[{"publication_identifier":{"issn":["0264-9993"]},"publication_status":"published","intvolume":"        31","page":"474-483","citation":{"short":"Z. Guo, Y. Feng, Economic Modelling 31 (2013) 474–483.","bibtex":"@article{Guo_Feng_2013, title={Modeling of the impact of the financial crisis and China’s accession to WTO on China’s exports to Germany}, volume={31}, DOI={<a href=\"https://doi.org/10.1016/j.econmod.2012.12.015\">10.1016/j.econmod.2012.12.015</a>}, journal={Economic Modelling}, publisher={Elsevier BV}, author={Guo, Zhichao and Feng, Yuanhua}, year={2013}, pages={474–483} }","mla":"Guo, Zhichao, and Yuanhua Feng. “Modeling of the Impact of the Financial Crisis and China’s Accession to WTO on China’s Exports to Germany.” <i>Economic Modelling</i>, vol. 31, Elsevier BV, 2013, pp. 474–83, doi:<a href=\"https://doi.org/10.1016/j.econmod.2012.12.015\">10.1016/j.econmod.2012.12.015</a>.","apa":"Guo, Z., &#38; Feng, Y. (2013). Modeling of the impact of the financial crisis and China’s accession to WTO on China’s exports to Germany. <i>Economic Modelling</i>, <i>31</i>, 474–483. <a href=\"https://doi.org/10.1016/j.econmod.2012.12.015\">https://doi.org/10.1016/j.econmod.2012.12.015</a>","ama":"Guo Z, Feng Y. Modeling of the impact of the financial crisis and China’s accession to WTO on China’s exports to Germany. <i>Economic Modelling</i>. 2013;31:474-483. doi:<a href=\"https://doi.org/10.1016/j.econmod.2012.12.015\">10.1016/j.econmod.2012.12.015</a>","ieee":"Z. Guo and Y. Feng, “Modeling of the impact of the financial crisis and China’s accession to WTO on China’s exports to Germany,” <i>Economic Modelling</i>, vol. 31, pp. 474–483, 2013.","chicago":"Guo, Zhichao, and Yuanhua Feng. “Modeling of the Impact of the Financial Crisis and China’s Accession to WTO on China’s Exports to Germany.” <i>Economic Modelling</i> 31 (2013): 474–83. <a href=\"https://doi.org/10.1016/j.econmod.2012.12.015\">https://doi.org/10.1016/j.econmod.2012.12.015</a>."},"year":"2013","volume":31,"author":[{"full_name":"Guo, Zhichao","last_name":"Guo","first_name":"Zhichao"},{"last_name":"Feng","id":"20760","full_name":"Feng, Yuanhua","first_name":"Yuanhua"}],"date_created":"2018-10-10T09:56:47Z","date_updated":"2022-01-06T07:01:14Z","publisher":"Elsevier BV","doi":"10.1016/j.econmod.2012.12.015","title":"Modeling of the impact of the financial crisis and China's accession to WTO on China's exports to Germany","publication":"Economic Modelling","type":"journal_article","status":"public","department":[{"_id":"206"}],"user_id":"10075","_id":"4600","language":[{"iso":"eng"}]},{"doi":"10.1007/978-3-642-35512-7","title":"Long-Memory Processes","author":[{"first_name":"Jan","full_name":"Beran, Jan","last_name":"Beran"},{"id":"20760","full_name":"Feng, Yuanhua","last_name":"Feng","first_name":"Yuanhua"},{"first_name":"Sucharita","last_name":"Ghosh","full_name":"Ghosh, Sucharita"},{"first_name":"Rafal","full_name":"Kulik, Rafal","last_name":"Kulik"}],"date_created":"2018-10-10T11:40:15Z","date_updated":"2022-01-06T07:01:15Z","publisher":"Springer Berlin Heidelberg","citation":{"short":"J. Beran, Y. Feng, S. Ghosh, R. Kulik, Long-Memory Processes, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.","bibtex":"@book{Beran_Feng_Ghosh_Kulik_2013, place={Berlin, Heidelberg}, title={Long-Memory Processes}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-35512-7\">10.1007/978-3-642-35512-7</a>}, publisher={Springer Berlin Heidelberg}, author={Beran, Jan and Feng, Yuanhua and Ghosh, Sucharita and Kulik, Rafal}, year={2013} }","mla":"Beran, Jan, et al. <i>Long-Memory Processes</i>. Springer Berlin Heidelberg, 2013, doi:<a href=\"https://doi.org/10.1007/978-3-642-35512-7\">10.1007/978-3-642-35512-7</a>.","apa":"Beran, J., Feng, Y., Ghosh, S., &#38; Kulik, R. (2013). <i>Long-Memory Processes</i>. Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-35512-7\">https://doi.org/10.1007/978-3-642-35512-7</a>","ieee":"J. Beran, Y. Feng, S. Ghosh, and R. Kulik, <i>Long-Memory Processes</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.","chicago":"Beran, Jan, Yuanhua Feng, Sucharita Ghosh, and Rafal Kulik. <i>Long-Memory Processes</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-35512-7\">https://doi.org/10.1007/978-3-642-35512-7</a>.","ama":"Beran J, Feng Y, Ghosh S, Kulik R. <i>Long-Memory Processes</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013. doi:<a href=\"https://doi.org/10.1007/978-3-642-35512-7\">10.1007/978-3-642-35512-7</a>"},"year":"2013","place":"Berlin, Heidelberg","publication_identifier":{"isbn":["9783642355110","9783642355127"]},"publication_status":"published","language":[{"iso":"eng"}],"department":[{"_id":"206"}],"user_id":"10075","_id":"4628","status":"public","type":"book"},{"type":"working_paper","status":"public","_id":"4657","department":[{"_id":"206"},{"_id":"475"}],"user_id":"10075","language":[{"iso":"eng"}],"year":"2013","citation":{"bibtex":"@book{Feng_Sun_2013, title={A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets}, author={Feng, Yuanhua and Sun, Lixin}, year={2013} }","short":"Y. Feng, L. Sun, A Semi-APARCH Approach for Comparing Long-Term and Short-Term Risk in Chinese Financial Market and in Mature Financial Markets, 2013.","mla":"Feng, Yuanhua, and Lixin Sun. <i>A Semi-APARCH Approach for Comparing Long-Term and Short-Term Risk in Chinese Financial Market and in Mature Financial Markets</i>. 2013.","apa":"Feng, Y., &#38; Sun, L. (2013). <i>A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets</i>.","ama":"Feng Y, Sun L. <i>A Semi-APARCH Approach for Comparing Long-Term and Short-Term Risk in Chinese Financial Market and in Mature Financial Markets</i>.; 2013.","chicago":"Feng, Yuanhua, and Lixin Sun. <i>A Semi-APARCH Approach for Comparing Long-Term and Short-Term Risk in Chinese Financial Market and in Mature Financial Markets</i>, 2013.","ieee":"Y. Feng and L. Sun, <i>A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets</i>. 2013."},"date_updated":"2022-01-06T07:01:16Z","date_created":"2018-10-11T11:18:10Z","author":[{"full_name":"Feng, Yuanhua","id":"20760","last_name":"Feng","first_name":"Yuanhua"},{"last_name":"Sun","full_name":"Sun, Lixin","first_name":"Lixin"}],"title":"A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets"},{"type":"working_paper","year":"2013","status":"public","citation":{"ieee":"Y. Feng, <i>Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects</i>. 2013.","chicago":"Feng, Yuanhua. <i>Double-Conditional Smoothing of High-Frequency Volatility Surface in a Spatial Multiplicative Component GARCH with Random Effects</i>, 2013.","ama":"Feng Y. <i>Double-Conditional Smoothing of High-Frequency Volatility Surface in a Spatial Multiplicative Component GARCH with Random Effects</i>.; 2013.","apa":"Feng, Y. (2013). <i>Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects</i>.","short":"Y. Feng, Double-Conditional Smoothing of High-Frequency Volatility Surface in a Spatial Multiplicative Component GARCH with Random Effects, 2013.","mla":"Feng, Yuanhua. <i>Double-Conditional Smoothing of High-Frequency Volatility Surface in a Spatial Multiplicative Component GARCH with Random Effects</i>. 2013.","bibtex":"@book{Feng_2013, title={Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects}, author={Feng, Yuanhua}, year={2013} }"},"_id":"4658","date_updated":"2022-01-06T07:01:17Z","department":[{"_id":"206"},{"_id":"475"}],"author":[{"first_name":"Yuanhua","last_name":"Feng","full_name":"Feng, Yuanhua","id":"20760"}],"date_created":"2018-10-11T11:19:17Z","user_id":"10075","title":"Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects","language":[{"iso":"eng"}]},{"title":"Zero Overhead Runtime Monitoring","date_created":"2017-10-17T12:42:23Z","year":"2013","language":[{"iso":"eng"}],"ddc":["040"],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"florida","date_created":"2018-03-16T11:18:41Z","date_updated":"2018-03-16T11:18:41Z","file_name":"469-WSW2013-2.pdf","access_level":"closed","file_id":"1332","file_size":394804}],"abstract":[{"lang":"eng","text":"Runtime monitoring aims at ensuring program safety by monitoring the program's behaviour during execution and taking appropriate action before a program violates some property.Runtime monitoring is in particular important when an exhaustive formal verification fails. While the approach allows for a safe execution of programs, it may impose a significant runtime overhead.In this paper, we propose a novel technique combining verification and monitoring which incurs no overhead during runtime at all. The technique proceeds by using the inconclusive result of a verification run as the basis for transforming the program into one where all potential points of failure are replaced by HALT statements. The new program is safe by construction, behaviourally equivalent to the original program (except for unsafe behaviour),and has the same performance characteristics."}],"publication":"Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)","doi":"10.1007/978-3-642-40561-7_17","author":[{"last_name":"Wonisch","full_name":"Wonisch, Daniel","first_name":"Daniel"},{"first_name":"Alexander","full_name":"Schremmer, Alexander","last_name":"Schremmer"},{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"}],"date_updated":"2022-01-06T07:01:18Z","citation":{"ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Zero Overhead Runtime Monitoring,” in <i>Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 2013, pp. 244–258.","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Zero Overhead Runtime Monitoring.” In <i>Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 244–58. LNCS, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40561-7_17\">https://doi.org/10.1007/978-3-642-40561-7_17</a>.","ama":"Wonisch D, Schremmer A, Wehrheim H. Zero Overhead Runtime Monitoring. In: <i>Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)</i>. LNCS. ; 2013:244-258. doi:<a href=\"https://doi.org/10.1007/978-3-642-40561-7_17\">10.1007/978-3-642-40561-7_17</a>","apa":"Wonisch, D., Schremmer, A., &#38; Wehrheim, H. (2013). Zero Overhead Runtime Monitoring. In <i>Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)</i> (pp. 244–258). <a href=\"https://doi.org/10.1007/978-3-642-40561-7_17\">https://doi.org/10.1007/978-3-642-40561-7_17</a>","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2013, series={LNCS}, title={Zero Overhead Runtime Monitoring}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40561-7_17\">10.1007/978-3-642-40561-7_17</a>}, booktitle={Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2013}, pages={244–258}, collection={LNCS} }","short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–258.","mla":"Wonisch, Daniel, et al. “Zero Overhead Runtime Monitoring.” <i>Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 2013, pp. 244–58, doi:<a href=\"https://doi.org/10.1007/978-3-642-40561-7_17\">10.1007/978-3-642-40561-7_17</a>."},"page":"244-258","has_accepted_license":"1","file_date_updated":"2018-03-16T11:18:41Z","series_title":"LNCS","user_id":"477","department":[{"_id":"77"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"469","status":"public","type":"conference"},{"language":[{"iso":"eng"}],"extern":"1","keyword":["Abstraction","Affordances","Design Science Research","Design Theory","Information Systems Development","Reflection","Theorizing"],"user_id":"72849","_id":"4698","status":"public","type":"conference","publication":"European Conference on Information Systems","main_file_link":[{"url":"https://aisel.aisnet.org/ecis2013_cr/74/"}],"title":"Reflection, abstraction and theorizing in design and development research","author":[{"last_name":"Gregor","full_name":"Gregor, Shirley","first_name":"Shirley"},{"last_name":"Müller","id":"72849","full_name":"Müller, Oliver","first_name":"Oliver"},{"last_name":"Seidel","full_name":"Seidel, Stefan","first_name":"Stefan"}],"date_created":"2018-10-12T08:30:49Z","date_updated":"2022-01-06T07:01:18Z","citation":{"mla":"Gregor, Shirley, et al. “Reflection, Abstraction and Theorizing in Design and Development Research.” <i>European Conference on Information Systems</i>, 2013.","bibtex":"@inproceedings{Gregor_Müller_Seidel_2013, title={Reflection, abstraction and theorizing in design and development research}, booktitle={European Conference on Information Systems}, author={Gregor, Shirley and Müller, Oliver and Seidel, Stefan}, year={2013} }","short":"S. Gregor, O. Müller, S. Seidel, in: European Conference on Information Systems, 2013.","apa":"Gregor, S., Müller, O., &#38; Seidel, S. (2013). Reflection, abstraction and theorizing in design and development research. In <i>European Conference on Information Systems</i>.","ama":"Gregor S, Müller O, Seidel S. Reflection, abstraction and theorizing in design and development research. In: <i>European Conference on Information Systems</i>. ; 2013.","chicago":"Gregor, Shirley, Oliver Müller, and Stefan Seidel. “Reflection, Abstraction and Theorizing in Design and Development Research.” In <i>European Conference on Information Systems</i>, 2013.","ieee":"S. Gregor, O. Müller, and S. Seidel, “Reflection, abstraction and theorizing in design and development research,” in <i>European Conference on Information Systems</i>, 2013."},"year":"2013"},{"main_file_link":[{"url":"https://aisel.aisnet.org/sjis/vol25/iss1/2/"}],"title":"Designing interaction routines in service networks: A modularity and social construction-based approach","date_created":"2018-10-12T08:30:56Z","author":[{"first_name":"Jörg","full_name":"Becker, Jörg","last_name":"Becker"},{"first_name":"Daniel","id":"59677","full_name":"Beverungen, Daniel","last_name":"Beverungen"},{"first_name":"Ralf","last_name":"Knackstedt","full_name":"Knackstedt, Ralf"},{"last_name":"Matzner","full_name":"Matzner, Martin","first_name":"Martin"},{"first_name":"Oliver","last_name":"Müller","full_name":"Müller, Oliver","id":"72849"},{"first_name":"Jens","last_name":"Pöppelbuss","full_name":"Pöppelbuss, Jens"}],"date_updated":"2022-01-06T07:01:18Z","citation":{"apa":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., &#38; Pöppelbuss, J. (2013). Designing interaction routines in service networks: A modularity and social construction-based approach. <i>Scandinavian Journal of Information Systems</i>, (1), 17--47.","bibtex":"@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuss_2013, title={Designing interaction routines in service networks: A modularity and social construction-based approach}, number={1}, journal={Scandinavian Journal of Information Systems}, author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuss, Jens}, year={2013}, pages={17--47} }","mla":"Becker, Jörg, et al. “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach.” <i>Scandinavian Journal of Information Systems</i>, no. 1, 2013, pp. 17--47.","short":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuss, Scandinavian Journal of Information Systems (2013) 17--47.","ama":"Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuss J. Designing interaction routines in service networks: A modularity and social construction-based approach. <i>Scandinavian Journal of Information Systems</i>. 2013;(1):17--47.","chicago":"Becker, Jörg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver Müller, and Jens Pöppelbuss. “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach.” <i>Scandinavian Journal of Information Systems</i>, no. 1 (2013): 17--47.","ieee":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuss, “Designing interaction routines in service networks: A modularity and social construction-based approach,” <i>Scandinavian Journal of Information Systems</i>, no. 1, pp. 17--47, 2013."},"page":"17--47","year":"2013","issue":"1","publication_identifier":{"issn":["09050167"]},"extern":"1","language":[{"iso":"eng"}],"keyword":["Business process management","Conceptual modeling","Interaction routines","Modular design","Service networks","Social construction"],"user_id":"72849","_id":"4699","status":"public","type":"journal_article","publication":"Scandinavian Journal of Information Systems"},{"year":"2013","citation":{"ama":"Wette P, Karl H. Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow. In: <i>Proceedings of the ACM SIGCOMM ’13</i>. Digital Library. ; 2013:541-542. doi:<a href=\"https://doi.org/10.1145/2486001.2491710\">10.1145/2486001.2491710</a>","ieee":"P. Wette and H. Karl, “Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow,” in <i>Proceedings of the ACM SIGCOMM ’13</i>, 2013, pp. 541–542.","chicago":"Wette, Philip, and Holger Karl. “Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow.” In <i>Proceedings of the ACM SIGCOMM ’13</i>, 541–42. Digital Library, 2013. <a href=\"https://doi.org/10.1145/2486001.2491710\">https://doi.org/10.1145/2486001.2491710</a>.","apa":"Wette, P., &#38; Karl, H. (2013). Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow. In <i>Proceedings of the ACM SIGCOMM ’13</i> (pp. 541–542). <a href=\"https://doi.org/10.1145/2486001.2491710\">https://doi.org/10.1145/2486001.2491710</a>","bibtex":"@inproceedings{Wette_Karl_2013, series={Digital Library}, title={Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow}, DOI={<a href=\"https://doi.org/10.1145/2486001.2491710\">10.1145/2486001.2491710</a>}, booktitle={Proceedings of the ACM SIGCOMM ’13}, author={Wette, Philip and Karl, Holger}, year={2013}, pages={541–542}, collection={Digital Library} }","short":"P. Wette, H. Karl, in: Proceedings of the ACM SIGCOMM ’13, 2013, pp. 541–542.","mla":"Wette, Philip, and Holger Karl. “Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow.” <i>Proceedings of the ACM SIGCOMM ’13</i>, 2013, pp. 541–42, doi:<a href=\"https://doi.org/10.1145/2486001.2491710\">10.1145/2486001.2491710</a>."},"page":"541-542","has_accepted_license":"1","title":"Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow","doi":"10.1145/2486001.2491710","date_updated":"2022-01-06T07:01:19Z","author":[{"first_name":"Philip","last_name":"Wette","full_name":"Wette, Philip"},{"last_name":"Karl","id":"126","full_name":"Karl, Holger","first_name":"Holger"}],"date_created":"2017-10-17T12:42:23Z","abstract":[{"text":"In OpenFlow [1], multiple switches share the same control plane which is centralized atwhat is called the OpenFlow controller. A switch only consists of a forwarding plane. Rules for forwarding individual packets (called ow entries in OpenFlow) are pushed from the controller to the switches. In a network with a high arrival rate of new ows, such as in a data center, the control trac between the switch and controller can become very high. As a consequence, routing of new ows will be slow. One way to reduce control trac is to use wildcarded ow entries. Wildcard ow entries can be used to create default routes in the network. However, since switches do not keep track of ows covered by a wildcard ow entry, the controller no longer has knowledge about individual ows. To nd out about these individual ows we propose an extension to the current OpenFlow standard to enable packet sampling of wildcard ow entries.","lang":"eng"}],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":446835,"access_level":"closed","file_name":"470-p541-wette_01.pdf","file_id":"1331","date_updated":"2018-03-16T11:18:01Z","date_created":"2018-03-16T11:18:01Z","creator":"florida"}],"status":"public","type":"conference","publication":"Proceedings of the ACM SIGCOMM '13","ddc":["040"],"file_date_updated":"2018-03-16T11:18:01Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"470","series_title":"Digital Library","user_id":"15572","department":[{"_id":"75"}]},{"issue":"3","publication_identifier":{"isbn":["0018-9391"],"issn":["00189391"]},"citation":{"mla":"Becker, Jorg, et al. “Bridging the Gap between Manufacturing and Service through IT-Based Boundary Objects.” <i>IEEE Transactions on Engineering Management</i>, no. 3, 2013, pp. 468--482, doi:<a href=\"https://doi.org/10.1109/TEM.2012.2214770\">10.1109/TEM.2012.2214770</a>.","short":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuss, IEEE Transactions on Engineering Management (2013) 468--482.","bibtex":"@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuss_2013, title={Bridging the gap between manufacturing and service through IT-based boundary objects}, DOI={<a href=\"https://doi.org/10.1109/TEM.2012.2214770\">10.1109/TEM.2012.2214770</a>}, number={3}, journal={IEEE Transactions on Engineering Management}, author={Becker, Jorg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuss, Jens}, year={2013}, pages={468--482} }","apa":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., &#38; Pöppelbuss, J. (2013). Bridging the gap between manufacturing and service through IT-based boundary objects. <i>IEEE Transactions on Engineering Management</i>, (3), 468--482. <a href=\"https://doi.org/10.1109/TEM.2012.2214770\">https://doi.org/10.1109/TEM.2012.2214770</a>","chicago":"Becker, Jorg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver Müller, and Jens Pöppelbuss. “Bridging the Gap between Manufacturing and Service through IT-Based Boundary Objects.” <i>IEEE Transactions on Engineering Management</i>, no. 3 (2013): 468--482. <a href=\"https://doi.org/10.1109/TEM.2012.2214770\">https://doi.org/10.1109/TEM.2012.2214770</a>.","ieee":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuss, “Bridging the gap between manufacturing and service through IT-based boundary objects,” <i>IEEE Transactions on Engineering Management</i>, no. 3, pp. 468--482, 2013.","ama":"Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuss J. Bridging the gap between manufacturing and service through IT-based boundary objects. <i>IEEE Transactions on Engineering Management</i>. 2013;(3):468--482. doi:<a href=\"https://doi.org/10.1109/TEM.2012.2214770\">10.1109/TEM.2012.2214770</a>"},"page":"468--482","year":"2013","date_created":"2018-10-12T08:31:02Z","author":[{"full_name":"Becker, Jorg","last_name":"Becker","first_name":"Jorg"},{"first_name":"Daniel","last_name":"Beverungen","full_name":"Beverungen, Daniel","id":"59677"},{"full_name":"Knackstedt, Ralf","last_name":"Knackstedt","first_name":"Ralf"},{"last_name":"Matzner","full_name":"Matzner, Martin","first_name":"Martin"},{"first_name":"Oliver","id":"72849","full_name":"Müller, Oliver","last_name":"Müller"},{"full_name":"Pöppelbuss, Jens","last_name":"Pöppelbuss","first_name":"Jens"}],"date_updated":"2022-01-06T07:01:19Z","doi":"10.1109/TEM.2012.2214770","title":"Bridging the gap between manufacturing and service through IT-based boundary objects","type":"journal_article","publication":"IEEE Transactions on Engineering Management","status":"public","user_id":"72849","_id":"4700","extern":"1","language":[{"iso":"eng"}],"keyword":["Action research","boundary spanning","business process management (BPM)","service blueprinting","service networks"]},{"author":[{"full_name":"Tezer, Alina","last_name":"Tezer","first_name":"Alina"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_created":"2017-10-17T12:42:23Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:19Z","title":"Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen","citation":{"apa":"Tezer, A. (2013). <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn.","mla":"Tezer, Alina. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.","bibtex":"@book{Tezer_2013, title={Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen}, publisher={Universität Paderborn}, author={Tezer, Alina}, year={2013} }","short":"A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.","ama":"Tezer A. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn; 2013.","chicago":"Tezer, Alina. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.","ieee":"A. Tezer, <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013."},"year":"2013","department":[{"_id":"64"}],"user_id":"477","_id":"471","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}],"language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public"},{"title":"Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern","date_updated":"2022-01-06T07:01:19Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:24Z","author":[{"first_name":"Marco","full_name":"Engelbrecht, Marco","last_name":"Engelbrecht"}],"year":"2013","citation":{"apa":"Engelbrecht, M. (2013). <i>Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern</i>. Universität Paderborn.","short":"M. Engelbrecht, Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern, Universität Paderborn, 2013.","bibtex":"@book{Engelbrecht_2013, title={Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern}, publisher={Universität Paderborn}, author={Engelbrecht, Marco}, year={2013} }","mla":"Engelbrecht, Marco. <i>Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern</i>. Universität Paderborn, 2013.","ieee":"M. Engelbrecht, <i>Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern</i>. Universität Paderborn, 2013.","chicago":"Engelbrecht, Marco. <i>Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern</i>. Universität Paderborn, 2013.","ama":"Engelbrecht M. <i>Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern</i>. Universität Paderborn; 2013."},"language":[{"iso":"ger"}],"_id":"472","project":[{"_id":"1","name":"SFB 901"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"user_id":"477","status":"public","type":"bachelorsthesis"},{"editor":[{"full_name":"Wang, Lingyu","last_name":"Wang","first_name":"Lingyu"},{"last_name":"Shafiq","full_name":"Shafiq, Basit","first_name":"Basit"}],"abstract":[{"text":"We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party - in contrast to most related work on privacy-preserving DRM - is based on a re-encryption scheme that runs on any mobile Android device. Only a minor security-critical part needs to be performed on the device's smartcard which could, for instance, be a SIM card.","lang":"eng"}],"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"1330","access_level":"closed","file_name":"473-drm-general-1-camera-ready.pdf","file_size":286049,"date_created":"2018-03-16T11:17:30Z","creator":"florida","date_updated":"2018-03-16T11:17:30Z"}],"publication":"Data and Applications Security and Privacy XXVII","type":"conference","ddc":["040"],"file_date_updated":"2018-03-16T11:17:30Z","_id":"473","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"user_id":"15504","series_title":"Lecture Notes in Computer Science","year":"2013","page":"289-296","citation":{"apa":"Petrlic, R., &#38; Sekula, S. (2013). Unlinkable content playbacks in a multiparty DRM system. In L. Wang &#38; B. Shafiq (Eds.), <i>Data and Applications Security and Privacy XXVII</i> (pp. 289–296). <a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">https://doi.org/10.1007/978-3-642-39256-6_21</a>","mla":"Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” <i>Data and Applications Security and Privacy XXVII</i>, edited by Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:<a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">10.1007/978-3-642-39256-6_21</a>.","bibtex":"@inproceedings{Petrlic_Sekula_2013, series={Lecture Notes in Computer Science}, title={Unlinkable content playbacks in a multiparty DRM system}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">10.1007/978-3-642-39256-6_21</a>}, booktitle={Data and Applications Security and Privacy XXVII}, author={Petrlic, Ronald and Sekula, Stephan}, editor={Wang, Lingyu and Shafiq, BasitEditors}, year={2013}, pages={289–296}, collection={Lecture Notes in Computer Science} }","short":"R. Petrlic, S. Sekula, in: L. Wang, B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.","ama":"Petrlic R, Sekula S. Unlinkable content playbacks in a multiparty DRM system. In: Wang L, Shafiq B, eds. <i>Data and Applications Security and Privacy XXVII</i>. Lecture Notes in Computer Science. ; 2013:289-296. doi:<a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">10.1007/978-3-642-39256-6_21</a>","chicago":"Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” In <i>Data and Applications Security and Privacy XXVII</i>, edited by Lingyu Wang and Basit Shafiq, 289–96. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">https://doi.org/10.1007/978-3-642-39256-6_21</a>.","ieee":"R. Petrlic and S. Sekula, “Unlinkable content playbacks in a multiparty DRM system,” in <i>Data and Applications Security and Privacy XXVII</i>, 2013, pp. 289–296."},"has_accepted_license":"1","title":"Unlinkable content playbacks in a multiparty DRM system","doi":"10.1007/978-3-642-39256-6_21","date_updated":"2022-01-06T07:01:19Z","date_created":"2017-10-17T12:42:24Z","author":[{"first_name":"Ronald","last_name":"Petrlic","full_name":"Petrlic, Ronald"},{"first_name":"Stephan","last_name":"Sekula","full_name":"Sekula, Stephan"}]},{"author":[{"full_name":"Röhl, Nils","last_name":"Röhl","first_name":"Nils"}],"date_created":"2017-10-17T12:42:24Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:20Z","title":"Two-Stage Allocation Procedures","has_accepted_license":"1","citation":{"mla":"Röhl, Nils. <i>Two-Stage Allocation Procedures</i>. Universität Paderborn, 2013.","bibtex":"@book{Röhl_2013, title={Two-Stage Allocation Procedures}, publisher={Universität Paderborn}, author={Röhl, Nils}, year={2013} }","short":"N. Röhl, Two-Stage Allocation Procedures, Universität Paderborn, 2013.","apa":"Röhl, N. (2013). <i>Two-Stage Allocation Procedures</i>. Universität Paderborn.","ama":"Röhl N. <i>Two-Stage Allocation Procedures</i>. Universität Paderborn; 2013.","ieee":"N. Röhl, <i>Two-Stage Allocation Procedures</i>. Universität Paderborn, 2013.","chicago":"Röhl, Nils. <i>Two-Stage Allocation Procedures</i>. Universität Paderborn, 2013."},"year":"2013","department":[{"_id":"205"}],"user_id":"477","_id":"474","project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-16T11:16:59Z","ddc":["040"],"type":"report","status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-16T11:16:59Z","creator":"florida","date_created":"2018-03-16T11:16:59Z","file_size":424301,"file_name":"474-WP73.pdf","file_id":"1329","access_level":"closed"}],"abstract":[{"text":"Suppose some individuals are allowed to engage in different groups at the same time and they generate a certain welfare by cooperation. Finding appropriate ways for distributing this welfare is a non-trivial issue. The purpose of this work is to analyze two-stage allocation procedures where first each group receives a share of the welfare which is then, subsequently, distributed among the corresponding members. To study these procedures in a structured way, cooperative games and network games are combined in a general framework by using mathematical hypergraphs. Moreover, several convincing requirements on allocation procedures are discussed and formalized. Thereby it will be shown, for example, that the Position Value and iteratively applying the Myerson Value can be characterized by similar axiomatizations.","lang":"eng"}]},{"user_id":"15504","_id":"475","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"file_date_updated":"2018-03-16T11:16:29Z","ddc":["040"],"publication":"Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC)","type":"conference","status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-16T11:16:29Z","date_created":"2018-03-16T11:16:29Z","creator":"florida","file_size":370473,"file_id":"1328","access_level":"closed","file_name":"475-privacy-drm-cloud-5.pdf"}],"abstract":[{"lang":"eng","text":"We propose a privacy-preserving digital rights management scheme for (future) cloud computing. Users buy software from software providers and execute it at computing centers. Our solution allows software providers to provide different license models, like execute at most n-times models. Users’ anonymity and unlinkability of actions are preserved and thus, profile building is not even possible under (a) pseudonym. Privacy protection in the honest-but-curious model is achieved by combining ring signatures with an anonymous recipient scheme.We employ secret sharing in a unique manner that allows the software provider to expose the user’s identity if the user commits fraud, e.g. by exceeding the execution limit n."}],"date_created":"2017-10-17T12:42:24Z","author":[{"last_name":"Joshi","full_name":"Joshi, Nakul","first_name":"Nakul"},{"last_name":"Petrlic","full_name":"Petrlic, Ronald","first_name":"Ronald"}],"date_updated":"2022-01-06T07:01:21Z","doi":"10.1109/CCNC.2013.6488456","title":"Towards practical privacy-preserving Digital Rights Management for Cloud Computing","has_accepted_license":"1","page":"259-264","citation":{"mla":"Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>, 2013, pp. 259–64, doi:<a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">10.1109/CCNC.2013.6488456</a>.","bibtex":"@inproceedings{Joshi_Petrlic_2013, title={Towards practical privacy-preserving Digital Rights Management for Cloud Computing}, DOI={<a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">10.1109/CCNC.2013.6488456</a>}, booktitle={Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)}, author={Joshi, Nakul and Petrlic, Ronald}, year={2013}, pages={259–264} }","short":"N. Joshi, R. Petrlic, in: Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC), 2013, pp. 259–264.","apa":"Joshi, N., &#38; Petrlic, R. (2013). Towards practical privacy-preserving Digital Rights Management for Cloud Computing. In <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i> (pp. 259–264). <a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">https://doi.org/10.1109/CCNC.2013.6488456</a>","ieee":"N. Joshi and R. Petrlic, “Towards practical privacy-preserving Digital Rights Management for Cloud Computing,” in <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>, 2013, pp. 259–264.","chicago":"Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” In <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>, 259–64, 2013. <a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">https://doi.org/10.1109/CCNC.2013.6488456</a>.","ama":"Joshi N, Petrlic R. Towards practical privacy-preserving Digital Rights Management for Cloud Computing. In: <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>. ; 2013:259-264. doi:<a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">10.1109/CCNC.2013.6488456</a>"},"year":"2013"},{"citation":{"apa":"Kolman, P., &#38; Scheideler, C. (2013). Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing. <i>Theory of Computing Systems</i>, (2), 341–363. <a href=\"https://doi.org/10.1007/s00224-013-9454-3\">https://doi.org/10.1007/s00224-013-9454-3</a>","mla":"Kolman, Petr, and Christian Scheideler. “Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing.” <i>Theory of Computing Systems</i>, no. 2, Springer, 2013, pp. 341–63, doi:<a href=\"https://doi.org/10.1007/s00224-013-9454-3\">10.1007/s00224-013-9454-3</a>.","short":"P. Kolman, C. Scheideler, Theory of Computing Systems (2013) 341–363.","bibtex":"@article{Kolman_Scheideler_2013, title={Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing}, DOI={<a href=\"https://doi.org/10.1007/s00224-013-9454-3\">10.1007/s00224-013-9454-3</a>}, number={2}, journal={Theory of Computing Systems}, publisher={Springer}, author={Kolman, Petr and Scheideler, Christian}, year={2013}, pages={341–363} }","ama":"Kolman P, Scheideler C. Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing. <i>Theory of Computing Systems</i>. 2013;(2):341-363. doi:<a href=\"https://doi.org/10.1007/s00224-013-9454-3\">10.1007/s00224-013-9454-3</a>","chicago":"Kolman, Petr, and Christian Scheideler. “Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing.” <i>Theory of Computing Systems</i>, no. 2 (2013): 341–63. <a href=\"https://doi.org/10.1007/s00224-013-9454-3\">https://doi.org/10.1007/s00224-013-9454-3</a>.","ieee":"P. Kolman and C. Scheideler, “Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing,” <i>Theory of Computing Systems</i>, no. 2, pp. 341–363, 2013."},"page":"341-363","year":"2013","issue":"2","has_accepted_license":"1","doi":"10.1007/s00224-013-9454-3","title":"Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing","author":[{"full_name":"Kolman, Petr","last_name":"Kolman","first_name":"Petr"},{"first_name":"Christian","last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792"}],"date_created":"2017-10-17T12:42:24Z","date_updated":"2022-01-06T07:01:21Z","publisher":"Springer","file":[{"file_size":264308,"access_level":"closed","file_name":"476-tocsrevised3b.pdf","file_id":"1326","date_updated":"2018-03-15T14:07:18Z","creator":"florida","date_created":"2018-03-15T14:07:18Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","abstract":[{"lang":"eng","text":"An elementary h-route ow, for an integer h 1, is a set of h edge- disjoint paths between a source and a sink, each path carrying a unit of ow, and an h-route ow is a non-negative linear combination of elementary h-routeows. An h-route cut is a set of edges whose removal decreases the maximum h-route ow between a given source-sink pair (or between every source-sink pair in the multicommodity setting) to zero. The main result of this paper is an approximate duality theorem for multicommodity h-route cuts and ows, for h 3: The size of a minimum h-route cut is at least f=h and at most O(log4 k f) where f is the size of the maximum h-routeow and k is the number of commodities. The main step towards the proof of this duality is the design and analysis of a polynomial-time approximation algorithm for the minimum h-route cut problem for h = 3 that has an approximation ratio of O(log4 k). Previously, polylogarithmic approximation was known only for h-route cuts for h 2. A key ingredient of our algorithm is a novel rounding technique that we call multilevel ball-growing. Though the proof of the duality relies on this algorithm, it is not a straightforward corollary of it as in the case of classical multicommodity ows and cuts. Similar results are shown also for the sparsest multiroute cut problem."}],"type":"journal_article","publication":"Theory of Computing Systems","file_date_updated":"2018-03-15T14:07:18Z","ddc":["040"],"user_id":"477","department":[{"_id":"79"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"476"},{"doi":"10.1007/978-3-642-45346-5_3","title":"Token Dissemination in Geometric Dynamic Networks","author":[{"full_name":"Abshoff, Sebastian","last_name":"Abshoff","first_name":"Sebastian"},{"last_name":"Benter","full_name":"Benter, Markus","first_name":"Markus"},{"full_name":"Cord-Landwehr, Andreas","last_name":"Cord-Landwehr","first_name":"Andreas"},{"last_name":"Malatyali","full_name":"Malatyali, Manuel","first_name":"Manuel"},{"last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"}],"date_created":"2017-10-17T12:42:25Z","date_updated":"2022-01-06T07:01:21Z","citation":{"chicago":"Abshoff, Sebastian, Markus Benter, Andreas Cord-Landwehr, Manuel Malatyali, and Friedhelm Meyer auf der Heide. “Token Dissemination in Geometric Dynamic Networks.” In <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers</i>, 22–34. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-45346-5_3\">https://doi.org/10.1007/978-3-642-45346-5_3</a>.","ieee":"S. Abshoff, M. Benter, A. Cord-Landwehr, M. Malatyali, and F. Meyer auf der Heide, “Token Dissemination in Geometric Dynamic Networks,” in <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers</i>, 2013, pp. 22–34.","ama":"Abshoff S, Benter M, Cord-Landwehr A, Malatyali M, Meyer auf der Heide F. Token Dissemination in Geometric Dynamic Networks. In: <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers</i>. Lecture Notes in Computer Science. ; 2013:22-34. doi:<a href=\"https://doi.org/10.1007/978-3-642-45346-5_3\">10.1007/978-3-642-45346-5_3</a>","apa":"Abshoff, S., Benter, M., Cord-Landwehr, A., Malatyali, M., &#38; Meyer auf der Heide, F. (2013). Token Dissemination in Geometric Dynamic Networks. In <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers</i> (pp. 22–34). <a href=\"https://doi.org/10.1007/978-3-642-45346-5_3\">https://doi.org/10.1007/978-3-642-45346-5_3</a>","mla":"Abshoff, Sebastian, et al. “Token Dissemination in Geometric Dynamic Networks.” <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers</i>, 2013, pp. 22–34, doi:<a href=\"https://doi.org/10.1007/978-3-642-45346-5_3\">10.1007/978-3-642-45346-5_3</a>.","bibtex":"@inproceedings{Abshoff_Benter_Cord-Landwehr_Malatyali_Meyer auf der Heide_2013, series={Lecture Notes in Computer Science}, title={Token Dissemination in Geometric Dynamic Networks}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-45346-5_3\">10.1007/978-3-642-45346-5_3</a>}, booktitle={Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers}, author={Abshoff, Sebastian and Benter, Markus and Cord-Landwehr, Andreas and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}, year={2013}, pages={22–34}, collection={Lecture Notes in Computer Science} }","short":"S. Abshoff, M. Benter, A. Cord-Landwehr, M. Malatyali, F. Meyer auf der Heide, in: Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers, 2013, pp. 22–34."},"page":"22-34","year":"2013","has_accepted_license":"1","file_date_updated":"2018-03-15T14:06:38Z","ddc":["040"],"user_id":"15504","series_title":"Lecture Notes in Computer Science","department":[{"_id":"63"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"477","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":193169,"file_id":"1325","file_name":"477-geometric-dynamic-networks_01.pdf","access_level":"closed","date_updated":"2018-03-15T14:06:38Z","date_created":"2018-03-15T14:06:38Z","creator":"florida"}],"status":"public","abstract":[{"lang":"eng","text":"We consider the k-token dissemination problem, where k initially arbitrarily distributed tokens have to be disseminated to all nodes in a dynamic network (as introduced by Kuhn et al., STOC 2010). In contrast to general dynamic networks, our dynamic networks are unit disk graphs, i.e., nodes are embedded into the Euclidean plane and two nodes are connected if and only if their distance is at most R. Our worst-case adversary is allowed to move the nodes on the plane, but the maximum velocity v_max of each node is limited and the graph must be connected in each round. For this model, we provide almost tight lower and upper bounds for k-token dissemination if nodes are restricted to send only one token per round. It turns out that the maximum velocity v_max is a meaningful parameter to characterize dynamics in our model."}],"type":"conference","publication":"Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers"},{"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"478","user_id":"477","department":[{"_id":"77"}],"ddc":["040"],"file_date_updated":"2018-03-15T14:06:05Z","type":"dissertation","abstract":[{"text":"Software systems are playing an increasing role in our everyday life, and as the amount of software applications grows, so does their complexity and the relevance of their computations. Software components can be found in many systems that are charged with safety-critical tasks, such as control systems for aviation or power plants. Hence, software verification techniques that are capable of proving the absence of critical errors are becoming more and more important in the field software engineering. A well-established approach to software verification is model checking. Applying this technique involves an exhaustive exploration of a state space model corresponding to the system under consideration. The major challenge in model checking is the so-called state explosion problem: The state space of a software system grows exponentially with its size. Thus, the straightforward modelling of real-life systems practically impossible. A common approach to this problem is the application of abstraction techniques, which reduce the original state space by mapping it on a significantly smaller abstract one. Abstraction inherently involves a loss of information, and thus, the resulting abstract model may be too imprecise for a definite result in verification. Therefore, abstraction is typically combined with abstraction refinement: An initially very coarse abstract model is iteratively refined, i.e. enriched with new details about the original system, until a level of abstraction is reached that is precise enough for a definite outcome. Abstraction refinement-based model checking is fully automatable and it is considered as one of the most promising approaches to the state explosion problem in verification. However, it is still faced with a number of challenges. There exist several types of abstraction techniques and not every type is equally well-suited for all kinds of systems and verification tasks. Moreover, the selection of adequate refinement steps is nontrivial and typically the most crucial part of the overall approach: Unfavourable refinement decisions can compromise the state space-reducing effect of abstraction, and as a consequence, can easily lead to the failure of verification. It is, however, hard to predict which refinement steps will eventually be expedient for verification – and which not.","lang":"eng"}],"file":[{"date_created":"2018-03-15T14:06:05Z","creator":"florida","date_updated":"2018-03-15T14:06:05Z","file_id":"1324","access_level":"closed","file_name":"478-Dissertation-Timm.pdf","file_size":931458,"content_type":"application/pdf","relation":"main_file","success":1}],"status":"public","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:22Z","author":[{"last_name":"Timm","full_name":"Timm, Nils","first_name":"Nils"}],"supervisor":[{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2017-10-17T12:42:25Z","title":"Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems","has_accepted_license":"1","year":"2013","citation":{"ieee":"N. Timm, <i>Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems</i>. Universität Paderborn, 2013.","chicago":"Timm, Nils. <i>Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems</i>. Universität Paderborn, 2013.","ama":"Timm N. <i>Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems</i>. Universität Paderborn; 2013.","bibtex":"@book{Timm_2013, title={Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems}, publisher={Universität Paderborn}, author={Timm, Nils}, year={2013} }","short":"N. Timm, Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems, Universität Paderborn, 2013.","mla":"Timm, Nils. <i>Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems</i>. Universität Paderborn, 2013.","apa":"Timm, N. (2013). <i>Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems</i>. Universität Paderborn."}},{"year":"2013","issue":"2","title":"The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley","publisher":"Springer","date_created":"2017-10-17T12:42:25Z","abstract":[{"text":"Although of considerable practical importance, the separate impact of individual and collective reputation on firm performance (e.g. product prices) has not yet been convincingly demonstrated. We use a sample of some 70 different wineries offering more than 1,300 different Riesling wines from the Mosel valley to isolate the returns to individual reputation (measured by expert ratings in a highly respected wine guide) from the returns to collective reputation (measured by membership in two different professional associations where members are assumed to monitor each other very closely). We find that both effects are statistically significant and economically relevant with the latter being more important in quantitative terms than the former.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-15T14:02:36Z","creator":"florida","date_updated":"2018-03-15T14:02:36Z","file_id":"1322","access_level":"closed","file_name":"480-Frick.pdf","file_size":371437}],"publication":"Journal of Business Economics","ddc":["040"],"language":[{"iso":"eng"}],"page":"101-119","intvolume":"        83","citation":{"bibtex":"@article{Frick_Simmons_2013, title={The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley}, volume={83}, DOI={<a href=\"https://doi.org/10.1007/s11573-013-0652-x\">10.1007/s11573-013-0652-x</a>}, number={2}, journal={Journal of Business Economics}, publisher={Springer}, author={Frick, Bernd and Simmons, Robert}, year={2013}, pages={101–119} }","mla":"Frick, Bernd, and Robert Simmons. “The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley.” <i>Journal of Business Economics</i>, vol. 83, no. 2, Springer, 2013, pp. 101–19, doi:<a href=\"https://doi.org/10.1007/s11573-013-0652-x\">10.1007/s11573-013-0652-x</a>.","short":"B. Frick, R. Simmons, Journal of Business Economics 83 (2013) 101–119.","apa":"Frick, B., &#38; Simmons, R. (2013). The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley. <i>Journal of Business Economics</i>, <i>83</i>(2), 101–119. <a href=\"https://doi.org/10.1007/s11573-013-0652-x\">https://doi.org/10.1007/s11573-013-0652-x</a>","ieee":"B. Frick and R. Simmons, “The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley,” <i>Journal of Business Economics</i>, vol. 83, no. 2, pp. 101–119, 2013.","chicago":"Frick, Bernd, and Robert Simmons. “The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley.” <i>Journal of Business Economics</i> 83, no. 2 (2013): 101–19. <a href=\"https://doi.org/10.1007/s11573-013-0652-x\">https://doi.org/10.1007/s11573-013-0652-x</a>.","ama":"Frick B, Simmons R. The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley. <i>Journal of Business Economics</i>. 2013;83(2):101-119. doi:<a href=\"https://doi.org/10.1007/s11573-013-0652-x\">10.1007/s11573-013-0652-x</a>"},"has_accepted_license":"1","doi":"10.1007/s11573-013-0652-x","date_updated":"2022-01-06T07:01:24Z","volume":83,"author":[{"first_name":"Bernd","full_name":"Frick, Bernd","last_name":"Frick"},{"full_name":"Simmons, Robert","last_name":"Simmons","first_name":"Robert"}],"status":"public","type":"journal_article","file_date_updated":"2018-03-15T14:02:36Z","_id":"480","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Subproject A4","_id":"8"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"183"}],"user_id":"477"},{"date_updated":"2022-01-06T07:01:25Z","author":[{"last_name":"Graffi","full_name":"Graffi, Kalman","first_name":"Kalman"},{"last_name":"Bremer","full_name":"Bremer, Lars","first_name":"Lars"}],"date_created":"2017-10-17T12:42:26Z","title":"Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case","doi":"10.1109/ICC.2013.6655082","has_accepted_license":"1","year":"2013","page":"3444 - 3449 ","citation":{"apa":"Graffi, K., &#38; Bremer, L. (2013). Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case. In <i>Proceedings of the International Conference on Communications (ICC’13)</i> (pp. 3444–3449). <a href=\"https://doi.org/10.1109/ICC.2013.6655082\">https://doi.org/10.1109/ICC.2013.6655082</a>","mla":"Graffi, Kalman, and Lars Bremer. “Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case.” <i>Proceedings of the International Conference on Communications (ICC’13)</i>, 2013, pp. 3444–49, doi:<a href=\"https://doi.org/10.1109/ICC.2013.6655082\">10.1109/ICC.2013.6655082</a>.","bibtex":"@inproceedings{Graffi_Bremer_2013, title={Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case}, DOI={<a href=\"https://doi.org/10.1109/ICC.2013.6655082\">10.1109/ICC.2013.6655082</a>}, booktitle={Proceedings of the International Conference on Communications (ICC’13)}, author={Graffi, Kalman and Bremer, Lars}, year={2013}, pages={3444–3449} }","short":"K. Graffi, L. Bremer, in: Proceedings of the International Conference on Communications (ICC’13), 2013, pp. 3444–3449.","ama":"Graffi K, Bremer L. Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case. In: <i>Proceedings of the International Conference on Communications (ICC’13)</i>. ; 2013:3444-3449. doi:<a href=\"https://doi.org/10.1109/ICC.2013.6655082\">10.1109/ICC.2013.6655082</a>","chicago":"Graffi, Kalman, and Lars Bremer. “Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case.” In <i>Proceedings of the International Conference on Communications (ICC’13)</i>, 3444–49, 2013. <a href=\"https://doi.org/10.1109/ICC.2013.6655082\">https://doi.org/10.1109/ICC.2013.6655082</a>.","ieee":"K. Graffi and L. Bremer, “Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case,” in <i>Proceedings of the International Conference on Communications (ICC’13)</i>, 2013, pp. 3444–3449."},"_id":"481","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"79"}],"user_id":"477","ddc":["040"],"file_date_updated":"2018-03-15T14:02:01Z","language":[{"iso":"eng"}],"publication":"Proceedings of the International Conference on Communications (ICC'13)","type":"conference","abstract":[{"text":"Cloud computing offers high availability, dynamic scalability, and elasticity requiring only very little administration. However, this service comes with financial costs. Peer-to-peer systems, in contrast, operate at very low costs but cannot match the quality of service of the cloud. This paper focuses on the case study of Wikipedia and presents an approach to reduce the operational costs of hosting similar websites in the cloud by using a practical peer-to-peer approach. The visitors of the site are joining a Chord overlay, which acts as first cache for article lookups. Simulation results show, that up to 72% of the article lookups in Wikipedia could be answered by other visitors instead of using the cloud.","lang":"eng"}],"status":"public","file":[{"date_created":"2018-03-15T14:02:01Z","creator":"florida","date_updated":"2018-03-15T14:02:01Z","access_level":"closed","file_name":"481-Symbiotic.Coupling.of.P2P.and.Cloud.Systems.The.Wikipedia.Case2.pdf","file_id":"1321","file_size":1405789,"content_type":"application/pdf","relation":"main_file","success":1}]},{"citation":{"apa":"Bieshaar, M. (2013). <i>Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen</i>. Universität Paderborn.","bibtex":"@book{Bieshaar_2013, title={Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen}, publisher={Universität Paderborn}, author={Bieshaar, Maarten}, year={2013} }","mla":"Bieshaar, Maarten. <i>Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen</i>. Universität Paderborn, 2013.","short":"M. Bieshaar, Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen, Universität Paderborn, 2013.","chicago":"Bieshaar, Maarten. <i>Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen</i>. Universität Paderborn, 2013.","ieee":"M. Bieshaar, <i>Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen</i>. Universität Paderborn, 2013.","ama":"Bieshaar M. <i>Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen</i>. Universität Paderborn; 2013."},"year":"2013","author":[{"first_name":"Maarten","last_name":"Bieshaar","full_name":"Bieshaar, Maarten"}],"date_created":"2017-10-17T12:42:26Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:25Z","title":"Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen","type":"bachelorsthesis","status":"public","user_id":"477","_id":"482","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B2","_id":"10"},{"_id":"3","name":"SFB 901 - Project Area B"}],"language":[{"iso":"ger"}]}]
