@inproceedings{7735, author = {{Münkhoff, E and Garnefeld, I and Bruns, A}}, booktitle = {{roceedings of the 42nd European Marketing Academy (EMAC) Conference}}, title = {{{How to prolong a sales promotion – Ex-post time extension versus reframing}}}, year = {{2013}}, } @inproceedings{7736, author = {{Posner , T and Garnefeld, I and Eggert, A}}, booktitle = {{Proceedings of the 42nd European Marketing Academy (EMAC) Conference}}, title = {{{Creating Emotional Brand Attachment through the Salesperson's Brand-Consistent Behavior}}}, year = {{2013}}, } @inproceedings{7737, author = {{Steinhoff, L and Palmatier, R. W}}, booktitle = {{Proceedings of the 42nd European Marketing Academy (EMAC) Conference}}, title = {{{The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance}}}, year = {{2013}}, } @inproceedings{7738, author = {{Eggert, A and Thiesbrummel, C and Deutscher, C}}, booktitle = {{2013 AMA Winter Marketing Educators' Proceedings}}, title = {{{Exploring differential effects of product and service innovations on industrial firms’ financial performance}}}, year = {{2013}}, } @inproceedings{774, author = {{Cicconetti, Claudio and Morelli, Arianna and Dräxler, Martin and Karl, Holger and Mancuso, Vincenzo and Sciancalepore, Vincenzo and Gupta, Rohit and de la Oliva, Antonio and Isabel Sanchez, M. and Serrano, Pablo and Roullet, Laurent}}, booktitle = {{2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013}}, pages = {{1----4}}, title = {{{The playground of Wireless Dense networks of the future}}}, year = {{2013}}, } @inproceedings{775, author = {{Keller, Matthias and Peuster, Manuel and Robbert, Christoph and Karl, Holger}}, booktitle = {{17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013}}, pages = {{61----69}}, title = {{{A topology-aware adaptive deployment framework for elastic applications}}}, doi = {{10.1109/ICIN.2013.6670895}}, year = {{2013}}, } @inproceedings{776, author = {{Herlich, Matthias and Karl, Holger}}, booktitle = {{ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013}}, pages = {{1----5}}, title = {{{Energy-Efficient Assignment of User Equipment to Cooperative Base Stations}}}, year = {{2013}}, } @proceedings{7762, editor = {{Fazal-Baqaie, Masud}}, publisher = {{GI, Köllen Druck+Verlag GmbH, Bonn}}, title = {{{Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch und Wirklichkeit - Proceedings der 20. Tagung der Fachgruppe Vorgehensmodelle im Fachgebiet Wirtschaftsinformatik (WI-VM) der Gesellschaft für Informatik e.V., Lörrach (Germany)}}}, volume = {{P-224}}, year = {{2013}}, } @inproceedings{777, author = {{Dräxler, Martin and Karl, Holger}}, booktitle = {{2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013}}, pages = {{1181----1186}}, title = {{{Cross-layer scheduling for multi-quality video streaming in cellular wireless networks}}}, doi = {{10.1109/IWCMC.2013.6583724}}, year = {{2013}}, } @unpublished{781, author = {{Dräxler, Martin and Blobel, Johannes and Dreimann, Philipp and Valentin, Stefan and Karl, Holger}}, booktitle = {{CoRR}}, title = {{{Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming}}}, year = {{2013}}, } @inproceedings{8057, abstract = {{The paradigm of service-oriented architectures has emerged as an architectural style for designing enterprise applications. Requirements engineering for such applications comprises the specification of business goal models representing stakeholder objectives and the operationalization to business process models that specify the required composition of services. Inconsistencies between business goals and derived business processes can lead to service compositions that are not in line with the actual stakeholder objectives. For preserving consistency it is required to consider logical and temporal dependencies among goals (e.g. the order in which they need to be achieved) in the derivation of business processes. In previous work, we provided a technique for the elicitation and specification of dependencies between business goals. Extending this approach, we aim at validating the consistency between business goal models and business process models regarding these dependencies. In this paper, we present a pattern-based approach for the automated generation of verifiable business process quality constraints from business goal models. We describe how these constraints can be used to check the consistency between business goals and business processes and demonstrate the applicability of our approach in a case study by using the implemented tool support.}}, author = {{Nagel, Benjamin and Gerth, Christian and Post, Jennifer and Engels, Gregor}}, booktitle = {{Proceedings of the 17th IEEE International EDOC Conference (EDOC'13)}}, pages = {{17--26}}, publisher = {{IEEE Computer Society}}, title = {{{Ensuring Consistency Among Business Goals and Business Process Models}}}, year = {{2013}}, } @inproceedings{8058, author = {{Schumacher, Claudia and Engels, Gregor and Güldali, Baris and Niehammer, Markus and Hamburg, Matthias}}, booktitle = {{Proceedings of the conference on Software Enginneering, Fachtagung des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany)}}, editor = {{Kowalewski, Stefan and Rumpe, Bernhard}}, pages = {{331--344}}, publisher = {{Gesellschaft für Informatik (GI)}}, title = {{{Modellbasierte Bewertung von Testprozessen nach TPI NEXT® mit Geschäftsprozess-Mustern}}}, volume = {{P-213}}, year = {{2013}}, } @inproceedings{8059, author = {{Engels, Gregor}}, booktitle = {{Software Engineering 2013}}, pages = {{17--18}}, title = {{{On-the-Fly Computing - Das Entwicklungs- und Betriebsparadigma für Softwaresysteme der Zukunft}}}, volume = {{P-213}}, year = {{2013}}, } @inproceedings{8060, author = {{Huma, Zille and Gerth, Christian and Engels, Gregor and Juwig, Oliver}}, booktitle = {{Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC'13)}}, pages = {{524--532}}, publisher = {{Springer-Verlag}}, title = {{{Automated Service Composition for On-the-Fly SOAs}}}, volume = {{8274}}, year = {{2013}}, } @inproceedings{8061, author = {{Luckey, Markus and Engels, Gregor}}, booktitle = {{Proceeding of the 8th international symposium on Software engineering for adaptive and self-managing systems}}, pages = {{143--152}}, publisher = {{ACM}}, title = {{{High-­Quality Specification of Self-­Adaptive Software Systems}}}, year = {{2013}}, } @inproceedings{8062, author = {{Brüseke, Frank and Becker, Steffen and Engels, Gregor}}, booktitle = {{Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic)}}, pages = {{77--88}}, publisher = {{ACM New York, NY, USA}}, title = {{{Decision Support via Automated Metric Comparison for the Palladio-based Performance Blame Analysis}}}, year = {{2013}}, } @inproceedings{8063, author = {{Becker, Matthias and Luckey, Markus and Becker, Steffen}}, booktitle = {{Ninth International ACM Sigsoft Conference on the Quality of Software Architectures}}, pages = {{43--52}}, publisher = {{ACM New York, NY, USA}}, title = {{{Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time}}}, year = {{2013}}, } @techreport{8222, author = {{Küster, Jochen and Kovács, Dániel and Bauer, Eduard and Gerth, Christian}}, publisher = {{IBM Research}}, title = {{{Integrating Coverage Analysis into Test-driven Development of Model Transformations}}}, year = {{2013}}, } @techreport{8223, author = {{Huma, Zille and Gerth, Christian and Engels, Gregor}}, publisher = {{University of Paderborn, Germany}}, title = {{{Automated Service Discovery and Composition for On-the-Fly SOAs}}}, year = {{2013}}, } @article{5682, author = {{de Meer, Hermann and Diener, Michael and Herkenhöner, Ralph and Kucera, Markus and Niedermeier, Michael and Reisser, Andreas and Schryen, Guido and Vetter, Michael and Waas, Thomas and Yasasin, Emrah}}, journal = {{PIK - Praxis der Informationsverarbeitung und Kommunikation}}, number = {{3}}, pages = {{153--159}}, publisher = {{de Gruyter}}, title = {{{Sicherheitsherausforderungen in hochverteilten Systemen}}}, volume = {{36}}, year = {{2013}}, } @article{5715, abstract = {{Smart interactive services, in contrast with other technology-based services, require significant human-to-human interaction and collaboration in addition to the service provided by the embedded technology itself. The authors’ foundational Delphi study confirms smart interactive services (e.g., remote diagnosis, remote repair of equipment, and telemedicine) are a rapidly growing innovation category across industries. Yet, gaining user acceptance of these types of services presents a significant challenge for managers. To address this challenge, the authors employ a grounded theory approach, drawing on depth interviews, to develop a framework of barriers and facilitators to users’ attitudinal and behavioral responses to smart interactive services. The findings reveal a new set of beliefs that are critical in this context. These beliefs are tied to the human element and specifically pertain to beliefs about the “service counterpart (SC),” who is the provider’s employee controlling the technology. Control, trustworthiness, and collaboration beliefs emerge jointly as important and interrelated influencers tied to the SC. Contrary to conventional wisdom that focuses on features of the technology itself to gain user acceptance, this research encourages providers to emphasize the interpersonal elements of the service by providing control cues, raising social presence, and enhancing human trust mechanisms.}}, author = {{Wünderlich, Nancy and Wangenheim, Florian V and Bitner, Mary Jo}}, journal = {{Journal of Service Research}}, keywords = {{service technology, technology-mediated service, service counterpart, smart service, remote service, technology adoption}}, number = {{1}}, pages = {{3--20}}, publisher = {{SAGE Publications Sage CA: Los Angeles, CA}}, title = {{{High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.}}}, volume = {{16}}, year = {{2013}}, } @inproceedings{5752, author = {{Yigitbas, Enes and Gerth, Christian and Sauer, Stefan}}, booktitle = {{Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland}}, pages = {{2714--2723}}, title = {{{Konzeption modellbasierter Benutzungsschnittstellen für verteilte Selbstbedienungssysteme}}}, year = {{2013}}, } @inproceedings{6054, author = {{Menke, Peter and McCrae, John and Cimiano, Philipp}}, booktitle = {{Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and linking lexicons, terminologies and other language data}}, pages = {{44--52}}, publisher = {{ACL}}, title = {{{Releasing multimodal data as Linguistic Linked Open Data: An experience report}}}, year = {{2013}}, } @article{6101, author = {{Kabst, Rüdiger and Wehner, M C}}, journal = {{PERSONALquartely}}, number = {{4}}, pages = {{34--39}}, title = {{{Editorial: Internationales Personalmanagement: Den kulturellen Kontext gestalten}}}, volume = {{65}}, year = {{2013}}, } @inbook{6147, author = {{Weber, P and Kabst, Rüdiger}}, booktitle = {{Verwaltungskommunikation - Wissenschaftliche Analyse und praktische Beispiele}}, editor = {{Hill, Hermann}}, pages = {{145--152}}, publisher = {{Nomos}}, title = {{{Unterstützung von Kommunalverwaltung bei Bürgerbeteiligung}}}, year = {{2013}}, } @article{6166, author = {{Wex, Felix and Schryen, Guido}}, journal = {{Blick in die Wissenschaft}}, number = {{28}}, pages = {{27--32}}, title = {{{Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung}}}, year = {{2013}}, } @inproceedings{6271, author = {{Weber, H and Wehner, M and Kabst, Rüdiger}}, title = {{{Institutional Determinants of Work-Family Practices: An International Comparative Examination. }}}, year = {{2013}}, } @inproceedings{6272, author = {{Golubovic, S and Wehner, M and Baum, M and Kabst, Rüdiger}}, title = {{{HR-Praktiken und Innovation: Wie können Wissens- und Technologievorsprünge im Unternehmen generiert werden?}}}, year = {{2013}}, } @inproceedings{6274, author = {{Isidor, R and Wehner, M and Li, C and Kabst, Rüdiger}}, title = {{{Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany}}}, year = {{2013}}, } @inbook{6276, author = {{Klompmaker, Florian and Paelke, Volker and Fischer, Holger Gerhard}}, booktitle = {{Distributed, Ambient, and Pervasive Interactions}}, isbn = {{9783642393501}}, issn = {{0302-9743}}, location = {{Las Vegas, USA}}, pages = {{32--41}}, publisher = {{Springer Berlin Heidelberg}}, title = {{{A Taxonomy-Based Approach towards NUI Interaction Design}}}, doi = {{10.1007/978-3-642-39351-8_4}}, volume = {{8028}}, year = {{2013}}, } @inbook{6279, author = {{Fischer, Holger Gerhard and Strenge, Benjamin and Nebe, Karsten}}, booktitle = {{Design, User Experience, and Usability. Design Philosophy, Methods, and Tools}}, isbn = {{9783642392283}}, issn = {{0302-9743}}, location = {{Las Vegas, USA}}, pages = {{252--261}}, publisher = {{Springer Berlin Heidelberg}}, title = {{{Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design}}}, doi = {{10.1007/978-3-642-39229-0_28}}, volume = {{8012}}, year = {{2013}}, } @inproceedings{6284, author = {{Fischer, Holger Gerhard and Geis, Thomas and Molich, Rolf and Kluge, Oliver and Heimgärtner, Rüdiger and Hunkirchen, Peter}}, booktitle = {{Jahresband Usability Professionals}}, pages = {{28--34}}, publisher = {{German UPA}}, title = {{{Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA}}}, year = {{2013}}, } @inbook{6448, author = {{Kremer, H.-Hugo}}, booktitle = {{Standardization, professionalizationn and the measurements}}, editor = {{Feng, X. and Rützel, J. and Kremer, H.-H.}}, pages = {{51--71}}, title = {{{Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen}}}, year = {{2013}}, } @inbook{6449, author = {{Kremer, H.-Hugo}}, booktitle = {{Standardization, professionalization and the measurements}}, editor = {{Feng, X. and Rützel, J. and Kremer, H.-H.}}, pages = {{151--171}}, title = {{{Social Media: Potenziale und Herausforderungen für die berufliche Bildung}}}, year = {{2013}}, } @inbook{6450, author = {{Kremer, H.-Hugo and Zoyke, A.}}, booktitle = {{Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven}}, editor = {{Niedermair, G.}}, pages = {{359--382}}, title = {{{Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs}}}, year = {{2013}}, } @inbook{6452, author = {{Beutner, Marc and Kremer, H.-Hugo and Zoyke, A.}}, booktitle = {{Transitions in Vocational Education, Research in Vocational Education}}, editor = {{Seifried, J. and Wuttke, E.}}, title = {{{Exploring Personalized Learning in the Context of the Transition System, vol. 2. Opladen}}}, year = {{2013}}, } @inbook{6454, author = {{Kremer, H.-Hugo}}, booktitle = {{Kompetenzentwicklung in unterschiedlichen Lernkulturen}}, editor = {{Seufert, S. and Metzger, C.}}, pages = {{357--373}}, title = {{{Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung }}}, year = {{2013}}, } @inbook{6455, author = {{Kremer, H.-Hugo}}, booktitle = {{From Diagnostics to Learning Success. Proceedings in Vocational Education and Training}}, editor = {{Beck, K. and Zlatkin-Troitschanskaia, O.}}, title = {{{Social Media: Potentials and Challenges for Vocational Education}}}, year = {{2013}}, } @article{4427, abstract = {{Kompetenzorientierung ist ein wichtiges aktuelles Ziel bei der Studienprogrammentwicklung. Allerdings ist die Umsetzung in der Praxis mit zwei wesentlichen Herausforderungen verbunden: So ist zum einen der Wechsel von disziplinären Inhalten hin zu Kompetenzen wenig intuitiv; zum anderen wird die Formulierung so genannter Learning Outcomes als administrative Übung betrachtet. An der Universität St. Gallen wurde ein systematischer Prozess für die Qualitätsentwicklung der Studienprogramme eingeführt. Im Beitrag wird dieser Prozess im Hinblick auf die Kompetenzorientierung reflektiert. Es erscheint wesentlich, den Programmen möglichst viel Freiraum auf ihrem Weg zur Kompetenzorientierung zu überlassen und sie auf diese Weise zu unterstützen.}}, author = {{Brahm, Taiga and Jenert, Tobias}}, issn = {{2219-6994}}, journal = {{Zeitschrift für Hochschulentwicklung}}, keywords = {{Kompetenzorientierung, Studienprogrammentwicklung, Hochschulentwicklung, Hochschule, Learning Outcomes}}, number = {{1}}, pages = {{7--14}}, publisher = {{Österreichische Gesellschaft für Hochschuldidaktik}}, title = {{{Herausforderungen der Kompetenzorientierung in der Studienprogrammentwicklung}}}, volume = {{8}}, year = {{2013}}, } @article{4428, abstract = {{Die Auseinandersetzung mit Bildungstechnologien erfolgt häufig ausgehend von einem technologischen Trend bzw. einer Klasse innovativer Werkzeuge (bspw. mobile Technologien). Es geht dann darum, die Potenziale dieser Tools für das Lernen zu ergründen, also letztlich eine Passung zwischen den technologischen Möglichkeiten und pädagogisch-didaktischen Erfordernissen zu konstruieren. In diesem Beitrag kehren wir diese Perspektive um: Ausgehend von einer bestimmten pädagogischen Problemstellung - der Bearbeitung heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung - entwickeln wir unterschiedliche didaktische Handlungsoptionen. Am Ende entsteht ein Werkzeug, das sich in Design und Funktionsumfang auf den Kern der pädagogischen Zielsetzung beschränkt.}}, author = {{Jenert, Tobias and Brahm, Taiga}}, issn = {{1681-7028}}, journal = {{Journal für LehrerInnenbildung}}, keywords = {{Portfolio, Lehrerbildung, Wirtschaftspädagogik}}, number = {{4}}, pages = {{29--33}}, publisher = {{Studien-Verlag}}, title = {{{Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung}}}, volume = {{13}}, year = {{2013}}, } @inproceedings{4477, abstract = {{The aim of this qualitative study is first to investigate the attitude development of students in their initial year at university. College effectiveness research has shown that attitudes towards studying as well as to one's university are key factors influencing student engagement. Up to now, little is known about the processes through which such attitudes develop. Based on the theory of planned behaviour (Ajzen & Fishbein, 1980), the study addresses this research gap in three parts: a) development paths of students' attitudes towards studying and the university; b) the normative behaviour of the fellow students as well as significant persons, c) university-related experiences during the first year influencing students' attitude development. To answer these research questions, a series of five interviews was conducted throughout the first year with a total of 13 first-year students at the University of St. Gallen/Switzerland. Data analysis was performed referring to the procedures suggested by Neale (2012) for qualitative longitudinal data. To master the challenge of displaying developments over time, graphical analysis was used to construct a case history (cf. Henderson, Holland et al., 2012) for each individual. Regarding the students' developments over time, the analysis shows the participants' attitudes towards the university became more differentiated over time. A second major result concerns frictions between students' own attitudes and what they perceive to be the dominant normative behaviour. It became obvious that this developmental process is influenced by concrete incidents students experience during the first year and thus, can be shaped by structural changes.}}, author = {{Jenert, Tobias and Brahm, Taiga}}, keywords = {{student attitudes, qualitative research, longitudinal study, student motivation}}, location = {{München}}, publisher = {{EARLI European Association for Research on Learning and Instruction}}, title = {{{How Business Students Attitudes towards their University and Studying Develop during the First Year: A Qualitative Longitudinal Study}}}, year = {{2013}}, } @inproceedings{4478, abstract = {{The purpose of the research was to develop and validate an instrument for the assessment of attitudes towards the study environment in higher education contexts. The questionnaire is designed to measure students' attitudes towards two particular objects: the university (or Higher Education Institution) and the process of studying. Five studies at two different universities were conducted to develop and validate the Attitudes towards the Study Environment Questionnaire (ASEQ). In total, 1640 students filled in the questionnaire. Reliability tests and exploratory factor analysis as well as confirmatory factor analysis showed satisfactory psychometric characteristics of the ASEQ. Each part of the questionnaire is internally consistent and construct validity of the scales is supported by correlations with other constructs as assumed by current theories: Positive attitudinal constructs (normative behavior, autonomy, joy, self-efficacy, and task value) are positively related to intrinsic motivation and the expected study performance while anxiety is negatively related to these constructs. Since attitudes towards the study situation are connected to student engagement and motivation, the study contributes to the theory of student learning by providing a validated instrument to assess attitudes. Thus, the ASEQ can support further research on student performance and development by providing an instrument for the hitherto neglected but nonetheless extremely relevant domain of attitudes. Also, the questionnaire can be used as a diagnostic instrument for higher education faculty and administration to trace students' attitudinal development over time - a factor of prime importance for student socialization during the introductory phase of studying.}}, author = {{Brahm, Taiga and Jenert, Tobias and Euler, Dieter}}, keywords = {{attitudes, teaching and learning, studying, higher education institution, theory of planned behavior, instrument development}}, location = {{München }}, publisher = {{EARLI European Association for Research on Learning and Instruction}}, title = {{{On the assessment of attitudes towards the study process and the university: Attitudes towards the Study Environment Questionnaire (ASEQ)}}}, year = {{2013}}, } @inproceedings{4480, abstract = {{The proposed paper aims to investigate the longitudinal development of students' motivation over the first year of their studies at a business school by using latent growth curve modeling. The study tackles the following core research questions: How do first-year university students' intrinsic and extrinsic vary over time? Which (motivational) factors are related to students' motivational development? Although motivational dispositions have been analyzed extensively in previous studies, their longitudinal development has hitherto not been examined in the higher education context. This longitudinal study is conducted at the University of St. Gallen in Switzerland. The current sample includes 280 first-year students who have been surveyed three times and who are representative of the first-year student population. Descriptive results show that prior to their studies, students were motivated most by intrinsic factors, however, extrinsic motivation was also quite high. Employing latent growth curve modeling, it could be shown that both intrinsic and extrinsic motivation decline significantly over the course of the first year (8 months). The study contributes to motivation theory by providing further insights into the development of academic motivation over time. Latent growth curve modeling as a method can be well used for longitudinal data analysis, thus, excluding measurement error from longitudinal data. Furthermore, the study supports educational developers by determining factors influencing students' motivational development.}}, author = {{Brahm, Taiga and Jenert, Tobias}}, keywords = {{motivation, intrinsic motivation, extrinsic motivation, latent growth curve modeling, longitudinal data analysis, ASEQ, higher education, studying}}, location = {{München}}, publisher = {{EARLI European Association for Research on Learning and Instruction}}, title = {{{A latent growth curve analysis of Business students' intrinsic and extrinsic motivation}}}, year = {{2013}}, } @inproceedings{4481, abstract = {{Die vorliegende Untersuchung an der Universität St. Gallen soll Erkenntnisse über die Verläufe der Einstellungsveränderungen der Studierenden geben (vgl. Brahm & Jenert, 2012). Basierend auf der Theorie des geplanten Verhaltens (Ajzen & Fishbein, 1980) werden drei Forschungsfragen adressiert: (1) Gibt es typische Pfade der Einstellungsentwicklung? (2) Wie wird das normative Verhalten von Mitstudierenden und anderen Personen wahrgenommen? (3) Welche Erfahrungen beeinflussen die Entwicklung? Zur Beantwortung dieser Fragen wurde über das erste Studienjahr hinweg eine Interviewserie mit 13 Studierenden durchgeführt. Die Datenanalyse mithilfe grafischer Case Histories zeigt, dass die Einstellungen der Probanden über die Zeit differenzierter werden. Zudem gibt es Widersprüche zwischen den Einstellungen und dem wahrgenommenen normativen Verhalten. Dabei ist die Einstellungsentwicklung von konkreten Ereignissen geprägt und kann damit durch strukturelle Interventionen beeinflusst werden.}}, author = {{Jenert, Tobias and Brahm, Taiga}}, keywords = {{student attitudes, theory of planned behaviour, Einstellungsentwicklung, student motivation}}, location = {{Hildesheim}}, publisher = {{Institut für Psychologie}}, title = {{{Die Entwicklung studien-und hochschulbezogener Einstellungen an einer Wirtschaftsuniversität: eine qualitative Längsschnittstudie}}}, year = {{2013}}, } @inbook{4509, author = {{Jenert, Tobias and Brahm , Taiga}}, booktitle = {{Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis}}, editor = {{Spiekermann, Annette}}, isbn = {{978-3-7639-5194-9}}, pages = {{69--84 }}, publisher = {{W. Bertelsmann Verlag }}, title = {{{Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen }}}, volume = {{124}}, year = {{2013}}, } @inbook{4510, author = {{Jenert, Tobias and Gebhardt , Anja}}, booktitle = {{Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag}}, editor = {{Seuffert, Sabine and Metzger, Christoph}}, issn = {{1613-0677}}, pages = {{227--240}}, publisher = {{EUSL}}, title = {{{Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm}}}, year = {{2013}}, } @article{4596, author = {{Feng, Yuanhua and Guo, Zhichao and Peitz, Christian}}, issn = {{1566-1679}}, journal = {{Journal of Industry, Competition and Trade}}, number = {{2}}, pages = {{207--228}}, publisher = {{Springer Nature}}, title = {{{A Tree-form Constant Market Share Model for Growth Causes in International Trade Based on Multi-level Classification}}}, doi = {{10.1007/s10842-013-0156-y}}, volume = {{14}}, year = {{2013}}, } @article{4600, author = {{Guo, Zhichao and Feng, Yuanhua}}, issn = {{0264-9993}}, journal = {{Economic Modelling}}, pages = {{474--483}}, publisher = {{Elsevier BV}}, title = {{{Modeling of the impact of the financial crisis and China's accession to WTO on China's exports to Germany}}}, doi = {{10.1016/j.econmod.2012.12.015}}, volume = {{31}}, year = {{2013}}, } @book{4628, author = {{Beran, Jan and Feng, Yuanhua and Ghosh, Sucharita and Kulik, Rafal}}, isbn = {{9783642355110}}, publisher = {{Springer Berlin Heidelberg}}, title = {{{Long-Memory Processes}}}, doi = {{10.1007/978-3-642-35512-7}}, year = {{2013}}, } @techreport{4657, author = {{Feng, Yuanhua and Sun, Lixin}}, title = {{{A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets}}}, year = {{2013}}, } @techreport{4658, author = {{Feng, Yuanhua}}, title = {{{Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects}}}, year = {{2013}}, } @inproceedings{469, abstract = {{Runtime monitoring aims at ensuring program safety by monitoring the program's behaviour during execution and taking appropriate action before a program violates some property.Runtime monitoring is in particular important when an exhaustive formal verification fails. While the approach allows for a safe execution of programs, it may impose a significant runtime overhead.In this paper, we propose a novel technique combining verification and monitoring which incurs no overhead during runtime at all. The technique proceeds by using the inconclusive result of a verification run as the basis for transforming the program into one where all potential points of failure are replaced by HALT statements. The new program is safe by construction, behaviourally equivalent to the original program (except for unsafe behaviour),and has the same performance characteristics.}}, author = {{Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}}, booktitle = {{Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)}}, pages = {{244--258}}, title = {{{Zero Overhead Runtime Monitoring}}}, doi = {{10.1007/978-3-642-40561-7_17}}, year = {{2013}}, } @inproceedings{4698, author = {{Gregor, Shirley and Müller, Oliver and Seidel, Stefan}}, booktitle = {{European Conference on Information Systems}}, keywords = {{Abstraction, Affordances, Design Science Research, Design Theory, Information Systems Development, Reflection, Theorizing}}, title = {{{Reflection, abstraction and theorizing in design and development research}}}, year = {{2013}}, } @article{4699, author = {{Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuss, Jens}}, issn = {{09050167}}, journal = {{Scandinavian Journal of Information Systems}}, keywords = {{Business process management, Conceptual modeling, Interaction routines, Modular design, Service networks, Social construction}}, number = {{1}}, pages = {{17----47}}, title = {{{Designing interaction routines in service networks: A modularity and social construction-based approach}}}, year = {{2013}}, } @inproceedings{470, abstract = {{In OpenFlow [1], multiple switches share the same control plane which is centralized atwhat is called the OpenFlow controller. A switch only consists of a forwarding plane. Rules for forwarding individual packets (called ow entries in OpenFlow) are pushed from the controller to the switches. In a network with a high arrival rate of new ows, such as in a data center, the control trac between the switch and controller can become very high. As a consequence, routing of new ows will be slow. One way to reduce control trac is to use wildcarded ow entries. Wildcard ow entries can be used to create default routes in the network. However, since switches do not keep track of ows covered by a wildcard ow entry, the controller no longer has knowledge about individual ows. To nd out about these individual ows we propose an extension to the current OpenFlow standard to enable packet sampling of wildcard ow entries.}}, author = {{Wette, Philip and Karl, Holger}}, booktitle = {{Proceedings of the ACM SIGCOMM '13}}, pages = {{541--542}}, title = {{{Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow}}}, doi = {{10.1145/2486001.2491710}}, year = {{2013}}, } @article{4700, author = {{Becker, Jorg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuss, Jens}}, isbn = {{0018-9391}}, issn = {{00189391}}, journal = {{IEEE Transactions on Engineering Management}}, keywords = {{Action research, boundary spanning, business process management (BPM), service blueprinting, service networks}}, number = {{3}}, pages = {{468----482}}, title = {{{Bridging the gap between manufacturing and service through IT-based boundary objects}}}, doi = {{10.1109/TEM.2012.2214770}}, year = {{2013}}, } @misc{471, author = {{Tezer, Alina}}, publisher = {{Universität Paderborn}}, title = {{{Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen}}}, year = {{2013}}, } @misc{472, author = {{Engelbrecht, Marco}}, publisher = {{Universität Paderborn}}, title = {{{Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern}}}, year = {{2013}}, } @inproceedings{473, abstract = {{We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party - in contrast to most related work on privacy-preserving DRM - is based on a re-encryption scheme that runs on any mobile Android device. Only a minor security-critical part needs to be performed on the device's smartcard which could, for instance, be a SIM card.}}, author = {{Petrlic, Ronald and Sekula, Stephan}}, booktitle = {{Data and Applications Security and Privacy XXVII}}, editor = {{Wang, Lingyu and Shafiq, Basit}}, pages = {{289--296}}, title = {{{Unlinkable content playbacks in a multiparty DRM system}}}, doi = {{10.1007/978-3-642-39256-6_21}}, year = {{2013}}, } @techreport{474, abstract = {{Suppose some individuals are allowed to engage in different groups at the same time and they generate a certain welfare by cooperation. Finding appropriate ways for distributing this welfare is a non-trivial issue. The purpose of this work is to analyze two-stage allocation procedures where first each group receives a share of the welfare which is then, subsequently, distributed among the corresponding members. To study these procedures in a structured way, cooperative games and network games are combined in a general framework by using mathematical hypergraphs. Moreover, several convincing requirements on allocation procedures are discussed and formalized. Thereby it will be shown, for example, that the Position Value and iteratively applying the Myerson Value can be characterized by similar axiomatizations.}}, author = {{Röhl, Nils}}, publisher = {{Universität Paderborn}}, title = {{{Two-Stage Allocation Procedures}}}, year = {{2013}}, } @inproceedings{475, abstract = {{We propose a privacy-preserving digital rights management scheme for (future) cloud computing. Users buy software from software providers and execute it at computing centers. Our solution allows software providers to provide different license models, like execute at most n-times models. Users’ anonymity and unlinkability of actions are preserved and thus, profile building is not even possible under (a) pseudonym. Privacy protection in the honest-but-curious model is achieved by combining ring signatures with an anonymous recipient scheme.We employ secret sharing in a unique manner that allows the software provider to expose the user’s identity if the user commits fraud, e.g. by exceeding the execution limit n.}}, author = {{Joshi, Nakul and Petrlic, Ronald}}, booktitle = {{Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC)}}, pages = {{259--264}}, title = {{{Towards practical privacy-preserving Digital Rights Management for Cloud Computing}}}, doi = {{10.1109/CCNC.2013.6488456}}, year = {{2013}}, } @article{476, abstract = {{An elementary h-route ow, for an integer h 1, is a set of h edge- disjoint paths between a source and a sink, each path carrying a unit of ow, and an h-route ow is a non-negative linear combination of elementary h-routeows. An h-route cut is a set of edges whose removal decreases the maximum h-route ow between a given source-sink pair (or between every source-sink pair in the multicommodity setting) to zero. The main result of this paper is an approximate duality theorem for multicommodity h-route cuts and ows, for h 3: The size of a minimum h-route cut is at least f=h and at most O(log4 k f) where f is the size of the maximum h-routeow and k is the number of commodities. The main step towards the proof of this duality is the design and analysis of a polynomial-time approximation algorithm for the minimum h-route cut problem for h = 3 that has an approximation ratio of O(log4 k). Previously, polylogarithmic approximation was known only for h-route cuts for h 2. A key ingredient of our algorithm is a novel rounding technique that we call multilevel ball-growing. Though the proof of the duality relies on this algorithm, it is not a straightforward corollary of it as in the case of classical multicommodity ows and cuts. Similar results are shown also for the sparsest multiroute cut problem.}}, author = {{Kolman, Petr and Scheideler, Christian}}, journal = {{Theory of Computing Systems}}, number = {{2}}, pages = {{341--363}}, publisher = {{Springer}}, title = {{{Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing}}}, doi = {{10.1007/s00224-013-9454-3}}, year = {{2013}}, } @inproceedings{477, abstract = {{We consider the k-token dissemination problem, where k initially arbitrarily distributed tokens have to be disseminated to all nodes in a dynamic network (as introduced by Kuhn et al., STOC 2010). In contrast to general dynamic networks, our dynamic networks are unit disk graphs, i.e., nodes are embedded into the Euclidean plane and two nodes are connected if and only if their distance is at most R. Our worst-case adversary is allowed to move the nodes on the plane, but the maximum velocity v_max of each node is limited and the graph must be connected in each round. For this model, we provide almost tight lower and upper bounds for k-token dissemination if nodes are restricted to send only one token per round. It turns out that the maximum velocity v_max is a meaningful parameter to characterize dynamics in our model.}}, author = {{Abshoff, Sebastian and Benter, Markus and Cord-Landwehr, Andreas and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}}, booktitle = {{Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers}}, pages = {{22--34}}, title = {{{Token Dissemination in Geometric Dynamic Networks}}}, doi = {{10.1007/978-3-642-45346-5_3}}, year = {{2013}}, } @phdthesis{478, abstract = {{Software systems are playing an increasing role in our everyday life, and as the amount of software applications grows, so does their complexity and the relevance of their computations. Software components can be found in many systems that are charged with safety-critical tasks, such as control systems for aviation or power plants. Hence, software verification techniques that are capable of proving the absence of critical errors are becoming more and more important in the field software engineering. A well-established approach to software verification is model checking. Applying this technique involves an exhaustive exploration of a state space model corresponding to the system under consideration. The major challenge in model checking is the so-called state explosion problem: The state space of a software system grows exponentially with its size. Thus, the straightforward modelling of real-life systems practically impossible. A common approach to this problem is the application of abstraction techniques, which reduce the original state space by mapping it on a significantly smaller abstract one. Abstraction inherently involves a loss of information, and thus, the resulting abstract model may be too imprecise for a definite result in verification. Therefore, abstraction is typically combined with abstraction refinement: An initially very coarse abstract model is iteratively refined, i.e. enriched with new details about the original system, until a level of abstraction is reached that is precise enough for a definite outcome. Abstraction refinement-based model checking is fully automatable and it is considered as one of the most promising approaches to the state explosion problem in verification. However, it is still faced with a number of challenges. There exist several types of abstraction techniques and not every type is equally well-suited for all kinds of systems and verification tasks. Moreover, the selection of adequate refinement steps is nontrivial and typically the most crucial part of the overall approach: Unfavourable refinement decisions can compromise the state space-reducing effect of abstraction, and as a consequence, can easily lead to the failure of verification. It is, however, hard to predict which refinement steps will eventually be expedient for verification – and which not.}}, author = {{Timm, Nils}}, publisher = {{Universität Paderborn}}, title = {{{Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems}}}, year = {{2013}}, } @article{480, abstract = {{Although of considerable practical importance, the separate impact of individual and collective reputation on firm performance (e.g. product prices) has not yet been convincingly demonstrated. We use a sample of some 70 different wineries offering more than 1,300 different Riesling wines from the Mosel valley to isolate the returns to individual reputation (measured by expert ratings in a highly respected wine guide) from the returns to collective reputation (measured by membership in two different professional associations where members are assumed to monitor each other very closely). We find that both effects are statistically significant and economically relevant with the latter being more important in quantitative terms than the former.}}, author = {{Frick, Bernd and Simmons, Robert}}, journal = {{Journal of Business Economics}}, number = {{2}}, pages = {{101--119}}, publisher = {{Springer}}, title = {{{The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley}}}, doi = {{10.1007/s11573-013-0652-x}}, volume = {{83}}, year = {{2013}}, } @inproceedings{481, abstract = {{Cloud computing offers high availability, dynamic scalability, and elasticity requiring only very little administration. However, this service comes with financial costs. Peer-to-peer systems, in contrast, operate at very low costs but cannot match the quality of service of the cloud. This paper focuses on the case study of Wikipedia and presents an approach to reduce the operational costs of hosting similar websites in the cloud by using a practical peer-to-peer approach. The visitors of the site are joining a Chord overlay, which acts as first cache for article lookups. Simulation results show, that up to 72% of the article lookups in Wikipedia could be answered by other visitors instead of using the cloud.}}, author = {{Graffi, Kalman and Bremer, Lars}}, booktitle = {{Proceedings of the International Conference on Communications (ICC'13)}}, pages = {{3444 -- 3449 }}, title = {{{Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case}}}, doi = {{10.1109/ICC.2013.6655082}}, year = {{2013}}, } @misc{482, author = {{Bieshaar, Maarten}}, publisher = {{Universität Paderborn}}, title = {{{Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen}}}, year = {{2013}}, } @inproceedings{483, abstract = {{Modern software systems adapt themselves to changing environments, to meet quality-of-service requirements, such as response time limits. The engineering of the system’s self-adaptation logic does not only require new modeling methods, but also new analyzes of transient phases. Model-driven software performance engineering methods already allow design-time analysis of steady states of non-adaptive system models. In order to validate requirements for transient phases, new modeling and analysis methods are needed. In this paper, we present SimuLizar, our initial model-driven approach to model self-adaptive systems and analyze the performance of their transient phases. Our evaluation of a load balancer toy example shows the applicability of our modeling approach. Additionally, a comparison of our performance analysis with a prototypical implementation of our example system shows that the prediction accuracy is sufficient to identify unsatisfactory self-adaptations.}}, author = {{Becker, Matthias and Becker, Steffen and Meyer, Joachim}}, booktitle = {{Proceedings of the Software Engineering Conference (SE)}}, pages = {{71--84}}, title = {{{SimuLizar: Design-Time modeling and Performance Analysis of Self-Adaptive Systems}}}, year = {{2013}}, } @inproceedings{484, abstract = {{One of the main ideas of Service-Oriented Computing (SOC) is the delivery of flexibly composable services provided on world-wide markets. For a successful service discovery,service requests have to be matched with the available service offers. However, in a situation in which no service that completely matches the request can be discovered, the customer may tolerate slight discrepancies between request and offer. Some existing fuzzy matching approaches are able to detectsuch service variants, but they do not allow to explicitly specify which parts of a request are not mandatory. In this paper, we improve an existing service matching approach based onVisual Contracts leveraging our preliminary work of design pattern detection. Thereby, we support explicit specifications of service variants and realize gradual matching results that can be ranked in order to discover the service offer that matches a customer’s request best.}}, author = {{Platenius, Marie Christin and von Detten, Markus and Gerth, Christian and Schäfer, Wilhelm and Engels, Gregor}}, booktitle = {{IEEE 20th International Conference on Web Services (ICWS 2013)}}, pages = {{613--614}}, title = {{{Service Matching under Consideration of Explicitly Specified Service Variants}}}, doi = {{10.1109/ICWS.2013.98}}, year = {{2013}}, } @inproceedings{485, abstract = {{Software composition has been studied as a subject of state based planning for decades. Existing composition approaches that are efficient enough to be used in practice are limited to sequential arrangements of software components. This restriction dramatically reduces the number of composition problems that can be solved. However, there are many composition problems that could be solved by existing approaches if they had a possibility to combine components in very simple non-sequential ways. To this end, we present an approach that arranges not only basic components but also composite components. Composite components enhance the structure of the composition by conditional control flows. Through algorithms that are written by experts, composite components are automatically generated before the composition process starts. Therefore, our approach is not a substitute for existing composition algorithms but complements them with a preprocessing step. We verified the validity of our approach through implementation of the presented algorithms.}}, author = {{Mohr, Felix and Kleine Büning, Hans}}, booktitle = {{Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS)}}, pages = {{676--680}}, title = {{{Semi-Automated Software Composition Through Generated Components}}}, doi = {{10.1145/2539150.2539235}}, year = {{2013}}, } @article{4851, author = {{Garnefeld, Ina and Eggert, Andreas and Helm, Sabrina V and Tax, Stephen S}}, journal = {{Journal of Marketing}}, number = {{4}}, pages = {{17----32}}, title = {{{Growing existing customers' revenue streams through customer referral programs}}}, year = {{2013}}, } @article{4852, author = {{Haas, Alexander and Eggert, Andreas and Terho, Harri and Ulaga, Wolfgang}}, journal = {{Marketing Review St. Gallen}}, number = {{4}}, pages = {{64----73}}, title = {{{Erfolgsfaktor Value-Based Selling—Verkaufen, wenn Kundenorientierung nicht zum Erfolg führt}}}, year = {{2013}}, } @misc{486, author = {{Otte, Oliver}}, publisher = {{Universität Paderborn}}, title = {{{Seitenkanalresistenz paarungsbasierter Kryptographie}}}, year = {{2013}}, } @misc{487, author = {{Bobolz, Jan}}, publisher = {{Universität Paderborn}}, title = {{{Security Proofs for Pairing-Based Cryptography in the Generic Group Model}}}, year = {{2013}}, } @inproceedings{488, abstract = {{Unattended systems are key ingredients of various critical infrastruc-tures like networks of self service terminals or automated teller machines.For cost and efficiency reasons they should mostly run autonomously.Unattended systems are attractive and lucrative targets for various kindsof attacks, including attacks on the integrity of their components and thecommunication between components. In this paper, we propose a gen-eral cryptographic framework to protect unattended systems. We alsodemonstrate that instantiating the framework with techniques from iden-tity based cryptography is particularly well-suited to efficiently secureunattended systems.}}, author = {{Blömer, Johannes and Günther, Peter and Krummel, Volker}}, booktitle = {{Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}}, pages = {{98--105}}, title = {{{Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study}}}, year = {{2013}}, } @article{4880, author = {{St{\, Susi and Fahr, Rene}}, journal = {{Applied Economics}}, number = {{19}}, pages = {{2863----2875}}, title = {{{Individual determinants of work attendance: Evidence on the role of personality}}}, year = {{2013}}, } @misc{489, author = {{Knopf, Michael}}, publisher = {{Universität Paderborn}}, title = {{{Scheduling Variants with Speed-Scaling via the Primal-Dual Approach}}}, year = {{2013}}, } @misc{490, author = {{Wallaschek, Felix}}, publisher = {{Universität Paderborn}}, title = {{{Routing in heterogenen OpenFlow Netzwerken}}}, year = {{2013}}, } @book{4911, author = {{Zimmermann, Klaus F and Bauer, Thomas K and Bonin, Holger and Fahr, Rene and Hinte, Holger}}, title = {{{Arbeitskräftebedarf bei hoher Arbeitslosigkeit: ein ökonomisches Zuwanderungskonzept für Deutschland}}}, year = {{2013}}, } @techreport{4915, author = {{Mir Djawadi, Behnud and Fahr, Rene}}, title = {{{The impact of risk perception and risk attitudes on corrupt behavior: Evidence from a petty corruption experiment}}}, year = {{2013}}, } @techreport{4917, author = {{Djawadi, Behnud Mir and Fahr, Rene}}, title = {{{The impact of tax knowledge and budget spending influence on tax compliance}}}, year = {{2013}}, } @misc{492, author = {{Robbert, Christoph}}, publisher = {{Universität Paderborn}}, title = {{{Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case}}}, year = {{2013}}, } @misc{493, author = {{Terentjew, Artjom}}, publisher = {{Universität Paderborn}}, title = {{{Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen}}}, year = {{2013}}, } @phdthesis{494, abstract = {{The maintenance of component-based software systems requires up-to-date models of their concrete architecture, i.e. the architecture that is realised in the source code. These models help in systematically planning, analysing and executing typical reengineering activities. Often no or only outdated architectural models of such systems exist. Therefore, various reverse engineering methods have been developed which try to recover a system's components, subsystems and connectors. However, these reverse engineering methods are severely impacted by design deciencies in the system's code base, especially violations of the component encapsulation. As long as design deciencies are not considered in the reverse engineering process, they reduce the quality of the recovered component structures. Despite this impact of design deciencies, no existing architecture reconstruction approach explicitly integrates a systematic deciency detection and removal into the recovery process. Therefore, I have developed Archimetrix. Archimetrix is a tool-supported architecture reconstruction process. It enhances a clustering-based architecture recovery approach with an extensible, pattern-based deciency detection. After the detection of deciencies, Archimetrix supports the software architect in removing the de ciencies and provides the means to preview the architectural consequences of such a removal. I also provide a process to identify and formalise additional deciencies. I validated the approach on three case studies which show that Archimetrix is able to identify relevant deciencies and that the removal of these deciencies leads to an increased quality of the recovered architectures, i.e. they are closer to the corresponding conceptual architectures.}}, author = {{von Detten, Markus}}, publisher = {{Universität Paderborn}}, title = {{{Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies}}}, year = {{2013}}, } @inproceedings{495, abstract = {{Automated service composition has been studied as a subject of state based planning for a decade. A great deal of service composition tasks can only be solved if concrete output values of the services are considered in the composition process. However, the fact that those values are not known before runtime leads to nondeterministic planning problems, which have proven to be notoriously difficult in practical automated service composition applications. Even though this problem is frequently recognized, it has still received remarkably few attention and remains unsolved.This paper shows how nondeterminism in automated service composition can be reduced. We introduce context rules as a means to derive semantic knowledge from output values of services. These rules enable us to replace nondeterministic composition operations by less nondeterministic or even completely deterministic ones. We show the validity of our solutions not only theoretically but also have evaluated them practically through implementation.}}, author = {{Mohr, Felix and Lettmann, Theodor and Kleine Büning, Hans}}, booktitle = {{Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)}}, pages = {{154--161}}, title = {{{Reducing Nondeterminism in Automated Service Composition}}}, doi = {{10.1109/SOCA.2013.25}}, year = {{2013}}, } @inproceedings{496, abstract = {{Within reactive topology control, a node determines its adjacent edges of a network subgraph without prior knowledge of its neighborhood. The goal is to construct a local view on a topology which provides certain desired properties such as planarity. During algorithm execution, a node, in general, is not allowed to determine all its neighbors of the network graph. There are well-known reactive algorithms for computing planar subgraphs. However, the subgraphs obtained do not have constant Euclidean spanning ratio. This means that routing along these subgraphs may result in potentially long detours. So far, it has been unknown if planar spanners can be constructed reactively. In this work, we show that at least under the unit disk network model, this is indeed possible, by proposing an algorithm for reactive construction of the partial Delaunay triangulation, which recently turned out to be a spanner. Furthermore, we show that our algorithm is message-optimal as a node will only exchange messages with nodes that are also neighbors in the spanner. The algorithm’s presentation is complemented by a rigorous proof of correctness.}}, author = {{Benter, Markus and Neumann, Florentin and Frey, Hannes}}, booktitle = {{Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)}}, pages = {{2193--2201}}, title = {{{Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks}}}, doi = {{10.1109/INFCOM.2013.6567022}}, year = {{2013}}, } @inproceedings{498, abstract = {{Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space.}}, author = {{Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}}, booktitle = {{Proceedings of the 25th International Conference on Computer Aided Verification (CAV)}}, pages = {{912--927}}, title = {{{Programs from Proofs – A PCC Alternative}}}, doi = {{10.1007/978-3-642-39799-8_65}}, year = {{2013}}, } @inproceedings{499, abstract = {{We present a new online algorithm for profit-oriented scheduling on multiple speed-scalable processors.Moreover, we provide a tight analysis of the algorithm's competitiveness.Our results generalize and improve upon work by \citet{Chan:2010}, which considers a single speed-scalable processor.Using significantly different techniques, we can not only extend their model to multiprocessors but also prove an enhanced and tight competitive ratio for our algorithm.In our scheduling problem, jobs arrive over time and are preemptable.They have different workloads, values, and deadlines.The scheduler may decide not to finish a job but instead to suffer a loss equaling the job's value.However, to process a job's workload until its deadline the scheduler must invest a certain amount of energy.The cost of a schedule is the sum of lost values and invested energy.In order to finish a job the scheduler has to determine which processors to use and set their speeds accordingly.A processor's energy consumption is power $\Power{s}$ integrated over time, where $\Power{s}=s^{\alpha}$ is the power consumption when running at speed $s$.Since we consider the online variant of the problem, the scheduler has no knowledge about future jobs.This problem was introduced by~\citet{Chan:2010} for the case of a single processor.They presented an online algorithm which is $\alpha^{\alpha}+2e\alpha$-competitive.We provide an online algorithm for the case of multiple processors with an improved competitive ratio of $\alpha^{\alpha}$.}}, author = {{Kling, Peter and Pietrzyk, Peter}}, booktitle = {{Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}}, pages = {{251--260 }}, title = {{{Profitable Scheduling on Multiple Speed-Scalable Processors}}}, doi = {{10.1145/2486159.2486183}}, year = {{2013}}, } @inproceedings{4991, author = {{Oertel, Simon and Thommes, Kirsten and Walgenbach, Peter}}, booktitle = {{Academy of Management Proceedings}}, number = {{1}}, pages = {{11642}}, title = {{{Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations}}}, year = {{2013}}, } @inproceedings{4992, author = {{Thommes, Kirsten and Akkerman, Agnes and Vyrastekova, Jana}}, booktitle = {{Academy of Management Proceedings}}, number = {{1}}, pages = {{12251}}, title = {{{The after effects of strikes on team collaboration-experimental evidence}}}, year = {{2013}}, } @book{6984, editor = {{Beutner, Marc and Kremer, H.-Hugo and Wirth, W.}}, title = {{{Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug}}}, year = {{2013}}, } @article{6985, author = {{Kremer, H.-Hugo and Fischer, M. and Tramm, T.}}, journal = {{bwp@ Berufs- und Wirtschaftspädagogik - online}}, number = {{24}}, title = {{{Didaktik beruflicher Bildung}}}, year = {{2013}}, } @book{6986, editor = {{Feng, X. and Rützel, J. and Kremer, H.-Hugo}}, title = {{{Standardization, professionalization and the measurements}}}, year = {{2013}}, } @article{7236, author = {{Lo, Fang-Yuh and Guo, Jhong-Yu and Huang, Cheng-De and Chou, Kai-Chieh and Liu, Hsiang-Lin and Ney, Verena and Ney, Andreas and Chern, Ming-Yau and Shvarkov, Stepan and Reuter, Dirk and Wieck, Andreas D. and Pezzagna, Sébastien and Massies, Jean}}, issn = {{1567-1739}}, journal = {{Current Applied Physics}}, pages = {{S7--S11}}, publisher = {{Elsevier BV}}, title = {{{Evidences of defect contribution in magnetically ordered Sm-implanted GaN}}}, doi = {{10.1016/j.cap.2013.11.051}}, volume = {{14}}, year = {{2013}}, } @article{7239, author = {{Steinhoff, A. and Kurtze, H. and Gartner, P. and Florian, M. and Reuter, Dirk and Wieck, A. D. and Bayer, M. and Jahnke, F.}}, issn = {{1098-0121}}, journal = {{Physical Review B}}, number = {{20}}, publisher = {{American Physical Society (APS)}}, title = {{{Combined influence of Coulomb interaction and polarons on the carrier dynamics in InGaAs quantum dots}}}, doi = {{10.1103/physrevb.88.205309}}, volume = {{88}}, year = {{2013}}, } @article{7240, author = {{Henn, T. and Kiessling, T. and Ossau, W. and Molenkamp, L. W. and Reuter, Dirk and Wieck, A. D.}}, issn = {{1098-0121}}, journal = {{Physical Review B}}, number = {{19}}, publisher = {{American Physical Society (APS)}}, title = {{{Picosecond real-space imaging of electron spin diffusion in GaAs}}}, doi = {{10.1103/physrevb.88.195202}}, volume = {{88}}, year = {{2013}}, } @article{7258, author = {{Henn, T. and Heckel, A. and Beck, M. and Kiessling, T. and Ossau, W. and Molenkamp, L. W. and Reuter, Dirk and Wieck, A. D.}}, issn = {{1098-0121}}, journal = {{Physical Review B}}, number = {{8}}, publisher = {{American Physical Society (APS)}}, title = {{{Hot carrier effects on the magneto-optical detection of electron spins in GaAs}}}, doi = {{10.1103/physrevb.88.085303}}, volume = {{88}}, year = {{2013}}, } @article{7259, author = {{Buß, J. H. and Rudolph, J. and Shvarkov, S. and Semond, F. and Reuter, Dirk and Wieck, A. D. and Hägele, D.}}, issn = {{0003-6951}}, journal = {{Applied Physics Letters}}, number = {{9}}, publisher = {{AIP Publishing}}, title = {{{Magneto-optical studies of Gd-implanted GaN: No spin alignment of conduction band electrons}}}, doi = {{10.1063/1.4819767}}, volume = {{103}}, year = {{2013}}, } @article{7260, author = {{Carrad, D J and Burke, A M and Reece, P J and Lyttleton, R W and Waddington, D E J and Rai, A and Reuter, Dirk and Wieck, A D and Micolich, A P}}, issn = {{0953-8984}}, journal = {{Journal of Physics: Condensed Matter}}, number = {{32}}, publisher = {{IOP Publishing}}, title = {{{The effect of (NH4)2Sxpassivation on the (311)A GaAs surface and its use in AlGaAs/GaAs heterostructure devices}}}, doi = {{10.1088/0953-8984/25/32/325304}}, volume = {{25}}, year = {{2013}}, } @article{7261, author = {{Höpfner, Henning and Fritsche, Carola and Ludwig, Arne and Ludwig, Astrid and Stromberg, Frank and Wende, Heiko and Keune, Werner and Reuter, Dirk and Wieck, Andreas D. and Gerhardt, Nils C. and Hofmann, Martin R.}}, issn = {{1862-6351}}, journal = {{physica status solidi (c)}}, number = {{9}}, pages = {{1214--1217}}, publisher = {{Wiley}}, title = {{{Spin relaxation length in quantum dot spin LEDs}}}, doi = {{10.1002/pssc.201200689}}, volume = {{10}}, year = {{2013}}, }