TY - CHAP AU - Rumlich, Dominik ED - Doff, Sabine ID - 21912 T2 - Fremdsprachenunterricht empirisch erforschen. Grundlagen - Methoden - Anwendung TI - (Sprach-)Tests in der Praxis: Die Studie „Development Of North Rhine-Westphalian CLIL Students“ (DENOCS). ER - TY - CONF AB - Relating to the direct manufacturing of end-use parts the knowledge about the effect of the long-term ageing of Fused Deposition Modeling (FDM) parts is of particular importance. For this, tensile specimens were stored for time periods of up to 52 weeks in two different conditions and the testing was conducted at different temperatures within a temperature range of -60°C to +160°C. Further tests were made after the exposure in multiple media. The parts were built up with the system “Fortus 400mc” from Stratasys with the material Ultem*9085 in two different build directions, the strongest direction X (on its side) and the weakest build direction Z (upright) and with the standard toolpath parameters of the Insight software version 7.0. AU - Bagsik, A. AU - Schöppner, Volker AU - Klemp, E. ID - 22016 T2 - 23rd Annual International Solid Freeform Fabrication Symposium TI - Long-Term ageing effects on Fused Deposition Modeling Parts manufactured with ULTEM*9085 VL - 23 ER - TY - CONF AU - Eggert, A AU - Garnefeld, I AU - Steinhoff, L ID - 7739 T2 - 2012 AMA Summer Marketing Educators' Proceedings TI - The Bright and Dark Side of Endowed Status in Hierarchical Loyalty Programs ER - TY - CONF AU - Garnefeld, I AU - Münkhoff, E AU - Bruns, A ID - 7740 T2 - 2012 AMA Summer Marketing Educators’ Proceedings TI - I thought it was all over and now it is back again – Customer reactions to time extensions of sales promotions ER - TY - CONF AU - Eggert, A AU - Steiner, M AU - Ulaga, W AU - Backhaus, K ID - 7741 T2 - Proceedings of the 2012 ISBM Academic Workshop TI - Capturing the Value of Hybrid Offerings: The Impact of the Price Presentation Format ER - TY - CONF AU - Ritter, T AU - Eggert, A ID - 7742 T2 - Proceedings of the 2012 ISBM Academic Workshop TI - Dispersion of Market Activities: A Configurational Approach ER - TY - CONF AU - Eggert, A AU - Münkhoff, E AU - Thiesbrummel, C ID - 7743 T2 - 2012 AMA Winter Marketing Educators' Proceedings TI - Growing with Industrial Services - A Configurational Approach ER - TY - CONF AU - Eggert, A AU - Garnefeld, I AU - Steinhoff, L ID - 7744 T2 - 2012 AMA Winter Marketing Educators' Proceedings TI - Endowed Status in Hierarchical Loyalty Programs ER - TY - CONF AU - Garnefeld, I AU - Helm, S AU - Eggert, A AU - Tax, S ID - 7745 T2 - 2012 AMA Winter Marketing Educators' Proceedings TI - Growing Existing Customers’ Profitability with Customer Referral Programs ER - TY - GEN ED - Ehrig, Hartmut ED - Engels, Gregor ED - Kreowski, Hans-Jörg ED - Rozenberg, Grzegorz ID - 7763 TI - Graph Transformation - 6th International Conference, ICGT 2012, Bremen, Germany, September 24-29, 2012, Proceedings VL - 7562 ER - TY - JOUR AU - Biermann, Thorsten AU - Scalia, Luca AU - Choi, Changsoon AU - Karl, Holger AU - Kellerer, Wolfgang ID - 782 IS - 5 JF - Pervasive and Mobile Computing TI - CoMP clustering and backhaul limitations in cooperative cellular mobile access networks ER - TY - JOUR AU - Willig, Andreas AU - Karl, Holger AU - Kipnis, Danil ID - 783 IS - 2 JF - Wireless Networks TI - Segment-based packet combining: how to schedule a dense relayer cluster? ER - TY - CONF AU - Herlich, Matthias AU - Karl, Holger ID - 784 T2 - Proceedings of the 3rd International Conference on Energy-Efficient Computing and Networking, e-Energy'12, Madrid, Spain, May 9-11, 2012 TI - Average and competitive analysis of latency and power consumption of a queuing system with a sleep mode ER - TY - CONF AU - Blanckenstein, Johannes AU - Klaue, Jirka AU - Karl, Holger ID - 785 T2 - European Wireless 2012 - 18th European Conference 2012, April 18-20, 2012, Poznan, Poland. TI - Energy Efficient Clustering using a Wake-up Receiver ER - TY - CONF AU - Künsemöller, Jörn AU - Karl, Holger ID - 786 T2 - Economics of Grids, Clouds, Systems, and Services - 9th International Conference, GECON 2012, Berlin, Germany, November 27-28, 2012. Proceedings TI - On Local Separation of Processing and Storage in Infrastructure-as-a-Service ER - TY - CONF AU - Dräxler, Martin AU - Karl, Holger ID - 787 T2 - 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France, November 20-23, 2012 TI - Efficiency of On-Path and Off-Path Caching Strategies in Information Centric Networks ER - TY - CONF AU - Dannewitz, Christian AU - Herlich, Matthias AU - Karl, Holger ID - 788 T2 - 37th Annual IEEE Conference on Local Computer Networks, Workshop Proceedings, Clearwater Beach, FL, USA, October 22-25, 2012 TI - OpenNetInf - prototyping an information-centric Network Architecture ER - TY - CONF AU - Dräxler, Martin AU - Biermann, Thorsten AU - Karl, Holger AU - Kellerer, Wolfgang ID - 789 T2 - 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2012, Sydney, Australia, September 9-12, 2012 TI - Cooperating base station set selection and network reconfiguration in limited backhaul networks ER - TY - CONF AU - Dräxler, Martin AU - Beister, Frederic AU - Kruska, Stephan AU - Aelken, J. AU - Karl, Holger ID - 790 T2 - International ICST Conference on Simulation Tools and Techniques, SIMUTOOLS '12, Sirmione-Desenzano, Italy, March 19-23, 2012 TI - Using OMNeT++ for energy optimization simulations in mobile core networks ER - TY - CONF AU - Volkhausen, Tobias AU - Schinköthe, Kai AU - Karl, Holger ID - 791 T2 - 2012 IEEE Wireless Communications and Networking Conference, WCNC 2012, Paris, France, April 1-4, 2012 TI - Quantization techniques for accurate soft message combining ER - TY - CONF AU - Volkhausen, Tobias AU - Dridger, Kornelius AU - S. Lichte, Hermann AU - Karl, Holger ID - 792 T2 - 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), Paderborn, Germany, May 14-18, 2012 TI - Efficient cooperative relaying in wireless multi-hop networks with commodity WiFi hardware ER - TY - CONF AU - Becker, Matthias AU - Luckey, Markus AU - Becker, Steffen ID - 8055 T2 - Proceedings of the International Conference on Quality of Software Architecture TI - Model-driven Performance Engineering of Self-Adaptive Systems: A Survey ER - TY - CONF AB - Service-oriented computing (SOC) promises to solve many issues in the area of distributed software development, e.g. the realization of the loose coupling pattern in practice through service discovery and invocation. For this purpose, service descriptions must comprise structural as well as behavioral information of the services otherwise an accurate service discovery is not possible. We addressed this issue in our previous paper and proposed a UML-based rich service description language (RSDL) providing comprehensive notations to specify service requests and offers. However, the automatic matching of service requests and offers specified in a RSDL for the purpose of service discovery is a complex task, due to multifaceted heterogeneity of the service partners. This heterogeneity includes the use of different underlying ontologies or different levels of granularity in the specification itself resulting in complex mappings between service requests and offers. In this paper, we present an automatic matching mechanism for service requests and offers specified in a RSDL that overcomes the underlying heterogeneity of the service partners. AU - Huma, Zille AU - Gerth, Christian AU - Engels, Gregor AU - Juwig, Oliver ID - 8056 T2 - Proceedings of the ACM/IEEE 15th International Conference on Model Driven Engineering Languages and Systems (MODELS'12) TI - Towards an Automatic Service Discovery for UML-based Rich Service Descriptions VL - 7590 ER - TY - BOOK AU - Kremer, Marion AU - Engels, Gregor AU - Hofmann, Alexander AU - Hohwiller, Jörg AU - E. Nandico, Oliver AU - Nötzold, Thomas AU - Prott, Karl AU - Schlegel, Diethelm AU - Seidl, Andreas AU - Wolf, Thomas ID - 8226 TI - Quasar 3.0 - A Situational Approach to Software Engineering ER - TY - CONF AB - A major goal of the On-The-Fly Computing project is the automated composition of individual services based on services that are available in dynamic markets. Dependent on the granularity of a market, different alternatives that satisfy the requested functional requirements may emerge. In order to select the best solution, services are usually selected with respect to their quality in terms of inherent non-functional properties. In this paper, we describe our idea of how to model this service selection process as a Markov Decision Process, which we in turn intend to solve by means of Reinforcement Learning techniques in order to control the underlying service composition process. In addition, some initial issues with respect to our approach are addressed. AU - Jungmann, Alexander AU - Kleinjohann, Bernd ID - 568 T2 - Proceedings of the 9th IEEE International Conference on Service Computing (SCC) TI - Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition ER - TY - CONF AU - Püschel, Tim AU - Schryen, Guido AU - Hristova, Diana AU - Neumann, Dirk ID - 5680 T2 - European Conference on Information Systems TI - Cloud Service Revenue Management ER - TY - CONF AU - Lang, Fabian AU - Schryen, Guido AU - Fink, Andreas ID - 5683 T2 - International Conference on Information Systems TI - Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study ER - TY - JOUR AU - Bodenstein, Christian AU - Schryen, Guido AU - Neumann, Dirk ID - 5688 IS - 1 JF - European Journal of Operational Research : EJOR TI - Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers VL - 222 ER - TY - CONF AB - Today's real-time embedded systems operate in frequently changing environments on which they react by self-adaptations. Such an approach needs adequate modeling support of these reconfigurations to enable verification of safety properties, e.g., by timed model checking. Component-based development of such systems realizes these self-adaptations by structural reconfigurations of components and their connectors. However, component models proposed in literature do not support reconfigurable components in real-time embedded context but focus on other domains like business information systems. In this paper, we present an extension of our modeling language MechatronicUML to support structural reconfigurations taking the specific requirements of our domain into account. Based on the proposed extension we outline our research roadmap to achieve verification and realization of systems modeled in MechatronicUML. AU - Becker, Steffen AU - Heinzemann, Christian AU - Priesterjahn, Claudia ID - 569 T2 - Proceedings of the 15th ACM SigSoft International Symposium on Component-Based Software Engineering (CBSE) TI - Towards Modeling Reconfiguration in Hierarchical Component Architectures ER - TY - JOUR AB - This article studies the construction of self-stabilizing topologies for distributed systems. While recent research has focused on chain topologies where nodes need to be linearized with respect to their identiers, we explore a natural and relevant 2-dimensional generalization. In particular, we present a local self-stabilizing algorithm DStab which is based on the concept of \local Delaunay graphs" and which forwards temporary edges in greedy fashion reminiscent of compass routing. DStab constructs a Delaunay graph from any initial connected topology and in a distributed manner in time O(n3) in the worst-case; if the initial network contains the Delaunay graph, the convergence time is only O(n) rounds. DStab also ensures that individual node joins and leaves aect a small part of the network only. Such self-stabilizing Delaunay networks have interesting applications and our construction gives insights into the necessary geometric reasoning that is required for higherdimensional linearization problems.Keywords: Distributed Algorithms, Topology Control, Social Networks AU - Jacob, Riko AU - Ritscher, Stephan AU - Scheideler, Christian AU - Schmid, Stefan ID - 570 JF - Theoretical Computer Science TI - Towards higher-dimensional topological self-stabilization: A distributed algorithm for Delaunay graphs ER - TY - CONF AB - The paradigm shift from purchasing monolithic software solutions to a dynamic composition of individual solutions entails many new possibilities yet great challenges, too. In order to satisfy user requirements, complex services have to be automatically composed of elementary services. Multiple possibilities of composing a complex service inevitably emerge. The problem of selecting the most appropriate services has to be solved by comparing the different service candidates with respect to their quality in terms of inherent non-functional properties while simultaneously taking the user requirements into account. We are aiming for an integrated service rating and ranking methodology in order to support the automation of the underlying decision-making process. The main contribution of this paper is a first decomposition of the quality-based service selection process, while emphasizing major issues and challenges, which we are addressing in the On-The-Fly Computing project. AU - Jungmann, Alexander AU - Kleinjohann, Bernd ID - 571 T2 - Proceedings of the 4th International Conferences on Advanced Service Computing (SERVICE COMPUTATION) TI - Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition ER - TY - JOUR AB - The tendency of managers to focus on short-term results rather than on sustained company success is of particular importance to retail marketing managers, because marketing activities involve expenditures which may only pay off in the longer term. To address the issue of myopic management, our study shows how the complexity of the service profit chain (SPC) can cause managers to make suboptimal decisions. Hence, our paper departs from past research by recognizing that understanding the temporal interplay between operational investments, employee satisfaction, customer satisfaction, and operating profit is essential to achieving sustained success. In particular, we intend to improve understanding of the functioning of the SPC with respect to time lags and feedback loops. Results of our large-scale longitudinal study set in a multi-outlet retail chain reveal time-lag effects between operational investments and employee satisfaction, as well as between customer satisfaction and performance. These findings, along with evidence of a negative interaction effect of employee satisfaction on the relationship between current performance and future investments, show the substantial risk of mismanaging the SPC. We identify specific situations in which the dynamic approach leads to superior marketing investment decisions, when compared to the conventional static view of the SCP. These insights provide valuable managerial guidance for effectively managing the SPC over time. AU - Evanschitzky, Heiner AU - Wangenheim, Florian v AU - Wünderlich, Nancy ID - 5716 IS - 3 JF - Journal of Retailing KW - Employee satisfaction KW - Customer satisfaction KW - Performance KW - Service profit chain KW - Feedback loops KW - Time lags KW - Myopic marketing management TI - Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops. VL - 88 ER - TY - JOUR AB - Although professional service providers increasingly deliver their services globally, little is known about cross-cultural differences in customers’ motivation to participate in service production. To address this lacuna, we survey a total of 2,284 banking customers in 11 countries on their motivation to provide personal information to, and follow the advice of, their service providers. We find differences in both aspects, but only the differences in providing personal information can be explained by the cultural values of uncertainty avoidance, individualism/collectivism, and masculinity/femininity. To perform certain tasks in the service process, global professional service providers should acknowledge cultural differences in customers’ motivations. AU - Schumann, Jan H AU - Wünderlich, Nancy AU - Zimmer, Marcus S ID - 5717 IS - 2 JF - Schmalenbach Business Review KW - Co-Production KW - Culture KW - Customer Participation KW - Professional Services TI - Culture’s Impact on Customer Motivation to Engage in Professional Service Enactments. VL - 64 ER - TY - JOUR AB - The role of information and communication technology for economic growth has been emphasized repeatedly. Technological breakthroughs have generated new forms of services, such as self-services or remote services. Although these encounters are qualitatively different from traditional service provision, prior service management literature thus far had paid little attention to theory development and the systematization of technology-based service encounters. To fill this research gap, the present study outlines how new types of technology-based services fit into existing service typologies and provides an extension of existing frameworks to capture their unique characteristics. These insights in turn offer managerial implications and highlight open research questions. AU - Schumann, Jan H AU - Wünderlich, Nancy AU - Wangenheim, Florian ID - 5718 IS - 2 JF - Technovation KW - Services KW - Remote services KW - Self-services KW - Technology mediation TI - Technology Mediation in Service Delivery: A New Typology and an Agenda for Managers and Academics. VL - 32 ER - TY - CONF AB - Service-oriented computing (SOC) promises to solve many issues in the area of distributed software development, e.g. the realization of the loose coupling pattern in practice through service discovery and invocation. For this purpose, service descriptions must comprise structural as well as behavioral information of the services otherwise an accurate service discovery is not possible. We addressed this issue in our previous paper and proposed a UML-based rich service description language (RSDL) providing comprehensive notations to specify service requests and offers.However, the automatic matching of service requests and offers specified in a RSDL for the purpose of service discovery is a complex task, due to multifaceted heterogeneity of the service partners. This heterogeneity includes the use of different underlying ontologies or different levels of granularity in the specification itself resulting in complex mappings between service requests and offers. In this paper, we present an automatic matching mechanism for service requests and offers specified in a RSDL that overcomes the underlying heterogeneity of the service partners. AU - Huma, Zille AU - Gerth, Christian AU - Engels, Gregor AU - Juwig, Oliver ID - 572 T2 - Proceedings of the ACM/IEEE 15th International Conference on Model Driven Engineering Languages and Systems (MoDELS) TI - Towards an Automatic Service Discovery for UML-based Rich Service Descriptions ER - TY - CONF AB - In software markets of the future, customer-specific software will be developed on demand from distributed software and hardware services available on world-wide markets. Having a request, services have to be automatically discovered and composed. For that purpose, services have to be matched based on their specifications. For the accurate matching, services have to be described comprehensively that requires the integration of different domain-specific languages (DSLs) used for functional, non-functional, and infrastructural properties. Since different service providers use plenty of language dialects to model the same service property, their integration is needed for the matching. In this paper, we propose a framework for integration of DSLs. It is based on a parameterized abstract core language that integrates key concepts needed to describe a service. Parts of the core language can be substituted with concrete DSLs. Thus, the framework serves as a basis for the comprehensive specification and automatic matching of services. AU - Arifulina, Svetlana ED - W. Eisenecker, Ulrich ED - Bucholdt, Christian ID - 573 T2 - Proceedings of the Doctoral Symposium of the 5th International Conference on Software Language Engineering 2012, Dresden, Germany (SLE (Doctoral Symposium)) TI - Towards a Framework for the Integration of Modeling Languages ER - TY - JOUR AB - We present Tiara — a self-stabilizing peer-to-peer network maintenance algorithm. Tiara is truly deterministic which allows it to achieve exact performance bounds. Tiara allows logarithmic searches and topology updates. It is based on a novel sparse 0-1 skip list. We then describe its extension to a ringed structure and to a skip-graph.Key words: Peer-to-peer networks, overlay networks, self-stabilization. AU - Clouser, Thomas AU - Nesterenko, Mikhail AU - Scheideler, Christian ID - 574 JF - Theoretical Computer Science TI - Tiara: A self-stabilizing deterministic skip list and skip graph ER - TY - GEN AU - Bremer, Lars ID - 575 TI - Symbiotic Coupling of Peer-to-Peer and Cloud Systems ER - TY - CONF AU - Nagel, Benjamin AU - Gerth, Christian AU - Yigitbas, Enes AU - Christ, Fabian AU - Engels, Gregor ID - 5753 T2 - Proceedings of the 1st International Workshop on Model-Driven Engineering for High Performance and CLoud computing co-located with 15th International Conference on Model Driven Engineering Languages and Systems {(MODELS} 2012), Innsbruck, Austria, October 01 - 05, 2012 TI - Model-driven specification of adaptive cloud-based systems ER - TY - GEN AU - Schmitz, Henning ID - 576 TI - Stereo Matching on a Convey HC-1 Hybrid Core Computer ER - TY - GEN AU - Yigitbas, Enes ID - 5760 TI - Entwicklung eines Monitoring- und Adaptionskonzeptes für Geschäftsprozesse in service-orientierten Systemen ER - TY - GEN AB - SSS is an international forum for researchers and practitioners in the design and development of distributed systems with self-properties: (classical) self-stabilizing, self-configuring, self-organizing, self-managing, self-repairing, self-healing, self-optimizing, self-adaptive, and self-protecting. Research in distributed systems is now at a crucialpoint in its evolution, marked by the importance of dynamic systems such as peer-to-peer networks, large-scale wireless sensor networks, mobile ad hoc networks, cloud computing, robotic networks, etc. Moreover, new applications such as grid and web services, banking and e-commerce, e-health and robotics, aerospace and avionics, automotive, industrial process control, etc. have joined the traditional applications of distributed systems. The theory of self-stabilization has been enriched in the last 30 years by high quality research contributions in the areas of algorithmic techniques, formal methodologies, model theoretic issues, and composition techniques. All these areas are essential to the understanding and maintenance of self-properties in fault-tolerant distributed systems. ED - Richa, Andrea W. ED - Scheideler, Christian ID - 577 TI - Stabilization, Safety, and Security of Distributed Systems ER - TY - GEN AB - This paper analyzes the stability of capital tax harmonization agreements in a stylized model where countries have formed coalitions which set a common tax rate in order to avoid the inefficient fully non-cooperative Nash equilibrium. In particular, for a given coalition structure we study to what extend the stability of tax agreements is affected by the coalitions that have formed. In our set-up, countries are symmetric, but coalitions can be of arbitrary size. We analyze stability by means of a repeated game setting employing simple trigger strategies and we allow a sub-coalition to deviate from the coalitional equilibrium. For a given form of punishment we are able to rank the stability of different coalition structures as long as the size of the largest coalition does not change. Our main results are: (1) singleton regions have the largest incentives to deviate, (2) the stability of cooperation depends on the degree of cooperative behavior ex-ante. AU - Brangewitz, Sonja AU - Brockhoff, Sarah ID - 578 TI - Stability of Coalitional Equilibria within Repeated Tax Competition ER - TY - JOUR AB - A left-to-right maximum in a sequence of n numbers s_1, …, s_n is a number that is strictly larger than all preceding numbers. In this article we present a smoothed analysis of the number of left-to-right maxima in the presence of additive random noise. We show that for every sequence of n numbers s_i ∈ [0,1] that are perturbed by uniform noise from the interval [-ε,ε], the expected number of left-to-right maxima is Θ(&sqrt;n/ε + log n) for ε>1/n. For Gaussian noise with standard deviation σ we obtain a bound of O((log3/2 n)/σ + log n).We apply our results to the analysis of the smoothed height of binary search trees and the smoothed number of comparisons in the quicksort algorithm and prove bounds of Θ(&sqrt;n/ε + log n) and Θ(n/ε+1&sqrt;n/ε + n log n), respectively, for uniform random noise from the interval [-ε,ε]. Our results can also be applied to bound the smoothed number of points on a convex hull of points in the two-dimensional plane and to smoothed motion complexity, a concept we describe in this article. We bound how often one needs to update a data structure storing the smallest axis-aligned box enclosing a set of points moving in d-dimensional space. AU - Damerow, Valentina AU - Manthey, Bodo AU - Meyer auf der Heide, Friedhelm AU - Räcke, Harald AU - Scheideler, Christian AU - Sohler, Christian AU - Tantau, Till ID - 579 IS - 3 JF - Transactions on Algorithms TI - Smoothed analysis of left-to-right maxima with applications ER - TY - CONF AB - We present and study a new model for energy-aware and profit-oriented scheduling on a single processor.The processor features dynamic speed scaling as well as suspension to a sleep mode.Jobs arrive over time, are preemptable, and have different sizes, values, and deadlines.On the arrival of a new job, the scheduler may either accept or reject the job.Accepted jobs need a certain energy investment to be finished in time, while rejected jobs cause costs equal to their values.Here, power consumption at speed $s$ is given by $P(s)=s^{\alpha}+\beta$ and the energy investment is power integrated over time.Additionally, the scheduler may decide to suspend the processor to a sleep mode in which no energy is consumed, though awaking entails fixed transition costs $\gamma$.The objective is to minimize the total value of rejected jobs plus the total energy.Our model combines aspects from advanced energy conservation techniques (namely speed scaling and sleep states) and profit-oriented scheduling models.We show that \emph{rejection-oblivious} schedulers (whose rejection decisions are not based on former decisions) have – in contrast to the model without sleep states – an unbounded competitive ratio.It turns out that the jobs' value densities (the ratio between a job's value and its work) are crucial for the performance of such schedulers.We give an algorithm whose competitiveness nearly matches the lower bound w.r.t\text{.} the maximum value density.If the maximum value density is not too large, the competitiveness becomes $\alpha^{\alpha}+2e\alpha$.Also, we show that it suffices to restrict the value density of low-value jobs only.Using a technique from \cite{Chan:2010} we transfer our results to processors with a fixed maximum speed. AU - Cord-Landwehr, Andreas AU - Kling, Peter AU - Mallmann Trenn, Fredrik ED - Even, Guy ED - Rawitz, Dror ID - 580 T2 - Proceedings of the 1st Mediterranean Conference on Algorithms (MedAlg) TI - Slow Down & Sleep for Profit in Online Deadline Scheduling ER - TY - CONF AB - Nanoparticles are getting more and more in the focus of the scientic community since the potential for the development of very small particles interacting with each other and completing medical and other tasks is getting bigger year by year. In this work we introduce a distributed local algorithm for arranging a set of nanoparticles on the discrete plane into specic geometric shapes, for instance a rectangle. The concept of a particle we use can be seen as a simple mobile robot with the following restrictions: it can only view the state of robots it is physically connected to, is anonymous, has only a constant size memory, can only move by using other particles as an anchor point on which it pulls itself alongside, and it operates in Look-Compute-Move cycles. The main result of this work is the presentation of a random distributed local algorithm which transforms any given connected set of particles into a particular geometric shape. As an example we provide a version of this algorithm for forming a rectangle with an arbitrary predened aspect ratio. To the best of our knowledge this is the rst work that considers arrangement problems for these types of robots. AU - Drees, Maximilian AU - Hüllmann (married name: Eikel), Martina AU - Koutsopoulos, Andreas AU - Scheideler, Christian ID - 581 T2 - Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS) TI - Self-Organizing Particle Systems ER - TY - GEN AU - Strothmann, Thim Frederik ID - 582 TI - Self-Optimizing Binary Search Trees - A Game Theoretic Approach ER - TY - GEN AU - Drücker, Julian ID - 583 TI - Revenue-maximizing Order of Sale in Sequential Auctions ER - TY - GEN AU - Hohenberger, Till ID - 584 TI - Queuing Latency at Cooperative Base Stations ER - TY - CONF AB - In a cloud-computing scenario where users buy software from software providers and execute it at computing centers, a digital rights management (DRM) system has to be in place to check the software licenses during each software execution. However, the exposure of users to privacy invasion in the presence of DRM systems is problematic.We come up with a concept that unites software providers' and users' demands for a secure and privacy-preserving DRM system for cloud computing. The employment of proxy re-encryption allows for a prevention of profile building (under pseudonym) of users by any party. AU - Petrlic, Ronald ID - 585 T2 - Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS) TI - Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme ER - TY - THES AB - FPGAs, systems on chip and embedded systems are nowadays irreplaceable. They combine the computational power of application specific hardware with software-like flexibility. At runtime, they can adjust their functionality by downloading new hardware modules and integrating their functionality. Due to their growing capabilities, the demands made to reconfigurable hardware grow. Their deployment in increasingly security critical scenarios requires new ways of enforcing security since a failure in security has severe consequences. Aside from financial losses, a loss of human life and risks to national security are possible. With this work I present the novel and groundbreaking concept of proof-carrying hardware. It is a method for the verification of properties of hardware modules to guarantee security for a target platform at runtime. The producer of a hardware module delivers based on the consumer's safety policy a safety proof in combination with the reconfiguration bitstream. The extensive computation of a proof is a contrast to the comparatively undemanding checking of the proof. I present a prototype based on open-source tools and an abstract FPGA architecture and bitstream format. The proof of the usability of proof-carrying hardware provides the evaluation of the prototype with the exemplary application of securing combinational and bounded sequential equivalence of reference monitor modules for memory safety. AU - Drzevitzky, Stephanie ID - 586 TI - Proof-Carrying Hardware: A Novel Approach to Reconfigurable Hardware Security ER - TY - GEN AU - Plessl, Christian AU - Platzner, Marco AU - Agne, Andreas AU - Happe, Markus AU - Lübbers, Enno ID - 587 TI - Programming models for reconfigurable heterogeneous multi-cores ER - TY - CONF AB - We come up with a digital rights management (DRM) concept for cloud computing and show how license management for software within the cloud can be achieved in a privacy-friendly manner. In our scenario, users who buy software from software providers stay anonymous. At the same time, our approach guarantees that software licenses are bound to users and their validity is checked before execution. We employ a software re-encryption scheme so that computing centers which execute users’ software are not able to build user profiles—not even under pseudonym—of their users. We combine secret sharing and homomorphic encryption. We make sure that malicious users are unable to relay software to others. DRM constitutes an incentive for software providers to take part in a future cloud computing scenario.We make this scenario more attractive for users by preserving their privacy. AU - Petrlic, Ronald AU - Sorge, Christoph ID - 588 T2 - Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA) TI - Privacy-Preserving DRM for Cloud Computing ER - TY - CONF AB - We present a privacy-preserving DRM scheme for a (future) cloud computing software market. In such a market, applications are packed into virtual machines (VMs) by software providers and the VMs can be executed at any computing center within the cloud. We propose the introduction of a software TPM as a container for VM-specific keys within the VM that moves around with the VM within the cloud. The software TPM is coupled to a virtual TPM at a computing center to constitute the root of trust for a local DRM enforcement system within the VM that checks the license before each application execution. This allows flexible price models, e.g. execute at most n timeslike models. Users have proof that their personally identifiable information, stored and processed within the VM at a computing center, cannot be obtained by the computing center. A feature of our solution is that neither software provider nor computing center are able to build usage profiles of the software executions. AU - Petrlic, Ronald ID - 589 T2 - Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) TI - Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment ER - TY - CONF AB - Predicate abstraction is an established technique for reducing the size of the state space during verification. In this paper, we extend predication abstraction with block-abstraction memoization (BAM), which exploits the fact that blocks are often executed several times in a program. The verification can thus benefit from caching the values of previous block analyses and reusing them upon next entry into a block. In addition to function bodies, BAM also performs well for nested loops. To further increase effectiveness, block memoization has been integrated with lazy abstraction adopting a lazy strategy for cache refinement. Together, this achieves significant performance increases: our tool (an implementation within the configurable program analysis framework CPAchecker) has won the Competition on Software Verification 2012 in the category “Overall”. AU - Wonisch, Daniel AU - Wehrheim, Heike ID - 590 T2 - Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM) TI - Predicate Analysis with Block-Abstraction Memoization ER - TY - GEN AU - Celik, Aydin ID - 592 TI - Penny Auctions: Design und Strategisches Verhalten ER - TY - GEN AU - Rojahn, Tobias ID - 593 TI - Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten ER - TY - GEN AU - Klerx, Timo ID - 594 TI - Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen ER - TY - GEN AU - Mallmann Trenn, Frederik ID - 595 TI - On scheduling with multi-core and multi-speed processors using power down ER - TY - CONF AB - To meet quality-of-service requirements in changing environments, modern software systems adapt themselves. The structure, and correspondingly the behavior, of these systems undergoes continuous change. Model-driven performance engineering, however, assumes static system structures, behavior, and deployment. Hence, self-adaptive systems pose new challenges to model-driven performance engineering. There are a few surveys on self-adaptive systems, performance engineering, and the combination of both in the literature. In contrast to existing work, here we focus on model-driven performance analysis approaches. Based on a systematic literature review, we present a classication, identify open issues, and outline further research. AU - Becker, Matthias AU - Luckey, Markus AU - Becker, Steffen ID - 596 T2 - Proceedings of the 8th ACM SigSoft International Conference on Quality of Software Architectures (QoSA'12) TI - Model-Driven Performance Engineering of Self-Adaptive Systems: A Survey ER - TY - CONF AB - We consider strategic games in which each player seeks a mixed strategy to minimize her cost evaluated by a concave valuation V (mapping probability distributions to reals); such valuations are used to model risk. In contrast to games with expectation-optimizer players where mixed equilibria always exist [15, 16], a mixed equilibrium for such games, called a V -equilibrium, may fail to exist, even though pure equilibria (if any) transfer over. What is the impact of such valuations on the existence, structure and complexity of mixed equilibria? We address this fundamental question for a particular concave valuation: expectation plus variance, denoted as RA, which stands for risk-averse; so, variance enters as a measure of risk and it is used as an additive adjustment to expectation. We obtain the following results about RA-equilibria:- A collection of general structural properties of RA-equilibria connecting to (i) E-equilibria and Var-equilibria, which correspond to the expectation and variance valuations E and Var, respectively, and to (ii) other weaker or incomparable equilibrium properties.- A second collection of (i) existence, (ii) equivalence and separation (with respect to E-equilibria), and (iii) characterization results for RA-equilibria in the new class of player-specific scheduling games. Using examples, we provide the first demonstration that going from E to RA may as well create new mixed (RA-)equilibria.- A purification technique to transform a player-specific scheduling game on identical links into a player-specific scheduling game so that all non-pure RA-equilibria are eliminated while new pure equilibria cannot be created; so, a particular game on two identical links yields one with no RA-equilibrium. As a by-product, the first-completeness result for the computation of RA-equilibria follows. AU - Mavronicolas, Marios AU - Monien, Burkhard ID - 597 T2 - Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT) TI - Minimizing Expectation Plus Variance ER - TY - GEN AU - Mammadov, Fuad ID - 598 TI - Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen ER - TY - GEN AU - Löwen, Xenia ID - 599 TI - Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium ER - TY - GEN AU - Feldkord, Björn ID - 600 TI - Lokale Swaps und überholte Informationen in Basic Network Creation Games ER - TY - THES AB - Wir betrachten eine Gruppe von mobilen, autonomen Robotern in einem ebenen Gel{\"a}nde. Es gibt keine zentrale Steuerung und die Roboter m{\"u}ssen sich selbst koordinieren. Zentrale Herausforderung dabei ist, dass jeder Roboter nur seine unmittelbare Nachbarschaft sieht und auch nur mit Robotern in seiner unmittelbaren Nachbarschaft kommunizieren kann. Daraus ergeben sich viele algorithmische Fragestellungen. In dieser Arbeit wird untersucht, unter welchen Voraussetzungen die Roboter sich auf einem Punkt versammeln bzw. eine Linie zwischen zwei festen Stationen bilden k{\"o}nnen. Daf{\"u}r werden mehrere Roboter-Strategien in verschiedenen Bewegungsmodellen vorgestellt. Diese Strategien werden auf ihre Effizienz hin untersucht. Es werden obere und untere Schranken f{\"u}r die ben{\"o}tigte Anzahl Runden und die Bewegungsdistanz gezeigt. In einigen F{\"a}llen wird außerdem die ben{\"o}tigte Bewegungsdistanz mit derjenigen Bewegungsdistanz verglichen, die eine optimale globale Strategie auf der gleichen Instanz ben{\"o}tigen w{\"u}rde. So werden kompetititve Faktoren hergeleitet. AU - Kempkes, Barbara ID - 601 SN - 978-3-942647-21-2 TI - Local strategies for robot formation problems VL - 302 ER - TY - GEN AB - We study the consequences of dropping the perfect competition assumption in a standard infinite horizon model with infinitely-lived traders and real collateralized assets, together with one additional ingredient: information among players is asymmetric and monitoring is incomplete. The key insight is that trading assets is not only a way to hedge oneself against uncertainty and to smooth consumption across time: It also enables learning information. Conversely, defaulting now becomes strategic: Certain players may manipulate prices so as to provoke a default in order to prevent their opponents from learning. We focus on learning equilibria, at the end of which no player has incorrect beliefs — not because those players with heterogeneous beliefs were eliminated from the market (although default is possible at equilibrium) but because they have taken time to update their prior belief. We prove a partial Folk theorem à la Wiseman (2011) of the following form: For any function that maps each state of the world to a sequence of feasible and strongly individually rational allocations, and for any degree of precision, there is a perfect Bayesian equilibrium in which patient players learn the realized state with this degree of precision and achieve a payoff close to the one specified for each state. AU - Brangewitz, Sonja ID - 602 TI - Learning by Trading in Infinite Horizon Strategic Market Games with Default ER - TY - GEN AB - Preemptive Routing and Wavelength Assignment (RWA) algorithms preempt established lightpaths in case not enough resources are available to setup a new lightpath in a Wavelength Division Multiplexing (WDM) network. The selection of lightpaths to be preempted relies on internal decisions of the RWA algorithm. Thus, if dedicated properties of the network topology are required by the applications running on the network, these requirements have to be known by the RWA algorithm. Otherwise it might happen that by preempting a particular lightpath these requirements are violated. If, however, these requirements include parameters only known at the nodes running the application, the RWA algorithm cannot evaluate the requirements. For this reason a RWA algorithm is needed which involves its users in the preemption decisions. We present a family of preemptive RWA algorithms for WDM networks. These algorithms have two distinguishing features: a) they can handle dynamic traffic by on-the-fly reconfiguration, and b) users can give feedback for reconfiguration decisions and thus influence the preemption decision of the RWA algorithm, leading to networks which adapt directly to application needs. This is different from traffic engineering where the network is (slowly) adapted to observed traffic patterns. Our algorithms handle various WDM network configurations including networks consisting of heterogeneous WDM hardware. To this end, we are using the layered graph approach together with a newly developed graph model that is used to determine conflicting lightpaths. AU - Wette, Philip AU - Karl, Holger ID - 603 TI - Introducing feedback to preemptive routing and wavelength assignment algorithms for dynamic traffic scenarios ER - TY - GEN AU - Seier, Henrik ID - 604 TI - Implementierung eines Branch-and-Bound-Algorithmus für nichtkonvexe gemischt-ganzzahlige Optimierungsprobleme mit quadratischen Nebenbedingungen ER - TY - GEN AU - Isenberg, Florian ID - 605 TI - Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung ER - TY - JOUR AU - Mehler, Alexander AU - Lücking, Andy AU - Menke, Peter ID - 6055 JF - Neural Networks SN - 0893-6080 TI - Assessing cognitive alignment in different types of dialog by means of a network model VL - 32 ER - TY - CHAP AU - Menke, Peter ID - 6057 SN - 978-3-11-018834-9 T2 - Handbook of Technical Communication TI - Evaluation of Technical Communication VL - 8 ER - TY - GEN AU - Löken, Nils ID - 606 TI - Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas ER - TY - GEN AU - Haarhoff, Thomas ID - 607 TI - Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2 ER - TY - CONF AB - Predicate abstraction is an established technique in software verification. It inherently includes an abstraction refinement loop successively adding predicates until the right level of abstraction is found. For concurrent systems, predicate abstraction can be combined with spotlight abstraction, further reducing the state space by abstracting away certain processes. Refinement then has to decide whether to add a new predicate or a new process. Selecting the right predicates and processes is a crucial task: The positive effect of abstraction may be compromised by unfavourable refinement decisions. Here we present a heuristic approach to abstraction refinement. The basis for a decision is a set of refinement candidates, derived by multiple counterexample-generation. Candidates are evaluated with respect to their influence on other components in the system. Experimental results show that our technique can significantly speed up verification as compared to a naive abstraction refinement. AU - Timm, Nils AU - Wehrheim, Heike AU - Czech, Mike ID - 608 T2 - Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM) TI - Heuristic-Guided Abstraction Refinement for Concurrent Systems ER - TY - GEN AU - Mohr, Mario ID - 610 TI - Generating Prototypes of Adaptive Component-based Software Systems for Performance Analysis ER - TY - JOUR AU - Steinmetz, Holger AU - Schwens, C AU - Wehner, M AU - Kabst, Rüdiger ID - 6102 IS - 1 JF - PERSONALquartely TI - Das Cranet-Projekt: Kreuzkulturelle Vergleiche im HR-Management. VL - 64 ER - TY - JOUR AU - Kabst, Rüdiger AU - Baum, M ID - 6103 IS - 3 JF - PERSONALquartely TI - Editorial: Employer Branding: Strategie, Instrumente, Umsetzung VL - 64 ER - TY - GEN AU - Hangmann, Hendrik ID - 611 TI - Generating Adjustable Temperature Gradients on modern FPGAs ER - TY - GEN AU - Wohlfarth, Stefan ID - 613 TI - Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens ER - TY - BOOK AU - Weber, W AU - Kabst, Rüdiger ID - 6138 SN - 978-3-8349-1994-6 TI - Einführung in die Betriebswirtschaftslehre ER - TY - GEN AU - Lehrig, Sebastian ID - 614 TI - Empirischer, quantitativer Vergleich von Modelltransformationssprachen ER - TY - CHAP AU - Baum, M AU - Schwens, C AU - Kabst, R ED - Gabrielsson, M ED - Kirpalani, M ID - 6148 T2 - Handbook of Research on Born Globals TI - Determinants of Different Types of Born Globals. ER - TY - CHAP AU - Isidor, R AU - Schwens, C AU - Kabst, R ED - Zentes, J ID - 6149 SN - 978-3-8349-3503-8 T2 - Markteintrittsstrategien - Dynamik und Komplexität TI - Die Messung von Joint-Venture Erfolg ER - TY - GEN AU - Kluczniok, Sven ID - 616 TI - Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen ER - TY - CONF AB - In this paper, a color based feature extraction and classification approach for image processing in embedded systems in presented. The algorithms and data structures developed for this approach pay particular attention to reduce memory consumption and computation power of the entire image processing, since embedded systems usually impose strong restrictions regarding those resources. The feature extraction is realized in terms of an image segmentation algorithm. The criteria of homogeneity for merging pixels and regions is provided by the color classification mechanism, which incorporates appropriate methods for defining, representing and accessing subspaces in the working color space. By doing so, pixels and regions with color values that belong to the same color class can be merged. Furthermore, pixels with redundant color values that do not belong to any pre-defined color class can be completely discarded in order to minimize computational effort. Subsequently, the extracted regions are converted to a more convenient feature representation in terms of statistical moments up to and including second order. For evaluation, the whole image processing approach is applied to a mobile representative of embedded systems within the scope of a simple real-world scenario. AU - Jungmann, Alexander AU - Kleinjohann, Bernd AU - Kleinjohann, Elisabeth AU - Bieshaar, Maarten ID - 617 T2 - Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE) TI - Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems ER - TY - GEN AU - Kurras, Sven ID - 618 TI - Distributed Sampling of Regular Graphs ER - TY - CONF AB - Dynamics in networks is caused by a variety of reasons, like nodes moving in 2D (or 3D) in multihop cellphone networks, joins and leaves in peer-to-peer networks, evolution in social networks, and many others. In order to understand such kinds of dynamics, and to design distributed algorithms that behave well under dynamics, many ways to model dynamics are introduced and analyzed w.r.t. correctness and eciency of distributed algorithms. In [16], Kuhn, Lynch, and Oshman have introduced a very general, worst case type model of dynamics: The edge set of the network may change arbitrarily from step to step, the only restriction is that it is connected at all times and the set of nodes does not change. An extended model demands that a xed connected subnetwork is maintained over each time interval of length T (T-interval dynamics). They have presented, among others, algorithms for counting the number of nodes under such general models of dynamics.In this paper, we generalize their models and algorithms by adding random edge faults, i.e., we consider fault-prone dynamic networks: We assume that an edge currently existing may fail to transmit data with some probability p. We rst observe that strong counting, i.e., each node knows the correct count and stops, is not possible in a model with random edge faults. Our main two positive results are feasibility and runtime bounds for weak counting, i.e., stopping is no longer required (but still a correct count in each node), and for strong counting with an upper bound, i.e., an upper bound N on n is known to all nodes. AU - Brandes, Philipp AU - Meyer auf der Heide, Friedhelm ID - 619 T2 - Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS) TI - Distributed Computing in Fault-Prone Dynamic Networks ER - TY - GEN AU - Mittendorf, Robert ID - 620 TI - Datenschutzgerechtes DRM im Cloud Computing ER - TY - GEN AU - Sekula, Stephan ID - 621 TI - Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing ER - TY - CONF AB - Behavioral modeling languages are most useful if their behavior is specified formally such that it can e.g. be analyzed and executed automatically. Obviously, the quality of such behavior specifications is crucial. The rule-based semantics specification technique Dynamic Meta Modeling (DMM) honors this by using the approach of Test-driven Semantics Specification (TDSS), which makes sure that the specification at hand at least describes the correct behavior for a suite of test models. However, in its current state TDSS does not provide any means to measure the quality of such a test suite. In this paper, we describe how we have applied the idea of test coverage to TDSS. Similar to common approaches of defining test coverage criteria, we describe a data structure called invocation graph containing possible orders of applications ofDMM rules. Then we define different coverage criteria based on that data structure, taking the rule applications caused by the test suite’s models into account. Our implementation of the described approach gives the language engineer using DMM a means to reason about the quality of the language’s test suite, and also provides hints on how to improve that quality by adding dedicated test models to the test suite. AU - Arifulina, Svetlana AU - Engels, Gregor AU - Soltenborn, Christian ID - 622 T2 - Proceedings of the 11th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT) TI - Coverage Criteria for Testing DMM Specifications ER - TY - CONF AB - This paper initiates the formal study of a fundamental problem: How to efficiently allocate a shared communication medium among a set of K co-existing networks in the presence of arbitrary external interference? While most literature on medium access focuses on how to share a medium among nodes, these approaches are often either not directly applicable to co-existing networks as they would violate the independence requirement, or they yield a low throughput if applied to multiple networks. We present the randomized medium access (MAC) protocol COMAC which guarantees that a given communication channel is shared fairly among competing and independent networks, and that the available bandwidth is used efficiently. These performance guarantees hold in the presence of arbitrary external interference or even under adversarial jamming. Concretely, we show that the co-existing networks can use a Ω(ε2 min{ε, 1/poly(K)})-fraction of the non-jammed time steps for successful message transmissions, where ε is the (arbitrarily distributed) fraction of time which is not jammed. AU - Richa, Andrea W. AU - Scheideler, Christian AU - Schmid, Stefan AU - Zhang, Jin ID - 623 T2 - Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC) TI - Competitive and fair throughput for co-existing networks under adversarial interference ER - TY - GEN AU - Jakobs, Marie-Christine ID - 624 TI - Change and Validity Analysis in Deductive Program Verification ER - TY - CONF AB - This paper initiates the study of self-adjusting distributed data structures for networks. In particular, we present SplayNets: a binary search tree based network that is self-adjusting to routing request.We derive entropy bounds on the amortized routing cost and show that our splaying algorithm has some interesting properties. AU - Schmid, Stefan AU - Avin, Chen AU - Scheideler, Christian AU - Häupler, Bernhard AU - Lotker, Zvi ID - 625 T2 - Proceedings of the 26th International Symposium on Distributed Computing (DISC) TI - Brief Announcement: SplayNets - Towards Self-Adjusting Distributed Data Structures ER - TY - JOUR AU - Paelke, Volker AU - Nebe, Karsten AU - Geiger, Christian AU - Klompmaker, Florian AU - Fischer, Holger Gerhard ID - 6250 JF - ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences SN - 1682-1777 TI - Multi-Modal, Multi-Touch Interaction with Maps in Disaster Management Applications VL - XXXIX-B8 ER - TY - CONF AB - The design of ecient search structures for peer-to-peer systems has attracted a lot of attention in recent years. In this announcement we address the problem of nding the predecessor in a key set and present an ecient data structure called hashed Predecessor Patricia trie. Our hashed Predecessor Patricia trie supports PredecessorSearch(x) and Insert(x) and Delete(x) in O(log log u) hash table accesses when u is the size of the universe of the keys. That is the costs only depend on u and not the size of the data structure. One feature of our approach is that it only uses the lookup interface of the hash table and therefore hash table accesses may be realized by any distributed hash table (DHT). AU - Kniesburges, Sebastian AU - Scheideler, Christian ID - 626 T2 - Proceedings of the 26th International Symposium on Distributed Computing (DISC) TI - Brief Announcement: Hashed Predecessor Patricia Trie - A Data Structure for Efficient Predecessor Queries in Peer-to-Peer Systems ER - TY - CONF AB - Block Abstraction Memoization (ABM) is a technique in software model checking that exploits the modularity of programs during verification by caching. To this end, ABM records the results of block analyses and reuses them if possible when revisiting the same block again. In this paper we present an implementation of ABM into the predicate-analysis component of the software-verification framework CPAchecker. With our participation at the Competition on Software Verification we aim at providing evidence that ABM can not only substantially increase the efficiency of predicate analysis but also enables verification of a wider range of programs. AU - Wonisch, Daniel ID - 627 T2 - Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) TI - Block Abstraction Memoization for CPAchecker ER - TY - CONF AU - Schneid, M AU - Steinmetz, Holger AU - Isidor, R AU - Kabst, Rüdiger ID - 6275 TI - Diversität, Konflikte und Leistung in Teams: Ein meta-analytisches Strukturgleichungsmodell ER - TY - CONF AU - Kabst, Rüdiger ID - 6277 TI - Endogeneity in the behavioral sciences: An illustration with real data ER - TY - CONF AB - Network creation games model the creation and usage costs of networks formed by a set of selfish peers.Each peer has the ability to change the network in a limited way, e.g., by creating or deleting incident links.In doing so, a peer can reduce its individual communication cost.Typically, these costs are modeled by the maximum or average distance in the network.We introduce a generalized version of the basic network creation game (BNCG).In the BNCG (by Alon et al., SPAA 2010), each peer may replace one of its incident links by a link to an arbitrary peer.This is done in a selfish way in order to minimize either the maximum or average distance to all other peers.That is, each peer works towards a network structure that allows himself to communicate efficiently with all other peers.However, participants of large networks are seldom interested in all peers.Rather, they want to communicate efficiently with a small subset only.Our model incorporates these (communication) interests explicitly.Given peers with interests and a communication network forming a tree, we prove several results on the structure and quality of equilibria in our model.We focus on the MAX-version, i.e., each node tries to minimize the maximum distance to nodes it is interested in, and give an upper bound of O(\sqrt(n)) for the private costs in an equilibrium of n peers.Moreover, we give an equilibrium for a circular interest graph where a node has private cost Omega(\sqrt(n)), showing that our bound is tight.This example can be extended such that we get a tight bound of Theta(\sqrt(n)) for the price of anarchy.For the case of general networks we show the price of anarchy to be Theta(n).Additionally, we prove an interesting connection between a maximum independent set in the interest graph and the private costs of the peers. AU - Cord-Landwehr, Andreas AU - Huellmann (married name: Eikel), Martina AU - Kling, Peter AU - Setzer, Alexander ID - 628 T2 - Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT) TI - Basic Network Creation Games with Communication Interests ER - TY - CONF AU - Wehner, M C AU - Giardini, A AU - Kabst, Rüdiger ID - 6281 TI - Recruitment Process Outsourcing and Applicant Reactions: Does Image Make a Difference? ER -