[{"department":[{"_id":"526"}],"citation":{"ieee":"J. Becker, D. Beverungen, R. Knackstedt, H. Peter Rauer, and D. Sigge, “On the Ontological Expressiveness of Conceptual Modeling Grammars for Service Productivity Management,” <i>Information Systems and e-Business Management</i>, no. 3, pp. 337--365, 2014.","chicago":"Becker, Jörg, Daniel Beverungen, Ralf Knackstedt, Hans Peter Rauer, and Daniel Sigge. “On the Ontological Expressiveness of Conceptual Modeling Grammars for Service Productivity Management.” <i>Information Systems and E-Business Management</i>, no. 3 (2014): 337--365. <a href=\"https://doi.org/10.1007/s10257-013-0219-y\">https://doi.org/10.1007/s10257-013-0219-y</a>.","apa":"Becker, J., Beverungen, D., Knackstedt, R., Peter Rauer, H., &#38; Sigge, D. (2014). On the Ontological Expressiveness of Conceptual Modeling Grammars for Service Productivity Management. <i>Information Systems and E-Business Management</i>, (3), 337--365. <a href=\"https://doi.org/10.1007/s10257-013-0219-y\">https://doi.org/10.1007/s10257-013-0219-y</a>","ama":"Becker J, Beverungen D, Knackstedt R, Peter Rauer H, Sigge D. On the Ontological Expressiveness of Conceptual Modeling Grammars for Service Productivity Management. <i>Information Systems and e-Business Management</i>. 2014;(3):337--365. doi:<a href=\"https://doi.org/10.1007/s10257-013-0219-y\">10.1007/s10257-013-0219-y</a>","short":"J. Becker, D. Beverungen, R. Knackstedt, H. Peter Rauer, D. Sigge, Information Systems and E-Business Management (2014) 337--365.","bibtex":"@article{Becker_Beverungen_Knackstedt_Peter Rauer_Sigge_2014, title={On the Ontological Expressiveness of Conceptual Modeling Grammars for Service Productivity Management}, DOI={<a href=\"https://doi.org/10.1007/s10257-013-0219-y\">10.1007/s10257-013-0219-y</a>}, number={3}, journal={Information Systems and e-Business Management}, author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Peter Rauer, Hans and Sigge, Daniel}, year={2014}, pages={337--365} }","mla":"Becker, Jörg, et al. “On the Ontological Expressiveness of Conceptual Modeling Grammars for Service Productivity Management.” <i>Information Systems and E-Business Management</i>, no. 3, 2014, pp. 337--365, doi:<a href=\"https://doi.org/10.1007/s10257-013-0219-y\">10.1007/s10257-013-0219-y</a>."},"user_id":"21671","doi":"10.1007/s10257-013-0219-y","title":"On the Ontological Expressiveness of Conceptual Modeling Grammars for Service Productivity Management","author":[{"last_name":"Becker","full_name":"Becker, Jörg","first_name":"Jörg"},{"last_name":"Beverungen","id":"59677","first_name":"Daniel","full_name":"Beverungen, Daniel"},{"last_name":"Knackstedt","first_name":"Ralf","full_name":"Knackstedt, Ralf"},{"first_name":"Hans","full_name":"Peter Rauer, Hans","last_name":"Peter Rauer"},{"full_name":"Sigge, Daniel","first_name":"Daniel","last_name":"Sigge"}],"extern":"1","date_updated":"2022-01-06T06:59:19Z","issue":"3","page":"337--365","_id":"3491","type":"journal_article","year":"2014","status":"public","publication":"Information Systems and e-Business Management","date_created":"2018-07-06T10:40:38Z"},{"doi":"10.1007/s12599-014-0335-3","title":"Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines","author":[{"first_name":"Daniel","full_name":"Beverungen, Daniel","last_name":"Beverungen","id":"59677"}],"extern":"1","department":[{"_id":"526"}],"citation":{"bibtex":"@article{Beverungen_2014, title={Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines}, DOI={<a href=\"https://doi.org/10.1007/s12599-014-0335-3\">10.1007/s12599-014-0335-3</a>}, number={4}, journal={Business and Information Systems Engineering}, author={Beverungen, Daniel}, year={2014}, pages={191--202} }","mla":"Beverungen, Daniel. “Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines.” <i>Business and Information Systems Engineering</i>, no. 4, 2014, pp. 191--202, doi:<a href=\"https://doi.org/10.1007/s12599-014-0335-3\">10.1007/s12599-014-0335-3</a>.","short":"D. Beverungen, Business and Information Systems Engineering (2014) 191--202.","apa":"Beverungen, D. (2014). Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines. <i>Business and Information Systems Engineering</i>, (4), 191--202. <a href=\"https://doi.org/10.1007/s12599-014-0335-3\">https://doi.org/10.1007/s12599-014-0335-3</a>","ama":"Beverungen D. Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines. <i>Business and Information Systems Engineering</i>. 2014;(4):191--202. doi:<a href=\"https://doi.org/10.1007/s12599-014-0335-3\">10.1007/s12599-014-0335-3</a>","ieee":"D. Beverungen, “Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines,” <i>Business and Information Systems Engineering</i>, no. 4, pp. 191--202, 2014.","chicago":"Beverungen, Daniel. “Exploring the Interplay of the Design and Emergence of Business Processes as Organizational Routines.” <i>Business and Information Systems Engineering</i>, no. 4 (2014): 191--202. <a href=\"https://doi.org/10.1007/s12599-014-0335-3\">https://doi.org/10.1007/s12599-014-0335-3</a>."},"user_id":"21671","type":"journal_article","year":"2014","status":"public","publication":"Business and Information Systems Engineering","date_created":"2018-07-06T10:41:38Z","date_updated":"2022-01-06T06:59:19Z","issue":"4","page":"191--202","_id":"3492"},{"type":"journal_article","year":"2014","status":"public","date_created":"2018-07-06T10:42:16Z","publication":"WIRTSCHAFTSINFORMATIK","issue":"4","date_updated":"2022-01-06T06:59:19Z","_id":"3493","page":"209--222","doi":"10.1007/s11576-014-0425-3","title":"Über das Zusammenwirken der Gestaltung und Emergenz von Geschäftsprozessen als Organisationsroutinen","extern":"1","author":[{"first_name":"Daniel","full_name":"Beverungen, Daniel","id":"59677","last_name":"Beverungen"}],"department":[{"_id":"526"}],"citation":{"short":"D. Beverungen, WIRTSCHAFTSINFORMATIK (2014) 209--222.","bibtex":"@article{Beverungen_2014, title={Über das Zusammenwirken der Gestaltung und Emergenz von Geschäftsprozessen als Organisationsroutinen}, DOI={<a href=\"https://doi.org/10.1007/s11576-014-0425-3\">10.1007/s11576-014-0425-3</a>}, number={4}, journal={WIRTSCHAFTSINFORMATIK}, author={Beverungen, Daniel}, year={2014}, pages={209--222} }","mla":"Beverungen, Daniel. “Über Das Zusammenwirken Der Gestaltung Und Emergenz von Geschäftsprozessen Als Organisationsroutinen.” <i>WIRTSCHAFTSINFORMATIK</i>, no. 4, 2014, pp. 209--222, doi:<a href=\"https://doi.org/10.1007/s11576-014-0425-3\">10.1007/s11576-014-0425-3</a>.","ieee":"D. Beverungen, “Über das Zusammenwirken der Gestaltung und Emergenz von Geschäftsprozessen als Organisationsroutinen,” <i>WIRTSCHAFTSINFORMATIK</i>, no. 4, pp. 209--222, 2014.","chicago":"Beverungen, Daniel. “Über Das Zusammenwirken Der Gestaltung Und Emergenz von Geschäftsprozessen Als Organisationsroutinen.” <i>WIRTSCHAFTSINFORMATIK</i>, no. 4 (2014): 209--222. <a href=\"https://doi.org/10.1007/s11576-014-0425-3\">https://doi.org/10.1007/s11576-014-0425-3</a>.","apa":"Beverungen, D. (2014). Über das Zusammenwirken der Gestaltung und Emergenz von Geschäftsprozessen als Organisationsroutinen. <i>WIRTSCHAFTSINFORMATIK</i>, (4), 209--222. <a href=\"https://doi.org/10.1007/s11576-014-0425-3\">https://doi.org/10.1007/s11576-014-0425-3</a>","ama":"Beverungen D. Über das Zusammenwirken der Gestaltung und Emergenz von Geschäftsprozessen als Organisationsroutinen. <i>WIRTSCHAFTSINFORMATIK</i>. 2014;(4):209--222. doi:<a href=\"https://doi.org/10.1007/s11576-014-0425-3\">10.1007/s11576-014-0425-3</a>"},"user_id":"21671"},{"date_updated":"2022-01-06T06:59:20Z","file_date_updated":"2018-03-20T07:24:40Z","_id":"350","status":"public","type":"report","year":"2014","language":[{"iso":"eng"}],"publisher":"Universität Paderborn","ddc":["040"],"date_created":"2017-10-17T12:42:00Z","department":[{"_id":"183"}],"user_id":"477","citation":{"mla":"Kaimann, Daniel, and Joe Cox. <i>The Interaction of Signals: A Fuzzy Set Analysis of the Video Game Industry</i>. Universität Paderborn, 2014.","bibtex":"@book{Kaimann_Cox_2014, title={The Interaction of Signals: A Fuzzy set Analysis of the Video Game Industry}, publisher={Universität Paderborn}, author={Kaimann, Daniel and Cox, Joe}, year={2014} }","short":"D. Kaimann, J. Cox, The Interaction of Signals: A Fuzzy Set Analysis of the Video Game Industry, Universität Paderborn, 2014.","apa":"Kaimann, D., &#38; Cox, J. (2014). <i>The Interaction of Signals: A Fuzzy set Analysis of the Video Game Industry</i>. Universität Paderborn.","ama":"Kaimann D, Cox J. <i>The Interaction of Signals: A Fuzzy Set Analysis of the Video Game Industry</i>. Universität Paderborn; 2014.","chicago":"Kaimann, Daniel, and Joe Cox. <i>The Interaction of Signals: A Fuzzy Set Analysis of the Video Game Industry</i>. Universität Paderborn, 2014.","ieee":"D. Kaimann and J. Cox, <i>The Interaction of Signals: A Fuzzy set Analysis of the Video Game Industry</i>. Universität Paderborn, 2014."},"abstract":[{"lang":"eng","text":"Customers continuously evaluate the credibility and reliability of a range of signals both separately and jointly. However, existing econometric studies pay insufficient attention to the interactions and complex combinations of these signals, and are typically limited as a result of difficulties controlling for multicollinearity and endogeneity in their data. We develop a novel theoretical approach to address these issues and study different signaling effects (i.e., word-of-mouth, brand reputation, and distribution strategy) on customer perceptions. Using data on the US video games market, we apply a fuzzy set qualitative comparative analysis (fsQCA) to account for cause-effect relationships. The results of our study address a number of key issues in the economics and management literature. First, our results support the contention that reviews from professional critics act as a signal of product quality and therefore positively influence unit sales, as do the discriminatory effects of prices and restricted age ratings. Second, we find evidence to support the use of brand extension strategies as marketing tools that create spillover effects and support the launch of new products."}],"has_accepted_license":"1","project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"author":[{"first_name":"Daniel","full_name":"Kaimann, Daniel","last_name":"Kaimann","id":"18949"},{"last_name":"Cox","full_name":"Cox, Joe","first_name":"Joe"}],"file":[{"success":1,"date_updated":"2018-03-20T07:24:40Z","relation":"main_file","content_type":"application/pdf","file_id":"1416","access_level":"closed","date_created":"2018-03-20T07:24:40Z","creator":"florida","file_size":739169,"file_name":"350-SSRN-id2456991.pdf"}],"title":"The Interaction of Signals: A Fuzzy set Analysis of the Video Game Industry"},{"user_id":"477","citation":{"ieee":"L. Holzweißig, <i>The Impact of Customer Reviews and Reputation on Hotel Prices</i>. Universität Paderborn, 2014.","chicago":"Holzweißig, Lena. <i>The Impact of Customer Reviews and Reputation on Hotel Prices</i>. Universität Paderborn, 2014.","apa":"Holzweißig, L. (2014). <i>The Impact of Customer Reviews and Reputation on Hotel Prices</i>. Universität Paderborn.","ama":"Holzweißig L. <i>The Impact of Customer Reviews and Reputation on Hotel Prices</i>. Universität Paderborn; 2014.","short":"L. Holzweißig, The Impact of Customer Reviews and Reputation on Hotel Prices, Universität Paderborn, 2014.","bibtex":"@book{Holzweißig_2014, title={The Impact of Customer Reviews and Reputation on Hotel Prices}, publisher={Universität Paderborn}, author={Holzweißig, Lena}, year={2014} }","mla":"Holzweißig, Lena. <i>The Impact of Customer Reviews and Reputation on Hotel Prices</i>. Universität Paderborn, 2014."},"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}],"author":[{"first_name":"Lena","full_name":"Holzweißig, Lena","last_name":"Holzweißig"}],"title":"The Impact of Customer Reviews and Reputation on Hotel Prices","date_updated":"2022-01-06T06:59:20Z","_id":"351","status":"public","year":"2014","type":"mastersthesis","publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:00Z"},{"language":[{"iso":"eng"}],"type":"dissertation","year":"2014","status":"public","date_created":"2017-10-17T12:42:00Z","ddc":["040"],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:59:21Z","file_date_updated":"2018-03-20T07:24:10Z","_id":"352","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}],"has_accepted_license":"1","supervisor":[{"last_name":"Frick","full_name":"Frick, Bernd","first_name":"Bernd"}],"title":"The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments","file":[{"creator":"florida","file_name":"352-Diss_Veröffentlichung_Friedrich_Scheel.pdf","file_size":1609436,"access_level":"closed","content_type":"application/pdf","file_id":"1415","date_created":"2018-03-20T07:24:10Z","relation":"main_file","date_updated":"2018-03-20T07:24:10Z","success":1}],"author":[{"last_name":"Scheel","full_name":"Scheel, Friedrich","first_name":"Friedrich"}],"department":[{"_id":"19"},{"_id":"183"}],"citation":{"mla":"Scheel, Friedrich. <i>The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments</i>. Universität Paderborn, 2014.","bibtex":"@book{Scheel_2014, title={The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments}, publisher={Universität Paderborn}, author={Scheel, Friedrich}, year={2014} }","short":"F. Scheel, The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments, Universität Paderborn, 2014.","ama":"Scheel F. <i>The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments</i>. Universität Paderborn; 2014.","apa":"Scheel, F. (2014). <i>The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments</i>. Universität Paderborn.","chicago":"Scheel, Friedrich. <i>The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments</i>. Universität Paderborn, 2014.","ieee":"F. Scheel, <i>The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments</i>. Universität Paderborn, 2014."},"user_id":"477"},{"language":[{"iso":"eng"}],"year":"2014","status":"public","date_created":"2017-10-17T12:42:00Z","date_updated":"2022-01-06T06:59:22Z","file_date_updated":"2018-03-20T07:23:32Z","_id":"353","author":[{"first_name":"Felix","full_name":"Mohr, Felix","last_name":"Mohr"},{"last_name":"Walther","first_name":"Sven","full_name":"Walther, Sven"}],"department":[{"_id":"77"},{"_id":"355"}],"citation":{"ieee":"F. Mohr and S. Walther, “Template-based Generation of Semantic Services,” in <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 2014, pp. 188–203.","chicago":"Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” In <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 188–203. LNCS, 2014. <a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">https://doi.org/10.1007/978-3-319-14130-5_14</a>.","apa":"Mohr, F., &#38; Walther, S. (2014). Template-based Generation of Semantic Services. In <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i> (pp. 188–203). <a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">https://doi.org/10.1007/978-3-319-14130-5_14</a>","ama":"Mohr F, Walther S. Template-based Generation of Semantic Services. In: <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>. LNCS. ; 2014:188-203. doi:<a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">10.1007/978-3-319-14130-5_14</a>","short":"F. Mohr, S. Walther, in: Proceedings of the 14th International Conference on Software Reuse (ICSR), 2014, pp. 188–203.","bibtex":"@inproceedings{Mohr_Walther_2014, series={LNCS}, title={Template-based Generation of Semantic Services}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">10.1007/978-3-319-14130-5_14</a>}, booktitle={Proceedings of the 14th International Conference on Software Reuse (ICSR)}, author={Mohr, Felix and Walther, Sven}, year={2014}, pages={188–203}, collection={LNCS} }","mla":"Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 2014, pp. 188–203, doi:<a href=\"https://doi.org/10.1007/978-3-319-14130-5_14\">10.1007/978-3-319-14130-5_14</a>."},"series_title":"LNCS","type":"conference","publication":"Proceedings of the 14th International Conference on Software Reuse (ICSR)","ddc":["040"],"page":"188-203","project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B2","_id":"10"}],"doi":"10.1007/978-3-319-14130-5_14","has_accepted_license":"1","abstract":[{"text":"There are many technologies for the automation of processesthat deal with services; examples are service discovery and composition.Automation of these processes requires that the services are described semantically. However, semantically described services are currently not oronly rarely available, which limits the applicability of discovery and composition approaches. The systematic support for creating new semanticservices usable by automated technologies is an open problem.We tackle this problem with a template based approach: Domain independent templates are instantiated with domain specific services andboolean expressions. The obtained services have semantic descriptionswhose correctness directly follows from the correctness of the template.Besides the theory, we present experimental results for a service repository in which 85% of the services were generated automatically.","lang":"eng"}],"title":"Template-based Generation of Semantic Services","file":[{"success":1,"relation":"main_file","date_updated":"2018-03-20T07:23:32Z","content_type":"application/pdf","access_level":"closed","file_id":"1414","date_created":"2018-03-20T07:23:32Z","creator":"florida","file_size":431778,"file_name":"353-icsr2015_submission_17.pdf"}],"user_id":"477"},{"publication":" Proceedings of the 39th Annual Macromarketing Conference","date_created":"2018-07-11T07:41:51Z","status":"public","type":"conference_abstract","year":"2014","_id":"3538","date_updated":"2022-01-06T06:59:22Z","author":[{"full_name":"Rötzmeier-Keuper, Julia","first_name":"Julia","id":"24869","last_name":"Rötzmeier-Keuper"},{"id":"36392","last_name":"Wünderlich","full_name":"Wünderlich, Nancy","first_name":"Nancy"}],"conference":{"location":"London, GB","name":"39th Annual Macromarketing Conference"},"title":"Customer collectives in healthcare: The transformative potential of service to overcome consumer vulnerability","user_id":"24869","citation":{"mla":"Rötzmeier-Keuper, Julia, and Nancy Wünderlich. “Customer Collectives in Healthcare: The Transformative Potential of Service to Overcome Consumer Vulnerability.” <i> Proceedings of the 39th Annual Macromarketing Conference</i>, 2014.","bibtex":"@inproceedings{Rötzmeier-Keuper_Wünderlich_2014, title={Customer collectives in healthcare: The transformative potential of service to overcome consumer vulnerability}, booktitle={ Proceedings of the 39th Annual Macromarketing Conference}, author={Rötzmeier-Keuper, Julia and Wünderlich, Nancy}, year={2014} }","short":"J. Rötzmeier-Keuper, N. Wünderlich, in:  Proceedings of the 39th Annual Macromarketing Conference, 2014.","apa":"Rötzmeier-Keuper, J., &#38; Wünderlich, N. (2014). Customer collectives in healthcare: The transformative potential of service to overcome consumer vulnerability. In <i> Proceedings of the 39th Annual Macromarketing Conference</i>. London, GB.","ama":"Rötzmeier-Keuper J, Wünderlich N. Customer collectives in healthcare: The transformative potential of service to overcome consumer vulnerability. In: <i> Proceedings of the 39th Annual Macromarketing Conference</i>. ; 2014.","chicago":"Rötzmeier-Keuper, Julia, and Nancy Wünderlich. “Customer Collectives in Healthcare: The Transformative Potential of Service to Overcome Consumer Vulnerability.” In <i> Proceedings of the 39th Annual Macromarketing Conference</i>, 2014.","ieee":"J. Rötzmeier-Keuper and N. Wünderlich, “Customer collectives in healthcare: The transformative potential of service to overcome consumer vulnerability,” in <i> Proceedings of the 39th Annual Macromarketing Conference</i>, London, GB, 2014."},"department":[{"_id":"181"}]},{"date_updated":"2022-01-06T06:59:22Z","_id":"354","file_date_updated":"2018-03-20T07:23:02Z","page":"387--395","status":"public","type":"conference","year":"2014","date_created":"2017-10-17T12:42:01Z","ddc":["040"],"publication":"Proceedings of 7th International Conference on Utility and Cloud Computing (UCC)","department":[{"_id":"75"}],"user_id":"15572","citation":{"short":"M. Keller, C. Robbert, H. Karl, in: Proceedings of 7th International Conference on Utility and Cloud Computing (UCC), 2014, pp. 387--395.","bibtex":"@inproceedings{Keller_Robbert_Karl_2014, title={Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds}, DOI={<a href=\"https://doi.org/10.1109/UCC.2014.49\">10.1109/UCC.2014.49</a>}, booktitle={Proceedings of 7th International Conference on Utility and Cloud Computing (UCC)}, author={Keller, Matthias and Robbert, Christoph and Karl, Holger}, year={2014}, pages={387--395} }","mla":"Keller, Matthias, et al. “Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds.” <i>Proceedings of 7th International Conference on Utility and Cloud Computing (UCC)</i>, 2014, pp. 387--395, doi:<a href=\"https://doi.org/10.1109/UCC.2014.49\">10.1109/UCC.2014.49</a>.","ieee":"M. Keller, C. Robbert, and H. Karl, “Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds,” in <i>Proceedings of 7th International Conference on Utility and Cloud Computing (UCC)</i>, 2014, pp. 387--395.","chicago":"Keller, Matthias, Christoph Robbert, and Holger Karl. “Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds.” In <i>Proceedings of 7th International Conference on Utility and Cloud Computing (UCC)</i>, 387--395, 2014. <a href=\"https://doi.org/10.1109/UCC.2014.49\">https://doi.org/10.1109/UCC.2014.49</a>.","apa":"Keller, M., Robbert, C., &#38; Karl, H. (2014). Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds. In <i>Proceedings of 7th International Conference on Utility and Cloud Computing (UCC)</i> (pp. 387--395). <a href=\"https://doi.org/10.1109/UCC.2014.49\">https://doi.org/10.1109/UCC.2014.49</a>","ama":"Keller M, Robbert C, Karl H. Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds. In: <i>Proceedings of 7th International Conference on Utility and Cloud Computing (UCC)</i>. ; 2014:387--395. doi:<a href=\"https://doi.org/10.1109/UCC.2014.49\">10.1109/UCC.2014.49</a>"},"has_accepted_license":"1","doi":"10.1109/UCC.2014.49","abstract":[{"lang":"eng","text":"In distributed cloud computing, application deployment across multiple sites can improve quality of service. Recent research developed algorithms to find optimal locations for virtual machines. However, those algorithms assume to have either single-tier applications or a fixed number of virtual machines – a strong simplification of reality. This paper investigates the placement and scaling of complex application architectures. An application is dynamically scaled to fit both the current demand situation and the currently available infrastructure resources. We compare two approaches: The first one is based on virtual network embedding. The second approach is a novel method called Template Embedding. It is based on a hierarchical 1-allocation hub flow problem and combines applica- tion scaling and embedding in one step. Extensive experiments on 43200 network configurations showed that Template Embedding outperforms virtual network embedding in all cases in three metrics: success rate, solution quality, and runtime. This positive result shows that template embedding is a promising approach for distributed cloud resource allocation."}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"name":"SFB 901 - Project Area A","_id":"2"}],"author":[{"last_name":"Keller","full_name":"Keller, Matthias","first_name":"Matthias"},{"last_name":"Robbert","first_name":"Christoph","full_name":"Robbert, Christoph"},{"last_name":"Karl","id":"126","full_name":"Karl, Holger","first_name":"Holger"}],"file":[{"relation":"main_file","date_updated":"2018-03-20T07:23:02Z","success":1,"file_size":737652,"file_name":"354-keller_ucc14_preprint_01.pdf","creator":"florida","date_created":"2018-03-20T07:23:02Z","content_type":"application/pdf","access_level":"closed","file_id":"1413"}],"title":"Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds"},{"author":[{"id":"24869","last_name":"Rötzmeier-Keuper","first_name":"Julia","full_name":"Rötzmeier-Keuper, Julia"},{"first_name":"Nancy","full_name":"Wünderlich, Nancy","id":"36392","last_name":"Wünderlich"}],"conference":{"name":"AMA SERVSIG International Service Research Conference","location":"Thessaloniki, GR"},"title":" Interdependent Relationships Between and among Service Providers and Customer Collectives.","user_id":"24869","citation":{"ama":"Rötzmeier-Keuper J, Wünderlich N.  Interdependent Relationships Between and among Service Providers and Customer Collectives. In: <i>Proceedings of the AMA SERVSIG International Service Research Conference</i>. ; 2014.","apa":"Rötzmeier-Keuper, J., &#38; Wünderlich, N. (2014).  Interdependent Relationships Between and among Service Providers and Customer Collectives. In <i>Proceedings of the AMA SERVSIG International Service Research Conference</i>. Thessaloniki, GR.","ieee":"J. Rötzmeier-Keuper and N. Wünderlich, “ Interdependent Relationships Between and among Service Providers and Customer Collectives.,” in <i>Proceedings of the AMA SERVSIG International Service Research Conference</i>, Thessaloniki, GR, 2014.","chicago":"Rötzmeier-Keuper, Julia, and Nancy Wünderlich. “ Interdependent Relationships Between and among Service Providers and Customer Collectives.” In <i>Proceedings of the AMA SERVSIG International Service Research Conference</i>, 2014.","bibtex":"@inproceedings{Rötzmeier-Keuper_Wünderlich_2014, title={ Interdependent Relationships Between and among Service Providers and Customer Collectives.}, booktitle={Proceedings of the AMA SERVSIG International Service Research Conference}, author={Rötzmeier-Keuper, Julia and Wünderlich, Nancy}, year={2014} }","mla":"Rötzmeier-Keuper, Julia, and Nancy Wünderlich. “ Interdependent Relationships Between and among Service Providers and Customer Collectives.” <i>Proceedings of the AMA SERVSIG International Service Research Conference</i>, 2014.","short":"J. Rötzmeier-Keuper, N. Wünderlich, in: Proceedings of the AMA SERVSIG International Service Research Conference, 2014."},"department":[{"_id":"181"}],"publication":"Proceedings of the AMA SERVSIG International Service Research Conference","date_created":"2018-07-11T07:46:12Z","status":"public","year":"2014","type":"conference_abstract","_id":"3541","date_updated":"2022-01-06T06:59:22Z"},{"_id":"355","file_date_updated":"2018-03-20T07:22:29Z","page":"1--7","date_updated":"2022-01-06T06:59:23Z","publication":"Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)","ddc":["040"],"date_created":"2017-10-17T12:42:01Z","type":"conference","year":"2014","status":"public","citation":{"bibtex":"@inproceedings{Blömer_Günther_Liske_2014, title={Tampering attacks in pairing-based cryptography}, DOI={<a href=\"https://doi.org/10.1109/FDTC.2014.10\">10.1109/FDTC.2014.10</a>}, booktitle={Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2014}, pages={1--7} }","mla":"Blömer, Johannes, et al. “Tampering Attacks in Pairing-Based Cryptography.” <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 2014, pp. 1--7, doi:<a href=\"https://doi.org/10.1109/FDTC.2014.10\">10.1109/FDTC.2014.10</a>.","short":"J. Blömer, P. Günther, G. Liske, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.","apa":"Blömer, J., Günther, P., &#38; Liske, G. (2014). Tampering attacks in pairing-based cryptography. In <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i> (pp. 1--7). <a href=\"https://doi.org/10.1109/FDTC.2014.10\">https://doi.org/10.1109/FDTC.2014.10</a>","ama":"Blömer J, Günther P, Liske G. Tampering attacks in pairing-based cryptography. In: <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>. ; 2014:1--7. doi:<a href=\"https://doi.org/10.1109/FDTC.2014.10\">10.1109/FDTC.2014.10</a>","ieee":"J. Blömer, P. Günther, and G. Liske, “Tampering attacks in pairing-based cryptography,” in <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 2014, pp. 1--7.","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Tampering Attacks in Pairing-Based Cryptography.” In <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 1--7, 2014. <a href=\"https://doi.org/10.1109/FDTC.2014.10\">https://doi.org/10.1109/FDTC.2014.10</a>."},"user_id":"25078","department":[{"_id":"64"}],"title":"Tampering attacks in pairing-based cryptography","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"},{"last_name":"Günther","full_name":"Günther, Peter","first_name":"Peter"},{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"file":[{"content_type":"application/pdf","file_id":"1412","access_level":"closed","date_created":"2018-03-20T07:22:29Z","creator":"florida","file_name":"355-Bloemer2014.pdf","file_size":293394,"success":1,"relation":"main_file","date_updated":"2018-03-20T07:22:29Z"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"43","name":"Securing the Financial Cloud"}],"doi":"10.1109/FDTC.2014.10","has_accepted_license":"1","abstract":[{"lang":"eng","text":"In the last decade pairings have become an important, and often indispensable, ingredient in the construction of identity-based and attribute-based cryptosystems, as well as group signatures and credential systems. Consequently, the applicability of timing, power, or fault attacks to implementations of pairings is an important research topic. We will review some of the known results in this area."}]},{"file_date_updated":"2018-03-20T07:21:58Z","_id":"356","date_updated":"2022-01-06T06:59:25Z","publisher":"Fuji Technology Press Ltd.","date_created":"2017-10-17T12:42:01Z","status":"public","year":"2014","citation":{"ama":"Blazovics L, Lukovszki T, Forstner B. Surrounding robots -- A discrete localized solution for the intruder problem. <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>. 2014;(3):315--319. doi:<a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">10.20965/jaciii.2014.p0315</a>","apa":"Blazovics, L., Lukovszki, T., &#38; Forstner, B. (2014). Surrounding robots -- A discrete localized solution for the intruder problem. <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>, (3), 315--319. <a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">https://doi.org/10.20965/jaciii.2014.p0315</a>","ieee":"L. Blazovics, T. Lukovszki, and B. Forstner, “Surrounding robots -- A discrete localized solution for the intruder problem,” <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>, no. 3, pp. 315--319, 2014.","chicago":"Blazovics, Laszlo, Tamas Lukovszki, and Bertalan  Forstner. “Surrounding Robots -- A Discrete Localized Solution for the Intruder Problem.” <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>, no. 3 (2014): 315--319. <a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">https://doi.org/10.20965/jaciii.2014.p0315</a>.","bibtex":"@article{Blazovics_Lukovszki_Forstner_2014, title={Surrounding robots -- A discrete localized solution for the intruder problem}, DOI={<a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">10.20965/jaciii.2014.p0315</a>}, number={3}, journal={Journal of Advanced Computational Intelligence and Intelligent Informatics}, publisher={Fuji Technology Press Ltd.}, author={Blazovics, Laszlo and Lukovszki, Tamas and Forstner, Bertalan }, year={2014}, pages={315--319} }","mla":"Blazovics, Laszlo, et al. “Surrounding Robots -- A Discrete Localized Solution for the Intruder Problem.” <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>, no. 3, Fuji Technology Press Ltd., 2014, pp. 315--319, doi:<a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">10.20965/jaciii.2014.p0315</a>.","short":"L. Blazovics, T. Lukovszki, B. Forstner, Journal of Advanced Computational Intelligence and Intelligent Informatics (2014) 315--319."},"author":[{"full_name":"Blazovics, Laszlo","first_name":"Laszlo","last_name":"Blazovics"},{"last_name":"Lukovszki","first_name":"Tamas","full_name":"Lukovszki, Tamas"},{"first_name":"Bertalan ","full_name":"Forstner, Bertalan ","last_name":"Forstner"}],"page":"315--319","issue":"3","ddc":["040"],"publication":"Journal of Advanced Computational Intelligence and Intelligent Informatics","type":"journal_article","user_id":"477","file":[{"success":1,"relation":"main_file","date_updated":"2018-03-20T07:21:58Z","file_id":"1411","access_level":"closed","content_type":"application/pdf","date_created":"2018-03-20T07:21:58Z","creator":"florida","file_name":"356-Lukowski.pdf","file_size":323838}],"title":"Surrounding robots -- A discrete localized solution for the intruder problem","has_accepted_license":"1","doi":"10.20965/jaciii.2014.p0315","abstract":[{"lang":"eng","text":"Decentralized algorithms are often used in the cooperative robotics field, especially by large swarm systems. We present a distributed algorithm for a problem in which a group of autonomous mobile robots must surround a given target. These robots are oblivious, i.e., they have no memory of the past. They use only local sensing and need no dedicated communication among themselves. We introduce, then solve the problem in which the group of autonomous mobile robots must surround a given target – we call it the “discrete multiorbit target surrounding problem” (DMTSP). We evaluate our solution using simulation and prove that our solution invariably ensures that robots enclose the target in finite time. "}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}]},{"status":"public","language":[{"iso":"ger"}],"year":"2014","type":"bachelorsthesis","publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:01Z","date_updated":"2022-01-06T06:59:25Z","_id":"357","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"author":[{"last_name":"Ebel","first_name":"Olga","full_name":"Ebel, Olga"}],"title":"Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten","user_id":"477","citation":{"short":"O. Ebel, Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten, Universität Paderborn, 2014.","mla":"Ebel, Olga. <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn, 2014.","bibtex":"@book{Ebel_2014, title={Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten}, publisher={Universität Paderborn}, author={Ebel, Olga}, year={2014} }","chicago":"Ebel, Olga. <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn, 2014.","ieee":"O. Ebel, <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn, 2014.","apa":"Ebel, O. (2014). <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn.","ama":"Ebel O. <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn; 2014."}},{"title":"Strategic and Cooperative Games in Network Economics","file":[{"relation":"main_file","date_updated":"2018-03-20T07:21:29Z","success":1,"creator":"florida","file_name":"358-DissertationRoehl.pdf","file_size":1230059,"file_id":"1410","access_level":"closed","content_type":"application/pdf","date_created":"2018-03-20T07:21:29Z"}],"author":[{"last_name":"Röhl","first_name":"Nils","full_name":"Röhl, Nils"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"supervisor":[{"id":"20801","last_name":"Haake","first_name":"Claus-Jochen","full_name":"Haake, Claus-Jochen"}],"has_accepted_license":"1","citation":{"bibtex":"@book{Röhl_2014, title={Strategic and Cooperative Games in Network Economics}, publisher={Universität Paderborn}, author={Röhl, Nils}, year={2014} }","mla":"Röhl, Nils. <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn, 2014.","short":"N. Röhl, Strategic and Cooperative Games in Network Economics, Universität Paderborn, 2014.","apa":"Röhl, N. (2014). <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn.","ama":"Röhl N. <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn; 2014.","ieee":"N. Röhl, <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn, 2014.","chicago":"Röhl, Nils. <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn, 2014."},"user_id":"477","department":[{"_id":"19"},{"_id":"205"}],"ddc":["040"],"date_created":"2017-10-17T12:42:01Z","publisher":"Universität Paderborn","year":"2014","type":"dissertation","language":[{"iso":"eng"}],"status":"public","_id":"358","file_date_updated":"2018-03-20T07:21:29Z","date_updated":"2022-01-06T06:59:25Z"},{"date_created":"2017-10-17T12:42:02Z","publisher":"Universität Paderborn","year":"2014","type":"mastersthesis","language":[{"iso":"ger"}],"status":"public","_id":"359","date_updated":"2022-01-06T06:59:26Z","title":"Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB","author":[{"first_name":"Manuel","full_name":"Töws, Manuel","last_name":"Töws","id":"11315"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}],"citation":{"chicago":"Töws, Manuel. <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn, 2014.","ieee":"M. Töws, <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn, 2014.","ama":"Töws M. <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn; 2014.","apa":"Töws, M. (2014). <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn.","short":"M. Töws, Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB, Universität Paderborn, 2014.","mla":"Töws, Manuel. <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn, 2014.","bibtex":"@book{Töws_2014, title={Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB}, publisher={Universität Paderborn}, author={Töws, Manuel}, year={2014} }"},"user_id":"15504"},{"publication":"Professional and Practice-based Learning","date_created":"2018-07-23T08:28:58Z","publisher":"Springer Netherlands","type":"book_chapter","year":"2014","publication_identifier":{"issn":["2210-5549","2210-5557"],"isbn":["9789400770119","9789400770126"]},"status":"public","page":"11-24","_id":"3591","date_updated":"2022-01-06T06:59:26Z","title":"Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development","author":[{"first_name":"Christoph","full_name":"Fischer, Christoph","id":"31722","last_name":"Fischer"},{"first_name":"Bridget N.","full_name":"O’Connor, Bridget N.","last_name":"O’Connor"}],"place":"Dordrecht","doi":"10.1007/978-94-007-7012-6_2","citation":{"mla":"Fischer, Christoph, and Bridget N. O’Connor. “Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development.” <i>Professional and Practice-Based Learning</i>, Springer Netherlands, 2014, pp. 11–24, doi:<a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">10.1007/978-94-007-7012-6_2</a>.","bibtex":"@inbook{Fischer_O’Connor_2014, place={Dordrecht}, title={Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development}, DOI={<a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">10.1007/978-94-007-7012-6_2</a>}, booktitle={Professional and Practice-based Learning}, publisher={Springer Netherlands}, author={Fischer, Christoph and O’Connor, Bridget N.}, year={2014}, pages={11–24} }","short":"C. Fischer, B.N. O’Connor, in: Professional and Practice-Based Learning, Springer Netherlands, Dordrecht, 2014, pp. 11–24.","ama":"Fischer C, O’Connor BN. Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development. In: <i>Professional and Practice-Based Learning</i>. Dordrecht: Springer Netherlands; 2014:11-24. doi:<a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">10.1007/978-94-007-7012-6_2</a>","apa":"Fischer, C., &#38; O’Connor, B. N. (2014). Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development. In <i>Professional and Practice-based Learning</i> (pp. 11–24). Dordrecht: Springer Netherlands. <a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">https://doi.org/10.1007/978-94-007-7012-6_2</a>","chicago":"Fischer, Christoph, and Bridget N. O’Connor. “Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development.” In <i>Professional and Practice-Based Learning</i>, 11–24. Dordrecht: Springer Netherlands, 2014. <a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">https://doi.org/10.1007/978-94-007-7012-6_2</a>.","ieee":"C. Fischer and B. N. O’Connor, “Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development,” in <i>Professional and Practice-based Learning</i>, Dordrecht: Springer Netherlands, 2014, pp. 11–24."},"user_id":"31722","publication_status":"published"},{"user_id":"31764","oa":"1","file":[{"relation":"main_file","date_updated":"2018-06-25T08:08:44Z","content_type":"application/pdf","file_id":"1409","access_level":"open_access","date_created":"2018-03-20T07:21:01Z","creator":"florida","file_name":"360-Mehr1410_Specifying_preprint_01.pdf","file_size":422019}],"title":"Specifying and Placing Chains of Virtual Network Functions","abstract":[{"text":"Network appliances perform different functions on network flows and constitute an important part of an operator’s network. Normally, a set of chained network functions process network flows. Following the trend of virtualization of networks, virtualization of the network functions has also become a topic of interest. We define a model for formalizing the chaining of network functions using a context-free language. We process deployment requests and construct virtual network function graphs that can be mapped to the network. We describe the mapping as a Mixed Integer Quadratically Constrained Program (MIQCP) for finding the placement of the network functions and chaining them together considering the limited network resources and requirements of the functions. We have performed a Pareto set analysis to investigate the possible trade-offs between different optimization objectives. ","lang":"eng"}],"has_accepted_license":"1","doi":"10.1109/CloudNet.2014.6968961","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"name":"SFB 901 - Project Area A","_id":"2"}],"page":"7-13","publication":"Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)","ddc":["040"],"type":"conference","citation":{"short":"S. Dräxler, M. Keller, H. Karl, in: Proceedings of the 3rd International Conference on Cloud Networking (CloudNet), 2014, pp. 7–13.","mla":"Dräxler, Sevil, et al. “Specifying and Placing Chains of Virtual Network Functions.” <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i>, 2014, pp. 7–13, doi:<a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">10.1109/CloudNet.2014.6968961</a>.","bibtex":"@inproceedings{Dräxler_Keller_Karl_2014, title={Specifying and Placing Chains of Virtual Network Functions}, DOI={<a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">10.1109/CloudNet.2014.6968961</a>}, booktitle={Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)}, author={Dräxler, Sevil and Keller, Matthias and Karl, Holger}, year={2014}, pages={7–13} }","chicago":"Dräxler, Sevil, Matthias Keller, and Holger Karl. “Specifying and Placing Chains of Virtual Network Functions.” In <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i>, 7–13, 2014. <a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">https://doi.org/10.1109/CloudNet.2014.6968961</a>.","ieee":"S. Dräxler, M. Keller, and H. Karl, “Specifying and Placing Chains of Virtual Network Functions,” in <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i>, 2014, pp. 7–13.","apa":"Dräxler, S., Keller, M., &#38; Karl, H. (2014). Specifying and Placing Chains of Virtual Network Functions. In <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i> (pp. 7–13). <a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">https://doi.org/10.1109/CloudNet.2014.6968961</a>","ama":"Dräxler S, Keller M, Karl H. Specifying and Placing Chains of Virtual Network Functions. In: <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i>. ; 2014:7-13. doi:<a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">10.1109/CloudNet.2014.6968961</a>"},"department":[{"_id":"75"}],"author":[{"full_name":"Dräxler, Sevil","first_name":"Sevil","id":"31764","last_name":"Dräxler"},{"last_name":"Keller","first_name":"Matthias","full_name":"Keller, Matthias"},{"last_name":"Karl","id":"126","full_name":"Karl, Holger","first_name":"Holger"}],"urn":"3601","_id":"360","file_date_updated":"2018-06-25T08:08:44Z","date_updated":"2022-01-06T06:59:27Z","date_created":"2017-10-17T12:42:02Z","status":"public","year":"2014"},{"status":"public","type":"bachelorsthesis","year":"2014","publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:02Z","date_updated":"2022-01-06T06:59:27Z","_id":"361","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"name":"SFB 901 - Project Area A","_id":"2"}],"author":[{"last_name":"Roeske","full_name":"Roeske, Daniel","first_name":"Daniel"}],"title":"Simulating load-dependent operation of picocells","department":[{"_id":"75"}],"user_id":"15504","citation":{"ama":"Roeske D. <i>Simulating Load-Dependent Operation of Picocells</i>. Universität Paderborn; 2014.","apa":"Roeske, D. (2014). <i>Simulating load-dependent operation of picocells</i>. Universität Paderborn.","chicago":"Roeske, Daniel. <i>Simulating Load-Dependent Operation of Picocells</i>. Universität Paderborn, 2014.","ieee":"D. Roeske, <i>Simulating load-dependent operation of picocells</i>. Universität Paderborn, 2014.","mla":"Roeske, Daniel. <i>Simulating Load-Dependent Operation of Picocells</i>. Universität Paderborn, 2014.","bibtex":"@book{Roeske_2014, title={Simulating load-dependent operation of picocells}, publisher={Universität Paderborn}, author={Roeske, Daniel}, year={2014} }","short":"D. Roeske, Simulating Load-Dependent Operation of Picocells, Universität Paderborn, 2014."}},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"supervisor":[{"full_name":"Hehenkamp, Burkhard","first_name":"Burkhard","id":"37339","last_name":"Hehenkamp"}],"title":"Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts & Holt und Kübler et. al","author":[{"full_name":"Kaiser, Sarah","first_name":"Sarah","last_name":"Kaiser"}],"department":[{"_id":"280"}],"citation":{"short":"S. Kaiser, Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al, Universität Paderborn, 2014.","mla":"Kaiser, Sarah. <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn, 2014.","bibtex":"@book{Kaiser_2014, title={Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al}, publisher={Universität Paderborn}, author={Kaiser, Sarah}, year={2014} }","chicago":"Kaiser, Sarah. <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn, 2014.","ieee":"S. Kaiser, <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn, 2014.","ama":"Kaiser S. <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn; 2014.","apa":"Kaiser, S. (2014). <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn."},"user_id":"42447","language":[{"iso":"ger"}],"year":"2014","type":"bachelorsthesis","status":"public","date_created":"2017-10-17T12:42:02Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:59:27Z","_id":"362"},{"user_id":"477","file":[{"creator":"florida","file_size":473308,"file_name":"364-ASE2014.pdf","access_level":"closed","file_id":"1407","content_type":"application/pdf","date_created":"2018-03-20T07:19:59Z","date_updated":"2018-03-20T07:19:59Z","relation":"main_file","success":1}],"title":"SeSAME: Modeling and Analyzing High-Quality Service Compositions","has_accepted_license":"1","abstract":[{"lang":"eng","text":"Today, software components are traded on markets in form of services. These services can also be service compositions consisting of several services. If a software architect wants to provide such a service composition in the market for trade, she needs to perform several tasks: she needs to model the composition, to discover existing services to be part of that composition, and to analyze the composition's functional correctness as well as its quality, e.g., performance. Up to now, the architect needed to find and use different tools for these tasks. Typically, these tools are not interoperable with each other. We provide the tool SeSAME that supports a software architect in all of these tasks. SeSAME is an integrated Eclipse-based tool-suite providing a comprehensive service specification language to model service compositions and existing services. Furthermore, it includes modules for service matching, functional analysis, and non-functional analysis. SeSAME is the first tool that integrates all these tasks into one tool-suite and, thereby, provides holistic support for trading software services. Thus, it contributes to a software provider's market success."}],"doi":"10.1145/2642937.2648621","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"_id":"11","name":"SFB 901 - Subproject B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"page":"839-842","ddc":["040"],"publication":"Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)","type":"conference","citation":{"mla":"Arifulina, Svetlana, et al. “SeSAME: Modeling and Analyzing High-Quality Service Compositions.” <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i>, 2014, pp. 839–42, doi:<a href=\"https://doi.org/10.1145/2642937.2648621\">10.1145/2642937.2648621</a>.","bibtex":"@inproceedings{Arifulina_Becker_Platenius_Walther_2014, title={SeSAME: Modeling and Analyzing High-Quality Service Compositions}, DOI={<a href=\"https://doi.org/10.1145/2642937.2648621\">10.1145/2642937.2648621</a>}, booktitle={Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)}, author={Arifulina, Svetlana and Becker, Matthias and Platenius, Marie Christin and Walther, Sven}, year={2014}, pages={839–842} }","short":"S. Arifulina, M. Becker, M.C. Platenius, S. Walther, in: Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014), 2014, pp. 839–842.","ama":"Arifulina S, Becker M, Platenius MC, Walther S. SeSAME: Modeling and Analyzing High-Quality Service Compositions. In: <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i>. ; 2014:839-842. doi:<a href=\"https://doi.org/10.1145/2642937.2648621\">10.1145/2642937.2648621</a>","apa":"Arifulina, S., Becker, M., Platenius, M. C., &#38; Walther, S. (2014). SeSAME: Modeling and Analyzing High-Quality Service Compositions. In <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i> (pp. 839–842). <a href=\"https://doi.org/10.1145/2642937.2648621\">https://doi.org/10.1145/2642937.2648621</a>","chicago":"Arifulina, Svetlana, Matthias Becker, Marie Christin Platenius, and Sven Walther. “SeSAME: Modeling and Analyzing High-Quality Service Compositions.” In <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i>, 839–42, 2014. <a href=\"https://doi.org/10.1145/2642937.2648621\">https://doi.org/10.1145/2642937.2648621</a>.","ieee":"S. Arifulina, M. Becker, M. C. Platenius, and S. Walther, “SeSAME: Modeling and Analyzing High-Quality Service Compositions,” in <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i>, 2014, pp. 839–842."},"department":[{"_id":"66"},{"_id":"76"}],"author":[{"last_name":"Arifulina","first_name":"Svetlana","full_name":"Arifulina, Svetlana"},{"first_name":"Matthias","full_name":"Becker, Matthias","last_name":"Becker"},{"last_name":"Platenius","full_name":"Platenius, Marie Christin","first_name":"Marie Christin"},{"full_name":"Walther, Sven","first_name":"Sven","last_name":"Walther"}],"_id":"364","file_date_updated":"2018-03-20T07:19:59Z","date_updated":"2022-01-06T06:59:28Z","date_created":"2017-10-17T12:42:03Z","status":"public","language":[{"iso":"eng"}],"year":"2014"}]
