[{"publication_status":"published","issue":"6/7","year":"2015","intvolume":"        29","page":"442-447","citation":{"chicago":"Wünderlich, Nancy, Kristina Heinonen, Amy L Ostrom, Lia Patricio, Rui Sousa, Chris Voss, and Jos Lemmink. “Futurizing” Smart Service: Implications for Service Researchers and Managers.” <i>Journal of Services Marketing</i> 29, no. 6/7 (2015): 442–47.","ieee":"N. Wünderlich <i>et al.</i>, “Futurizing” Smart Service: Implications for Service Researchers and Managers.,” <i>Journal of Services Marketing</i>, vol. 29, no. 6/7, pp. 442–447, 2015.","ama":"Wünderlich N, Heinonen K, Ostrom AL, et al. Futurizing” Smart Service: Implications for Service Researchers and Managers. <i>Journal of Services Marketing</i>. 2015;29(6/7):442-447.","apa":"Wünderlich, N., Heinonen, K., Ostrom, A. L., Patricio, L., Sousa, R., Voss, C., &#38; Lemmink, J. (2015). Futurizing” Smart Service: Implications for Service Researchers and Managers. <i>Journal of Services Marketing</i>, <i>29</i>(6/7), 442–447.","bibtex":"@article{Wünderlich_Heinonen_Ostrom_Patricio_Sousa_Voss_Lemmink_2015, title={Futurizing” Smart Service: Implications for Service Researchers and Managers.}, volume={29}, number={6/7}, journal={Journal of Services Marketing}, publisher={Emerald Group Publishing Limited}, author={Wünderlich, Nancy and Heinonen, Kristina and Ostrom, Amy L and Patricio, Lia and Sousa, Rui and Voss, Chris and Lemmink, Jos}, year={2015}, pages={442–447} }","mla":"Wünderlich, Nancy, et al. “Futurizing” Smart Service: Implications for Service Researchers and Managers.” <i>Journal of Services Marketing</i>, vol. 29, no. 6/7, Emerald Group Publishing Limited, 2015, pp. 442–47.","short":"N. Wünderlich, K. Heinonen, A.L. Ostrom, L. Patricio, R. Sousa, C. Voss, J. Lemmink, Journal of Services Marketing 29 (2015) 442–447."},"date_updated":"2022-01-06T07:02:36Z","publisher":"Emerald Group Publishing Limited","volume":29,"author":[{"last_name":"Wünderlich","id":"36392","full_name":"Wünderlich, Nancy","first_name":"Nancy"},{"full_name":"Heinonen, Kristina","last_name":"Heinonen","first_name":"Kristina"},{"full_name":"Ostrom, Amy L","last_name":"Ostrom","first_name":"Amy L"},{"last_name":"Patricio","full_name":"Patricio, Lia","first_name":"Lia"},{"first_name":"Rui","last_name":"Sousa","full_name":"Sousa, Rui"},{"last_name":"Voss","full_name":"Voss, Chris","first_name":"Chris"},{"full_name":"Lemmink, Jos","last_name":"Lemmink","first_name":"Jos"}],"date_created":"2018-11-15T11:27:26Z","title":"Futurizing” Smart Service: Implications for Service Researchers and Managers.","publication":"Journal of Services Marketing","type":"journal_article","abstract":[{"text":"Purpose\r\n– The purpose of this paper is to craft a future research agenda to advance smart service research and practice. Smart services are delivered to or via intelligent objects that feature awareness and connectivity. For service researchers and managers, one of the most fascinating aspects of smart service provision is that the connected object is able to sense its own condition and its surroundings and thus allows for real-time data collection, continuous communication and interactive feedback. \r\n\r\nDesign/methodology/approach\r\n– This article is based on discussions in the workshop on “Fresh perspectives on technology in service” at the International Network of Service Researchers on September 26, 2014 at CTF, Karlstad, Sweden. The paper summarizes the discussion on smart services, adds an extensive literature review, provides examples from business practice and develops a structured approach to new research avenues. \r\n\r\nFindings\r\n– We propose that smart services vary on their individual level of autonomous decision-making, visibility and embeddedness in objects and customer lives. Based on a discussion of these characteristics, we identify research avenues regarding the perception and nature of smart services, the adoption of smart services, the innovation through smart services as well as regarding the development of new business models. \r\n\r\nOriginality/value\r\n– Smart services is a new emerging topic in service marketing research, their implications on organizations, customers and the service landscape have not been fully explored. We provide a fresh perspective on service research by characterizing relevant aspects of smart service that will stimulate fruitful future research and advance the understanding and practice of smart services.","lang":"eng"}],"status":"public","_id":"5701","department":[{"_id":"181"}],"user_id":"37741","keyword":["Connected services","Intelligent object","New service type","Smart services"],"article_type":"original","language":[{"iso":"eng"}]},{"author":[{"full_name":"Gustafsson, Anders","last_name":"Gustafsson","first_name":"Anders"},{"full_name":"Aksoy, Lerzan","last_name":"Aksoy","first_name":"Lerzan"},{"first_name":"Michael K","full_name":"Brady, Michael K","last_name":"Brady"},{"full_name":"McColl-Kennedy, Janet R","last_name":"McColl-Kennedy","first_name":"Janet R"},{"first_name":"Nancy J","last_name":"Sirianni","full_name":"Sirianni, Nancy J"},{"first_name":"Lars","full_name":"Witell, Lars","last_name":"Witell"},{"last_name":"Wünderlich","full_name":"Wünderlich, Nancy","id":"36392","first_name":"Nancy"}],"volume":29,"date_updated":"2022-01-06T07:02:36Z","citation":{"ama":"Gustafsson A, Aksoy L, Brady MK, et al. Conducting Service Research that Matters. <i>Journal of Services Marketing</i>. 2015;29(6/7):425-429.","ieee":"A. Gustafsson <i>et al.</i>, “Conducting Service Research that Matters.,” <i>Journal of Services Marketing</i>, vol. 29, no. 6/7, pp. 425–429, 2015.","chicago":"Gustafsson, Anders, Lerzan Aksoy, Michael K Brady, Janet R McColl-Kennedy, Nancy J Sirianni, Lars Witell, and Nancy Wünderlich. “Conducting Service Research That Matters.” <i>Journal of Services Marketing</i> 29, no. 6/7 (2015): 425–29.","bibtex":"@article{Gustafsson_Aksoy_Brady_McColl-Kennedy_Sirianni_Witell_Wünderlich_2015, title={Conducting Service Research that Matters.}, volume={29}, number={6/7}, journal={Journal of Services Marketing}, publisher={Emerald Group Publishing Limited}, author={Gustafsson, Anders and Aksoy, Lerzan and Brady, Michael K and McColl-Kennedy, Janet R and Sirianni, Nancy J and Witell, Lars and Wünderlich, Nancy}, year={2015}, pages={425–429} }","short":"A. Gustafsson, L. Aksoy, M.K. Brady, J.R. McColl-Kennedy, N.J. Sirianni, L. Witell, N. Wünderlich, Journal of Services Marketing 29 (2015) 425–429.","mla":"Gustafsson, Anders, et al. “Conducting Service Research That Matters.” <i>Journal of Services Marketing</i>, vol. 29, no. 6/7, Emerald Group Publishing Limited, 2015, pp. 425–29.","apa":"Gustafsson, A., Aksoy, L., Brady, M. K., McColl-Kennedy, J. R., Sirianni, N. J., Witell, L., &#38; Wünderlich, N. (2015). Conducting Service Research that Matters. <i>Journal of Services Marketing</i>, <i>29</i>(6/7), 425–429."},"intvolume":"        29","page":"425-429","publication_status":"published","article_type":"original","user_id":"37741","department":[{"_id":"181"}],"_id":"5703","status":"public","type":"journal_article","title":"Conducting Service Research that Matters.","date_created":"2018-11-15T11:32:07Z","publisher":"Emerald Group Publishing Limited","year":"2015","issue":"6/7","language":[{"iso":"eng"}],"keyword":["Relevance","Service technology","Service innovation","Customer experience","Rigor","Service outcomes"],"abstract":[{"text":"Purpose\r\n– The purpose of this paper is to encourage the reader to think differently about service-related issues and to strive to conduct service research that makes a transformational impact on individuals, organizations and society. The authors suggest that service researchers are in an excellent position to develop research that matters by making stronger connections with theory and elevating purely applied research to research that is higher in both practical relevance and methodological rigor. \r\n\r\nDesign/methodology/approach\r\n– This paper takes a conceptual approach, connecting pertinent literature with new ideas highlighted in this special issue. \r\n\r\nFindings\r\n– This paper proposes that service researchers look beyond traditional service applications, take a multi-disciplinary approach to problem-solving and make greater strides towards connecting theory and practice. The authors propose a Model of Rigorous and Relevant Research, and call for fresh thinking across a wide range of research areas, including enhancing the customer experience, crafting innovation, integrating technology and measuring service outcomes. \r\n\r\nOriginality/value\r\n– The originality of this essay lies in its focus on revitalizing the discussion on relevance and rigor as a path forward for service research. Additionally, this paper offers new insights on core management aspects of service provision that provide a solid platform for future work in service research.","lang":"eng"}],"publication":"Journal of Services Marketing"},{"title":"The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.","date_updated":"2022-01-06T07:02:36Z","publisher":"MIS RC","volume":39,"author":[{"last_name":"Scherer","full_name":"Scherer, Anne","first_name":"Anne"},{"first_name":"Nancy","full_name":"Wünderlich, Nancy","id":"36392","last_name":"Wünderlich"},{"first_name":"Florian","full_name":"Von Wangenheim, Florian","last_name":"Von Wangenheim"}],"date_created":"2018-11-15T11:36:38Z","year":"2015","intvolume":"        39","page":"177-200","citation":{"bibtex":"@article{Scherer_Wünderlich_Von Wangenheim_2015, title={The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.}, volume={39}, number={1}, journal={MIS Quarterly}, publisher={MIS RC}, author={Scherer, Anne and Wünderlich, Nancy and Von Wangenheim, Florian}, year={2015}, pages={177–200} }","mla":"Scherer, Anne, et al. “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.” <i>MIS Quarterly</i>, vol. 39, no. 1, MIS RC, 2015, pp. 177–200.","short":"A. Scherer, N. Wünderlich, F. Von Wangenheim, MIS Quarterly 39 (2015) 177–200.","apa":"Scherer, A., Wünderlich, N., &#38; Von Wangenheim, F. (2015). The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention. <i>MIS Quarterly</i>, <i>39</i>(1), 177–200.","ama":"Scherer A, Wünderlich N, Von Wangenheim F. The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention. <i>MIS Quarterly</i>. 2015;39(1):177-200.","chicago":"Scherer, Anne, Nancy Wünderlich, and Florian Von Wangenheim. “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.” <i>MIS Quarterly</i> 39, no. 1 (2015): 177–200.","ieee":"A. Scherer, N. Wünderlich, and F. Von Wangenheim, “The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.,” <i>MIS Quarterly</i>, vol. 39, no. 1, pp. 177–200, 2015."},"publication_identifier":{"issn":["0276-7783."]},"publication_status":"published","issue":"1","keyword":["customer defection","customer retention","e-service","longitudinal","Self-service","value-in-context"],"article_type":"original","language":[{"iso":"eng"}],"_id":"5704","department":[{"_id":"181"}],"user_id":"37741","abstract":[{"lang":"eng","text":"Advancements in information technology have changed the way customers experience a service encounter and their relationship with service providers. Especially technology-based self-service channels have found their way into the 21st century service economy. While research embraces these channels for their cost-efficiency, it has not examined whether a shift from personal to self-service affects customer–firm relationships. Drawing from the service-dominant logic and its central concept of value-in-context, we discuss customers’ value creation in self-service and personal service channels and examine the long-term impact of these channels on customer retention. Using longitudinal customer data, we investigate how the ratio of self-service versus personal service use influences customer defection over time. Our findings suggest that the ratio of self-service to personal service used affects customer defection in a U-shaped manner, with intermediate levels of both self-service and personal service use being associated with the lowest likelihood of defection. We also find that this effect mitigates over time. We conclude that firms should not shift customers toward self-service channels completely, especially not at the beginning of a relationship. Our study underlines the importance of understanding when and how self-service technologies create valuable customer experiences and stresses the notion of actively managing customers’ cocreation of value. "}],"status":"public","publication":"MIS Quarterly","type":"journal_article"},{"department":[{"_id":"181"}],"user_id":"37741","_id":"5714","article_type":"original","type":"journal_article","status":"public","volume":90,"author":[{"full_name":"Schumann, Jan H","last_name":"Schumann","first_name":"Jan H"},{"first_name":"Nancy","last_name":"Wünderlich","full_name":"Wünderlich, Nancy","id":"36392"},{"last_name":"Evanschitzky","full_name":"Evanschitzky, Heiner","first_name":"Heiner"}],"date_updated":"2022-01-06T07:02:37Z","publication_status":"published","intvolume":"        90","page":"111-118","citation":{"bibtex":"@article{Schumann_Wünderlich_Evanschitzky_2014, title={Spillover Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special Treatment Benefits.}, volume={90}, number={1}, journal={Journal of Retailing}, publisher={Elsevier}, author={Schumann, Jan H and Wünderlich, Nancy and Evanschitzky, Heiner}, year={2014}, pages={111–118} }","mla":"Schumann, Jan H., et al. “Spillover Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special Treatment Benefits.” <i>Journal of Retailing</i>, vol. 90, no. 1, Elsevier, 2014, pp. 111–18.","short":"J.H. Schumann, N. Wünderlich, H. Evanschitzky, Journal of Retailing 90 (2014) 111–118.","apa":"Schumann, J. H., Wünderlich, N., &#38; Evanschitzky, H. (2014). Spillover Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special Treatment Benefits. <i>Journal of Retailing</i>, <i>90</i>(1), 111–118.","ieee":"J. H. Schumann, N. Wünderlich, and H. Evanschitzky, “Spillover Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special Treatment Benefits.,” <i>Journal of Retailing</i>, vol. 90, no. 1, pp. 111–118, 2014.","chicago":"Schumann, Jan H, Nancy Wünderlich, and Heiner Evanschitzky. “Spillover Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special Treatment Benefits.” <i>Journal of Retailing</i> 90, no. 1 (2014): 111–18.","ama":"Schumann JH, Wünderlich N, Evanschitzky H. Spillover Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special Treatment Benefits. <i>Journal of Retailing</i>. 2014;90(1):111-118."},"language":[{"iso":"eng"}],"keyword":["Service failure","Spillover effects","Buffering effect","Coalition loyalty program"],"publication":"Journal of Retailing","abstract":[{"lang":"eng","text":"Coalition loyalty programs are on the rise, yet few studies investigate the impact of service failures in such programs. Using data from a retail context, the authors show that a program partner deemed responsible for a service failure suffers negative customer responses. However, customers’ perceptions of the benefits of the coalition loyalty program buffer these consequences. Perhaps most importantly, when customers perceive the program's special treatment benefits as low, direct and indirect spillover effects occur, such that a service failure by one program partner has a negative effect on customer loyalty toward the program itself."}],"date_created":"2018-11-16T09:23:24Z","publisher":"Elsevier","title":"Spillover Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special Treatment Benefits.","issue":"1","year":"2014"},{"user_id":"37741","department":[{"_id":"181"}],"_id":"5715","language":[{"iso":"eng"}],"article_type":"original","keyword":["service technology","technology-mediated service","service counterpart","smart service","remote service","technology adoption"],"type":"journal_article","publication":"Journal of Service Research","status":"public","abstract":[{"lang":"eng","text":"Smart interactive services, in contrast with other technology-based services, require significant human-to-human interaction and collaboration in addition to the service provided by the embedded technology itself. The authors’ foundational Delphi study confirms smart interactive services (e.g., remote diagnosis, remote repair of equipment, and telemedicine) are a rapidly growing innovation category across industries. Yet, gaining user acceptance of these types of services presents a significant challenge for managers. To address this challenge, the authors employ a grounded theory approach, drawing on depth interviews, to develop a framework of barriers and facilitators to users’ attitudinal and behavioral responses to smart interactive services. The findings reveal a new set of beliefs that are critical in this context. These beliefs are tied to the human element and specifically pertain to beliefs about the “service counterpart (SC),” who is the provider’s employee controlling the technology. Control, trustworthiness, and collaboration beliefs emerge jointly as important and interrelated influencers tied to the SC. Contrary to conventional wisdom that focuses on features of the technology itself to gain user acceptance, this research encourages providers to emphasize the interpersonal elements of the service by providing control cues, raising social presence, and enhancing human trust mechanisms."}],"author":[{"first_name":"Nancy","full_name":"Wünderlich, Nancy","id":"36392","last_name":"Wünderlich"},{"last_name":"Wangenheim","full_name":"Wangenheim, Florian V","first_name":"Florian V"},{"first_name":"Mary Jo","full_name":"Bitner, Mary Jo","last_name":"Bitner"}],"date_created":"2018-11-16T09:31:00Z","volume":16,"publisher":"SAGE Publications Sage CA: Los Angeles, CA","date_updated":"2022-01-06T07:02:37Z","title":"High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.","issue":"1","publication_status":"published","citation":{"ama":"Wünderlich N, Wangenheim FV, Bitner MJ. High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services. <i>Journal of Service Research</i>. 2013;16(1):3-20.","chicago":"Wünderlich, Nancy, Florian V Wangenheim, and Mary Jo Bitner. “High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.” <i>Journal of Service Research</i> 16, no. 1 (2013): 3–20.","ieee":"N. Wünderlich, F. V. Wangenheim, and M. J. Bitner, “High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.,” <i>Journal of Service Research</i>, vol. 16, no. 1, pp. 3–20, 2013.","apa":"Wünderlich, N., Wangenheim, F. V., &#38; Bitner, M. J. (2013). High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services. <i>Journal of Service Research</i>, <i>16</i>(1), 3–20.","mla":"Wünderlich, Nancy, et al. “High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.” <i>Journal of Service Research</i>, vol. 16, no. 1, SAGE Publications Sage CA: Los Angeles, CA, 2013, pp. 3–20.","bibtex":"@article{Wünderlich_Wangenheim_Bitner_2013, title={High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.}, volume={16}, number={1}, journal={Journal of Service Research}, publisher={SAGE Publications Sage CA: Los Angeles, CA}, author={Wünderlich, Nancy and Wangenheim, Florian V and Bitner, Mary Jo}, year={2013}, pages={3–20} }","short":"N. Wünderlich, F.V. Wangenheim, M.J. Bitner, Journal of Service Research 16 (2013) 3–20."},"page":"3-20","intvolume":"        16","year":"2013"},{"type":"journal_article","publication":"Scandinavian Journal of Information Systems","status":"public","user_id":"72849","_id":"4699","extern":"1","language":[{"iso":"eng"}],"keyword":["Business process management","Conceptual modeling","Interaction routines","Modular design","Service networks","Social construction"],"issue":"1","publication_identifier":{"issn":["09050167"]},"citation":{"bibtex":"@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuss_2013, title={Designing interaction routines in service networks: A modularity and social construction-based approach}, number={1}, journal={Scandinavian Journal of Information Systems}, author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuss, Jens}, year={2013}, pages={17--47} }","mla":"Becker, Jörg, et al. “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach.” <i>Scandinavian Journal of Information Systems</i>, no. 1, 2013, pp. 17--47.","short":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuss, Scandinavian Journal of Information Systems (2013) 17--47.","apa":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., &#38; Pöppelbuss, J. (2013). Designing interaction routines in service networks: A modularity and social construction-based approach. <i>Scandinavian Journal of Information Systems</i>, (1), 17--47.","ama":"Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuss J. Designing interaction routines in service networks: A modularity and social construction-based approach. <i>Scandinavian Journal of Information Systems</i>. 2013;(1):17--47.","ieee":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuss, “Designing interaction routines in service networks: A modularity and social construction-based approach,” <i>Scandinavian Journal of Information Systems</i>, no. 1, pp. 17--47, 2013.","chicago":"Becker, Jörg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver Müller, and Jens Pöppelbuss. “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach.” <i>Scandinavian Journal of Information Systems</i>, no. 1 (2013): 17--47."},"page":"17--47","year":"2013","date_created":"2018-10-12T08:30:56Z","author":[{"first_name":"Jörg","full_name":"Becker, Jörg","last_name":"Becker"},{"last_name":"Beverungen","id":"59677","full_name":"Beverungen, Daniel","first_name":"Daniel"},{"first_name":"Ralf","full_name":"Knackstedt, Ralf","last_name":"Knackstedt"},{"last_name":"Matzner","full_name":"Matzner, Martin","first_name":"Martin"},{"last_name":"Müller","id":"72849","full_name":"Müller, Oliver","first_name":"Oliver"},{"full_name":"Pöppelbuss, Jens","last_name":"Pöppelbuss","first_name":"Jens"}],"date_updated":"2022-01-06T07:01:18Z","main_file_link":[{"url":"https://aisel.aisnet.org/sjis/vol25/iss1/2/"}],"title":"Designing interaction routines in service networks: A modularity and social construction-based approach"},{"type":"journal_article","publication":"IEEE Transactions on Engineering Management","status":"public","_id":"4700","user_id":"72849","keyword":["Action research","boundary spanning","business process management (BPM)","service blueprinting","service networks"],"language":[{"iso":"eng"}],"extern":"1","publication_identifier":{"issn":["00189391"],"isbn":["0018-9391"]},"issue":"3","year":"2013","citation":{"apa":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., &#38; Pöppelbuss, J. (2013). Bridging the gap between manufacturing and service through IT-based boundary objects. <i>IEEE Transactions on Engineering Management</i>, (3), 468--482. <a href=\"https://doi.org/10.1109/TEM.2012.2214770\">https://doi.org/10.1109/TEM.2012.2214770</a>","bibtex":"@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuss_2013, title={Bridging the gap between manufacturing and service through IT-based boundary objects}, DOI={<a href=\"https://doi.org/10.1109/TEM.2012.2214770\">10.1109/TEM.2012.2214770</a>}, number={3}, journal={IEEE Transactions on Engineering Management}, author={Becker, Jorg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuss, Jens}, year={2013}, pages={468--482} }","short":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuss, IEEE Transactions on Engineering Management (2013) 468--482.","mla":"Becker, Jorg, et al. “Bridging the Gap between Manufacturing and Service through IT-Based Boundary Objects.” <i>IEEE Transactions on Engineering Management</i>, no. 3, 2013, pp. 468--482, doi:<a href=\"https://doi.org/10.1109/TEM.2012.2214770\">10.1109/TEM.2012.2214770</a>.","ieee":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuss, “Bridging the gap between manufacturing and service through IT-based boundary objects,” <i>IEEE Transactions on Engineering Management</i>, no. 3, pp. 468--482, 2013.","chicago":"Becker, Jorg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver Müller, and Jens Pöppelbuss. “Bridging the Gap between Manufacturing and Service through IT-Based Boundary Objects.” <i>IEEE Transactions on Engineering Management</i>, no. 3 (2013): 468--482. <a href=\"https://doi.org/10.1109/TEM.2012.2214770\">https://doi.org/10.1109/TEM.2012.2214770</a>.","ama":"Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuss J. Bridging the gap between manufacturing and service through IT-based boundary objects. <i>IEEE Transactions on Engineering Management</i>. 2013;(3):468--482. doi:<a href=\"https://doi.org/10.1109/TEM.2012.2214770\">10.1109/TEM.2012.2214770</a>"},"page":"468--482","date_updated":"2022-01-06T07:01:19Z","date_created":"2018-10-12T08:31:02Z","author":[{"first_name":"Jorg","full_name":"Becker, Jorg","last_name":"Becker"},{"first_name":"Daniel","last_name":"Beverungen","full_name":"Beverungen, Daniel","id":"59677"},{"last_name":"Knackstedt","full_name":"Knackstedt, Ralf","first_name":"Ralf"},{"first_name":"Martin","full_name":"Matzner, Martin","last_name":"Matzner"},{"first_name":"Oliver","last_name":"Müller","id":"72849","full_name":"Müller, Oliver"},{"first_name":"Jens","last_name":"Pöppelbuss","full_name":"Pöppelbuss, Jens"}],"title":"Bridging the gap between manufacturing and service through IT-based boundary objects","doi":"10.1109/TEM.2012.2214770"},{"date_updated":"2022-01-06T06:56:06Z","publisher":"Monsenstein und Vannerdat","author":[{"last_name":"Pottebaum","orcid":"http://orcid.org/0000-0001-8778-2989","full_name":"Pottebaum, Jens","id":"405","first_name":"Jens"}],"date_created":"2021-09-09T12:18:36Z","title":"Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation","publication_identifier":{"isbn":["3-86991-525-0"]},"place":"Münster","year":"2012","citation":{"chicago":"Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Münster: Monsenstein und Vannerdat, 2012.","ieee":"J. Pottebaum, <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>. Münster: Monsenstein und Vannerdat, 2012.","ama":"Pottebaum J. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Monsenstein und Vannerdat; 2012.","short":"J. Pottebaum, Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation, Monsenstein und Vannerdat, Münster, 2012.","mla":"Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>. Monsenstein und Vannerdat, 2012.","bibtex":"@book{Pottebaum_2012, place={Münster}, title={Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation}, publisher={Monsenstein und Vannerdat}, author={Pottebaum, Jens}, year={2012} }","apa":"Pottebaum, J. (2012). <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>. Monsenstein und Vannerdat."},"_id":"24036","user_id":"405","keyword":["Arbeitsorganisation","E-Learning","Lernorganisation","Lerntechnik","Wissensmanagement"],"language":[{"iso":"eng"}],"type":"dissertation","status":"public"},{"intvolume":"        88","page":"356-366","citation":{"apa":"Evanschitzky, H., Wangenheim, F. v, &#38; Wünderlich, N. (2012). Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops. <i>Journal of Retailing</i>, <i>88</i>(3), 356–366.","short":"H. Evanschitzky, F. v Wangenheim, N. Wünderlich, Journal of Retailing 88 (2012) 356–366.","mla":"Evanschitzky, Heiner, et al. “Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops.” <i>Journal of Retailing</i>, vol. 88, no. 3, Elsevier, 2012, pp. 356–66.","bibtex":"@article{Evanschitzky_Wangenheim_Wünderlich_2012, title={Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops.}, volume={88}, number={3}, journal={Journal of Retailing}, publisher={Elsevier}, author={Evanschitzky, Heiner and Wangenheim, Florian v and Wünderlich, Nancy}, year={2012}, pages={356–366} }","chicago":"Evanschitzky, Heiner, Florian v Wangenheim, and Nancy Wünderlich. “Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops.” <i>Journal of Retailing</i> 88, no. 3 (2012): 356–66.","ieee":"H. Evanschitzky, F. v Wangenheim, and N. Wünderlich, “Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops.,” <i>Journal of Retailing</i>, vol. 88, no. 3, pp. 356–366, 2012.","ama":"Evanschitzky H, Wangenheim F v, Wünderlich N. Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops. <i>Journal of Retailing</i>. 2012;88(3):356-366."},"publication_status":"published","volume":88,"author":[{"full_name":"Evanschitzky, Heiner","last_name":"Evanschitzky","first_name":"Heiner"},{"last_name":"Wangenheim","full_name":"Wangenheim, Florian v","first_name":"Florian v"},{"last_name":"Wünderlich","id":"36392","full_name":"Wünderlich, Nancy","first_name":"Nancy"}],"date_updated":"2022-01-06T07:02:37Z","status":"public","type":"journal_article","article_type":"original","department":[{"_id":"181"}],"user_id":"37741","_id":"5716","year":"2012","issue":"3","title":"Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops.","date_created":"2018-11-16T09:37:06Z","publisher":"Elsevier","abstract":[{"text":"The tendency of managers to focus on short-term results rather than on sustained company success is of particular importance to retail marketing managers, because marketing activities involve expenditures which may only pay off in the longer term. To address the issue of myopic management, our study shows how the complexity of the service profit chain (SPC) can cause managers to make suboptimal decisions. Hence, our paper departs from past research by recognizing that understanding the temporal interplay between operational investments, employee satisfaction, customer satisfaction, and operating profit is essential to achieving sustained success. In particular, we intend to improve understanding of the functioning of the SPC with respect to time lags and feedback loops. Results of our large-scale longitudinal study set in a multi-outlet retail chain reveal time-lag effects between operational investments and employee satisfaction, as well as between customer satisfaction and performance. These findings, along with evidence of a negative interaction effect of employee satisfaction on the relationship between current performance and future investments, show the substantial risk of mismanaging the SPC. We identify specific situations in which the dynamic approach leads to superior marketing investment decisions, when compared to the conventional static view of the SCP. These insights provide valuable managerial guidance for effectively managing the SPC over time.","lang":"eng"}],"publication":"Journal of Retailing","language":[{"iso":"eng"}],"keyword":["Employee satisfaction","Customer satisfaction","Performance","Service profit chain","Feedback loops","Time lags","Myopic marketing management"]},{"year":"2011","page":"17-29","intvolume":"         6","citation":{"apa":"Jenert, T., Gebhardt, A., &#38; Käser, R. (2011). Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift Für E-Learning</i>, <i>6</i>(2), 17–29.","mla":"Jenert, Tobias, et al. “Weblogs Zur Unterstützung Der Theorie-Praxis-Integration in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift Für E-Learning</i>, vol. 6, no. 2, Studien-Verlag, 2011, pp. 17–29.","bibtex":"@article{Jenert_Gebhardt_Käser_2011, title={Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung}, volume={6}, number={2}, journal={Zeitschrift für E-Learning}, publisher={Studien-Verlag}, author={Jenert, Tobias and Gebhardt, Anja and Käser, Reto}, year={2011}, pages={17–29} }","short":"T. Jenert, A. Gebhardt, R. Käser, Zeitschrift Für E-Learning 6 (2011) 17–29.","ama":"Jenert T, Gebhardt A, Käser R. Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift für E-Learning</i>. 2011;6(2):17-29.","chicago":"Jenert, Tobias, Anja Gebhardt, and Reto Käser. “Weblogs Zur Unterstützung Der Theorie-Praxis-Integration in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift Für E-Learning</i> 6, no. 2 (2011): 17–29.","ieee":"T. Jenert, A. Gebhardt, and R. Käser, “Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung,” <i>Zeitschrift für E-Learning</i>, vol. 6, no. 2, pp. 17–29, 2011."},"publication_identifier":{"issn":["1992-9579"]},"issue":"2","title":"Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung","date_updated":"2022-01-06T07:01:03Z","publisher":"Studien-Verlag","volume":6,"date_created":"2018-09-18T09:23:54Z","author":[{"first_name":"Tobias","full_name":"Jenert, Tobias","last_name":"Jenert"},{"full_name":"Gebhardt, Anja","last_name":"Gebhardt","first_name":"Anja"},{"first_name":"Reto","full_name":"Käser, Reto","last_name":"Käser"}],"abstract":[{"lang":"ger","text":"Eine zentrale Herausforderung in der Ausbildung angehender Wirtschaftslehrpersonen stellt die sinnvolle Verknüpfung von Theorie- und Praxiserfahrungen dar. Im Rahmen der Ausbildung angehender Wirtschaftslehrpersonen an der Universität St. Gallen wird eine Lernumgebung gestaltet, die eine Verschränkung von Theorie- und Praxiserfahrungen ermöglichen soll. Die Lernprozesse der Studierenden werden dabei durch didaktisch angeleitete Weblogarbeit unterstützt. Trotz der Lernchancen, die sich aus einer Verknüpfung von theoretischen und praktischen Lernphasen ergeben, schätzen die Studierenden den Nutzen der Weblogarbeit als äusserst gering ein. Die Studierenden bei der reflexiven Integration praxisnaher und theoretischer Lernerfahrungen zu unterstützen, ist eine Herausforderung, die dezidierter Anleitung und Förderung durch die Lehrpersonen bedarf"}],"status":"public","publication":"Zeitschrift für E-Learning","type":"journal_article","keyword":["Weblog","Blog","e-learning","TEL","higher education","business education"],"extern":"1","_id":"4430","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057"},{"user_id":"460","department":[{"_id":"54"}],"_id":"11892","language":[{"iso":"eng"}],"keyword":["audio streaming","audio visual data streaming","context information speech","face identification","face recognition","image segmentation","middleware","multimodal telecommunication","online diarization","service oriented middleware architecture","sessionless telecommunication","software architecture","speaker identification","speaker localization","speaker recognition","steerable camera","telecommunication computing","temporal segmentation","terminal-less telecommunication","video streaming"],"type":"journal_article","publication":"IEEE Journal of Selected Topics in Signal Processing","status":"public","abstract":[{"text":"For an environment to be perceived as being smart, contextual information has to be gathered to adapt the system's behavior and its interface towards the user. Being a rich source of context information speech can be acquired unobtrusively by microphone arrays and then processed to extract information about the user and his environment. In this paper, a system for joint temporal segmentation, speaker localization, and identification is presented, which is supported by face identification from video data obtained from a steerable camera. Special attention is paid to latency aspects and online processing capabilities, as they are important for the application under investigation, namely ambient communication. It describes the vision of terminal-less, session-less and multi-modal telecommunication with remote partners, where the user can move freely within his home while the communication follows him. The speaker diarization serves as a context source, which has been integrated in a service-oriented middleware architecture and provided to the application to select the most appropriate I/O device and to steer the camera towards the speaker during ambient communication.","lang":"eng"}],"date_created":"2019-07-12T05:30:16Z","author":[{"id":"460","full_name":"Schmalenstroeer, Joerg","last_name":"Schmalenstroeer","first_name":"Joerg"},{"last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242","first_name":"Reinhold"}],"volume":4,"oa":"1","date_updated":"2023-10-26T08:10:18Z","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2010/ScHa10.pdf","open_access":"1"}],"doi":"10.1109/JSTSP.2010.2050519","title":"Online Diarization of Streaming Audio-Visual Data for Smart Environments","issue":"5","quality_controlled":"1","citation":{"apa":"Schmalenstroeer, J., &#38; Haeb-Umbach, R. (2010). Online Diarization of Streaming Audio-Visual Data for Smart Environments. <i>IEEE Journal of Selected Topics in Signal Processing</i>, <i>4</i>(5), 845–856. <a href=\"https://doi.org/10.1109/JSTSP.2010.2050519\">https://doi.org/10.1109/JSTSP.2010.2050519</a>","bibtex":"@article{Schmalenstroeer_Haeb-Umbach_2010, title={Online Diarization of Streaming Audio-Visual Data for Smart Environments}, volume={4}, DOI={<a href=\"https://doi.org/10.1109/JSTSP.2010.2050519\">10.1109/JSTSP.2010.2050519</a>}, number={5}, journal={IEEE Journal of Selected Topics in Signal Processing}, author={Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}, year={2010}, pages={845–856} }","mla":"Schmalenstroeer, Joerg, and Reinhold Haeb-Umbach. “Online Diarization of Streaming Audio-Visual Data for Smart Environments.” <i>IEEE Journal of Selected Topics in Signal Processing</i>, vol. 4, no. 5, 2010, pp. 845–56, doi:<a href=\"https://doi.org/10.1109/JSTSP.2010.2050519\">10.1109/JSTSP.2010.2050519</a>.","short":"J. Schmalenstroeer, R. Haeb-Umbach, IEEE Journal of Selected Topics in Signal Processing 4 (2010) 845–856.","ama":"Schmalenstroeer J, Haeb-Umbach R. Online Diarization of Streaming Audio-Visual Data for Smart Environments. <i>IEEE Journal of Selected Topics in Signal Processing</i>. 2010;4(5):845-856. doi:<a href=\"https://doi.org/10.1109/JSTSP.2010.2050519\">10.1109/JSTSP.2010.2050519</a>","chicago":"Schmalenstroeer, Joerg, and Reinhold Haeb-Umbach. “Online Diarization of Streaming Audio-Visual Data for Smart Environments.” <i>IEEE Journal of Selected Topics in Signal Processing</i> 4, no. 5 (2010): 845–56. <a href=\"https://doi.org/10.1109/JSTSP.2010.2050519\">https://doi.org/10.1109/JSTSP.2010.2050519</a>.","ieee":"J. Schmalenstroeer and R. Haeb-Umbach, “Online Diarization of Streaming Audio-Visual Data for Smart Environments,” <i>IEEE Journal of Selected Topics in Signal Processing</i>, vol. 4, no. 5, pp. 845–856, 2010, doi: <a href=\"https://doi.org/10.1109/JSTSP.2010.2050519\">10.1109/JSTSP.2010.2050519</a>."},"intvolume":"         4","page":"845-856","year":"2010"},{"language":[{"iso":"eng"}],"ddc":["000"],"keyword":["e-voting","Internet voting","Internet election","security","verifiability","RIES","Estonia","Neuch{\\^a}tel"],"file":[{"creator":"hsiemes","date_created":"2018-12-18T13:16:07Z","date_updated":"2018-12-18T13:16:07Z","file_id":"6316","access_level":"open_access","file_name":"JOURNAL VERSION.pdf","file_size":1544790,"content_type":"application/pdf","relation":"main_file"}],"abstract":[{"lang":"eng","text":"Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence."}],"publication":"IEEE Transactions on Information Forensics \\& Security","title":"Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland","date_created":"2018-11-14T14:06:44Z","publisher":"IEEE","year":"2009","issue":"4 Part","extern":"1","file_date_updated":"2018-12-18T13:16:07Z","user_id":"61579","department":[{"_id":"277"}],"_id":"5621","status":"public","type":"journal_article","author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"},{"first_name":"Eliot","last_name":"Rich","full_name":"Rich, Eliot"}],"volume":4,"date_updated":"2022-01-06T07:02:12Z","oa":"1","citation":{"apa":"Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, <i>4</i>(4 Part), 729–744.","bibtex":"@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}, volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics \\&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009}, pages={729–744} }","short":"G. Schryen, E. Rich, IEEE Transactions on Information Forensics \\&#38; Security 4 (2009) 729–744.","mla":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.","ama":"Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions on Information Forensics \\&#38; Security</i>. 2009;4(4 Part):729-744.","ieee":"G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions on Information Forensics \\&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744, 2009.","chicago":"Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” <i>IEEE Transactions on Information Forensics \\&#38; Security</i> 4, no. 4 Part (2009): 729–44."},"page":"729-744","intvolume":"         4","has_accepted_license":"1"},{"title":"“Try something else!” — When users change their discursive behavior in human-robot interaction","doi":"10.1109/ROBOT.2008.4543743","date_updated":"2023-02-01T13:08:20Z","author":[{"last_name":"Lohse","full_name":"Lohse, Manja","first_name":"Manja"},{"first_name":"Katharina","id":"50352","full_name":"Rohlfing, Katharina","last_name":"Rohlfing"},{"first_name":"Britta","last_name":"Wrede","full_name":"Wrede, Britta"},{"full_name":"Sagerer, Gerhard","last_name":"Sagerer","first_name":"Gerhard"}],"date_created":"2020-06-24T13:02:49Z","year":"2008","page":"3481-3486","citation":{"ieee":"M. Lohse, K. Rohlfing, B. Wrede, and G. Sagerer, “‘Try something else!’ — When users change their discursive behavior in human-robot interaction,” 2008, pp. 3481–3486, doi: <a href=\"https://doi.org/10.1109/ROBOT.2008.4543743\">10.1109/ROBOT.2008.4543743</a>.","chicago":"Lohse, Manja, Katharina Rohlfing, Britta Wrede, and Gerhard Sagerer. “‘Try Something Else!’ — When Users Change Their Discursive Behavior in Human-Robot Interaction,” 3481–86, 2008. <a href=\"https://doi.org/10.1109/ROBOT.2008.4543743\">https://doi.org/10.1109/ROBOT.2008.4543743</a>.","ama":"Lohse M, Rohlfing K, Wrede B, Sagerer G. “Try something else!” — When users change their discursive behavior in human-robot interaction. In: ; 2008:3481-3486. doi:<a href=\"https://doi.org/10.1109/ROBOT.2008.4543743\">10.1109/ROBOT.2008.4543743</a>","apa":"Lohse, M., Rohlfing, K., Wrede, B., &#38; Sagerer, G. (2008). <i>“Try something else!” — When users change their discursive behavior in human-robot interaction</i>. 3481–3486. <a href=\"https://doi.org/10.1109/ROBOT.2008.4543743\">https://doi.org/10.1109/ROBOT.2008.4543743</a>","short":"M. Lohse, K. Rohlfing, B. Wrede, G. Sagerer, in: 2008, pp. 3481–3486.","mla":"Lohse, Manja, et al. <i>“Try Something Else!” — When Users Change Their Discursive Behavior in Human-Robot Interaction</i>. 2008, pp. 3481–86, doi:<a href=\"https://doi.org/10.1109/ROBOT.2008.4543743\">10.1109/ROBOT.2008.4543743</a>.","bibtex":"@inproceedings{Lohse_Rohlfing_Wrede_Sagerer_2008, title={“Try something else!” — When users change their discursive behavior in human-robot interaction}, DOI={<a href=\"https://doi.org/10.1109/ROBOT.2008.4543743\">10.1109/ROBOT.2008.4543743</a>}, author={Lohse, Manja and Rohlfing, Katharina and Wrede, Britta and Sagerer, Gerhard}, year={2008}, pages={3481–3486} }"},"publication_identifier":{"isbn":["1050-4729"]},"keyword":["discursive behavior","autonomous robot","BIRON","man-machine systems","robot abilities","robot knowledge","user gestures","robot verbal feedback utterance","speech processing","user verbal behavior","service robots","human-robot interaction","human computer interaction","gesture recognition"],"language":[{"iso":"eng"}],"_id":"17278","department":[{"_id":"749"}],"user_id":"14931","abstract":[{"text":"This paper investigates the influence of feedback provided by an autonomous robot (BIRON) on users’ discursive behavior. A user study is described during which users show objects to the robot. The results of the experiment indicate, that the robot’s verbal feedback utterances cause the humans to adapt their own way of speaking. The changes in users’ verbal behavior are due to their beliefs about the robots knowledge and abilities. In this paper they are identified and grouped. Moreover, the data implies variations in user behavior regarding gestures. Unlike speech, the robot was not able to give feedback with gestures. Due to the lack of feedback, users did not seem to have a consistent mental representation of the robot’s abilities to recognize gestures. As a result, changes between different gestures are interpreted to be unconscious variations accompanying speech.","lang":"eng"}],"status":"public","type":"conference"},{"year":"2007","page":"19--26","citation":{"bibtex":"@inproceedings{Sporer_Jenert_Strehl_Noack_2007, title={Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}, booktitle={DeLFI Workshops}, publisher={Logos Verlag}, author={Sporer, Thomas and Jenert, Tobias and Strehl, Bernhard and Noack, Patrick Ole}, year={2007}, pages={19--26} }","mla":"Sporer, Thomas, et al. “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im Hochschulstudium.” <i>DeLFI Workshops</i>, Logos Verlag, 2007, pp. 19--26.","short":"T. Sporer, T. Jenert, B. Strehl, P.O. Noack, in: DeLFI Workshops, Logos Verlag, 2007, pp. 19--26.","apa":"Sporer, T., Jenert, T., Strehl, B., &#38; Noack, P. O. (2007). Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium. In <i>DeLFI Workshops</i> (pp. 19--26). Siegen: Logos Verlag.","ieee":"T. Sporer, T. Jenert, B. Strehl, and P. O. Noack, “Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.,” in <i>DeLFI Workshops</i>, Siegen, 2007, pp. 19--26.","chicago":"Sporer, Thomas, Tobias Jenert, Bernhard Strehl, and Patrick Ole Noack. “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im Hochschulstudium.” In <i>DeLFI Workshops</i>, 19--26. Logos Verlag, 2007.","ama":"Sporer T, Jenert T, Strehl B, Noack PO. Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium. In: <i>DeLFI Workshops</i>. Logos Verlag; 2007:19--26."},"title":"Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.","conference":{"start_date":"2007-09-17","name":"DeLFI 2007 - 5. e-Learing Fachtagung Informatik der Gesellschaft für Informatik e.V.","location":"Siegen","end_date":"2007-09-17"},"publisher":"Logos Verlag","date_updated":"2022-01-06T07:01:06Z","date_created":"2018-09-19T09:08:18Z","author":[{"last_name":"Sporer","full_name":"Sporer, Thomas","first_name":"Thomas"},{"first_name":"Tobias","id":"71994","full_name":"Jenert, Tobias","last_name":"Jenert","orcid":" https://orcid.org/0000-0001-9262-5646"},{"full_name":"Strehl, Bernhard","last_name":"Strehl","first_name":"Bernhard"},{"first_name":"Patrick Ole","full_name":"Noack, Patrick Ole","last_name":"Noack"}],"status":"public","publication":"DeLFI Workshops","type":"conference","keyword":["E-Portfolios","Lerngemeinschaften","Praxisgemeinschaften","Projektgruppen","Hochschulstudium","informelles Lernen"],"extern":"1","alternative_title":["Proceedings der Pre-Conference Workshops der 5. e-Learning Fachtagung Informatik DeLFI 2007"],"_id":"4494","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057"},{"date_updated":"2022-01-06T07:01:06Z","date_created":"2018-09-19T09:22:02Z","author":[{"first_name":"Thomas","full_name":"Sporer, Thomas","last_name":"Sporer"},{"last_name":"Heinze","full_name":"Heinze, Nina","first_name":"Nina"},{"first_name":"Tobias","id":"71994","full_name":"Jenert, Tobias","orcid":" https://orcid.org/0000-0001-9262-5646","last_name":"Jenert"},{"last_name":"Reinmann","full_name":"Reinmann, Gabi","first_name":"Gabi"}],"title":"Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"","conference":{"end_date":"2007-06-20 ","location":"Kreta ","name":"Second European Conference on Technology Enhanced Learning (EC-TEL) 2007","start_date":"2007-06-17"},"year":"2007","citation":{"chicago":"Sporer, Thomas, Nina Heinze, Tobias Jenert, and Gabi Reinmann. “Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\",” 2007.","ieee":"T. Sporer, N. Heinze, T. Jenert, and G. Reinmann, “Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\",” presented at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007, Kreta , 2007.","ama":"Sporer T, Heinze N, Jenert T, Reinmann G. Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\". In: ; 2007.","apa":"Sporer, T., Heinze, N., Jenert, T., &#38; Reinmann, G. (2007). Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\". Presented at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007, Kreta .","bibtex":"@inproceedings{Sporer_Heinze_Jenert_Reinmann_2007, title={Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"}, author={Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi}, year={2007} }","mla":"Sporer, Thomas, et al. <i>Student Learning Communities in the Project-Centered Study Program\" Problem-Solving Competencies\"</i>. 2007.","short":"T. Sporer, N. Heinze, T. Jenert, G. Reinmann, in: 2007."},"_id":"4497","department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057","keyword":["Problem Solving Competencies","E-Portfolio"],"extern":"1","alternative_title":["Creating New Learning Experiences on a Global Scale"],"type":"conference","status":"public"},{"keyword":["e-mail","spam","e-mail infrastructure","anti-spam measures","spamming options"],"ddc":["000"],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment."}],"file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-18T13:25:12Z","creator":"hsiemes","date_updated":"2018-12-18T13:25:12Z","access_level":"open_access","file_name":"Do anti-spam measures effectively cover the e-mail communication - Journal version.pdf","file_id":"6324","file_size":100448}],"publication":"The Journal of Information Systems Security (AIS Special Interest Group in Security)","title":"Do anti-spam measures effectively cover the e-mail communication network? A formal approach","date_created":"2018-11-14T14:51:41Z","year":"2007","issue":"2","extern":"1","file_date_updated":"2018-12-18T13:25:12Z","_id":"5655","department":[{"_id":"277"}],"user_id":"61579","status":"public","type":"journal_article","oa":"1","date_updated":"2022-01-06T07:02:22Z","volume":3,"author":[{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"}],"intvolume":"         3","page":"66-90","citation":{"ama":"Schryen G. Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>. 2007;3(2):66-90.","chicago":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.","ieee":"G. Schryen, “Do anti-spam measures effectively cover the e-mail communication network? A formal approach,” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007.","bibtex":"@article{Schryen_2007, title={Do anti-spam measures effectively cover the e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The Journal of Information Systems Security (AIS Special Interest Group in Security)}, author={Schryen, Guido}, year={2007}, pages={66–90} }","mla":"Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.","short":"G. Schryen, The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2007) 66–90.","apa":"Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication network? A formal approach. <i>The Journal of Information Systems Security (AIS Special Interest Group in Security)</i>, <i>3</i>(2), 66–90."},"has_accepted_license":"1"},{"user_id":"61579","department":[{"_id":"277"}],"_id":"5661","extern":"1","file_date_updated":"2018-12-18T13:31:41Z","type":"conference","status":"public","author":[{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"}],"date_updated":"2022-01-06T07:02:24Z","oa":"1","has_accepted_license":"1","citation":{"mla":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, Westpoint, 2005, pp. 37–41.","bibtex":"@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses}, booktitle={Proceedings of the 6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen, Guido}, year={2005}, pages={37–41} }","short":"G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop, Westpoint, 2005, pp. 37–41.","apa":"Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i> (pp. 37–41). Westpoint.","chicago":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 37–41. Westpoint, 2005.","ieee":"G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses,” in <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 2005, pp. 37–41.","ama":"Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In: <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>. Westpoint; 2005:37-41."},"page":"37-41","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Spam","ham","e-mail","honeypot","address obscuring technique","address taxonomy"],"publication":"Proceedings of the 6th IEEE Information Assurance Workshop","file":[{"date_updated":"2018-12-18T13:31:41Z","creator":"hsiemes","date_created":"2018-12-18T13:31:41Z","file_size":119362,"file_id":"6331","access_level":"open_access","file_name":"Schryen - An e-mail honeypot addressing spammers' behavior in collecting and applying addresses.pdf","content_type":"application/pdf","relation":"main_file"}],"abstract":[{"text":"Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided.","lang":"eng"}],"date_created":"2018-11-14T14:55:48Z","publisher":"Westpoint","title":"An e-mail honeypot addressing spammers' behavior in collecting and applying addresses","year":"2005"},{"extern":"1","file_date_updated":"2018-12-18T13:36:34Z","_id":"5662","department":[{"_id":"277"}],"user_id":"61579","status":"public","type":"journal_article","date_updated":"2022-01-06T07:02:24Z","oa":"1","volume":46,"author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"}],"intvolume":"        46","page":"281-288","citation":{"apa":"Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>, <i>46</i>(4), 281–288.","bibtex":"@article{Schryen_2004, title={Effektivität von Lösungsansätzen zur Bekämpfung von Spam}, volume={46}, number={4}, journal={Wirtschaftsinformatik}, publisher={Springer}, author={Schryen, Guido}, year={2004}, pages={281–288} }","mla":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, Springer, 2004, pp. 281–88.","short":"G. Schryen, Wirtschaftsinformatik 46 (2004) 281–288.","ieee":"G. Schryen, “Effektivität von Lösungsansätzen zur Bekämpfung von Spam,” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, pp. 281–288, 2004.","chicago":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i> 46, no. 4 (2004): 281–88.","ama":"Schryen G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>. 2004;46(4):281-288."},"has_accepted_license":"1","keyword":["Spam","E-Mail","Spoofing","Blockieren","Filtern","Lightweight Mail Transfer Agent Authentication Protocol (LMAP)"],"ddc":["000"],"language":[{"iso":"eng"}],"abstract":[{"text":"Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten, weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe. Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit bedeutendsten Verfahren zur Bekämpfung von Spam.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","file_id":"6338","access_level":"open_access","file_name":"Verlagsversion Guido_Schryen__281__288.pdf","file_size":288686,"date_created":"2018-12-18T13:36:34Z","creator":"hsiemes","date_updated":"2018-12-18T13:36:34Z"}],"publication":"Wirtschaftsinformatik","title":"Effektivität von Lösungsansätzen zur Bekämpfung von Spam","publisher":"Springer","date_created":"2018-11-14T14:56:51Z","year":"2004","issue":"4"},{"status":"public","editor":[{"full_name":"Isaias, Pedro","last_name":"Isaias","first_name":"Pedro"}],"type":"conference","extern":"1","file_date_updated":"2018-12-18T13:33:30Z","user_id":"61579","department":[{"_id":"277"}],"_id":"5663","citation":{"chicago":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” In <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, 937–40. Madrid: IADIS Press, 2004.","ieee":"G. Schryen, “Fighting Spam: Motivating an Account-based Approach,” in <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i>, 2004, pp. 937–940.","ama":"Schryen G. Fighting Spam: Motivating an Account-based Approach. In: Isaias P, ed. <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>. Madrid: IADIS Press; 2004:937-940.","apa":"Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In P. Isaias (Ed.), <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i> (pp. 937–940). Madrid: IADIS Press.","mla":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, IADIS Press, 2004, pp. 937–40.","short":"G. Schryen, in: P. Isaias (Ed.), Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2, IADIS Press, Madrid, 2004, pp. 937–940.","bibtex":"@inproceedings{Schryen_2004, place={Madrid}, title={Fighting Spam: Motivating an Account-based Approach}, booktitle={Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, editor={Isaias, PedroEditor}, year={2004}, pages={937–940} }"},"page":"937-940","place":"Madrid","has_accepted_license":"1","author":[{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"oa":"1","date_updated":"2022-01-06T07:02:25Z","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-18T13:33:30Z","creator":"hsiemes","date_created":"2018-12-18T13:33:30Z","file_size":46083,"file_name":"Fighting Spam_Motivating an account-based approach.pdf","access_level":"open_access","file_id":"6333"}],"abstract":[{"lang":"eng","text":"Spam as unsolicited e-mail to a large number of recipients is known to ecome an increasingly disturbing and costly issue of electronic business and internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the domain name system. They come along with different drawbacks and have all low effectiveness in common. The article sketches these approaches, shows its limitations, and proposes an account-based approach where the number of e-mails per day and account is restricted."}],"publication":"Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["e-mail","spam","filtering","blocking","LMAP","SMTP account"],"year":"2004","title":"Fighting Spam: Motivating an Account-based Approach","date_created":"2018-11-14T14:59:03Z","publisher":"IADIS Press"},{"_id":"1998","department":[{"_id":"27"}],"user_id":"15274","series_title":"Lecture Notes in Computer Science","status":"public","type":"conference","doi":"10.1007/10968987_1","date_updated":"2022-01-06T06:54:17Z","volume":2862,"author":[{"full_name":"Hovestadt, Matthias","last_name":"Hovestadt","first_name":"Matthias"},{"full_name":"Kao, Odej","last_name":"Kao","first_name":"Odej"},{"first_name":"Axel","last_name":"Keller","full_name":"Keller, Axel","id":"15274"},{"first_name":"Achim","full_name":"Streit, Achim","last_name":"Streit"}],"place":"Berlin / Heidelberg","page":"1-20","intvolume":"      2862","citation":{"ama":"Hovestadt M, Kao O, Keller A, Streit A. Scheduling in HPC Resource Management Systems: Queuing vs. Planning. In: <i>Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP)</i>. Vol 2862. Lecture Notes in Computer Science. Berlin / Heidelberg; 2003:1-20. doi:<a href=\"https://doi.org/10.1007/10968987_1\">10.1007/10968987_1</a>","chicago":"Hovestadt, Matthias, Odej Kao, Axel Keller, and Achim Streit. “Scheduling in HPC Resource Management Systems: Queuing vs. Planning.” In <i>Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP)</i>, 2862:1–20. Lecture Notes in Computer Science. Berlin / Heidelberg, 2003. <a href=\"https://doi.org/10.1007/10968987_1\">https://doi.org/10.1007/10968987_1</a>.","ieee":"M. Hovestadt, O. Kao, A. Keller, and A. Streit, “Scheduling in HPC Resource Management Systems: Queuing vs. Planning,” in <i>Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP)</i>, 2003, vol. 2862, pp. 1–20.","bibtex":"@inproceedings{Hovestadt_Kao_Keller_Streit_2003, place={Berlin / Heidelberg}, series={Lecture Notes in Computer Science}, title={Scheduling in HPC Resource Management Systems: Queuing vs. Planning}, volume={2862}, DOI={<a href=\"https://doi.org/10.1007/10968987_1\">10.1007/10968987_1</a>}, booktitle={Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP)}, author={Hovestadt, Matthias and Kao, Odej and Keller, Axel and Streit, Achim}, year={2003}, pages={1–20}, collection={Lecture Notes in Computer Science} }","short":"M. Hovestadt, O. Kao, A. Keller, A. Streit, in: Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP), Berlin / Heidelberg, 2003, pp. 1–20.","mla":"Hovestadt, Matthias, et al. “Scheduling in HPC Resource Management Systems: Queuing vs. Planning.” <i>Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP)</i>, vol. 2862, 2003, pp. 1–20, doi:<a href=\"https://doi.org/10.1007/10968987_1\">10.1007/10968987_1</a>.","apa":"Hovestadt, M., Kao, O., Keller, A., &#38; Streit, A. (2003). Scheduling in HPC Resource Management Systems: Queuing vs. Planning. In <i>Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP)</i> (Vol. 2862, pp. 1–20). Berlin / Heidelberg. <a href=\"https://doi.org/10.1007/10968987_1\">https://doi.org/10.1007/10968987_1</a>"},"publication_status":"published","keyword":["High Performance Computing","Service Level Agreement","Grid Resource","Resource Management System","Advance Reservation"],"language":[{"iso":"eng"}],"abstract":[{"text":"Nearly all existing HPC systems are operated by resource management systems based on the queuing approach. With the increasing acceptance of grid middleware like Globus, new requirements for the underlying local resource management systems arise. Features like advanced reservation or quality of service are needed to implement high level functions like co-allocation. However it is difficult to realize these features with a resource management system based on the queuing concept since it considers only the present resource usage.\r\n\r\nIn this paper we present an approach which closes this gap. By assigning start times to each resource request, a complete schedule is planned. Advanced reservations are now easily possible. Based on this planning approach functions like diffuse requests, automatic duration extension, or service level agreements are described. We think they are useful to increase the usability, acceptance and performance of HPC machines. In the second part of this paper we present a planning based resource management system which already covers some of the mentioned features.","lang":"eng"}],"publication":"Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP)","title":"Scheduling in HPC Resource Management Systems: Queuing vs. Planning","date_created":"2018-03-29T11:37:24Z","year":"2003"}]
