[{"publication":"Proceedings of the 18th International Conference on Software Architecture Companion ","file":[{"date_updated":"2022-07-04T12:34:52Z","date_created":"2022-07-04T12:33:18Z","creator":"sego","file_size":183185,"file_name":"ICSA_CR.pdf","access_level":"open_access","file_id":"32322","content_type":"application/pdf","relation":"main_file"}],"abstract":[{"lang":"eng","text":"To build successful software products, developers continuously have to discover what features the users really need. This discovery can be achieved with continuous experimentation, testing different software variants with distinct user groups, and deploying the superior variant for all users. However, existing approaches do not focus on explicit modeling of variants and experiments, which offers advantages such as traceability of decisions and combinability of experiments. Therefore, our vision is the provision of model-driven continuous experimentation, which provides the developer with a framework for structuring the experimentation process. For that, we introduce the overall concept, apply it to the experimentation on component-based software architectures and point out future research questions. In particular, we show the applicability by combining feature models for modeling the software variants, users, and experiments (i.e., model-driven) with MAPE-K for the adaptation (i.e., continuous experimentation) and implementing the concept based on the component-based Angular framework."}],"language":[{"iso":"eng"}],"ddc":["000"],"keyword":["continuous experimentation","model-driven","component-based software architectures","self-adaptation"],"year":"2022","date_created":"2022-02-15T07:32:10Z","publisher":"IEEE","title":"Model-driven Continuous Experimentation on Component-based Software Architectures ","type":"conference","status":"public","user_id":"47208","department":[{"_id":"66"},{"_id":"534"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"17","name":"SFB 901 - C5: SFB 901 - Subproject C5"}],"_id":"29842","file_date_updated":"2022-07-04T12:34:52Z","has_accepted_license":"1","citation":{"short":"S. Gottschalk, E. Yigitbas, G. Engels, in: Proceedings of the 18th International Conference on Software Architecture Companion , IEEE, 2022.","bibtex":"@inproceedings{Gottschalk_Yigitbas_Engels_2022, title={Model-driven Continuous Experimentation on Component-based Software Architectures }, DOI={<a href=\"https://doi.org/10.1109/ICSA-C54293.2022.00011\">10.1109/ICSA-C54293.2022.00011</a>}, booktitle={Proceedings of the 18th International Conference on Software Architecture Companion }, publisher={IEEE}, author={Gottschalk, Sebastian and Yigitbas, Enes and Engels, Gregor}, year={2022} }","mla":"Gottschalk, Sebastian, et al. “Model-Driven Continuous Experimentation on Component-Based Software Architectures .” <i>Proceedings of the 18th International Conference on Software Architecture Companion </i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/ICSA-C54293.2022.00011\">10.1109/ICSA-C54293.2022.00011</a>.","apa":"Gottschalk, S., Yigitbas, E., &#38; Engels, G. (2022). Model-driven Continuous Experimentation on Component-based Software Architectures . <i>Proceedings of the 18th International Conference on Software Architecture Companion </i>. 18th International Conference on Software Architecture , Hawaii. <a href=\"https://doi.org/10.1109/ICSA-C54293.2022.00011\">https://doi.org/10.1109/ICSA-C54293.2022.00011</a>","chicago":"Gottschalk, Sebastian, Enes Yigitbas, and Gregor Engels. “Model-Driven Continuous Experimentation on Component-Based Software Architectures .” In <i>Proceedings of the 18th International Conference on Software Architecture Companion </i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/ICSA-C54293.2022.00011\">https://doi.org/10.1109/ICSA-C54293.2022.00011</a>.","ieee":"S. Gottschalk, E. Yigitbas, and G. Engels, “Model-driven Continuous Experimentation on Component-based Software Architectures ,” presented at the 18th International Conference on Software Architecture , Hawaii, 2022, doi: <a href=\"https://doi.org/10.1109/ICSA-C54293.2022.00011\">10.1109/ICSA-C54293.2022.00011</a>.","ama":"Gottschalk S, Yigitbas E, Engels G. Model-driven Continuous Experimentation on Component-based Software Architectures . In: <i>Proceedings of the 18th International Conference on Software Architecture Companion </i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/ICSA-C54293.2022.00011\">10.1109/ICSA-C54293.2022.00011</a>"},"author":[{"first_name":"Sebastian","last_name":"Gottschalk","full_name":"Gottschalk, Sebastian","id":"47208"},{"orcid":"0000-0002-5967-833X","last_name":"Yigitbas","id":"8447","full_name":"Yigitbas, Enes","first_name":"Enes"},{"last_name":"Engels","id":"107","full_name":"Engels, Gregor","first_name":"Gregor"}],"date_updated":"2022-07-04T12:34:53Z","oa":"1","conference":{"start_date":"2022-03-12","name":"18th International Conference on Software Architecture ","location":"Hawaii","end_date":"2022-03-15"},"doi":"10.1109/ICSA-C54293.2022.00011"},{"keyword":["Automated static analysis","Software usability"],"language":[{"iso":"eng"}],"_id":"32410","department":[{"_id":"76"}],"user_id":"32312","abstract":[{"lang":"eng","text":"Static analysis tools support developers in detecting potential coding issues, such as bugs or vulnerabilities. Research on static analysis emphasizes its technical challenges but also mentions severe usability shortcomings. These shortcomings hinder the adoption of static analysis tools, and in some cases, user dissatisfaction even leads to tool abandonment.\r\nTo comprehensively assess the current state of the art, this paper presents the first systematic usability evaluation in a wide range of static analysis tools. We derived a set of 36 relevant criteria from the scientific literature and gathered a collection of 46 static analysis tools complying with our inclusion and exclusion criteria - a representative set of mainly non-proprietary tools. Then, we evaluated how well these tools fulfill the aforementioned criteria.\r\nThe evaluation shows that more than half of the considered tools offer poor warning messages, while about three-quarters of the tools provide hardly any fix support. Furthermore, the integration of user knowledge is strongly neglected, which could be used for improved handling of false positives and tuning the results for the corresponding developer. Finally, issues regarding workflow integration and specialized user interfaces are proved further.\r\nThese findings should prove useful in guiding and focusing further research and development in the area of user experience for static code analyses."}],"status":"public","publication":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","type":"conference","title":"A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools","doi":"10.1145/3533767","publisher":"ACM","date_updated":"2022-07-26T11:42:23Z","date_created":"2022-07-25T08:02:36Z","author":[{"id":"41213","full_name":"Nachtigall, Marcus","last_name":"Nachtigall","first_name":"Marcus"},{"full_name":"Schlichtig, Michael","id":"32312","last_name":"Schlichtig","orcid":"0000-0001-6600-6171","first_name":"Michael"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"year":"2022","page":"532 - 543","citation":{"ieee":"M. Nachtigall, M. Schlichtig, and E. Bodden, “A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools,” in <i>Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 2022, pp. 532–543, doi: <a href=\"https://doi.org/10.1145/3533767\">10.1145/3533767</a>.","chicago":"Nachtigall, Marcus, Michael Schlichtig, and Eric Bodden. “A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools.” In <i>Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 532–43. ACM, 2022. <a href=\"https://doi.org/10.1145/3533767\">https://doi.org/10.1145/3533767</a>.","ama":"Nachtigall M, Schlichtig M, Bodden E. A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools. In: <i>Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis</i>. ACM; 2022:532-543. doi:<a href=\"https://doi.org/10.1145/3533767\">10.1145/3533767</a>","apa":"Nachtigall, M., Schlichtig, M., &#38; Bodden, E. (2022). A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools. <i>Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 532–543. <a href=\"https://doi.org/10.1145/3533767\">https://doi.org/10.1145/3533767</a>","mla":"Nachtigall, Marcus, et al. “A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools.” <i>Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, ACM, 2022, pp. 532–43, doi:<a href=\"https://doi.org/10.1145/3533767\">10.1145/3533767</a>.","short":"M. Nachtigall, M. Schlichtig, E. Bodden, in: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, 2022, pp. 532–543.","bibtex":"@inproceedings{Nachtigall_Schlichtig_Bodden_2022, title={A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools}, DOI={<a href=\"https://doi.org/10.1145/3533767\">10.1145/3533767</a>}, booktitle={Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis}, publisher={ACM}, author={Nachtigall, Marcus and Schlichtig, Michael and Bodden, Eric}, year={2022}, pages={532–543} }"},"publication_identifier":{"isbn":["9781450393799"]},"quality_controlled":"1","publication_status":"published","related_material":{"link":[{"url":"https://dl.acm.org/doi/10.1145/3533767.3534374","relation":"confirmation"}]}},{"type":"journal_article","publication":"Software and Systems Modeling","abstract":[{"lang":"eng","text":"Distributed, software-intensive systems (e.g., in the automotive sector) must fulfill communication requirements under hard real-time constraints.  The requirements have to be documented and validated carefully using a systematic requirements engineering (RE) approach, for example, by applying scenario-based requirements notations. The resources of the execution platforms and their properties (e.g., CPU frequency or bus throughput) induce effects on the timing behavior, which may lead to violations of the real-time requirements. Nowadays, the platform properties and their induced timing effects are verified against the real-time requirements by means of timing analysis techniques mostly implemented in commercial-off-the-shelf tools. However, such timing analyses are conducted in late development phases since they rely on artifacts produced during these phases (e.g., the platform-specific code). In order to enable early timing analyses already during RE, we extend a scenario-based requirements notation with allocation means to platform models and define operational semantics for the purpose of simulation-based, platform-aware timing analyses. We illustrate and evaluate the approach with an automotive software-intensive system."}],"status":"public","_id":"31071","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"keyword":["Modeling and Simulation","Software"],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["1619-1366","1619-1374"]},"year":"2022","citation":{"apa":"Holtmann, J., Deantoni, J., &#38; Fockel, M. (2022). Early timing analysis based on scenario requirements and platform models. <i>Software and Systems Modeling</i>. <a href=\"https://doi.org/10.1007/s10270-022-01002-3\">https://doi.org/10.1007/s10270-022-01002-3</a>","mla":"Holtmann, Jörg, et al. “Early Timing Analysis Based on Scenario Requirements and Platform Models.” <i>Software and Systems Modeling</i>, Springer Science and Business Media LLC, 2022, doi:<a href=\"https://doi.org/10.1007/s10270-022-01002-3\">10.1007/s10270-022-01002-3</a>.","short":"J. Holtmann, J. Deantoni, M. Fockel, Software and Systems Modeling (2022).","bibtex":"@article{Holtmann_Deantoni_Fockel_2022, title={Early timing analysis based on scenario requirements and platform models}, DOI={<a href=\"https://doi.org/10.1007/s10270-022-01002-3\">10.1007/s10270-022-01002-3</a>}, journal={Software and Systems Modeling}, publisher={Springer Science and Business Media LLC}, author={Holtmann, Jörg and Deantoni, Julien and Fockel, Markus}, year={2022} }","ama":"Holtmann J, Deantoni J, Fockel M. Early timing analysis based on scenario requirements and platform models. <i>Software and Systems Modeling</i>. Published online 2022. doi:<a href=\"https://doi.org/10.1007/s10270-022-01002-3\">10.1007/s10270-022-01002-3</a>","chicago":"Holtmann, Jörg, Julien Deantoni, and Markus Fockel. “Early Timing Analysis Based on Scenario Requirements and Platform Models.” <i>Software and Systems Modeling</i>, 2022. <a href=\"https://doi.org/10.1007/s10270-022-01002-3\">https://doi.org/10.1007/s10270-022-01002-3</a>.","ieee":"J. Holtmann, J. Deantoni, and M. Fockel, “Early timing analysis based on scenario requirements and platform models,” <i>Software and Systems Modeling</i>, 2022, doi: <a href=\"https://doi.org/10.1007/s10270-022-01002-3\">10.1007/s10270-022-01002-3</a>."},"publisher":"Springer Science and Business Media LLC","date_updated":"2022-05-05T14:09:41Z","date_created":"2022-05-05T14:05:32Z","author":[{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875"},{"first_name":"Julien","last_name":"Deantoni","full_name":"Deantoni, Julien"},{"orcid":"0000-0002-1269-0702","last_name":"Fockel","full_name":"Fockel, Markus","id":"8472","first_name":"Markus"}],"title":"Early timing analysis based on scenario requirements and platform models","doi":"10.1007/s10270-022-01002-3"},{"year":"2022","citation":{"apa":"Sayar, I., Bartel, A., Bodden, E., &#38; Le Traon, Y. (2022). An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. <i>ACM Transactions on Software Engineering and Methodology</i>. <a href=\"https://doi.org/10.1145/3554732\">https://doi.org/10.1145/3554732</a>","short":"I. Sayar, A. Bartel, E. Bodden, Y. Le Traon, ACM Transactions on Software Engineering and Methodology (2022).","mla":"Sayar, Imen, et al. “An In-Depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities.” <i>ACM Transactions on Software Engineering and Methodology</i>, Association for Computing Machinery (ACM), 2022, doi:<a href=\"https://doi.org/10.1145/3554732\">10.1145/3554732</a>.","bibtex":"@article{Sayar_Bartel_Bodden_Le Traon_2022, title={An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities}, DOI={<a href=\"https://doi.org/10.1145/3554732\">10.1145/3554732</a>}, journal={ACM Transactions on Software Engineering and Methodology}, publisher={Association for Computing Machinery (ACM)}, author={Sayar, Imen and Bartel, Alexandre and Bodden, Eric and Le Traon, Yves}, year={2022} }","chicago":"Sayar, Imen, Alexandre Bartel, Eric Bodden, and Yves Le Traon. “An In-Depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities.” <i>ACM Transactions on Software Engineering and Methodology</i>, 2022. <a href=\"https://doi.org/10.1145/3554732\">https://doi.org/10.1145/3554732</a>.","ieee":"I. Sayar, A. Bartel, E. Bodden, and Y. Le Traon, “An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities,” <i>ACM Transactions on Software Engineering and Methodology</i>, 2022, doi: <a href=\"https://doi.org/10.1145/3554732\">10.1145/3554732</a>.","ama":"Sayar I, Bartel A, Bodden E, Le Traon Y. An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. <i>ACM Transactions on Software Engineering and Methodology</i>. Published online 2022. doi:<a href=\"https://doi.org/10.1145/3554732\">10.1145/3554732</a>"},"publication_identifier":{"issn":["1049-331X","1557-7392"]},"publication_status":"published","title":"An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities","doi":"10.1145/3554732","date_updated":"2022-10-20T12:32:31Z","publisher":"Association for Computing Machinery (ACM)","author":[{"first_name":"Imen","last_name":"Sayar","full_name":"Sayar, Imen"},{"last_name":"Bartel","full_name":"Bartel, Alexandre","first_name":"Alexandre"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"},{"last_name":"Le Traon","full_name":"Le Traon, Yves","first_name":"Yves"}],"date_created":"2022-10-20T12:31:49Z","abstract":[{"lang":"eng","text":"<jats:p>\r\n            Nowadays, an increasing number of applications uses deserialization. This technique, based on rebuilding the instance of objects from serialized byte streams, can be dangerous since it can open the application to attacks such as remote code execution (RCE) if the data to deserialize is originating from an untrusted source. Deserialization vulnerabilities are so critical that they are in OWASP’s list of top 10 security risks for web applications. This is mainly caused by faults in the development process of applications and by flaws in their dependencies, i.e., flaws in the libraries used by these applications. No previous work has studied deserialization attacks in-depth: How are they performed? How are weaknesses introduced and patched? And for how long are vulnerabilities present in the codebase? To yield a deeper understanding of this important kind of vulnerability, we perform two main analyses: one on attack gadgets, i.e., exploitable pieces of code, present in Java libraries, and one on vulnerabilities present in Java applications. For the first analysis, we conduct an exploratory large-scale study by running 256 515 experiments in which we vary the versions of libraries for each of the 19 publicly available exploits. Such attacks rely on a combination of\r\n            <jats:italic>gadgets</jats:italic>\r\n            present in one or multiple Java libraries. A gadget is a method which is using objects or fields that can be attacker-controlled. Our goal is to precisely identify library versions containing gadgets and to understand how gadgets have been introduced and how they have been patched. We observe that the modification of one innocent-looking detail in a class – such as making it\r\n            <jats:monospace>public</jats:monospace>\r\n            – can already introduce a gadget. Furthermore, we noticed that among the studied libraries, 37.5% are not patched, leaving gadgets available for future attacks.\r\n          </jats:p>\r\n          <jats:p>For the second analysis, we manually analyze 104 deserialization vulnerabilities CVEs to understand how vulnerabilities are introduced and patched in real-life Java applications. Results indicate that the vulnerabilities are not always completely patched or that a workaround solution is proposed. With a workaround solution, applications are still vulnerable since the code itself is unchanged.</jats:p>"}],"status":"public","publication":"ACM Transactions on Software Engineering and Methodology","type":"journal_article","keyword":["Software"],"language":[{"iso":"eng"}],"_id":"33835","department":[{"_id":"76"}],"user_id":"15249"},{"publication_identifier":{"issn":["0268-3768","1433-3015"]},"publication_status":"published","citation":{"apa":"Zirngibl, C., Schleich, B., &#38; Wartzack, S. (2022). Robust estimation of clinch joint characteristics based on data-driven methods. <i>The International Journal of Advanced Manufacturing Technology</i>. <a href=\"https://doi.org/10.1007/s00170-022-10441-7\">https://doi.org/10.1007/s00170-022-10441-7</a>","short":"C. Zirngibl, B. Schleich, S. Wartzack, The International Journal of Advanced Manufacturing Technology (2022).","mla":"Zirngibl, Christoph, et al. “Robust Estimation of Clinch Joint Characteristics Based on Data-Driven Methods.” <i>The International Journal of Advanced Manufacturing Technology</i>, Springer Science and Business Media LLC, 2022, doi:<a href=\"https://doi.org/10.1007/s00170-022-10441-7\">10.1007/s00170-022-10441-7</a>.","bibtex":"@article{Zirngibl_Schleich_Wartzack_2022, title={Robust estimation of clinch joint characteristics based on data-driven methods}, DOI={<a href=\"https://doi.org/10.1007/s00170-022-10441-7\">10.1007/s00170-022-10441-7</a>}, journal={The International Journal of Advanced Manufacturing Technology}, publisher={Springer Science and Business Media LLC}, author={Zirngibl, Christoph and Schleich, Benjamin and Wartzack, Sandro}, year={2022} }","ama":"Zirngibl C, Schleich B, Wartzack S. Robust estimation of clinch joint characteristics based on data-driven methods. <i>The International Journal of Advanced Manufacturing Technology</i>. Published online 2022. doi:<a href=\"https://doi.org/10.1007/s00170-022-10441-7\">10.1007/s00170-022-10441-7</a>","chicago":"Zirngibl, Christoph, Benjamin Schleich, and Sandro Wartzack. “Robust Estimation of Clinch Joint Characteristics Based on Data-Driven Methods.” <i>The International Journal of Advanced Manufacturing Technology</i>, 2022. <a href=\"https://doi.org/10.1007/s00170-022-10441-7\">https://doi.org/10.1007/s00170-022-10441-7</a>.","ieee":"C. Zirngibl, B. Schleich, and S. Wartzack, “Robust estimation of clinch joint characteristics based on data-driven methods,” <i>The International Journal of Advanced Manufacturing Technology</i>, 2022, doi: <a href=\"https://doi.org/10.1007/s00170-022-10441-7\">10.1007/s00170-022-10441-7</a>."},"author":[{"first_name":"Christoph","last_name":"Zirngibl","full_name":"Zirngibl, Christoph"},{"full_name":"Schleich, Benjamin","last_name":"Schleich","first_name":"Benjamin"},{"first_name":"Sandro","full_name":"Wartzack, Sandro","last_name":"Wartzack"}],"oa":"1","date_updated":"2023-01-02T11:14:26Z","doi":"10.1007/s00170-022-10441-7","main_file_link":[{"url":"https://link.springer.com/article/10.1007/s00170-022-10441-7","open_access":"1"}],"type":"journal_article","status":"public","department":[{"_id":"630"}],"user_id":"14931","_id":"34414","project":[{"grant_number":"418701707","name":"TRR 285: TRR 285","_id":"130"},{"name":"TRR 285 - B: TRR 285 - Project Area B","_id":"132"},{"_id":"144","name":"TRR 285 – B05: TRR 285 - Subproject B05"}],"year":"2022","date_created":"2022-12-14T12:24:29Z","publisher":"Springer Science and Business Media LLC","title":"Robust estimation of clinch joint characteristics based on data-driven methods","publication":"The International Journal of Advanced Manufacturing Technology","abstract":[{"lang":"eng","text":"Given a steadily increasing demand on multi-material lightweight designs, fast and cost-efficient production technologies, such as the mechanical joining process clinching, are becoming more and more relevant for series production. Since the application of such joining techniques often base on the ability to reach similar or even better joint loading capacities compared to established joining processes (e.g., spot welding), few contributions investigated the systematic improvement of clinch joint characteristics. In this regard, the use of data-driven methods in combination with optimization algorithms showed already high potentials for the analysis of individual joints and the definition of optimal tool configurations. However, the often missing consideration of uncertainties, such as varying material properties, and the related calculation of their impact on clinch joint properties can lead to poor estimation results and thus to a decreased reliability of the entire joint connection. This can cause major challenges, especially for the design and dimensioning of safety-relevant components, such as in car bodies. Motivated by this, the presented contribution introduces a novel method for the robust estimation of clinch joint characteristics including uncertainties of varying and versatile process chains in mechanical joining. Therefore, the utilization of Gaussian process regression models is demonstrated and evaluated regarding the ability to achieve sufficient prediction qualities."}],"language":[{"iso":"eng"}],"keyword":["Industrial and Manufacturing Engineering","Computer Science Applications","Mechanical Engineering","Software","Control and Systems Engineering"]},{"extern":"1","user_id":"99353","_id":"45847","status":"public","type":"journal_article","doi":"10.1093/logcom/exac070","volume":32,"author":[{"first_name":"Juha","last_name":"Kontinen","full_name":"Kontinen, Juha"},{"first_name":"Arne","full_name":"Meier, Arne","last_name":"Meier"},{"last_name":"Mahmood","id":"99353","full_name":"Mahmood, Yasir","first_name":"Yasir"}],"date_updated":"2024-06-04T16:06:37Z","page":"1624-1644","intvolume":"        32","citation":{"ama":"Kontinen J, Meier A, Mahmood Y. A parameterized view on the complexity of dependence and independence logic. <i>Journal of Logic and Computation</i>. 2022;32(8):1624-1644. doi:<a href=\"https://doi.org/10.1093/logcom/exac070\">10.1093/logcom/exac070</a>","ieee":"J. Kontinen, A. Meier, and Y. Mahmood, “A parameterized view on the complexity of dependence and independence logic,” <i>Journal of Logic and Computation</i>, vol. 32, no. 8, pp. 1624–1644, 2022, doi: <a href=\"https://doi.org/10.1093/logcom/exac070\">10.1093/logcom/exac070</a>.","chicago":"Kontinen, Juha, Arne Meier, and Yasir Mahmood. “A Parameterized View on the Complexity of Dependence and Independence Logic.” <i>Journal of Logic and Computation</i> 32, no. 8 (2022): 1624–44. <a href=\"https://doi.org/10.1093/logcom/exac070\">https://doi.org/10.1093/logcom/exac070</a>.","bibtex":"@article{Kontinen_Meier_Mahmood_2022, title={A parameterized view on the complexity of dependence and independence logic}, volume={32}, DOI={<a href=\"https://doi.org/10.1093/logcom/exac070\">10.1093/logcom/exac070</a>}, number={8}, journal={Journal of Logic and Computation}, publisher={Oxford University Press (OUP)}, author={Kontinen, Juha and Meier, Arne and Mahmood, Yasir}, year={2022}, pages={1624–1644} }","mla":"Kontinen, Juha, et al. “A Parameterized View on the Complexity of Dependence and Independence Logic.” <i>Journal of Logic and Computation</i>, vol. 32, no. 8, Oxford University Press (OUP), 2022, pp. 1624–44, doi:<a href=\"https://doi.org/10.1093/logcom/exac070\">10.1093/logcom/exac070</a>.","short":"J. Kontinen, A. Meier, Y. Mahmood, Journal of Logic and Computation 32 (2022) 1624–1644.","apa":"Kontinen, J., Meier, A., &#38; Mahmood, Y. (2022). A parameterized view on the complexity of dependence and independence logic. <i>Journal of Logic and Computation</i>, <i>32</i>(8), 1624–1644. <a href=\"https://doi.org/10.1093/logcom/exac070\">https://doi.org/10.1093/logcom/exac070</a>"},"publication_identifier":{"issn":["0955-792X","1465-363X"]},"publication_status":"published","language":[{"iso":"eng"}],"keyword":["Logic","Hardware and Architecture","Arts and Humanities (miscellaneous)","Software","Theoretical Computer Science"],"abstract":[{"lang":"eng","text":"<jats:title>Abstract</jats:title>\r\n               <jats:p>In this paper, we investigate the parameterized complexity of model checking for Dependence and Independence logic, which are well studied logics in the area of Team Semantics. We start with a list of nine immediate parameterizations for this problem, namely the number of disjunctions (i.e. splits)/(free) variables/universal quantifiers, formula-size, the tree-width of the Gaifman graph of the input structure, the size of the universe/team and the arity of dependence atoms. We present a comprehensive picture of the parameterized complexity of model checking and obtain a division of the problem into tractable and various intractable degrees. Furthermore, we also consider the complexity of the most important variants (data and expression complexity) of the model checking problem by fixing parts of the input.</jats:p>"}],"publication":"Journal of Logic and Computation","title":"A parameterized view on the complexity of dependence and independence logic","date_created":"2023-07-03T11:36:55Z","publisher":"Oxford University Press (OUP)","year":"2022","issue":"8"},{"title":"Towards Situation-specific Software Support for Cross-organizational Design Thinking Processes","author":[{"last_name":"Gottschalk","id":"47208","full_name":"Gottschalk, Sebastian","first_name":"Sebastian"},{"first_name":"Enes","full_name":"Yigitbas, Enes","id":"8447","last_name":"Yigitbas","orcid":"0000-0002-5967-833X"},{"full_name":"Nowosad, Alexander","last_name":"Nowosad","first_name":"Alexander"},{"first_name":"Gregor","last_name":"Engels","id":"107","full_name":"Engels, Gregor"}],"date_created":"2022-07-01T08:14:16Z","date_updated":"2023-03-14T09:59:05Z","publisher":"ACM","citation":{"apa":"Gottschalk, S., Yigitbas, E., Nowosad, A., &#38; Engels, G. (2022). Towards Situation-specific Software Support for Cross-organizational Design Thinking Processes. <i>Proceedings of the 5th International Workshop on Software-Intensive Business (IWSiB’22) </i>.","bibtex":"@inproceedings{Gottschalk_Yigitbas_Nowosad_Engels_2022, title={Towards Situation-specific Software Support for Cross-organizational Design Thinking Processes}, booktitle={Proceedings of the 5th International Workshop on Software-intensive Business (IWSiB’22) }, publisher={ACM}, author={Gottschalk, Sebastian and Yigitbas, Enes and Nowosad, Alexander and Engels, Gregor}, year={2022} }","mla":"Gottschalk, Sebastian, et al. “Towards Situation-Specific Software Support for Cross-Organizational Design Thinking Processes.” <i>Proceedings of the 5th International Workshop on Software-Intensive Business (IWSiB’22) </i>, ACM, 2022.","short":"S. Gottschalk, E. Yigitbas, A. Nowosad, G. Engels, in: Proceedings of the 5th International Workshop on Software-Intensive Business (IWSiB’22) , ACM, 2022.","chicago":"Gottschalk, Sebastian, Enes Yigitbas, Alexander Nowosad, and Gregor Engels. “Towards Situation-Specific Software Support for Cross-Organizational Design Thinking Processes.” In <i>Proceedings of the 5th International Workshop on Software-Intensive Business (IWSiB’22) </i>. ACM, 2022.","ieee":"S. Gottschalk, E. Yigitbas, A. Nowosad, and G. Engels, “Towards Situation-specific Software Support for Cross-organizational Design Thinking Processes,” 2022.","ama":"Gottschalk S, Yigitbas E, Nowosad A, Engels G. Towards Situation-specific Software Support for Cross-organizational Design Thinking Processes. In: <i>Proceedings of the 5th International Workshop on Software-Intensive Business (IWSiB’22) </i>. ACM; 2022."},"year":"2022","language":[{"iso":"eng"}],"keyword":["design thinking","situation-specific","cross-organizational","software support"],"department":[{"_id":"66"},{"_id":"534"}],"user_id":"8447","_id":"32309","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - C5: SFB 901 - Subproject C5"}],"status":"public","abstract":[{"text":"Due to the increasing influences of a VUCA world, design thinking workshops have been established as a standard technique to build solutions according to uncertain customer needs. Concerning the ongoing pandemic and rising development of solutions across organizations, more and more workshops were conducted online with software support. However, existing software tools insufficiently address the different workshop situations in terms of the process (i.e., fixed tasks to conduct), the place (e.g., static online whiteboards), and people (i.e., synchronous working of all stakeholders).\r\nTherefore, we propose a design science study to develop a situation-specific software support that can be configured with flexible development processes, different places, and task-related people. Based on practical experience in existing research projects, we derive the initial design requirements and map them to a set of design principles. Out of that, we design a concept with its implementation as a software tool and point out open challenges. ","lang":"eng"}],"publication":"Proceedings of the 5th International Workshop on Software-intensive Business (IWSiB'22) ","type":"conference"},{"title":"Towards electronic structure-based ab-initio molecular dynamics simulations with hundreds of millions of atoms","publisher":"Elsevier BV","date_created":"2022-10-11T08:17:02Z","year":"2022","quality_controlled":"1","keyword":["Artificial Intelligence","Computer Graphics and Computer-Aided Design","Computer Networks and Communications","Hardware and Architecture","Theoretical Computer Science","Software"],"language":[{"iso":"eng"}],"publication":"Parallel Computing","main_file_link":[{"open_access":"1","url":"https://www.sciencedirect.com/science/article/pii/S0167819122000242"}],"doi":"10.1016/j.parco.2022.102920","date_updated":"2023-08-02T15:03:55Z","oa":"1","author":[{"full_name":"Schade, Robert","id":"75963","orcid":"0000-0002-6268-539","last_name":"Schade","first_name":"Robert"},{"first_name":"Tobias","last_name":"Kenter","id":"3145","full_name":"Kenter, Tobias"},{"first_name":"Hossam","full_name":"Elgabarty, Hossam","id":"60250","orcid":"0000-0002-4945-1481","last_name":"Elgabarty"},{"first_name":"Michael","last_name":"Lass","orcid":"0000-0002-5708-7632","id":"24135","full_name":"Lass, Michael"},{"full_name":"Schütt, Ole","last_name":"Schütt","first_name":"Ole"},{"first_name":"Alfio","full_name":"Lazzaro, Alfio","last_name":"Lazzaro"},{"full_name":"Pabst, Hans","last_name":"Pabst","first_name":"Hans"},{"full_name":"Mohr, Stephan","last_name":"Mohr","first_name":"Stephan"},{"last_name":"Hutter","full_name":"Hutter, Jürg","first_name":"Jürg"},{"full_name":"Kühne, Thomas","id":"49079","last_name":"Kühne","first_name":"Thomas"},{"last_name":"Plessl","orcid":"0000-0001-5728-9982","id":"16153","full_name":"Plessl, Christian","first_name":"Christian"}],"volume":111,"citation":{"mla":"Schade, Robert, et al. “Towards Electronic Structure-Based Ab-Initio Molecular Dynamics Simulations with Hundreds of Millions of Atoms.” <i>Parallel Computing</i>, vol. 111, 102920, Elsevier BV, 2022, doi:<a href=\"https://doi.org/10.1016/j.parco.2022.102920\">10.1016/j.parco.2022.102920</a>.","bibtex":"@article{Schade_Kenter_Elgabarty_Lass_Schütt_Lazzaro_Pabst_Mohr_Hutter_Kühne_et al._2022, title={Towards electronic structure-based ab-initio molecular dynamics simulations with hundreds of millions of atoms}, volume={111}, DOI={<a href=\"https://doi.org/10.1016/j.parco.2022.102920\">10.1016/j.parco.2022.102920</a>}, number={102920}, journal={Parallel Computing}, publisher={Elsevier BV}, author={Schade, Robert and Kenter, Tobias and Elgabarty, Hossam and Lass, Michael and Schütt, Ole and Lazzaro, Alfio and Pabst, Hans and Mohr, Stephan and Hutter, Jürg and Kühne, Thomas and et al.}, year={2022} }","short":"R. Schade, T. Kenter, H. Elgabarty, M. Lass, O. Schütt, A. Lazzaro, H. Pabst, S. Mohr, J. Hutter, T. Kühne, C. Plessl, Parallel Computing 111 (2022).","apa":"Schade, R., Kenter, T., Elgabarty, H., Lass, M., Schütt, O., Lazzaro, A., Pabst, H., Mohr, S., Hutter, J., Kühne, T., &#38; Plessl, C. (2022). Towards electronic structure-based ab-initio molecular dynamics simulations with hundreds of millions of atoms. <i>Parallel Computing</i>, <i>111</i>, Article 102920. <a href=\"https://doi.org/10.1016/j.parco.2022.102920\">https://doi.org/10.1016/j.parco.2022.102920</a>","ama":"Schade R, Kenter T, Elgabarty H, et al. Towards electronic structure-based ab-initio molecular dynamics simulations with hundreds of millions of atoms. <i>Parallel Computing</i>. 2022;111. doi:<a href=\"https://doi.org/10.1016/j.parco.2022.102920\">10.1016/j.parco.2022.102920</a>","ieee":"R. Schade <i>et al.</i>, “Towards electronic structure-based ab-initio molecular dynamics simulations with hundreds of millions of atoms,” <i>Parallel Computing</i>, vol. 111, Art. no. 102920, 2022, doi: <a href=\"https://doi.org/10.1016/j.parco.2022.102920\">10.1016/j.parco.2022.102920</a>.","chicago":"Schade, Robert, Tobias Kenter, Hossam Elgabarty, Michael Lass, Ole Schütt, Alfio Lazzaro, Hans Pabst, et al. “Towards Electronic Structure-Based Ab-Initio Molecular Dynamics Simulations with Hundreds of Millions of Atoms.” <i>Parallel Computing</i> 111 (2022). <a href=\"https://doi.org/10.1016/j.parco.2022.102920\">https://doi.org/10.1016/j.parco.2022.102920</a>."},"intvolume":"       111","publication_status":"published","publication_identifier":{"issn":["0167-8191"]},"article_number":"102920","project":[{"_id":"52","name":"PC2: Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"_id":"33684","user_id":"75963","department":[{"_id":"613"},{"_id":"27"},{"_id":"518"}],"status":"public","type":"journal_article"},{"abstract":[{"text":"<jats:title>Abstract</jats:title><jats:p>Many critical codebases are written in C, and most of them use preprocessor directives to encode variability, effectively encoding software product lines. These preprocessor directives, however, challenge any static code analysis. SPLlift, a previously presented approach for analyzing software product lines, is limited to Java programs that use a rather simple feature encoding and to analysis problems with a finite and ideally small domain. Other approaches that allow the analysis of real-world C software product lines use special-purpose analyses, preventing the reuse of existing analysis infrastructures and ignoring the progress made by the static analysis community. This work presents <jats:sc>VarAlyzer</jats:sc>, a novel static analysis approach for software product lines. <jats:sc>VarAlyzer</jats:sc> first transforms preprocessor constructs to plain C while preserving their variability and semantics. It then solves any given distributive analysis problem on transformed product lines in a variability-aware manner. <jats:sc>VarAlyzer</jats:sc> ’s analysis results are annotated with feature constraints that encode in which configurations each result holds. Our experiments with 95 compilation units of OpenSSL show that applying <jats:sc>VarAlyzer</jats:sc> enables one to conduct inter-procedural, flow-, field- and context-sensitive data-flow analyses on entire product lines for the first time, outperforming the product-based approach for highly-configurable systems.</jats:p>","lang":"eng"}],"publication":"Automated Software Engineering","language":[{"iso":"eng"}],"keyword":["inter-procedural static analysis","software product lines","preprocessor","LLVM","C/C++"],"year":"2022","issue":"1","title":"Static data-flow analysis for software product lines in C","date_created":"2022-03-25T07:41:26Z","publisher":"Springer Science and Business Media LLC","status":"public","type":"journal_article","alternative_title":["Revoking the preprocessor’s special role"],"article_type":"original","article_number":"35","department":[{"_id":"76"}],"user_id":"15249","_id":"30511","project":[{"name":"SFB 901 - B4: SFB 901 - Subproject B4","_id":"12"},{"name":"SFB 901 - B: SFB 901 - Project Area B","_id":"3"},{"_id":"1","name":"SFB 901: SFB 901"}],"intvolume":"        29","citation":{"chicago":"Schubert, Philipp, Paul Gazzillo, Zach Patterson, Julian Braha, Fabian Benedikt Schiebel, Ben Hermann, Shiyi Wei, and Eric Bodden. “Static Data-Flow Analysis for Software Product Lines in C.” <i>Automated Software Engineering</i> 29, no. 1 (2022). <a href=\"https://doi.org/10.1007/s10515-022-00333-1\">https://doi.org/10.1007/s10515-022-00333-1</a>.","ieee":"P. Schubert <i>et al.</i>, “Static data-flow analysis for software product lines in C,” <i>Automated Software Engineering</i>, vol. 29, no. 1, Art. no. 35, 2022, doi: <a href=\"https://doi.org/10.1007/s10515-022-00333-1\">10.1007/s10515-022-00333-1</a>.","ama":"Schubert P, Gazzillo P, Patterson Z, et al. Static data-flow analysis for software product lines in C. <i>Automated Software Engineering</i>. 2022;29(1). doi:<a href=\"https://doi.org/10.1007/s10515-022-00333-1\">10.1007/s10515-022-00333-1</a>","short":"P. Schubert, P. Gazzillo, Z. Patterson, J. Braha, F.B. Schiebel, B. Hermann, S. Wei, E. Bodden, Automated Software Engineering 29 (2022).","bibtex":"@article{Schubert_Gazzillo_Patterson_Braha_Schiebel_Hermann_Wei_Bodden_2022, title={Static data-flow analysis for software product lines in C}, volume={29}, DOI={<a href=\"https://doi.org/10.1007/s10515-022-00333-1\">10.1007/s10515-022-00333-1</a>}, number={135}, journal={Automated Software Engineering}, publisher={Springer Science and Business Media LLC}, author={Schubert, Philipp and Gazzillo, Paul and Patterson, Zach and Braha, Julian and Schiebel, Fabian Benedikt and Hermann, Ben and Wei, Shiyi and Bodden, Eric}, year={2022} }","mla":"Schubert, Philipp, et al. “Static Data-Flow Analysis for Software Product Lines in C.” <i>Automated Software Engineering</i>, vol. 29, no. 1, 35, Springer Science and Business Media LLC, 2022, doi:<a href=\"https://doi.org/10.1007/s10515-022-00333-1\">10.1007/s10515-022-00333-1</a>.","apa":"Schubert, P., Gazzillo, P., Patterson, Z., Braha, J., Schiebel, F. B., Hermann, B., Wei, S., &#38; Bodden, E. (2022). Static data-flow analysis for software product lines in C. <i>Automated Software Engineering</i>, <i>29</i>(1), Article 35. <a href=\"https://doi.org/10.1007/s10515-022-00333-1\">https://doi.org/10.1007/s10515-022-00333-1</a>"},"publication_identifier":{"issn":["0928-8910","1573-7535"]},"publication_status":"published","doi":"10.1007/s10515-022-00333-1","main_file_link":[{"url":"https://link.springer.com/article/10.1007/s10515-022-00333-1","open_access":"1"}],"volume":29,"author":[{"orcid":"0000-0002-8674-1859","last_name":"Schubert","full_name":"Schubert, Philipp","id":"60543","first_name":"Philipp"},{"last_name":"Gazzillo","full_name":"Gazzillo, Paul","first_name":"Paul"},{"last_name":"Patterson","full_name":"Patterson, Zach","first_name":"Zach"},{"full_name":"Braha, Julian","last_name":"Braha","first_name":"Julian"},{"id":"55745","full_name":"Schiebel, Fabian Benedikt","last_name":"Schiebel","orcid":"0009-0008-6867-9802","first_name":"Fabian Benedikt"},{"full_name":"Hermann, Ben","id":"66173","last_name":"Hermann","orcid":"0000-0001-9848-2017","first_name":"Ben"},{"full_name":"Wei, Shiyi","last_name":"Wei","first_name":"Shiyi"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647"}],"date_updated":"2025-12-04T10:42:38Z","oa":"1"},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"9","name":"SFB 901 - Subproject B1"}],"_id":"26049","user_id":"58701","ddc":["000"],"keyword":["Software Requirements","Natural Language Processing","Transfer Learning","On-The-Fly Computing"],"language":[{"iso":"eng"}],"file_date_updated":"2021-10-15T15:54:41Z","type":"conference","publication":"PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021","abstract":[{"lang":"eng","text":"Content is the new oil. Users consume billions of terabytes a day while surfing on news sites or blogs, posting on social media sites, and sending chat messages around the globe. While content is heterogeneous, the dominant form of web content is text. There are situations where more diversity needs to be introduced into text content, for example, to reuse it on websites or to allow a chatbot to base its models on the information conveyed rather than of the language used. In order to achieve this, paraphrasing techniques have been developed: One example is Text spinning, a technique that automatically paraphrases text while leaving the intent intact. This makes it easier to reuse content, or to change the language generated by the bot more human. One method for modifying texts is a combination of translation and back-translation. This paper presents NATTS, a naive approach that uses transformer-based translation models to create diversified text, combining translation steps in one model. An advantage of this approach is that it can be fine-tuned and handle technical language."}],"file":[{"file_size":411667,"file_name":"Bäumer et al. (2021), Baeumer2021.pdf","access_level":"closed","file_id":"26282","date_updated":"2021-10-15T15:54:41Z","creator":"jkers","date_created":"2021-10-15T15:54:41Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","date_updated":"2022-01-06T06:57:16Z","publisher":"IADIS","author":[{"first_name":"Frederik Simon","last_name":"Bäumer","full_name":"Bäumer, Frederik Simon"},{"last_name":"Kersting","full_name":"Kersting, Joschka","id":"58701","first_name":"Joschka"},{"first_name":"Sergej","full_name":"Denisov, Sergej","last_name":"Denisov"},{"last_name":"Geierhos","orcid":"0000-0002-8180-5606","id":"42496","full_name":"Geierhos, Michaela","first_name":"Michaela"}],"date_created":"2021-10-11T15:26:58Z","title":"IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING","conference":{"name":"18th International Conference on Applied Computing","start_date":"13.10.2021","end_date":"15.10.2021","location":"Lisbon, Portugal"},"has_accepted_license":"1","year":"2021","citation":{"ama":"Bäumer FS, Kersting J, Denisov S, Geierhos M. IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING. In: <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>. IADIS; 2021:221--225.","ieee":"F. S. Bäumer, J. Kersting, S. Denisov, and M. Geierhos, “IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING,” in <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>, Lisbon, Portugal, 2021, pp. 221--225.","chicago":"Bäumer, Frederik Simon, Joschka Kersting, Sergej Denisov, and Michaela Geierhos. “IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING.” In <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>, 221--225. IADIS, 2021.","apa":"Bäumer, F. S., Kersting, J., Denisov, S., &#38; Geierhos, M. (2021). IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING. <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>, 221--225.","bibtex":"@inproceedings{Bäumer_Kersting_Denisov_Geierhos_2021, title={IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING}, booktitle={PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021}, publisher={IADIS}, author={Bäumer, Frederik Simon and Kersting, Joschka and Denisov, Sergej and Geierhos, Michaela}, year={2021}, pages={221--225} }","short":"F.S. Bäumer, J. Kersting, S. Denisov, M. Geierhos, in: PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021, IADIS, 2021, pp. 221--225.","mla":"Bäumer, Frederik Simon, et al. “IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING.” <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>, IADIS, 2021, pp. 221--225."},"page":"221--225"},{"year":"2021","citation":{"ama":"Gottschalk S, Yigitbas E, Nowosad A, Engels G. Situation-specific Business Model Development Methods for Mobile App Developers. In: <i>Enterprise, Business-Process and Information Systems Modeling</i>. Springer; 2021. doi:<a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">10.1007/978-3-030-79186-5_17</a>","ieee":"S. Gottschalk, E. Yigitbas, A. Nowosad, and G. Engels, “Situation-specific Business Model Development Methods for Mobile App Developers,” in <i>Enterprise, Business-Process and Information Systems Modeling</i>, 2021.","chicago":"Gottschalk, Sebastian, Enes Yigitbas, Alexander Nowosad, and Gregor Engels. “Situation-Specific Business Model Development Methods for Mobile App Developers.” In <i>Enterprise, Business-Process and Information Systems Modeling</i>. Springer, 2021. <a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">https://doi.org/10.1007/978-3-030-79186-5_17</a>.","mla":"Gottschalk, Sebastian, et al. “Situation-Specific Business Model Development Methods for Mobile App Developers.” <i>Enterprise, Business-Process and Information Systems Modeling</i>, Springer, 2021, doi:<a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">10.1007/978-3-030-79186-5_17</a>.","bibtex":"@inproceedings{Gottschalk_Yigitbas_Nowosad_Engels_2021, title={Situation-specific Business Model Development Methods for Mobile App Developers}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">10.1007/978-3-030-79186-5_17</a>}, booktitle={Enterprise, Business-Process and Information Systems Modeling}, publisher={Springer}, author={Gottschalk, Sebastian and Yigitbas, Enes and Nowosad, Alexander and Engels, Gregor}, year={2021} }","short":"S. Gottschalk, E. Yigitbas, A. Nowosad, G. Engels, in: Enterprise, Business-Process and Information Systems Modeling, Springer, 2021.","apa":"Gottschalk, S., Yigitbas, E., Nowosad, A., &#38; Engels, G. (2021). Situation-specific Business Model Development Methods for Mobile App Developers. In <i>Enterprise, Business-Process and Information Systems Modeling</i>. Springer. <a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">https://doi.org/10.1007/978-3-030-79186-5_17</a>"},"has_accepted_license":"1","title":"Situation-specific Business Model Development Methods for Mobile App Developers","doi":"10.1007/978-3-030-79186-5_17","oa":"1","publisher":"Springer","date_updated":"2022-01-06T06:55:08Z","author":[{"full_name":"Gottschalk, Sebastian","id":"47208","last_name":"Gottschalk","first_name":"Sebastian"},{"orcid":"0000-0002-5967-833X","last_name":"Yigitbas","full_name":"Yigitbas, Enes","id":"8447","first_name":"Enes"},{"last_name":"Nowosad","full_name":"Nowosad, Alexander","first_name":"Alexander"},{"full_name":"Engels, Gregor","last_name":"Engels","first_name":"Gregor"}],"date_created":"2021-04-20T13:23:41Z","abstract":[{"lang":"eng","text":"The development of effective business models is an essential task in highly competitive markets like mobile ecosystems. Existing development methods for these business models do not specifically focus that the development process profoundly depends on the situation (e.g., market size, regulations) of the mobile app developer. Here, a mismatch between method and situation can lead to poor resource management and longer development cycles. In software engineering, situational method engineering is used for software projects to configure a development method out of a method repository based on the project situation. Analogously, we support creating situation-specific business model development methods with a method base and new user roles. Here, the method engineer obtains the knowledge of the domain expert and stores it in the method base as elements, building blocks, and patterns. The expert knowledge is derived from a grey literature review on mobile development processes. After this, the method engineer constructs the development method based on the described situation of the business developer. We provide an open-source tool and evaluate it by constructing a local event platform's business model development method.    "}],"file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_name":"EMMSAD21.pdf","file_id":"22769","file_size":638707,"date_created":"2021-07-20T16:19:27Z","creator":"sego","date_updated":"2021-07-20T16:20:15Z"}],"status":"public","type":"conference","publication":"Enterprise, Business-Process and Information Systems Modeling","ddc":["000"],"keyword":["Business Model Development","Situational Method Engineering","Mobile App","Business Model Development Tools"],"file_date_updated":"2021-07-20T16:20:15Z","language":[{"iso":"eng"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"_id":"21639","user_id":"47208","department":[{"_id":"66"},{"_id":"534"}]},{"publication":"IEEE Transactions on Computers","type":"journal_article","status":"public","_id":"30907","department":[{"_id":"78"}],"user_id":"398","keyword":["Computational Theory and Mathematics","Hardware and Architecture","Theoretical Computer Science","Software"],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["0018-9340","1557-9956","2326-3814"]},"publication_status":"published","year":"2021","page":"1-1","citation":{"apa":"Rodriguez, A., Otero, A., Platzner, M., &#38; De la Torre, E. (2021). Exploiting Hardware-Based Data-Parallel and Multithreading Models for Smart Edge Computing in Reconfigurable FPGAs. <i>IEEE Transactions on Computers</i>, 1–1. <a href=\"https://doi.org/10.1109/tc.2021.3107196\">https://doi.org/10.1109/tc.2021.3107196</a>","mla":"Rodriguez, Alfonso, et al. “Exploiting Hardware-Based Data-Parallel and Multithreading Models for Smart Edge Computing in Reconfigurable FPGAs.” <i>IEEE Transactions on Computers</i>, Institute of Electrical and Electronics Engineers (IEEE), 2021, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/tc.2021.3107196\">10.1109/tc.2021.3107196</a>.","bibtex":"@article{Rodriguez_Otero_Platzner_De la Torre_2021, title={Exploiting Hardware-Based Data-Parallel and Multithreading Models for Smart Edge Computing in Reconfigurable FPGAs}, DOI={<a href=\"https://doi.org/10.1109/tc.2021.3107196\">10.1109/tc.2021.3107196</a>}, journal={IEEE Transactions on Computers}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Rodriguez, Alfonso and Otero, Andres and Platzner, Marco and De la Torre, Eduardo}, year={2021}, pages={1–1} }","short":"A. Rodriguez, A. Otero, M. Platzner, E. De la Torre, IEEE Transactions on Computers (2021) 1–1.","ama":"Rodriguez A, Otero A, Platzner M, De la Torre E. Exploiting Hardware-Based Data-Parallel and Multithreading Models for Smart Edge Computing in Reconfigurable FPGAs. <i>IEEE Transactions on Computers</i>. Published online 2021:1-1. doi:<a href=\"https://doi.org/10.1109/tc.2021.3107196\">10.1109/tc.2021.3107196</a>","chicago":"Rodriguez, Alfonso, Andres Otero, Marco Platzner, and Eduardo De la Torre. “Exploiting Hardware-Based Data-Parallel and Multithreading Models for Smart Edge Computing in Reconfigurable FPGAs.” <i>IEEE Transactions on Computers</i>, 2021, 1–1. <a href=\"https://doi.org/10.1109/tc.2021.3107196\">https://doi.org/10.1109/tc.2021.3107196</a>.","ieee":"A. Rodriguez, A. Otero, M. Platzner, and E. De la Torre, “Exploiting Hardware-Based Data-Parallel and Multithreading Models for Smart Edge Computing in Reconfigurable FPGAs,” <i>IEEE Transactions on Computers</i>, pp. 1–1, 2021, doi: <a href=\"https://doi.org/10.1109/tc.2021.3107196\">10.1109/tc.2021.3107196</a>."},"date_updated":"2022-04-18T10:04:21Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","author":[{"last_name":"Rodriguez","full_name":"Rodriguez, Alfonso","first_name":"Alfonso"},{"full_name":"Otero, Andres","last_name":"Otero","first_name":"Andres"},{"first_name":"Marco","id":"398","full_name":"Platzner, Marco","last_name":"Platzner"},{"last_name":"De la Torre","full_name":"De la Torre, Eduardo","first_name":"Eduardo"}],"date_created":"2022-04-18T10:03:16Z","title":"Exploiting Hardware-Based Data-Parallel and Multithreading Models for Smart Edge Computing in Reconfigurable FPGAs","doi":"10.1109/tc.2021.3107196"},{"publication_status":"published","publication_identifier":{"issn":["0955-792X","1465-363X"]},"citation":{"ama":"Mahmood Y, Meier A, Schmidt J. Parameterized complexity of abduction in Schaefer’s framework. <i>Journal of Logic and Computation</i>. 2021;31(1):266-296. doi:<a href=\"https://doi.org/10.1093/logcom/exaa079\">10.1093/logcom/exaa079</a>","ieee":"Y. Mahmood, A. Meier, and J. Schmidt, “Parameterized complexity of abduction in Schaefer’s framework,” <i>Journal of Logic and Computation</i>, vol. 31, no. 1, pp. 266–296, 2021, doi: <a href=\"https://doi.org/10.1093/logcom/exaa079\">10.1093/logcom/exaa079</a>.","chicago":"Mahmood, Yasir, Arne Meier, and Johannes Schmidt. “Parameterized Complexity of Abduction in Schaefer’s Framework.” <i>Journal of Logic and Computation</i> 31, no. 1 (2021): 266–96. <a href=\"https://doi.org/10.1093/logcom/exaa079\">https://doi.org/10.1093/logcom/exaa079</a>.","short":"Y. Mahmood, A. Meier, J. Schmidt, Journal of Logic and Computation 31 (2021) 266–296.","bibtex":"@article{Mahmood_Meier_Schmidt_2021, title={Parameterized complexity of abduction in Schaefer’s framework}, volume={31}, DOI={<a href=\"https://doi.org/10.1093/logcom/exaa079\">10.1093/logcom/exaa079</a>}, number={1}, journal={Journal of Logic and Computation}, publisher={Oxford University Press (OUP)}, author={Mahmood, Yasir and Meier, Arne and Schmidt, Johannes}, year={2021}, pages={266–296} }","mla":"Mahmood, Yasir, et al. “Parameterized Complexity of Abduction in Schaefer’s Framework.” <i>Journal of Logic and Computation</i>, vol. 31, no. 1, Oxford University Press (OUP), 2021, pp. 266–96, doi:<a href=\"https://doi.org/10.1093/logcom/exaa079\">10.1093/logcom/exaa079</a>.","apa":"Mahmood, Y., Meier, A., &#38; Schmidt, J. (2021). Parameterized complexity of abduction in Schaefer’s framework. <i>Journal of Logic and Computation</i>, <i>31</i>(1), 266–296. <a href=\"https://doi.org/10.1093/logcom/exaa079\">https://doi.org/10.1093/logcom/exaa079</a>"},"page":"266-296","intvolume":"        31","date_updated":"2024-06-04T16:03:14Z","author":[{"last_name":"Mahmood","full_name":"Mahmood, Yasir","first_name":"Yasir"},{"last_name":"Meier","full_name":"Meier, Arne","first_name":"Arne"},{"first_name":"Johannes","last_name":"Schmidt","full_name":"Schmidt, Johannes"}],"volume":31,"doi":"10.1093/logcom/exaa079","type":"journal_article","status":"public","_id":"45844","user_id":"99353","department":[{"_id":"574"}],"extern":"1","issue":"1","year":"2021","publisher":"Oxford University Press (OUP)","date_created":"2023-07-03T11:35:23Z","title":"Parameterized complexity of abduction in Schaefer’s framework","publication":"Journal of Logic and Computation","abstract":[{"text":"<jats:title>Abstract</jats:title>\r\n               <jats:p>Abductive reasoning is a non-monotonic formalism stemming from the work of Peirce. It describes the process of deriving the most plausible explanations of known facts. Considering the positive version, asking for sets of variables as explanations, we study, besides the problem of wether there exists a set of explanations, two explanation size limited variants of this reasoning problem (less than or equal to, and equal to a given size bound). In this paper, we present a thorough two-dimensional classification of these problems: the first dimension is regarding the parameterized complexity under a wealth of different parameterizations, and the second dimension spans through all possible Boolean fragments of these problems in Schaefer’s constraint satisfaction framework with co-clones (T. J. Schaefer. The complexity of satisfiability problems. In Proceedings of the 10th Annual ACM Symposium on Theory of Computing, May 1–3, 1978, San Diego, California, USA, R.J. Lipton, W.A. Burkhard, W.J. Savitch, E.P. Friedman, A.V. Aho eds, pp. 216–226. ACM, 1978). Thereby, we almost complete the parameterized complexity classification program initiated by Fellows et al. (The parameterized complexity of abduction. In Proceedings of the Twenty-Sixth AAAI Conference on Articial Intelligence, July 22–26, 2012, Toronto, Ontario, Canada, J. Homann, B. Selman eds. AAAI Press, 2012), partially building on the results by Nordh and Zanuttini (What makes propositional abduction tractable. Artificial Intelligence, 172, 1245–1284, 2008). In this process, we outline a fine-grained analysis of the inherent parameterized intractability of these problems and pinpoint their FPT parts. As the standard algebraic approach is not applicable to our problems, we develop an alternative method that makes the algebraic tools partially available again.</jats:p>","lang":"eng"}],"keyword":["Logic","Hardware and Architecture","Arts and Humanities (miscellaneous)","Software","Theoretical Computer Science"],"language":[{"iso":"eng"}]},{"user_id":"80546","_id":"37146","language":[{"iso":"eng"}],"keyword":["Computer Networks and Communications","Information Systems","Theoretical Computer Science","Software"],"type":"journal_article","publication":"Information Systems Frontiers","status":"public","abstract":[{"text":"<jats:title>Abstract</jats:title><jats:p>Organizations increasingly introduce collaborative technologies in form of virtual assistants (VAs) to save valuable resources, especially when employees are assisted with work-related tasks. However, the effect of VAs on virtual teams and collaboration remains uncertain, particularly whether employees show social loafing (SL) tendencies, i.e., applying less effort for collective tasks compared to working alone. While extant research indicates that VAs collaboratively working in teams exert greater results, less is known about SL in virtual collaboration and how responsibility attribution alters. An online experiment with N = 102 was conducted in which participants were assisted by a VA in solving a task. The results indicate SL tendencies in virtual collaboration with VAs and that participants tend to cede responsibility to the VA. This study makes a first foray and extends the information systems (IS) literature by analyzing SL and responsibility attribution thus updates our knowledge on virtual collaboration with VAs.</jats:p>","lang":"eng"}],"author":[{"full_name":"Stieglitz, Stefan","last_name":"Stieglitz","first_name":"Stefan"},{"last_name":"Mirbabaie","full_name":"Mirbabaie, Milad","id":"88691","first_name":"Milad"},{"last_name":"Möllmann","full_name":"Möllmann, Nicholas R. J.","first_name":"Nicholas R. J."},{"last_name":"Rzyski","full_name":"Rzyski, Jannik","first_name":"Jannik"}],"date_created":"2023-01-17T15:25:22Z","volume":24,"date_updated":"2023-01-18T07:57:25Z","publisher":"Springer Science and Business Media LLC","doi":"10.1007/s10796-021-10201-0","title":"Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution","issue":"3","publication_status":"published","publication_identifier":{"issn":["1387-3326","1572-9419"]},"citation":{"mla":"Stieglitz, Stefan, et al. “Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution.” <i>Information Systems Frontiers</i>, vol. 24, no. 3, Springer Science and Business Media LLC, 2021, pp. 745–70, doi:<a href=\"https://doi.org/10.1007/s10796-021-10201-0\">10.1007/s10796-021-10201-0</a>.","bibtex":"@article{Stieglitz_Mirbabaie_Möllmann_Rzyski_2021, title={Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution}, volume={24}, DOI={<a href=\"https://doi.org/10.1007/s10796-021-10201-0\">10.1007/s10796-021-10201-0</a>}, number={3}, journal={Information Systems Frontiers}, publisher={Springer Science and Business Media LLC}, author={Stieglitz, Stefan and Mirbabaie, Milad and Möllmann, Nicholas R. J. and Rzyski, Jannik}, year={2021}, pages={745–770} }","short":"S. Stieglitz, M. Mirbabaie, N.R.J. Möllmann, J. Rzyski, Information Systems Frontiers 24 (2021) 745–770.","apa":"Stieglitz, S., Mirbabaie, M., Möllmann, N. R. J., &#38; Rzyski, J. (2021). Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution. <i>Information Systems Frontiers</i>, <i>24</i>(3), 745–770. <a href=\"https://doi.org/10.1007/s10796-021-10201-0\">https://doi.org/10.1007/s10796-021-10201-0</a>","ama":"Stieglitz S, Mirbabaie M, Möllmann NRJ, Rzyski J. Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution. <i>Information Systems Frontiers</i>. 2021;24(3):745-770. doi:<a href=\"https://doi.org/10.1007/s10796-021-10201-0\">10.1007/s10796-021-10201-0</a>","ieee":"S. Stieglitz, M. Mirbabaie, N. R. J. Möllmann, and J. Rzyski, “Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution,” <i>Information Systems Frontiers</i>, vol. 24, no. 3, pp. 745–770, 2021, doi: <a href=\"https://doi.org/10.1007/s10796-021-10201-0\">10.1007/s10796-021-10201-0</a>.","chicago":"Stieglitz, Stefan, Milad Mirbabaie, Nicholas R. J. Möllmann, and Jannik Rzyski. “Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution.” <i>Information Systems Frontiers</i> 24, no. 3 (2021): 745–70. <a href=\"https://doi.org/10.1007/s10796-021-10201-0\">https://doi.org/10.1007/s10796-021-10201-0</a>."},"intvolume":"        24","page":"745-770","year":"2021"},{"abstract":[{"text":"Verification of software and processor hardware usually proceeds separately, software analysis relying on the correctness of processors executing machine instructions. This assumption is valid as long as the software runs on standard CPUs that have been extensively validated and are in wide use. However, for processors exploiting custom instruction set extensions to meet performance and energy constraints the validation might be less extensive, challenging the correctness assumption. In this paper we present a novel formal approach for hardware/software co-verification targeting processors with custom instruction set extensions. We detail two different approaches for checking whether the hardware fulfills the requirements expected by the software analysis. The approaches are designed to explore a trade-off between generality of the verification and computational effort. Then, we describe the integration of software and hardware analyses for both techniques and describe a fully automated tool chain implementing the approaches. Finally, we demonstrate and compare the two approaches on example source code with custom instructions, using state-of-the-art software analysis and hardware verification techniques.","lang":"eng"}],"status":"public","type":"journal_article","publication":"IEEE Access","keyword":["Software Analysis","Abstract Interpretation","Custom Instruction","Hardware Verification"],"language":[{"iso":"eng"}],"funded_apc":"1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"_id":"27841","user_id":"22398","department":[{"_id":"78"}],"year":"2021","citation":{"mla":"Jakobs, Marie-Christine, et al. “Software/Hardware Co-Verification for Custom Instruction Set Processors.” <i>IEEE Access</i>, IEEE, 2021, doi:<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>.","bibtex":"@article{Jakobs_Pauck_Platzner_Wehrheim_Wiersema_2021, title={Software/Hardware Co-Verification for Custom Instruction Set Processors}, DOI={<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>}, journal={IEEE Access}, publisher={IEEE}, author={Jakobs, Marie-Christine and Pauck, Felix and Platzner, Marco and Wehrheim, Heike and Wiersema, Tobias}, year={2021} }","short":"M.-C. Jakobs, F. Pauck, M. Platzner, H. Wehrheim, T. Wiersema, IEEE Access (2021).","apa":"Jakobs, M.-C., Pauck, F., Platzner, M., Wehrheim, H., &#38; Wiersema, T. (2021). Software/Hardware Co-Verification for Custom Instruction Set Processors. <i>IEEE Access</i>. <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">https://doi.org/10.1109/ACCESS.2021.3131213</a>","ama":"Jakobs M-C, Pauck F, Platzner M, Wehrheim H, Wiersema T. Software/Hardware Co-Verification for Custom Instruction Set Processors. <i>IEEE Access</i>. Published online 2021. doi:<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>","ieee":"M.-C. Jakobs, F. Pauck, M. Platzner, H. Wehrheim, and T. Wiersema, “Software/Hardware Co-Verification for Custom Instruction Set Processors,” <i>IEEE Access</i>, 2021, doi: <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>.","chicago":"Jakobs, Marie-Christine, Felix Pauck, Marco Platzner, Heike Wehrheim, and Tobias Wiersema. “Software/Hardware Co-Verification for Custom Instruction Set Processors.” <i>IEEE Access</i>, 2021. <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">https://doi.org/10.1109/ACCESS.2021.3131213</a>."},"publication_status":"published","quality_controlled":"1","title":"Software/Hardware Co-Verification for Custom Instruction Set Processors","doi":"10.1109/ACCESS.2021.3131213","date_updated":"2023-01-18T08:34:50Z","publisher":"IEEE","date_created":"2021-11-25T14:12:22Z","author":[{"full_name":"Jakobs, Marie-Christine","last_name":"Jakobs","first_name":"Marie-Christine"},{"last_name":"Pauck","full_name":"Pauck, Felix","id":"22398","first_name":"Felix"},{"first_name":"Marco","last_name":"Platzner","id":"398","full_name":"Platzner, Marco"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"},{"first_name":"Tobias","full_name":"Wiersema, Tobias","id":"3118","last_name":"Wiersema"}]},{"type":"journal_article","publication":"IEEE Transactions on Software Engineering","status":"public","project":[{"_id":"107","name":"Reaktor: SFB 901 - Automatisierte Risikoanalyse in Bezug auf Open-Source-Abhängigkeiten (Hektor) (Transferproject T3)"},{"_id":"1","name":"SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten"},{"_id":"82","name":"SFB 901; Projektbereich T: Transferprojekte des Sonderforschungsbereichs"},{"_id":"107","name":"SFB 901; TP T3: Automatisierte Risikoanalyse in Bezug auf Open-Source-Abhängigkeiten (Hektor)"}],"_id":"31132","user_id":"477","department":[{"_id":"76"}],"keyword":["Software"],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0098-5589","1939-3520","2326-3881"]},"year":"2021","citation":{"ieee":"A. P. Dann, H. Plate, B. Hermann, S. E. Ponta, and E. Bodden, “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2021, doi: <a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>.","chicago":"Dann, Andreas Peter, Henrik Plate, Ben Hermann, Serena Elisa Ponta, and Eric Bodden. “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite.” <i>IEEE Transactions on Software Engineering</i>, 2021, 1–1. <a href=\"https://doi.org/10.1109/tse.2021.3101739\">https://doi.org/10.1109/tse.2021.3101739</a>.","ama":"Dann AP, Plate H, Hermann B, Ponta SE, Bodden E. Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite. <i>IEEE Transactions on Software Engineering</i>. Published online 2021:1-1. doi:<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>","apa":"Dann, A. P., Plate, H., Hermann, B., Ponta, S. E., &#38; Bodden, E. (2021). Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/tse.2021.3101739\">https://doi.org/10.1109/tse.2021.3101739</a>","short":"A.P. Dann, H. Plate, B. Hermann, S.E. Ponta, E. Bodden, IEEE Transactions on Software Engineering (2021) 1–1.","bibtex":"@article{Dann_Plate_Hermann_Ponta_Bodden_2021, title={Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite}, DOI={<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>}, journal={IEEE Transactions on Software Engineering}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Dann, Andreas Peter and Plate, Henrik and Hermann, Ben and Ponta, Serena Elisa and Bodden, Eric}, year={2021}, pages={1–1} }","mla":"Dann, Andreas Peter, et al. “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite.” <i>IEEE Transactions on Software Engineering</i>, Institute of Electrical and Electronics Engineers (IEEE), 2021, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>."},"page":"1-1","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_updated":"2025-11-11T14:28:46Z","author":[{"last_name":"Dann","id":"26886","full_name":"Dann, Andreas Peter","first_name":"Andreas Peter"},{"first_name":"Henrik","full_name":"Plate, Henrik","last_name":"Plate"},{"first_name":"Ben","id":"66173","full_name":"Hermann, Ben","orcid":"0000-0001-9848-2017","last_name":"Hermann"},{"last_name":"Ponta","full_name":"Ponta, Serena Elisa","first_name":"Serena Elisa"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"date_created":"2022-05-09T13:02:35Z","title":"Identifying Challenges for OSS Vulnerability Scanners - A Study &amp; Test Suite","doi":"10.1109/tse.2021.3101739"},{"file_date_updated":"2020-11-19T17:29:03Z","language":[{"iso":"eng"}],"keyword":["Software Requirements","Natural Language Processing","Transfer Learning","On-The-Fly Computing"],"ddc":["000"],"department":[{"_id":"579"}],"user_id":"58701","_id":"18686","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"9","name":"SFB 901 - Subproject B1"}],"status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2020-11-19T17:29:03Z","creator":"jkers","date_created":"2020-11-19T17:29:03Z","file_size":1064877,"access_level":"closed","file_id":"20443","file_name":"Kersting & Bäumer (2020), Kersting2020d.pdf"}],"publication":"PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020","type":"conference","conference":{"location":"Lisbon, Portugal","end_date":"20.11.2020","start_date":"18.11.2020","name":"17th International Conference on Applied Computing"},"title":"SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH","date_created":"2020-08-31T10:59:54Z","author":[{"first_name":"Joschka","last_name":"Kersting","full_name":"Kersting, Joschka","id":"58701"},{"first_name":"Frederik Simon","id":"38837","full_name":"Bäumer, Frederik Simon","last_name":"Bäumer"}],"publisher":"IADIS","date_updated":"2022-01-06T06:53:51Z","page":"119--123","citation":{"ieee":"J. Kersting and F. S. Bäumer, “SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH,” in <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>, Lisbon, Portugal, 2020, pp. 119--123.","chicago":"Kersting, Joschka, and Frederik Simon Bäumer. “SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH.” In <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>, 119--123. IADIS, 2020.","ama":"Kersting J, Bäumer FS. SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH. In: <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>. IADIS; 2020:119--123.","bibtex":"@inproceedings{Kersting_Bäumer_2020, title={SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH}, booktitle={PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020}, publisher={IADIS}, author={Kersting, Joschka and Bäumer, Frederik Simon}, year={2020}, pages={119--123} }","short":"J. Kersting, F.S. Bäumer, in: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020, IADIS, 2020, pp. 119--123.","mla":"Kersting, Joschka, and Frederik Simon Bäumer. “SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH.” <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>, IADIS, 2020, pp. 119--123.","apa":"Kersting, J., &#38; Bäumer, F. S. (2020). SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH. <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>, 119--123."},"year":"2020","has_accepted_license":"1"},{"year":"2020","title":"Model-based Product Configuration in Augmented Reality Applications","publisher":"Springer","date_created":"2020-08-25T08:27:38Z","abstract":[{"text":"Augmented Reality (AR) has recently found high attention in mobile shopping apps such as in domains like furniture or decoration. Here, the developers of the apps focus on the positioning of atomic 3D objects in the physical environment. With this focus, they neglect the conﬁguration of multi-faceted 3D object composition according to the user needs and environmental constraints. To tackle these challenges, we present a model-based approach to support AR-assisted product con-ﬁguration based on the concept of Dynamic Software Product Lines. Our approach splits products (e.g. table) into parts (e.g. tabletop, ta-ble legs, funnier) with their 3D objects and additional information (e.g. name, price). The possible products, which can be conﬁgured out of these parts, are stored in a feature model. At runtime, this feature model can be used to conﬁgure 3D object compositions out of the product parts and adapt to user needs and environmental constraints. The beneﬁts of this approach are demonstrated by a case study of conﬁguring modular kitchens with the help of a prototypical mobile-based implementation.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_id":"20541","file_name":"HCSE20_full.pdf","file_size":2258601,"date_created":"2020-11-30T08:33:30Z","creator":"sego","date_updated":"2020-11-30T08:36:52Z"}],"publication":"Human-Centered Software Engineering. HCSE 2020","ddc":["000"],"keyword":["Product Configuration","Augmented Reality","Runtime Adaptation","Dynamic Software Product Lines"],"language":[{"iso":"eng"}],"place":"Cham","citation":{"mla":"Gottschalk, Sebastian, et al. “Model-Based Product Configuration in Augmented Reality Applications.” <i>Human-Centered Software Engineering. HCSE 2020</i>, edited by Regina Bernhaupt et al., vol. 12481, Springer, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-64266-2_5\">10.1007/978-3-030-64266-2_5</a>.","bibtex":"@inproceedings{Gottschalk_Yigitbas_Schmidt_Engels_2020, place={Cham}, series={Lecture Notes in Computer Science}, title={Model-based Product Configuration in Augmented Reality Applications}, volume={12481}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-64266-2_5\">10.1007/978-3-030-64266-2_5</a>}, booktitle={Human-Centered Software Engineering. HCSE 2020}, publisher={Springer}, author={Gottschalk, Sebastian and Yigitbas, Enes and Schmidt, Eugen and Engels, Gregor}, editor={Bernhaupt, Regina and Ardito, Carmelo and Sauer, StefanEditors}, year={2020}, collection={Lecture Notes in Computer Science} }","short":"S. Gottschalk, E. Yigitbas, E. Schmidt, G. Engels, in: R. Bernhaupt, C. Ardito, S. Sauer (Eds.), Human-Centered Software Engineering. HCSE 2020, Springer, Cham, 2020.","apa":"Gottschalk, S., Yigitbas, E., Schmidt, E., &#38; Engels, G. (2020). Model-based Product Configuration in Augmented Reality Applications. In R. Bernhaupt, C. Ardito, &#38; S. Sauer (Eds.), <i>Human-Centered Software Engineering. HCSE 2020</i> (Vol. 12481). Cham: Springer. <a href=\"https://doi.org/10.1007/978-3-030-64266-2_5\">https://doi.org/10.1007/978-3-030-64266-2_5</a>","ieee":"S. Gottschalk, E. Yigitbas, E. Schmidt, and G. Engels, “Model-based Product Configuration in Augmented Reality Applications,” in <i>Human-Centered Software Engineering. HCSE 2020</i>, Eindhoven, 2020, vol. 12481.","chicago":"Gottschalk, Sebastian, Enes Yigitbas, Eugen Schmidt, and Gregor Engels. “Model-Based Product Configuration in Augmented Reality Applications.” In <i>Human-Centered Software Engineering. HCSE 2020</i>, edited by Regina Bernhaupt, Carmelo Ardito, and Stefan Sauer, Vol. 12481. Lecture Notes in Computer Science. Cham: Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-64266-2_5\">https://doi.org/10.1007/978-3-030-64266-2_5</a>.","ama":"Gottschalk S, Yigitbas E, Schmidt E, Engels G. Model-based Product Configuration in Augmented Reality Applications. In: Bernhaupt R, Ardito C, Sauer S, eds. <i>Human-Centered Software Engineering. HCSE 2020</i>. Vol 12481. Lecture Notes in Computer Science. Cham: Springer; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-64266-2_5\">10.1007/978-3-030-64266-2_5</a>"},"intvolume":"     12481","publication_status":"published","has_accepted_license":"1","conference":{"start_date":"2020-11-30","name":"8th International Working Conference on Human-Centered Software Engineering (HCSE'20)","location":"Eindhoven","end_date":"2020-12-02"},"doi":"10.1007/978-3-030-64266-2_5","date_updated":"2022-01-06T06:53:28Z","oa":"1","author":[{"last_name":"Gottschalk","full_name":"Gottschalk, Sebastian","id":"47208","first_name":"Sebastian"},{"last_name":"Yigitbas","orcid":"0000-0002-5967-833X","id":"8447","full_name":"Yigitbas, Enes","first_name":"Enes"},{"last_name":"Schmidt","full_name":"Schmidt, Eugen","first_name":"Eugen"},{"last_name":"Engels","full_name":"Engels, Gregor","id":"107","first_name":"Gregor"}],"volume":12481,"editor":[{"full_name":"Bernhaupt, Regina","last_name":"Bernhaupt","first_name":"Regina"},{"first_name":"Carmelo","full_name":"Ardito, Carmelo","last_name":"Ardito"},{"first_name":"Stefan","full_name":"Sauer, Stefan","last_name":"Sauer"}],"status":"public","type":"conference","file_date_updated":"2020-11-30T08:36:52Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"18249","user_id":"47208","series_title":"Lecture Notes in Computer Science","department":[{"_id":"66"},{"_id":"534"}]},{"year":"2020","title":"Hypothesis-driven Adaptation of Business Models based on Product Line Engineering","date_created":"2020-05-04T12:16:54Z","publisher":"IEEE","file":[{"file_size":569290,"file_name":"CBI.pdf","access_level":"open_access","file_id":"17383","date_updated":"2020-07-14T09:33:00Z","date_created":"2020-07-14T09:33:00Z","creator":"sego","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"The continuous innovation of its business models is an important task for a company to stay competitive. During this process, the company has to validate various hypotheses about its business models by adapting to uncertain and changing customer needs effectively and efficiently. This adaptation, in turn, can be supported by the concept of Software Product Lines (SPLs). SPLs reduce the time to market by deriving products for customers with changing requirements using a common set of features, structured as a feature model. Analogously, we support the process of business model adaptation by applying the engineering process of SPLs to the structure of the Business Model Canvas (BMC). We call this concept a Business Model Decision Line (BMDL). The BMDL matches business domain knowledge in the form of a feature model with customer needs to derive hypotheses about the business model together with experiments for validation. Our approach is effective by providing a comprehensive overview of possible business model adaptations and efficient by reusing experiments for different hypotheses. We implement our approach in a tool and illustrate the usefulness with an example of developing business models for a mobile application."}],"publication":"Proceedings of the 22nd IEEE International Conference on Business Informatics","language":[{"iso":"eng"}],"ddc":["006"],"keyword":["Business Model Decision Line","Business Model Adaptation","Hypothesis-driven Adaptation","Software Product Line","Feature Model"],"citation":{"ama":"Gottschalk S, Rittmeier F, Engels G. Hypothesis-driven Adaptation of Business Models based on Product Line Engineering. In: <i>Proceedings of the 22nd IEEE International Conference on Business Informatics</i>. IEEE; 2020. doi:<a href=\"https://doi.org/10.1109/CBI49978.2020.00022\">10.1109/CBI49978.2020.00022</a>","chicago":"Gottschalk, Sebastian, Florian Rittmeier, and Gregor Engels. “Hypothesis-Driven Adaptation of Business Models Based on Product Line Engineering.” In <i>Proceedings of the 22nd IEEE International Conference on Business Informatics</i>. IEEE, 2020. <a href=\"https://doi.org/10.1109/CBI49978.2020.00022\">https://doi.org/10.1109/CBI49978.2020.00022</a>.","ieee":"S. Gottschalk, F. Rittmeier, and G. Engels, “Hypothesis-driven Adaptation of Business Models based on Product Line Engineering,” in <i>Proceedings of the 22nd IEEE International Conference on Business Informatics</i>, Antwerp, 2020.","short":"S. Gottschalk, F. Rittmeier, G. Engels, in: Proceedings of the 22nd IEEE International Conference on Business Informatics, IEEE, 2020.","bibtex":"@inproceedings{Gottschalk_Rittmeier_Engels_2020, title={Hypothesis-driven Adaptation of Business Models based on Product Line Engineering}, DOI={<a href=\"https://doi.org/10.1109/CBI49978.2020.00022\">10.1109/CBI49978.2020.00022</a>}, booktitle={Proceedings of the 22nd IEEE International Conference on Business Informatics}, publisher={IEEE}, author={Gottschalk, Sebastian and Rittmeier, Florian and Engels, Gregor}, year={2020} }","mla":"Gottschalk, Sebastian, et al. “Hypothesis-Driven Adaptation of Business Models Based on Product Line Engineering.” <i>Proceedings of the 22nd IEEE International Conference on Business Informatics</i>, IEEE, 2020, doi:<a href=\"https://doi.org/10.1109/CBI49978.2020.00022\">10.1109/CBI49978.2020.00022</a>.","apa":"Gottschalk, S., Rittmeier, F., &#38; Engels, G. (2020). Hypothesis-driven Adaptation of Business Models based on Product Line Engineering. In <i>Proceedings of the 22nd IEEE International Conference on Business Informatics</i>. Antwerp: IEEE. <a href=\"https://doi.org/10.1109/CBI49978.2020.00022\">https://doi.org/10.1109/CBI49978.2020.00022</a>"},"has_accepted_license":"1","doi":"10.1109/CBI49978.2020.00022","conference":{"end_date":"2020-06-24","location":"Antwerp","name":"22nd IEEE International Conference on Business Informatics","start_date":"2020-06-22"},"author":[{"first_name":"Sebastian","last_name":"Gottschalk","full_name":"Gottschalk, Sebastian","id":"47208"},{"full_name":"Rittmeier, Florian","id":"5281","last_name":"Rittmeier","first_name":"Florian"},{"first_name":"Gregor","last_name":"Engels","id":"107","full_name":"Engels, Gregor"}],"oa":"1","date_updated":"2022-01-06T06:52:59Z","status":"public","type":"conference","file_date_updated":"2020-07-14T09:33:00Z","user_id":"47208","department":[{"_id":"66"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"16933"},{"doi":"10.1109/TSE.2019.2948910","main_file_link":[{"url":"http://www.bodden.de/pubs/tse19CrySL.pdf"}],"title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","author":[{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"},{"first_name":"Mira","last_name":"Mezini","full_name":"Mezini, Mira"}],"date_created":"2020-11-27T10:48:38Z","date_updated":"2022-01-06T06:54:29Z","page":"1-1","citation":{"ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>. Published online 2019:1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2019, doi: <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>.","bibtex":"@article{Krüger_Späth_Ali_Bodden_Mezini_2019, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>}, journal={IEEE Transactions on Software Engineering}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2019}, pages={1–1} }","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, IEEE Transactions on Software Engineering (2019) 1–1.","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2019). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>"},"year":"2019","publication_identifier":{"issn":["2326-3881"]},"language":[{"iso":"eng"}],"keyword":["Java","Encryption","Static analysis","Tools","Ciphers","Semantics","cryptography","domain-specific language","static analysis"],"department":[{"_id":"76"}],"user_id":"5786","_id":"20533","status":"public","publication":"IEEE Transactions on Software Engineering","type":"journal_article"}]
