@misc{537, author = {{Heindorf, Stefan}}, publisher = {{Universität Paderborn}}, title = {{{Dispersion of Multi-Robot Teams}}}, year = {{2013}}, } @unpublished{538, abstract = {{We present a new technique to realize attribute-based encryption (ABE) schemes secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE schemes to achieve more efficient constructions than the known generic constructions of CCA-secure ABE schemes. We restrict ourselves to the construction of attribute-based key encapsulation mechanisms (KEMs) and present two concrete CCA-secure schemes: a key-policy attribute-based KEM that is based on Goyal's key-policy ABE and a ciphertext-policy attribute-based KEM that is based on Waters' ciphertext-policy ABE. To achieve our goals, we use an appropriate hash function and need to extend the public parameters and the ciphertexts of the underlying CPA-secure encryption schemes only by a single group element. Moreover, we use the same hardness assumptions as the underlying CPA-secure encryption schemes.}}, author = {{Blömer, Johannes and Liske, Gennadij}}, publisher = {{Universität Paderborn}}, title = {{{Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles}}}, year = {{2013}}, } @misc{539, author = {{Kornhoff, Tobias}}, publisher = {{Universität Paderborn}}, title = {{{Der Einfluss adaptierter Erwartungen in dynamischen Cournot Oligopolen}}}, year = {{2013}}, } @inproceedings{541, abstract = {{Existing solutions for gossip-based aggregation in peer-to-peer networks use epochs to calculate a global estimation from an initial static set of local values. Once the estimation converges system-wide, a new epoch is started with fresh initial values. Long epochs result in precise estimations based on old measurements and short epochs result in imprecise aggregated estimations. In contrast to this approach, we present in this paper a continuous, epoch-less approach which considers fresh local values in every round of the gossip-based aggregation. By using an approach for dynamic information aging, inaccurate values and values from left peers fade from the aggregation memory. Evaluation shows that the presented approach for continuous information aggregation in peer-to-peer systems monitors the system performance precisely, adapts to changes and is lightweight to operate.}}, author = {{Graffi, Kalman and Rapp, Vitaly}}, booktitle = {{Proceedings of the International Conference on Computer Communications and Networks (ICCCN'13)}}, pages = {{1--7}}, title = {{{Continuous Gossip-based Aggregation through Dynamic Information Aging}}}, doi = {{10.1109/ICCCN.2013.6614118}}, year = {{2013}}, } @inproceedings{542, abstract = {{We consider the problem of managing a dynamic heterogeneous storagesystem in a distributed way so that the amount of data assigned to a hostin that system is related to its capacity. Two central problems have to be solvedfor this: (1) organizing the hosts in an overlay network with low degree and diameterso that one can efficiently check the correct distribution of the data androute between any two hosts, and (2) distributing the data among the hosts so thatthe distribution respects the capacities of the hosts and can easily be adapted asthe set of hosts or their capacities change. We present distributed protocols forthese problems that are self-stabilizing and that do not need any global knowledgeabout the system such as the number of nodes or the overall capacity of thesystem. Prior to this work no solution was known satisfying these properties.}}, author = {{Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler, Christian}}, booktitle = {{Proceedings of the 27th International Symposium on Distributed Computing (DISC)}}, pages = {{537--549}}, title = {{{CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system}}}, doi = {{10.1007/978-3-642-41527-2_37}}, year = {{2013}}, } @misc{543, author = {{Jagannath, Kavitha}}, publisher = {{Universität Paderborn}}, title = {{{Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services}}}, year = {{2013}}, } @inproceedings{544, abstract = {{Comparative evaluations of peer-to-peer protocols through simulations are a viable approach to judge the performance and costs of the individual protocols in large-scale networks. In order to support this work, we enhanced the peer-to-peer systems simulator PeerfactSim.KOM with a fine-grained analyzer concept, with exhaustive automated measurements and gnuplot generators as well as a coordination control to evaluate a set of experiment setups in parallel. Thus, by configuring all experiments and protocols only once and starting the simulator, all desired measurements are performed, analyzed, evaluated and combined, resulting in a holistic environment for the comparative evaluation of peer-to-peer systems.}}, author = {{Feldotto, Matthias and Graffi, Kalman}}, booktitle = {{Proceedings of the International Conference on High Performance Computing and Simulation (HPCS'13)}}, pages = {{99--106}}, title = {{{Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM}}}, doi = {{10.1109/HPCSim.2013.6641399}}, year = {{2013}}, } @misc{545, author = {{Blumentritt, Fritz}}, publisher = {{Universität Paderborn}}, title = {{{Cliquenbildung in verteilten Systemen}}}, year = {{2013}}, } @inproceedings{546, abstract = {{Self-stabilization is the property of a system to transfer itself regardless of the initial state into a legitimate state. Chord as a simple, decentralized and scalable distributed hash table is an ideal showcase to introduce self-stabilization for p2p overlays. In this paper, we present Re-Chord, a self-stabilizing version of Chord. We show, that the stabilization process is functional, but prone to strong churn. For that, we present Ca-Re-Chord, a churn resistant version of Re-Chord, that allows the creation of a useful DHT in any kind of graph regardless of the initial state. Simulation results attest the churn resistance and good performance of Ca-Re-Chord.}}, author = {{Graffi, Kalman and Benter, Markus and Divband, Mohammad and Kniesburges, Sebastian and Koutsopoulos, Andreas}}, booktitle = {{Proceedings of the Conference on Networked Systems (NetSys)}}, pages = {{27--34}}, title = {{{Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network}}}, doi = {{10.1109/NetSys.2013.11}}, year = {{2013}}, } @article{5464, author = {{Baum, M and Schwens, C and Kabst, Rüdiger}}, journal = {{International Small Business Journal (ISBJ).}}, number = {{5}}, pages = {{534--560}}, title = {{{International as Opposed to Domestic New Venturing: The Moderating Role of Perceived Barriers to Internationalization.}}}, volume = {{31}}, year = {{2013}}, } @article{5465, author = {{Baum, M and Kabst, Rüdiger}}, journal = {{International Journal of Human Resource Management (IJHRM).}}, number = {{7}}, pages = {{1393--1417}}, title = {{{Conjoint implications on job preferences: The moderating role of involvement.}}}, volume = {{24}}, year = {{2013}}, } @phdthesis{547, abstract = {{In recent years, the role of process models in the development of enterprise software systems has increased continuously. Today, process models are used at different levels in the development process. For instance, in Service-Oriented Architectures (SOA), high-level business process models become input for the development of IT systems, and in running IT systems executable process models describe choreographies of Web Services. A key driver behind this development is the necessity for a closer alignment of business and IT requirements, to reduce the reaction times in software development to frequent changes in competitive markets.Typically in these scenarios, process models are developed, maintained, and transformed in a team environment by several stakeholders that are often from different business units, resulting in different versions. To obtain integrated process models comprising the changes applied to different versions, the versions need to be consolidated by means of model change management. Change management for process models can be compared to widely used concurrent versioning systems (CVS) and consists of the following major activities: matching of process models, detection of differences, computation of dependencies and conflicts between differences, and merging of process models.Although in general model-driven development (MDD) is accepted as a well-established development approach, there are still some shortcomings that let developers decide against MDD and for more traditional development paradigms. These shortcomings comprise a lack of fully integrated and fully featured development environments for MDD, such as a comprehensive support for model change management.In this thesis, we present a framework for process model change management. The framework is based on an intermediate representation for process models that serves as an abstraction of specific process modeling languages and focuses on common syntactic and semantic core concepts for the modeling of workflow in process models. Based on the intermediate representation, we match process models in versioning scenarios and compute differences between process models generically. Further, we consider the analysis of dependencies between differences and show how conflicts between differences can be computed by taking into account the semantics of the modeling language.As proof-of concept, we have implemented major parts of this framework in terms of a prototype. The detection of differences and dependencies contributed also to the Compare & Merge framework for the IBM WebSphere Business Modeler V 7.0 [1] (WBM), which was released as a product in fall 2009.}}, author = {{Gerth, Christian}}, publisher = {{Universität Paderborn}}, title = {{{Business Process Models - Change Management}}}, doi = {{10.1007/978-3-642-38604-6}}, year = {{2013}}, } @article{5478, author = {{Baum, M and Kabst, Rüdiger}}, journal = {{Journal of World Business (JWB).}}, number = {{2}}, pages = {{175--185}}, title = {{{How to attract applicants in the atlantic versus the asia-pacific region? A cross-national analysis on China, India, Germany, and Hungary.}}}, volume = {{48}}, year = {{2013}}, } @inproceedings{548, abstract = {{Peer-to-peer systems scale to millions of nodes and provide routing and storage functions with best effort quality. In order to provide a guaranteed quality of the overlay functions, even under strong dynamics in the network with regard to peer capacities, online participation and usage patterns, we propose to calibrate the peer-to-peer overlay and to autonomously learn which qualities can be reached. For that, we simulate the peer-to-peer overlay systematically under a wide range of parameter configurations and use neural networks to learn the effects of the configurations on the quality metrics. Thus, by choosing a specific quality setting by the overlay operator, the network can tune itself to the learned parameter configurations that lead to the desired quality. Evaluation shows that the presented self-calibration succeeds in learning the configuration-quality interdependencies and that peer-to-peer systems can learn and adapt their behavior according to desired quality goals.}}, author = {{Graffi, Kalman and Klerx, Timo}}, booktitle = {{Proceedings of the International Conference on Peer-to-Peer Computing (P2P'13)}}, pages = {{1--5}}, title = {{{Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks}}}, doi = {{10.1109/P2P.2013.6688720}}, year = {{2013}}, } @article{5484, author = {{Haus, I and Steinmetz, Holger and Isidor, R and Kabst, Rüdiger}}, journal = {{International Journal of Gender and Entrepreneurship (IJGE)}}, number = {{2}}, pages = {{130--156}}, title = {{{Gender Effects on Entrepreneurial Intention: A Meta-Analytical Structural Equation Model.}}}, volume = {{5}}, year = {{2013}}, } @article{5489, author = {{Steinmetz, Holger}}, journal = {{European Journal of Research Methods for the Behavioral and Social Sciences.}}, number = {{1}}, pages = {{1--12}}, title = {{{Analyzing observed composite differences across groups: Is partial measurement invariance enough?}}}, volume = {{9}}, year = {{2013}}, } @misc{549, author = {{Bick, Christian}}, publisher = {{Universität Paderborn}}, title = {{{Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner}}}, year = {{2013}}, } @misc{550, author = {{Meschede, Julian}}, publisher = {{Universität Paderborn}}, title = {{{Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen}}}, year = {{2013}}, } @inproceedings{551, abstract = {{In the service-oriented computing domain, the number of available software services steadily increased in recent years, favored by the rise of cloud computing with its attached delivery models like Software-as-a-Service (SaaS). To fully leverage the opportunities provided by these services for developing highly flexible and aligned SOA, integration of new services as well as the substitution of existing services must be simplified. As a consequence, approaches for automated and accurate service discovery and composition are needed. In this paper, we propose an automatic service composition approach as an extension to our earlier work on automatic service discovery. To ensure accurate results, it matches service requests and available offers based on their structural as well as behavioral aspects. Afterwards, possible service compositions are determined by composing service protocols through a composition strategy based on labeled transition systems.}}, author = {{Huma, Zille and Gerth, Christian and Engels, Gregor and Juwig, Oliver}}, booktitle = {{Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC'13)}}, pages = {{524----532}}, title = {{{Automated Service Composition for On-the-Fly SOAs}}}, doi = {{10.1007/978-3-642-45005-1_42}}, year = {{2013}}, } @misc{552, author = {{Meckenstock, Kevin}}, publisher = {{Universität Paderborn}}, title = {{{Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse}}}, year = {{2013}}, }