@inproceedings{597, abstract = {{We consider strategic games in which each player seeks a mixed strategy to minimize her cost evaluated by a concave valuation V (mapping probability distributions to reals); such valuations are used to model risk. In contrast to games with expectation-optimizer players where mixed equilibria always exist [15, 16], a mixed equilibrium for such games, called a V -equilibrium, may fail to exist, even though pure equilibria (if any) transfer over. What is the impact of such valuations on the existence, structure and complexity of mixed equilibria? We address this fundamental question for a particular concave valuation: expectation plus variance, denoted as RA, which stands for risk-averse; so, variance enters as a measure of risk and it is used as an additive adjustment to expectation. We obtain the following results about RA-equilibria:- A collection of general structural properties of RA-equilibria connecting to (i) E-equilibria and Var-equilibria, which correspond to the expectation and variance valuations E and Var, respectively, and to (ii) other weaker or incomparable equilibrium properties.- A second collection of (i) existence, (ii) equivalence and separation (with respect to E-equilibria), and (iii) characterization results for RA-equilibria in the new class of player-specific scheduling games. Using examples, we provide the first demonstration that going from E to RA may as well create new mixed (RA-)equilibria.- A purification technique to transform a player-specific scheduling game on identical links into a player-specific scheduling game so that all non-pure RA-equilibria are eliminated while new pure equilibria cannot be created; so, a particular game on two identical links yields one with no RA-equilibrium. As a by-product, the first-completeness result for the computation of RA-equilibria follows.}}, author = {{Mavronicolas, Marios and Monien, Burkhard}}, booktitle = {{Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)}}, pages = {{239--250}}, title = {{{Minimizing Expectation Plus Variance}}}, doi = {{10.1007/978-3-642-33996-7_21}}, year = {{2012}}, } @misc{598, author = {{Mammadov, Fuad}}, publisher = {{Universität Paderborn}}, title = {{{Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen}}}, year = {{2012}}, } @misc{599, author = {{Löwen, Xenia}}, publisher = {{Universität Paderborn}}, title = {{{Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium}}}, year = {{2012}}, } @misc{600, author = {{Feldkord, Björn}}, publisher = {{Universität Paderborn}}, title = {{{Lokale Swaps und überholte Informationen in Basic Network Creation Games}}}, year = {{2012}}, } @phdthesis{601, abstract = {{Wir betrachten eine Gruppe von mobilen, autonomen Robotern in einem ebenen Gel{\"a}nde. Es gibt keine zentrale Steuerung und die Roboter m{\"u}ssen sich selbst koordinieren. Zentrale Herausforderung dabei ist, dass jeder Roboter nur seine unmittelbare Nachbarschaft sieht und auch nur mit Robotern in seiner unmittelbaren Nachbarschaft kommunizieren kann. Daraus ergeben sich viele algorithmische Fragestellungen. In dieser Arbeit wird untersucht, unter welchen Voraussetzungen die Roboter sich auf einem Punkt versammeln bzw. eine Linie zwischen zwei festen Stationen bilden k{\"o}nnen. Daf{\"u}r werden mehrere Roboter-Strategien in verschiedenen Bewegungsmodellen vorgestellt. Diese Strategien werden auf ihre Effizienz hin untersucht. Es werden obere und untere Schranken f{\"u}r die ben{\"o}tigte Anzahl Runden und die Bewegungsdistanz gezeigt. In einigen F{\"a}llen wird außerdem die ben{\"o}tigte Bewegungsdistanz mit derjenigen Bewegungsdistanz verglichen, die eine optimale globale Strategie auf der gleichen Instanz ben{\"o}tigen w{\"u}rde. So werden kompetititve Faktoren hergeleitet.}}, author = {{Kempkes, Barbara}}, isbn = {{978-3-942647-21-2}}, publisher = {{Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}}, title = {{{Local strategies for robot formation problems}}}, volume = {{302}}, year = {{2012}}, } @techreport{602, abstract = {{We study the consequences of dropping the perfect competition assumption in a standard infinite horizon model with infinitely-lived traders and real collateralized assets, together with one additional ingredient: information among players is asymmetric and monitoring is incomplete. The key insight is that trading assets is not only a way to hedge oneself against uncertainty and to smooth consumption across time: It also enables learning information. Conversely, defaulting now becomes strategic: Certain players may manipulate prices so as to provoke a default in order to prevent their opponents from learning. We focus on learning equilibria, at the end of which no player has incorrect beliefs — not because those players with heterogeneous beliefs were eliminated from the market (although default is possible at equilibrium) but because they have taken time to update their prior belief. We prove a partial Folk theorem à la Wiseman (2011) of the following form: For any function that maps each state of the world to a sequence of feasible and strongly individually rational allocations, and for any degree of precision, there is a perfect Bayesian equilibrium in which patient players learn the realized state with this degree of precision and achieve a payoff close to the one specified for each state.}}, author = {{Brangewitz, Sonja}}, publisher = {{Universität Paderborn}}, title = {{{Learning by Trading in Infinite Horizon Strategic Market Games with Default}}}, year = {{2012}}, } @techreport{603, abstract = {{Preemptive Routing and Wavelength Assignment (RWA) algorithms preempt established lightpaths in case not enough resources are available to setup a new lightpath in a Wavelength Division Multiplexing (WDM) network. The selection of lightpaths to be preempted relies on internal decisions of the RWA algorithm. Thus, if dedicated properties of the network topology are required by the applications running on the network, these requirements have to be known by the RWA algorithm. Otherwise it might happen that by preempting a particular lightpath these requirements are violated. If, however, these requirements include parameters only known at the nodes running the application, the RWA algorithm cannot evaluate the requirements. For this reason a RWA algorithm is needed which involves its users in the preemption decisions. We present a family of preemptive RWA algorithms for WDM networks. These algorithms have two distinguishing features: a) they can handle dynamic traffic by on-the-fly reconfiguration, and b) users can give feedback for reconfiguration decisions and thus influence the preemption decision of the RWA algorithm, leading to networks which adapt directly to application needs. This is different from traffic engineering where the network is (slowly) adapted to observed traffic patterns. Our algorithms handle various WDM network configurations including networks consisting of heterogeneous WDM hardware. To this end, we are using the layered graph approach together with a newly developed graph model that is used to determine conflicting lightpaths.}}, author = {{Wette, Philip and Karl, Holger}}, publisher = {{Universität Paderborn}}, title = {{{Introducing feedback to preemptive routing and wavelength assignment algorithms for dynamic traffic scenarios}}}, year = {{2012}}, } @misc{604, author = {{Seier, Henrik}}, publisher = {{Universität Paderborn}}, title = {{{Implementierung eines Branch-and-Bound-Algorithmus für nichtkonvexe gemischt-ganzzahlige Optimierungsprobleme mit quadratischen Nebenbedingungen}}}, year = {{2012}}, } @misc{605, author = {{Isenberg, Florian}}, publisher = {{Universität Paderborn}}, title = {{{Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung}}}, year = {{2012}}, } @article{6055, author = {{Mehler, Alexander and Lücking, Andy and Menke, Peter}}, issn = {{0893-6080}}, journal = {{Neural Networks}}, pages = {{159--164}}, publisher = {{Elsevier BV}}, title = {{{Assessing cognitive alignment in different types of dialog by means of a network model}}}, doi = {{10.1016/j.neunet.2012.02.013}}, volume = {{32}}, year = {{2012}}, } @inbook{6057, author = {{Menke, Peter}}, booktitle = {{Handbook of Technical Communication}}, isbn = {{978-3-11-018834-9}}, pages = {{285–314}}, publisher = {{de Gruyter}}, title = {{{Evaluation of Technical Communication}}}, volume = {{8}}, year = {{2012}}, } @misc{606, author = {{Löken, Nils}}, publisher = {{Universität Paderborn}}, title = {{{Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas}}}, year = {{2012}}, } @misc{607, author = {{Haarhoff, Thomas}}, publisher = {{Universität Paderborn}}, title = {{{Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2}}}, year = {{2012}}, } @inproceedings{608, abstract = {{Predicate abstraction is an established technique in software verification. It inherently includes an abstraction refinement loop successively adding predicates until the right level of abstraction is found. For concurrent systems, predicate abstraction can be combined with spotlight abstraction, further reducing the state space by abstracting away certain processes. Refinement then has to decide whether to add a new predicate or a new process. Selecting the right predicates and processes is a crucial task: The positive effect of abstraction may be compromised by unfavourable refinement decisions. Here we present a heuristic approach to abstraction refinement. The basis for a decision is a set of refinement candidates, derived by multiple counterexample-generation. Candidates are evaluated with respect to their influence on other components in the system. Experimental results show that our technique can significantly speed up verification as compared to a naive abstraction refinement.}}, author = {{Timm, Nils and Wehrheim, Heike and Czech, Mike}}, booktitle = {{Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)}}, pages = {{348--363}}, title = {{{Heuristic-Guided Abstraction Refinement for Concurrent Systems}}}, doi = {{10.1007/978-3-642-34281-3_25}}, year = {{2012}}, } @misc{610, author = {{Mohr, Mario}}, publisher = {{Universität Paderborn}}, title = {{{Generating Prototypes of Adaptive Component-based Software Systems for Performance Analysis}}}, year = {{2012}}, } @article{6102, author = {{Steinmetz, Holger and Schwens, C and Wehner, M and Kabst, Rüdiger}}, journal = {{PERSONALquartely}}, number = {{1}}, pages = {{34--39}}, title = {{{Das Cranet-Projekt: Kreuzkulturelle Vergleiche im HR-Management.}}}, volume = {{64}}, year = {{2012}}, } @article{6103, author = {{Kabst, Rüdiger and Baum, M}}, journal = {{PERSONALquartely}}, number = {{3}}, pages = {{3}}, title = {{{Editorial: Employer Branding: Strategie, Instrumente, Umsetzung}}}, volume = {{64}}, year = {{2012}}, } @misc{611, author = {{Hangmann, Hendrik}}, publisher = {{Universität Paderborn}}, title = {{{Generating Adjustable Temperature Gradients on modern FPGAs}}}, year = {{2012}}, } @misc{613, author = {{Wohlfarth, Stefan}}, publisher = {{Universität Paderborn}}, title = {{{Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens}}}, year = {{2012}}, } @book{6138, author = {{Weber, W and Kabst, Rüdiger}}, isbn = {{978-3-8349-1994-6}}, title = {{{Einführung in die Betriebswirtschaftslehre}}}, year = {{2012}}, }