@misc{553, author = {{Kohn, Kathlén}}, publisher = {{Universität Paderborn}}, title = {{{Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise}}}, year = {{2013}}, } @article{554, abstract = {{We establish a link between cooperative and competitive behavior. For every possible vector of weights of an asymmetric Nash bargaining solution there exists a market that has this asymmetric Nash bargaining solution as its unique competitive payoff vector.}}, author = {{Brangewitz, Sonja and Gamp, Jan-Philip}}, journal = {{Economics Letters}}, number = {{2}}, pages = {{224 -- 227}}, publisher = {{Elsevier}}, title = {{{Asymmetric Nash bargaining solutions and competitive payoffs}}}, doi = {{10.1016/j.econlet.2013.08.013}}, year = {{2013}}, } @misc{555, author = {{Setzer, Alexander}}, publisher = {{Universität Paderborn}}, title = {{{Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs}}}, year = {{2013}}, } @misc{556, author = {{Nickel, Tobias}}, publisher = {{Universität Paderborn}}, title = {{{Analyse von Benutzeranforderungen von Service-Kompositionen mittels Modelchecking}}}, year = {{2013}}, } @techreport{557, abstract = {{Since the last two decades, the water consumption in Germany is decreasing, which causes the water tanks and pipes in a water supply system to work inefficiently. This paper proposes an approach for a decision support system, which helps to decide how to plan new water tanks and resize existing tanks in water supply systems. The approach uses a combination of network reduction, mathematical optimization and hydraulic simulation. The mathematical optimization model is a nonconvex Mixed Integer Quadratically Constrained Program (MIQCP), which is solved by a piecewise linearization. As this may lead to many binary variables and therefore high computational times, the size of the water supply system model is reduced before building the optimization model. By applying several network reduction techniques there may occur some hydraulic differences between the original network model and the reduced network model. To make sure that the solution obtained in the optimization process is feasible in the original water supply system, the solution is verified by a hydraulic simulation tool.}}, author = {{Hallmann, Corinna}}, publisher = {{Universität Paderborn}}, title = {{{An Approach for a Decision Support Systems to optimize Water Tanks in Water Supply Systems by combining Network Reduction, Optimization and Simulation}}}, year = {{2013}}, } @article{5575, author = {{Wex, Felix and Schryen, Guido and Neumann, Dirk}}, journal = {{International Journal of Information Systems for Crisis Response and Management}}, number = {{4}}, pages = {{63--80}}, publisher = {{IGI Publ.}}, title = {{{Assignments of Collaborative Rescue Units during Emergency Response}}}, volume = {{5}}, year = {{2013}}, } @inproceedings{5576, author = {{Wex, Felix and Schryen, Guido and Neumann, Dirk}}, booktitle = {{Proceedings of the 46th Hawaii International Conference on System Science}}, title = {{{Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response}}}, year = {{2013}}, } @proceedings{558, editor = {{Flocchini, Paola and Gao, Jie and Kranakis, Evangelos and Meyer auf der Heide, Friedhelm}}, location = {{Sophia Antipolis, France}}, publisher = {{Springer}}, title = {{{Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics}}}, doi = {{10.1007/978-3-642-45346-5}}, volume = {{8243}}, year = {{2013}}, } @inproceedings{559, abstract = {{Distributed hash tables are very versatile to use, as distributed storage is a desirable feature for various applications. Typical structured overlays like Chord, Pastry or Kademlia consider only homogeneous nodes with equal capacities, which does not resemble reality. In a practical use case, nodes might get overloaded by storing popular data. In this paper, we present a general approach to enable capacity awareness and load-balancing capability of homogeneous structured overlays. We introduce a hierarchical second structured overlay aside, which allows efficient capacity-based access on the nodes in the system as hosting mirrors. Simulation results show that the structured overlay is able to store various contents, such as of a social network, with only a negligible number of overloaded peers. Content, even if very popular, is hosted by easily findable capable peers. Thus, long-existing and well-evaluated overlays like Chord or Pastry can be used to create attractive DHT-based applications.}}, author = {{Wette, Philip and Graffi, Kalman}}, booktitle = {{Proceedings of the Conference on Networked Systems (NetSys)}}, pages = {{35--42}}, title = {{{Adding Capacity-Aware Storage Indirection to Homogeneous Distributed Hash Tables}}}, doi = {{10.1109/NetSys.2013.9}}, year = {{2013}}, } @inproceedings{560, abstract = {{In the last decades, development turned from monolithic software products towards more flexible software components that can be provided on world-wide markets in form of services. Customers request such services or compositions of several services. However, in many cases, discovering the best services to address a given request is a tough challenge and requires expressive, gradual matching results, considering different aspects of a service description, e.g., inputs/ouputs, protocols, or quality properties. Furthermore,in situations in which no service exactly satifies the request, approximate matching which can deal with a certain amount of fuzziness becomes necessary. There is a wealth of service matching approaches, but it is not clear whether there is a comprehensive, fuzzy matching approach which addresses all these challenges. Although there are a few service matchingsurveys, none of them is able to answer this question. In this paper, we perform a systematic literature survey of 35 (outof 504) service matching approaches which consider fuzzy matching. Based on this survey, we propose a classication,discuss how different matching approaches can be combined into a comprehensive matching method, and identify future research challenges.}}, author = {{Platenius, Marie and von Detten, Markus and Becker, Steffen and Schäfer, Wilhelm and Engels, Gregor}}, booktitle = {{Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based Software Engineering}}, pages = {{143--152}}, title = {{{A Survey of Fuzzy Service Matching Approaches in the Context of On-The-Fly Computing}}}, doi = {{10.1145/2465449.2465454}}, year = {{2013}}, } @article{561, abstract = {{We present a privacy-friendly architecture for a future cloud computing scenario where software licensing and software payment plays a major role. We show how digital rights management as a technical solution for software licensing can be achieved in a privacy-friendly manner. In our scenario, users who buy software from software providers and execute it at computing centres stay anonymous. At the same time, our approach guarantees that software licenses are bound to users and that their validity is checked before execution. Thus, DRM constitutes an incentive for software providers to take part in such a future cloud computing scenario. We employ a software re-encryption scheme so that computing centres are not able to build profiles of their users – not even under a pseudonym. We make sure that malicious users are unable to relay software to others. }}, author = {{Petrlic, Ronald and Sekula, Stephan and Sorge, Christoph}}, journal = {{International Journal of Grid and Utility Computing}}, number = {{4}}, pages = {{265--277}}, publisher = {{InderScience}}, title = {{{A privacy-friendly Architecture for future Cloud Computing}}}, doi = {{10.1504/IJGUC.2013.057120}}, year = {{2013}}, } @inproceedings{562, abstract = {{In Distributed Cloud Computing, applications are deployed across many data centres at topologically diverse locations to improved network-related quality of service (QoS). As we focus on interactive applications, we minimize the latency between users and an application by allocating Cloud resources nearby the customers. Allocating resources at all locations will result in the best latency but also in the highest expenses. So we need to find an optimal subset of locations which reduces the latency but also the expenses – the facility location problem (FLP). In addition, we consider resource capacity restrictions, as a resource can only serve a limited amount of users. An FLP can be globally solved. Additionally, we propose a local, distributed heuristic. This heuristic is running within the network and does not depend on a global component. No distributed, local approximations for the capacitated FLP have been proposed so far due to the complexity of the problem. We compared the heuristic with an optimal solution obtained from a mixed integer program for different network topologies. We investigated the influence of different parameters like overall resource utilization or different latency weights.}}, author = {{Keller, Matthias and Pawlik, Stefan and Pietrzyk, Peter and Karl, Holger}}, booktitle = {{Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing}}, pages = {{429--434}}, title = {{{A Local Heuristic for Latency-Optimized Distributed Cloud Deployment}}}, doi = {{10.1109/UCC.2013.85}}, year = {{2013}}, } @inproceedings{563, abstract = {{Dominating set based virtual backbones are used for rou-ting in wireless ad-hoc networks. Such backbones receive and transmit messages from/to every node in the network. Existing distributed algorithms only consider undirected graphs, which model symmetric networks with uniform transmission ranges. We are particularly interested in the well-established disk graphs, which model asymmetric networks with non-uniform transmission ranges. The corresponding graph theoretic problem seeks a strongly connected dominating-absorbent set of minimum cardinality in a digraph. A subset of nodes in a digraph is a strongly connected dominating-absorbent set if the subgraph induced by these nodes is strongly connected and each node in the graph is either in the set or has both an in-neighbor and an out-neighbor in it. We introduce the first distributed algorithm for this problem in disk graphs. The algorithm gives an O(k^4) -approximation ratio and has a runtime bound of O(Diam) where Diam is the diameter of the graph and k denotes the transmission ratio r_{max}/r_{min} with r_{max} and r_{min} being the maximum and minimum transmission range, respectively. Moreover, we apply our algorithm on the subgraph of disk graphs consisting of only bidirectional edges. Our algorithm gives an O(ln k) -approximation and a runtime bound of O(k^8 log^∗ n) , which, for bounded k , is an optimal approximation for the problem, following Lenzen and Wattenhofer’s Ω(log^∗ n) runtime lower bound for distributed constant approximation in disk graphs.}}, author = {{Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert, Michael}}, booktitle = {{Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)}}, pages = {{217--227}}, title = {{{A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks}}}, doi = {{10.1007/978-3-642-45346-5_16}}, year = {{2013}}, } @article{5637, author = {{Schryen, Guido}}, journal = {{European Journal of Information Systems (EJIS)}}, number = {{2}}, pages = {{139--169}}, title = {{{Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there}}}, volume = {{22}}, year = {{2013}}, } @inproceedings{564, abstract = {{We consider the problem of resource discovery in distributed systems. In particular we give an algorithm, such that each node in a network discovers the add ress of any other node in the network. We model the knowledge of the nodes as a virtual overlay network given by a directed graph such that complete knowledge of all nodes corresponds to a complete graph in the overlay network. Although there are several solutions for resource discovery, our solution is the first that achieves worst-case optimal work for each node, i.e. the number of addresses (O(n)) or bits (O(nlogn)) a node receives or sendscoincides with the lower bound, while ensuring only a linearruntime (O(n)) on the number of rounds.}}, author = {{Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler, Christian}}, booktitle = {{Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)}}, pages = {{165--176}}, title = {{{A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery}}}, doi = {{10.1007/978-3-319-03578-9_14}}, year = {{2013}}, } @inbook{6456, author = {{Higham, J. J. S. and Kremer, H.-Hugo and Yeomans, D.}}, booktitle = {{The Architecture of Innovative Apprenticeship}}, editor = {{Deitmer, L. and Hauschildt, U. and Rauner, F. and Zelloth, H.}}, pages = {{39--50}}, title = {{{Exploring Intermediate Vocational Education and Training for 16-19 Year-olds in Germany and England}}}, year = {{2013}}, } @inbook{6457, author = {{Kremer, H.-Hugo and Beutner, Marc and Wirth, W.}}, booktitle = {{Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug}}, editor = {{Kremer, H.-H. and Beutner, M. and Wirth, W.}}, title = {{{Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM}}}, year = {{2013}}, } @inbook{6458, author = {{Kremer, H.-Hugo and Beutner, Marc}}, booktitle = {{Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug}}, title = {{{Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien}}}, year = {{2013}}, } @inbook{6459, author = {{Gebbe, M. and Kremer, H.-Hugo}}, booktitle = {{Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug}}, editor = {{Kremer, H.-H. and Beutner, M. and Wirth, W.}}, title = {{{myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern}}}, year = {{2013}}, } @inbook{6461, author = {{Kremer, H.-Hugo and Knust, S.}}, booktitle = {{Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug}}, editor = {{Kremer, H.-H. and Beutner, M. and Wirth, W.}}, title = {{{Stärkenbasierte Berufsorientierung im Jungtätervollzug }}}, year = {{2013}}, }