[{"has_accepted_license":"1","year":"2013","page":"1-7","citation":{"ama":"Graffi K, Rapp V. Continuous Gossip-based Aggregation through Dynamic Information Aging. In: <i>Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13)</i>. ; 2013:1-7. doi:<a href=\"https://doi.org/10.1109/ICCCN.2013.6614118\">10.1109/ICCCN.2013.6614118</a>","ieee":"K. Graffi and V. Rapp, “Continuous Gossip-based Aggregation through Dynamic Information Aging,” in <i>Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13)</i>, 2013, pp. 1–7.","chicago":"Graffi, Kalman, and Vitaly Rapp. “Continuous Gossip-Based Aggregation through Dynamic Information Aging.” In <i>Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13)</i>, 1–7, 2013. <a href=\"https://doi.org/10.1109/ICCCN.2013.6614118\">https://doi.org/10.1109/ICCCN.2013.6614118</a>.","bibtex":"@inproceedings{Graffi_Rapp_2013, title={Continuous Gossip-based Aggregation through Dynamic Information Aging}, DOI={<a href=\"https://doi.org/10.1109/ICCCN.2013.6614118\">10.1109/ICCCN.2013.6614118</a>}, booktitle={Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13)}, author={Graffi, Kalman and Rapp, Vitaly}, year={2013}, pages={1–7} }","short":"K. Graffi, V. Rapp, in: Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13), 2013, pp. 1–7.","mla":"Graffi, Kalman, and Vitaly Rapp. “Continuous Gossip-Based Aggregation through Dynamic Information Aging.” <i>Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13)</i>, 2013, pp. 1–7, doi:<a href=\"https://doi.org/10.1109/ICCCN.2013.6614118\">10.1109/ICCCN.2013.6614118</a>.","apa":"Graffi, K., &#38; Rapp, V. (2013). Continuous Gossip-based Aggregation through Dynamic Information Aging. In <i>Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13)</i> (pp. 1–7). <a href=\"https://doi.org/10.1109/ICCCN.2013.6614118\">https://doi.org/10.1109/ICCCN.2013.6614118</a>"},"date_updated":"2022-01-06T07:01:52Z","author":[{"first_name":"Kalman","last_name":"Graffi","full_name":"Graffi, Kalman"},{"first_name":"Vitaly","full_name":"Rapp, Vitaly","last_name":"Rapp"}],"date_created":"2017-10-17T12:42:37Z","title":"Continuous Gossip-based Aggregation through Dynamic Information Aging","doi":"10.1109/ICCCN.2013.6614118","publication":"Proceedings of the International Conference on Computer Communications and Networks (ICCCN'13)","type":"conference","abstract":[{"lang":"eng","text":"Existing solutions for gossip-based aggregation in peer-to-peer networks use epochs to calculate a global estimation from an initial static set of local values. Once the estimation converges system-wide, a new epoch is started with fresh initial values. Long epochs result in precise estimations based on old measurements and short epochs result in imprecise aggregated estimations. In contrast to this approach, we present in this paper a continuous, epoch-less approach which considers fresh local values in every round of the gossip-based aggregation. By using an approach for dynamic information aging, inaccurate values and values from left peers fade from the aggregation memory. Evaluation shows that the presented approach for continuous information aggregation in peer-to-peer systems monitors the system performance precisely, adapts to changes and is lightweight to operate."}],"status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-15T10:33:20Z","date_created":"2018-03-15T10:33:20Z","creator":"florida","file_size":272960,"file_name":"541-Continuous.Gossip.based.Aggregation.Through.Dynamic.Information.Aging.pdf","file_id":"1290","access_level":"closed"}],"_id":"541","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"79"}],"user_id":"477","ddc":["040"],"file_date_updated":"2018-03-15T10:33:20Z","language":[{"iso":"eng"}]},{"file_date_updated":"2018-03-15T10:32:48Z","ddc":["040"],"user_id":"15504","series_title":"LNCS","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"542","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":262302,"access_level":"closed","file_name":"542-CONE-DHT_A_distributed_self-stabilizing_algorithm_for_a_heterogeneous_storage_system.pdf","file_id":"1289","date_updated":"2018-03-15T10:32:48Z","creator":"florida","date_created":"2018-03-15T10:32:48Z"}],"status":"public","abstract":[{"text":"We consider the problem of managing a dynamic heterogeneous storagesystem in a distributed way so that the amount of data assigned to a hostin that system is related to its capacity. Two central problems have to be solvedfor this: (1) organizing the hosts in an overlay network with low degree and diameterso that one can efficiently check the correct distribution of the data androute between any two hosts, and (2) distributing the data among the hosts so thatthe distribution respects the capacities of the hosts and can easily be adapted asthe set of hosts or their capacities change. We present distributed protocols forthese problems that are self-stabilizing and that do not need any global knowledgeabout the system such as the number of nodes or the overall capacity of thesystem. Prior to this work no solution was known satisfying these properties.","lang":"eng"}],"type":"conference","publication":"Proceedings of the 27th International Symposium on Distributed Computing (DISC)","doi":"10.1007/978-3-642-41527-2_37","title":"CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system","author":[{"first_name":"Sebastian","last_name":"Kniesburges","full_name":"Kniesburges, Sebastian"},{"first_name":"Andreas","last_name":"Koutsopoulos","full_name":"Koutsopoulos, Andreas"},{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}],"date_created":"2017-10-17T12:42:38Z","date_updated":"2022-01-06T07:01:53Z","citation":{"apa":"Kniesburges, S., Koutsopoulos, A., &#38; Scheideler, C. (2013). CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system. In <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i> (pp. 537–549). <a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">https://doi.org/10.1007/978-3-642-41527-2_37</a>","mla":"Kniesburges, Sebastian, et al. “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System.” <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>, 2013, pp. 537–49, doi:<a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">10.1007/978-3-642-41527-2_37</a>.","short":"S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.","bibtex":"@inproceedings{Kniesburges_Koutsopoulos_Scheideler_2013, series={LNCS}, title={CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">10.1007/978-3-642-41527-2_37</a>}, booktitle={Proceedings of the 27th International Symposium on Distributed Computing (DISC)}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler, Christian}, year={2013}, pages={537–549}, collection={LNCS} }","ama":"Kniesburges S, Koutsopoulos A, Scheideler C. CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system. In: <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>. LNCS. ; 2013:537-549. doi:<a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">10.1007/978-3-642-41527-2_37</a>","chicago":"Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System.” In <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>, 537–49. LNCS, 2013. <a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">https://doi.org/10.1007/978-3-642-41527-2_37</a>.","ieee":"S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system,” in <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>, 2013, pp. 537–549."},"page":"537-549","year":"2013","has_accepted_license":"1"},{"title":"Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services","author":[{"first_name":"Kavitha","last_name":"Jagannath","full_name":"Jagannath, Kavitha"}],"date_created":"2017-10-17T12:42:38Z","user_id":"15504","date_updated":"2022-01-06T07:01:53Z","publisher":"Universität Paderborn","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"543","citation":{"bibtex":"@book{Jagannath_2013, title={Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services}, publisher={Universität Paderborn}, author={Jagannath, Kavitha}, year={2013} }","mla":"Jagannath, Kavitha. <i>Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services</i>. Universität Paderborn, 2013.","short":"K. Jagannath, Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services, Universität Paderborn, 2013.","apa":"Jagannath, K. (2013). <i>Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services</i>. Universität Paderborn.","ieee":"K. Jagannath, <i>Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services</i>. Universität Paderborn, 2013.","chicago":"Jagannath, Kavitha. <i>Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services</i>. Universität Paderborn, 2013.","ama":"Jagannath K. <i>Comparison of Various Contract-Based Approaches for Specifying Behavior of On-The-Fly Computing Services</i>. Universität Paderborn; 2013."},"status":"public","year":"2013","type":"mastersthesis"},{"has_accepted_license":"1","year":"2013","page":"99-106","citation":{"chicago":"Feldotto, Matthias, and Kalman Graffi. “Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM.” In <i>Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13)</i>, 99–106, 2013. <a href=\"https://doi.org/10.1109/HPCSim.2013.6641399\">https://doi.org/10.1109/HPCSim.2013.6641399</a>.","ieee":"M. Feldotto and K. Graffi, “Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM,” in <i>Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13)</i>, 2013, pp. 99–106.","ama":"Feldotto M, Graffi K. Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM. In: <i>Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13)</i>. ; 2013:99-106. doi:<a href=\"https://doi.org/10.1109/HPCSim.2013.6641399\">10.1109/HPCSim.2013.6641399</a>","apa":"Feldotto, M., &#38; Graffi, K. (2013). Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM. In <i>Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13)</i> (pp. 99–106). <a href=\"https://doi.org/10.1109/HPCSim.2013.6641399\">https://doi.org/10.1109/HPCSim.2013.6641399</a>","short":"M. Feldotto, K. Graffi, in: Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13), 2013, pp. 99–106.","bibtex":"@inproceedings{Feldotto_Graffi_2013, title={Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM}, DOI={<a href=\"https://doi.org/10.1109/HPCSim.2013.6641399\">10.1109/HPCSim.2013.6641399</a>}, booktitle={Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13)}, author={Feldotto, Matthias and Graffi, Kalman}, year={2013}, pages={99–106} }","mla":"Feldotto, Matthias, and Kalman Graffi. “Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM.” <i>Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13)</i>, 2013, pp. 99–106, doi:<a href=\"https://doi.org/10.1109/HPCSim.2013.6641399\">10.1109/HPCSim.2013.6641399</a>."},"date_updated":"2022-01-06T07:01:53Z","date_created":"2017-10-17T12:42:38Z","author":[{"first_name":"Matthias","id":"14052","full_name":"Feldotto, Matthias","last_name":"Feldotto","orcid":"0000-0003-1348-6516"},{"first_name":"Kalman","full_name":"Graffi, Kalman","last_name":"Graffi"}],"title":"Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM","doi":"10.1109/HPCSim.2013.6641399","publication":"Proceedings of the International Conference on High Performance Computing and Simulation (HPCS'13)","type":"conference","abstract":[{"text":"Comparative evaluations of peer-to-peer protocols through simulations are a viable approach to judge the performance and costs of the individual protocols in large-scale networks. In order to support this work, we enhanced the peer-to-peer systems simulator PeerfactSim.KOM with a fine-grained analyzer concept, with exhaustive automated measurements and gnuplot generators as well as a coordination control to evaluate a set of experiment setups in parallel. Thus, by configuring all experiments and protocols only once and starting the simulator, all desired measurements are performed, analyzed, evaluated and combined, resulting in a holistic environment for the comparative evaluation of peer-to-peer systems.","lang":"eng"}],"status":"public","file":[{"date_created":"2018-03-15T10:32:17Z","creator":"florida","date_updated":"2018-03-15T10:32:17Z","file_id":"1288","access_level":"closed","file_name":"544-FeldGraffi13.pdf","file_size":899441,"content_type":"application/pdf","relation":"main_file","success":1}],"_id":"544","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"79"}],"user_id":"14052","ddc":["040"],"file_date_updated":"2018-03-15T10:32:17Z","language":[{"iso":"eng"}]},{"status":"public","type":"bachelorsthesis","language":[{"iso":"ger"}],"_id":"545","project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"user_id":"477","year":"2013","citation":{"ama":"Blumentritt F. <i>Cliquenbildung in verteilten Systemen</i>. Universität Paderborn; 2013.","ieee":"F. Blumentritt, <i>Cliquenbildung in verteilten Systemen</i>. Universität Paderborn, 2013.","chicago":"Blumentritt, Fritz. <i>Cliquenbildung in verteilten Systemen</i>. Universität Paderborn, 2013.","short":"F. Blumentritt, Cliquenbildung in verteilten Systemen, Universität Paderborn, 2013.","bibtex":"@book{Blumentritt_2013, title={Cliquenbildung in verteilten Systemen}, publisher={Universität Paderborn}, author={Blumentritt, Fritz}, year={2013} }","mla":"Blumentritt, Fritz. <i>Cliquenbildung in verteilten Systemen</i>. Universität Paderborn, 2013.","apa":"Blumentritt, F. (2013). <i>Cliquenbildung in verteilten Systemen</i>. Universität Paderborn."},"title":"Cliquenbildung in verteilten Systemen","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:54Z","date_created":"2017-10-17T12:42:38Z","author":[{"last_name":"Blumentritt","full_name":"Blumentritt, Fritz","first_name":"Fritz"}]},{"abstract":[{"text":"Self-stabilization is the property of a system to transfer itself regardless of the initial state into a legitimate state. Chord as a simple, decentralized and scalable distributed hash table is an ideal showcase to introduce self-stabilization for p2p overlays. In this paper, we present Re-Chord, a self-stabilizing version of Chord. We show, that the stabilization process is functional, but prone to strong churn. For that, we present Ca-Re-Chord, a churn resistant version of Re-Chord, that allows the creation of a useful DHT in any kind of graph regardless of the initial state. Simulation results attest the churn resistance and good performance of Ca-Re-Chord.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-15T10:30:42Z","creator":"florida","date_updated":"2018-03-15T10:30:42Z","file_name":"546-Kalman.Graffi_CaReChord.A.Churn.Resistant.Selfstabilizing.Chord.Overlay.Network_02.pdf","file_id":"1286","access_level":"closed","file_size":244841}],"status":"public","type":"conference","publication":"Proceedings of the Conference on Networked Systems (NetSys)","ddc":["040"],"file_date_updated":"2018-03-15T10:30:42Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"13","name":"SFB 901 - Subproject C1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"546","user_id":"15504","department":[{"_id":"79"}],"year":"2013","citation":{"chicago":"Graffi, Kalman, Markus Benter, Mohammad Divband, Sebastian Kniesburges, and Andreas Koutsopoulos. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network.” In <i>Proceedings of the Conference on Networked Systems (NetSys)</i>, 27–34, 2013. <a href=\"https://doi.org/10.1109/NetSys.2013.11\">https://doi.org/10.1109/NetSys.2013.11</a>.","ieee":"K. Graffi, M. Benter, M. Divband, S. Kniesburges, and A. Koutsopoulos, “Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network,” in <i>Proceedings of the Conference on Networked Systems (NetSys)</i>, 2013, pp. 27–34.","ama":"Graffi K, Benter M, Divband M, Kniesburges S, Koutsopoulos A. Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network. In: <i>Proceedings of the Conference on Networked Systems (NetSys)</i>. ; 2013:27-34. doi:<a href=\"https://doi.org/10.1109/NetSys.2013.11\">10.1109/NetSys.2013.11</a>","apa":"Graffi, K., Benter, M., Divband, M., Kniesburges, S., &#38; Koutsopoulos, A. (2013). Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network. In <i>Proceedings of the Conference on Networked Systems (NetSys)</i> (pp. 27–34). <a href=\"https://doi.org/10.1109/NetSys.2013.11\">https://doi.org/10.1109/NetSys.2013.11</a>","bibtex":"@inproceedings{Graffi_Benter_Divband_Kniesburges_Koutsopoulos_2013, title={Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network}, DOI={<a href=\"https://doi.org/10.1109/NetSys.2013.11\">10.1109/NetSys.2013.11</a>}, booktitle={Proceedings of the Conference on Networked Systems (NetSys)}, author={Graffi, Kalman and Benter, Markus and Divband, Mohammad and Kniesburges, Sebastian and Koutsopoulos, Andreas}, year={2013}, pages={27–34} }","short":"K. Graffi, M. Benter, M. Divband, S. Kniesburges, A. Koutsopoulos, in: Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.","mla":"Graffi, Kalman, et al. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network.” <i>Proceedings of the Conference on Networked Systems (NetSys)</i>, 2013, pp. 27–34, doi:<a href=\"https://doi.org/10.1109/NetSys.2013.11\">10.1109/NetSys.2013.11</a>."},"page":"27-34","has_accepted_license":"1","title":"Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network","doi":"10.1109/NetSys.2013.11","date_updated":"2022-01-06T07:01:55Z","date_created":"2017-10-17T12:42:38Z","author":[{"first_name":"Kalman","full_name":"Graffi, Kalman","last_name":"Graffi"},{"first_name":"Markus","full_name":"Benter, Markus","last_name":"Benter"},{"last_name":"Divband","full_name":"Divband, Mohammad","first_name":"Mohammad"},{"last_name":"Kniesburges","full_name":"Kniesburges, Sebastian","first_name":"Sebastian"},{"full_name":"Koutsopoulos, Andreas","last_name":"Koutsopoulos","first_name":"Andreas"}]},{"status":"public","publication":"International Small Business Journal (ISBJ).","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"274"}],"user_id":"46632","_id":"5464","intvolume":"        31","page":"534-560","citation":{"chicago":"Baum, M, C Schwens, and Rüdiger Kabst. “International as Opposed to Domestic New Venturing: The Moderating Role of Perceived Barriers to Internationalization.” <i>International Small Business Journal (ISBJ).</i> 31, no. 5 (2013): 534–60.","ieee":"M. Baum, C. Schwens, and R. Kabst, “International as Opposed to Domestic New Venturing: The Moderating Role of Perceived Barriers to Internationalization.,” <i>International Small Business Journal (ISBJ).</i>, vol. 31, no. 5, pp. 534–560, 2013.","ama":"Baum M, Schwens C, Kabst R. International as Opposed to Domestic New Venturing: The Moderating Role of Perceived Barriers to Internationalization. <i>International Small Business Journal (ISBJ)</i>. 2013;31(5):534-560.","apa":"Baum, M., Schwens, C., &#38; Kabst, R. (2013). International as Opposed to Domestic New Venturing: The Moderating Role of Perceived Barriers to Internationalization. <i>International Small Business Journal (ISBJ).</i>, <i>31</i>(5), 534–560.","short":"M. Baum, C. Schwens, R. Kabst, International Small Business Journal (ISBJ). 31 (2013) 534–560.","bibtex":"@article{Baum_Schwens_Kabst_2013, title={International as Opposed to Domestic New Venturing: The Moderating Role of Perceived Barriers to Internationalization.}, volume={31}, number={5}, journal={International Small Business Journal (ISBJ).}, author={Baum, M and Schwens, C and Kabst, Rüdiger}, year={2013}, pages={534–560} }","mla":"Baum, M., et al. “International as Opposed to Domestic New Venturing: The Moderating Role of Perceived Barriers to Internationalization.” <i>International Small Business Journal (ISBJ).</i>, vol. 31, no. 5, 2013, pp. 534–60."},"year":"2013","issue":"5","title":"International as Opposed to Domestic New Venturing: The Moderating Role of Perceived Barriers to Internationalization.","volume":31,"date_created":"2018-11-08T14:22:26Z","author":[{"full_name":"Baum, M","last_name":"Baum","first_name":"M"},{"full_name":"Schwens, C","last_name":"Schwens","first_name":"C"},{"first_name":"Rüdiger","id":"42362","full_name":"Kabst, Rüdiger","last_name":"Kabst"}],"date_updated":"2022-01-06T07:01:55Z"},{"status":"public","publication":"International Journal of Human Resource Management (IJHRM).","type":"journal_article","language":[{"iso":"eng"}],"_id":"5465","department":[{"_id":"274"}],"user_id":"46632","year":"2013","intvolume":"        24","page":"1393-1417","citation":{"chicago":"Baum, M, and Rüdiger Kabst. “Conjoint Implications on Job Preferences: The Moderating Role of Involvement.” <i>International Journal of Human Resource Management (IJHRM).</i> 24, no. 7 (2013): 1393–1417.","ieee":"M. Baum and R. Kabst, “Conjoint implications on job preferences: The moderating role of involvement.,” <i>International Journal of Human Resource Management (IJHRM).</i>, vol. 24, no. 7, pp. 1393–1417, 2013.","ama":"Baum M, Kabst R. Conjoint implications on job preferences: The moderating role of involvement. <i>International Journal of Human Resource Management (IJHRM)</i>. 2013;24(7):1393-1417.","apa":"Baum, M., &#38; Kabst, R. (2013). Conjoint implications on job preferences: The moderating role of involvement. <i>International Journal of Human Resource Management (IJHRM).</i>, <i>24</i>(7), 1393–1417.","mla":"Baum, M., and Rüdiger Kabst. “Conjoint Implications on Job Preferences: The Moderating Role of Involvement.” <i>International Journal of Human Resource Management (IJHRM).</i>, vol. 24, no. 7, 2013, pp. 1393–417.","short":"M. Baum, R. Kabst, International Journal of Human Resource Management (IJHRM). 24 (2013) 1393–1417.","bibtex":"@article{Baum_Kabst_2013, title={Conjoint implications on job preferences: The moderating role of involvement.}, volume={24}, number={7}, journal={International Journal of Human Resource Management (IJHRM).}, author={Baum, M and Kabst, Rüdiger}, year={2013}, pages={1393–1417} }"},"issue":"7","title":"Conjoint implications on job preferences: The moderating role of involvement.","date_updated":"2022-01-06T07:01:55Z","volume":24,"date_created":"2018-11-08T14:28:07Z","author":[{"first_name":"M","full_name":"Baum, M","last_name":"Baum"},{"first_name":"Rüdiger","last_name":"Kabst","full_name":"Kabst, Rüdiger","id":"42362"}]},{"supervisor":[{"id":"107","full_name":"Engels, Gregor","last_name":"Engels","first_name":"Gregor"}],"date_created":"2017-10-17T12:42:39Z","author":[{"first_name":"Christian","last_name":"Gerth","full_name":"Gerth, Christian"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:55Z","doi":"10.1007/978-3-642-38604-6","title":"Business Process Models - Change Management","citation":{"ieee":"C. Gerth, <i>Business Process Models - Change Management</i>. Universität Paderborn, 2013.","chicago":"Gerth, Christian. <i>Business Process Models - Change Management</i>. Universität Paderborn, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38604-6\">https://doi.org/10.1007/978-3-642-38604-6</a>.","ama":"Gerth C. <i>Business Process Models - Change Management</i>. Universität Paderborn; 2013. doi:<a href=\"https://doi.org/10.1007/978-3-642-38604-6\">10.1007/978-3-642-38604-6</a>","bibtex":"@book{Gerth_2013, title={Business Process Models - Change Management}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38604-6\">10.1007/978-3-642-38604-6</a>}, publisher={Universität Paderborn}, author={Gerth, Christian}, year={2013} }","mla":"Gerth, Christian. <i>Business Process Models - Change Management</i>. Universität Paderborn, 2013, doi:<a href=\"https://doi.org/10.1007/978-3-642-38604-6\">10.1007/978-3-642-38604-6</a>.","short":"C. Gerth, Business Process Models - Change Management, Universität Paderborn, 2013.","apa":"Gerth, C. (2013). <i>Business Process Models - Change Management</i>. Universität Paderborn. <a href=\"https://doi.org/10.1007/978-3-642-38604-6\">https://doi.org/10.1007/978-3-642-38604-6</a>"},"year":"2013","user_id":"477","department":[{"_id":"66"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"547","language":[{"iso":"eng"}],"type":"dissertation","status":"public","abstract":[{"lang":"eng","text":"In recent years, the role of process models in the development of enterprise software systems has increased continuously. Today, process models are used at different levels in the development process. For instance, in Service-Oriented Architectures (SOA), high-level business process models become input for the development of IT systems, and in running IT systems executable process models describe choreographies of Web Services. A key driver behind this development is the necessity for a closer alignment of business and IT requirements, to reduce the reaction times in software development to frequent changes in competitive markets.Typically in these scenarios, process models are developed, maintained, and transformed in a team environment by several stakeholders that are often from different business units, resulting in different versions. To obtain integrated process models comprising the changes applied to different versions, the versions need to be consolidated by means of model change management. Change management for process models can be compared to widely used concurrent versioning systems (CVS) and consists of the following major activities: matching of process models, detection of differences, computation of dependencies and conflicts between differences, and merging of process models.Although in general model-driven development (MDD) is accepted as a well-established development approach, there are still some shortcomings that let developers decide against MDD and for more traditional development paradigms. These shortcomings comprise a lack of fully integrated and fully featured development environments for MDD, such as a comprehensive support for model change management.In this thesis, we present a framework for process model change management. The framework is based on an intermediate representation for process models that serves as an abstraction of specific process modeling languages and focuses on common syntactic and semantic core concepts for the modeling of workflow in process models. Based on the intermediate representation, we match process models in versioning scenarios and compute differences between process models generically. Further, we consider the analysis of dependencies between differences and show how conflicts between differences can be computed by taking into account the semantics of the modeling language.As proof-of concept, we have implemented major parts of this framework in terms of a prototype. The detection of differences and dependencies contributed also to the Compare & Merge framework for the IBM WebSphere Business Modeler V 7.0 [1] (WBM), which was released as a product in fall 2009."}]},{"publication":"Journal of World Business (JWB).","type":"journal_article","status":"public","department":[{"_id":"274"}],"user_id":"46632","_id":"5478","language":[{"iso":"eng"}],"issue":"2","page":"175-185","intvolume":"        48","citation":{"bibtex":"@article{Baum_Kabst_2013, title={How to attract applicants in the atlantic versus the asia-pacific region? A cross-national analysis on China, India, Germany, and Hungary.}, volume={48}, number={2}, journal={Journal of World Business (JWB).}, author={Baum, M and Kabst, Rüdiger}, year={2013}, pages={175–185} }","mla":"Baum, M., and Rüdiger Kabst. “How to Attract Applicants in the Atlantic versus the Asia-Pacific Region? A Cross-National Analysis on China, India, Germany, and Hungary.” <i>Journal of World Business (JWB).</i>, vol. 48, no. 2, 2013, pp. 175–85.","short":"M. Baum, R. Kabst, Journal of World Business (JWB). 48 (2013) 175–185.","apa":"Baum, M., &#38; Kabst, R. (2013). How to attract applicants in the atlantic versus the asia-pacific region? A cross-national analysis on China, India, Germany, and Hungary. <i>Journal of World Business (JWB).</i>, <i>48</i>(2), 175–185.","ieee":"M. Baum and R. Kabst, “How to attract applicants in the atlantic versus the asia-pacific region? A cross-national analysis on China, India, Germany, and Hungary.,” <i>Journal of World Business (JWB).</i>, vol. 48, no. 2, pp. 175–185, 2013.","chicago":"Baum, M, and Rüdiger Kabst. “How to Attract Applicants in the Atlantic versus the Asia-Pacific Region? A Cross-National Analysis on China, India, Germany, and Hungary.” <i>Journal of World Business (JWB).</i> 48, no. 2 (2013): 175–85.","ama":"Baum M, Kabst R. How to attract applicants in the atlantic versus the asia-pacific region? A cross-national analysis on China, India, Germany, and Hungary. <i>Journal of World Business (JWB)</i>. 2013;48(2):175-185."},"year":"2013","volume":48,"author":[{"first_name":"M","last_name":"Baum","full_name":"Baum, M"},{"full_name":"Kabst, Rüdiger","id":"42362","last_name":"Kabst","first_name":"Rüdiger"}],"date_created":"2018-11-12T10:14:53Z","date_updated":"2022-01-06T07:01:55Z","title":"How to attract applicants in the atlantic versus the asia-pacific region? A cross-national analysis on China, India, Germany, and Hungary."},{"language":[{"iso":"eng"}],"file_date_updated":"2018-03-15T10:30:09Z","ddc":["040"],"user_id":"477","department":[{"_id":"79"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"548","file":[{"date_updated":"2018-03-15T10:30:09Z","creator":"florida","date_created":"2018-03-15T10:30:09Z","file_size":629234,"file_name":"548-Bootstrapping.Skynet.Calibration.and.Autonomic.Self-Control.of.Structured.P2P.Networks_01.pdf","access_level":"closed","file_id":"1285","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","abstract":[{"lang":"eng","text":"Peer-to-peer systems scale to millions of nodes and provide routing and storage functions with best effort quality. In order to provide a guaranteed quality of the overlay functions, even under strong dynamics in the network with regard to peer capacities, online participation and usage patterns, we propose to calibrate the peer-to-peer overlay and to autonomously learn which qualities can be reached. For that, we simulate the peer-to-peer overlay systematically under a wide range of parameter configurations and use neural networks to learn the effects of the configurations on the quality metrics. Thus, by choosing a specific quality setting by the overlay operator, the network can tune itself to the learned parameter configurations that lead to the desired quality. Evaluation shows that the presented self-calibration succeeds in learning the configuration-quality interdependencies and that peer-to-peer systems can learn and adapt their behavior according to desired quality goals."}],"type":"conference","publication":"Proceedings of the International Conference on Peer-to-Peer Computing (P2P'13)","doi":"10.1109/P2P.2013.6688720","title":"Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks","date_created":"2017-10-17T12:42:39Z","author":[{"full_name":"Graffi, Kalman","last_name":"Graffi","first_name":"Kalman"},{"first_name":"Timo","last_name":"Klerx","full_name":"Klerx, Timo"}],"date_updated":"2022-01-06T07:01:56Z","citation":{"ama":"Graffi K, Klerx T. Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks. In: <i>Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13)</i>. ; 2013:1-5. doi:<a href=\"https://doi.org/10.1109/P2P.2013.6688720\">10.1109/P2P.2013.6688720</a>","chicago":"Graffi, Kalman, and Timo Klerx. “Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks.” In <i>Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13)</i>, 1–5, 2013. <a href=\"https://doi.org/10.1109/P2P.2013.6688720\">https://doi.org/10.1109/P2P.2013.6688720</a>.","ieee":"K. Graffi and T. Klerx, “Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks,” in <i>Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13)</i>, 2013, pp. 1–5.","apa":"Graffi, K., &#38; Klerx, T. (2013). Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks. In <i>Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13)</i> (pp. 1–5). <a href=\"https://doi.org/10.1109/P2P.2013.6688720\">https://doi.org/10.1109/P2P.2013.6688720</a>","bibtex":"@inproceedings{Graffi_Klerx_2013, title={Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks}, DOI={<a href=\"https://doi.org/10.1109/P2P.2013.6688720\">10.1109/P2P.2013.6688720</a>}, booktitle={Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13)}, author={Graffi, Kalman and Klerx, Timo}, year={2013}, pages={1–5} }","short":"K. Graffi, T. Klerx, in: Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13), 2013, pp. 1–5.","mla":"Graffi, Kalman, and Timo Klerx. “Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks.” <i>Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13)</i>, 2013, pp. 1–5, doi:<a href=\"https://doi.org/10.1109/P2P.2013.6688720\">10.1109/P2P.2013.6688720</a>."},"page":"1-5","year":"2013","has_accepted_license":"1"},{"language":[{"iso":"eng"}],"user_id":"46632","department":[{"_id":"274"}],"_id":"5484","status":"public","type":"journal_article","publication":"International Journal of Gender and Entrepreneurship (IJGE)","title":"Gender Effects on Entrepreneurial Intention: A Meta-Analytical Structural Equation Model.","author":[{"last_name":"Haus","full_name":"Haus, I","first_name":"I"},{"first_name":"Holger","last_name":"Steinmetz","full_name":"Steinmetz, Holger","id":"43261"},{"last_name":"Isidor","full_name":"Isidor, R","first_name":"R"},{"first_name":"Rüdiger","full_name":"Kabst, Rüdiger","id":"42362","last_name":"Kabst"}],"date_created":"2018-11-12T10:31:29Z","volume":5,"date_updated":"2022-01-06T07:01:56Z","citation":{"short":"I. Haus, H. Steinmetz, R. Isidor, R. Kabst, International Journal of Gender and Entrepreneurship (IJGE) 5 (2013) 130–156.","mla":"Haus, I., et al. “Gender Effects on Entrepreneurial Intention: A Meta-Analytical Structural Equation Model.” <i>International Journal of Gender and Entrepreneurship (IJGE)</i>, vol. 5, no. 2, 2013, pp. 130–56.","bibtex":"@article{Haus_Steinmetz_Isidor_Kabst_2013, title={Gender Effects on Entrepreneurial Intention: A Meta-Analytical Structural Equation Model.}, volume={5}, number={2}, journal={International Journal of Gender and Entrepreneurship (IJGE)}, author={Haus, I and Steinmetz, Holger and Isidor, R and Kabst, Rüdiger}, year={2013}, pages={130–156} }","apa":"Haus, I., Steinmetz, H., Isidor, R., &#38; Kabst, R. (2013). Gender Effects on Entrepreneurial Intention: A Meta-Analytical Structural Equation Model. <i>International Journal of Gender and Entrepreneurship (IJGE)</i>, <i>5</i>(2), 130–156.","chicago":"Haus, I, Holger Steinmetz, R Isidor, and Rüdiger Kabst. “Gender Effects on Entrepreneurial Intention: A Meta-Analytical Structural Equation Model.” <i>International Journal of Gender and Entrepreneurship (IJGE)</i> 5, no. 2 (2013): 130–56.","ieee":"I. Haus, H. Steinmetz, R. Isidor, and R. Kabst, “Gender Effects on Entrepreneurial Intention: A Meta-Analytical Structural Equation Model.,” <i>International Journal of Gender and Entrepreneurship (IJGE)</i>, vol. 5, no. 2, pp. 130–156, 2013.","ama":"Haus I, Steinmetz H, Isidor R, Kabst R. Gender Effects on Entrepreneurial Intention: A Meta-Analytical Structural Equation Model. <i>International Journal of Gender and Entrepreneurship (IJGE)</i>. 2013;5(2):130-156."},"page":"130-156","intvolume":"         5","year":"2013","issue":"2"},{"status":"public","publication":"European Journal of Research Methods for the Behavioral and Social Sciences.","type":"journal_article","language":[{"iso":"eng"}],"_id":"5489","department":[{"_id":"274"}],"user_id":"46632","year":"2013","intvolume":"         9","page":"1-12","citation":{"bibtex":"@article{Steinmetz_2013, title={Analyzing observed composite differences across groups: Is partial measurement invariance enough?}, volume={9}, number={1}, journal={European Journal of Research Methods for the Behavioral and Social Sciences.}, author={Steinmetz, Holger}, year={2013}, pages={1–12} }","short":"H. Steinmetz, European Journal of Research Methods for the Behavioral and Social Sciences. 9 (2013) 1–12.","mla":"Steinmetz, Holger. “Analyzing Observed Composite Differences across Groups: Is Partial Measurement Invariance Enough?” <i>European Journal of Research Methods for the Behavioral and Social Sciences.</i>, vol. 9, no. 1, 2013, pp. 1–12.","apa":"Steinmetz, H. (2013). Analyzing observed composite differences across groups: Is partial measurement invariance enough? <i>European Journal of Research Methods for the Behavioral and Social Sciences.</i>, <i>9</i>(1), 1–12.","ama":"Steinmetz H. Analyzing observed composite differences across groups: Is partial measurement invariance enough? <i>European Journal of Research Methods for the Behavioral and Social Sciences</i>. 2013;9(1):1-12.","chicago":"Steinmetz, Holger. “Analyzing Observed Composite Differences across Groups: Is Partial Measurement Invariance Enough?” <i>European Journal of Research Methods for the Behavioral and Social Sciences.</i> 9, no. 1 (2013): 1–12.","ieee":"H. Steinmetz, “Analyzing observed composite differences across groups: Is partial measurement invariance enough?,” <i>European Journal of Research Methods for the Behavioral and Social Sciences.</i>, vol. 9, no. 1, pp. 1–12, 2013."},"issue":"1","title":"Analyzing observed composite differences across groups: Is partial measurement invariance enough?","date_updated":"2022-01-06T07:01:56Z","volume":9,"author":[{"id":"43261","full_name":"Steinmetz, Holger","last_name":"Steinmetz","first_name":"Holger"}],"date_created":"2018-11-12T10:38:26Z"},{"type":"bachelorsthesis","status":"public","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C2","_id":"14"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"549","user_id":"477","language":[{"iso":"ger"}],"year":"2013","citation":{"apa":"Bick, C. (2013). <i>Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner</i>. Universität Paderborn.","bibtex":"@book{Bick_2013, title={Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner}, publisher={Universität Paderborn}, author={Bick, Christian}, year={2013} }","short":"C. Bick, Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner, Universität Paderborn, 2013.","mla":"Bick, Christian. <i>Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner</i>. Universität Paderborn, 2013.","ieee":"C. Bick, <i>Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner</i>. Universität Paderborn, 2013.","chicago":"Bick, Christian. <i>Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner</i>. Universität Paderborn, 2013.","ama":"Bick C. <i>Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner</i>. Universität Paderborn; 2013."},"date_updated":"2022-01-06T07:01:56Z","publisher":"Universität Paderborn","author":[{"first_name":"Christian","full_name":"Bick, Christian","last_name":"Bick"}],"date_created":"2017-10-17T12:42:39Z","title":"Beschleunigung von Tiefenberechung aus Stereobildern durch FPGA-basierte Datenflussrechner"},{"title":"Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen","date_updated":"2022-01-06T07:01:56Z","publisher":"Universität Paderborn","author":[{"full_name":"Meschede, Julian","last_name":"Meschede","first_name":"Julian"}],"date_created":"2017-10-17T12:42:39Z","year":"2013","citation":{"apa":"Meschede, J. (2013). <i>Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen</i>. Universität Paderborn.","bibtex":"@book{Meschede_2013, title={Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen}, publisher={Universität Paderborn}, author={Meschede, Julian}, year={2013} }","short":"J. Meschede, Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen, Universität Paderborn, 2013.","mla":"Meschede, Julian. <i>Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen</i>. Universität Paderborn, 2013.","chicago":"Meschede, Julian. <i>Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen</i>. Universität Paderborn, 2013.","ieee":"J. Meschede, <i>Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen</i>. Universität Paderborn, 2013.","ama":"Meschede J. <i>Bandbreiten-beschränktes Scheduling mit skalierbaren Jobanforderungen in Multiprozessor-Umgebungen</i>. Universität Paderborn; 2013."},"language":[{"iso":"ger"}],"_id":"550","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C2","_id":"14"},{"name":"SFB 901 - Project Area C","_id":"4"}],"user_id":"477","status":"public","type":"bachelorsthesis"},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"551","series_title":"LNCS","user_id":"477","department":[{"_id":"66"}],"ddc":["040"],"file_date_updated":"2018-03-15T10:31:20Z","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC'13)","abstract":[{"lang":"eng","text":"In the service-oriented computing domain, the number of available software services steadily increased in recent years, favored by the rise of cloud computing with its attached delivery models like Software-as-a-Service (SaaS). To fully leverage the opportunities provided by these services for developing highly flexible and aligned SOA, integration of new services as well as the substitution of existing services must be simplified. As a consequence, approaches for automated and accurate service discovery and composition are needed. In this paper, we propose an automatic service composition approach as an extension to our earlier work on automatic service discovery. To ensure accurate results, it matches service requests and available offers based on their structural as well as behavioral aspects. Afterwards, possible service compositions are determined by composing service protocols through a composition strategy based on labeled transition systems."}],"file":[{"file_name":"551-978-3-642-45005-1_42.pdf","access_level":"closed","file_id":"1287","file_size":384397,"creator":"florida","date_created":"2018-03-15T10:31:20Z","date_updated":"2018-03-15T10:31:20Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","date_updated":"2022-01-06T07:01:57Z","author":[{"full_name":"Huma, Zille","last_name":"Huma","first_name":"Zille"},{"first_name":"Christian","last_name":"Gerth","full_name":"Gerth, Christian"},{"first_name":"Gregor","id":"107","full_name":"Engels, Gregor","last_name":"Engels"},{"first_name":"Oliver","last_name":"Juwig","full_name":"Juwig, Oliver"}],"date_created":"2017-10-17T12:42:39Z","title":"Automated Service Composition for On-the-Fly SOAs","doi":"10.1007/978-3-642-45005-1_42","has_accepted_license":"1","year":"2013","citation":{"ieee":"Z. Huma, C. Gerth, G. Engels, and O. Juwig, “Automated Service Composition for On-the-Fly SOAs,” in <i>Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13)</i>, 2013, pp. 524--532.","chicago":"Huma, Zille, Christian Gerth, Gregor Engels, and Oliver Juwig. “Automated Service Composition for On-the-Fly SOAs.” In <i>Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13)</i>, 524--532. LNCS, 2013. <a href=\"https://doi.org/10.1007/978-3-642-45005-1_42\">https://doi.org/10.1007/978-3-642-45005-1_42</a>.","ama":"Huma Z, Gerth C, Engels G, Juwig O. Automated Service Composition for On-the-Fly SOAs. In: <i>Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13)</i>. LNCS. ; 2013:524--532. doi:<a href=\"https://doi.org/10.1007/978-3-642-45005-1_42\">10.1007/978-3-642-45005-1_42</a>","short":"Z. Huma, C. Gerth, G. Engels, O. Juwig, in: Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13), 2013, pp. 524--532.","mla":"Huma, Zille, et al. “Automated Service Composition for On-the-Fly SOAs.” <i>Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13)</i>, 2013, pp. 524--532, doi:<a href=\"https://doi.org/10.1007/978-3-642-45005-1_42\">10.1007/978-3-642-45005-1_42</a>.","bibtex":"@inproceedings{Huma_Gerth_Engels_Juwig_2013, series={LNCS}, title={Automated Service Composition for On-the-Fly SOAs}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-45005-1_42\">10.1007/978-3-642-45005-1_42</a>}, booktitle={Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13)}, author={Huma, Zille and Gerth, Christian and Engels, Gregor and Juwig, Oliver}, year={2013}, pages={524--532}, collection={LNCS} }","apa":"Huma, Z., Gerth, C., Engels, G., &#38; Juwig, O. (2013). Automated Service Composition for On-the-Fly SOAs. In <i>Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13)</i> (pp. 524--532). <a href=\"https://doi.org/10.1007/978-3-642-45005-1_42\">https://doi.org/10.1007/978-3-642-45005-1_42</a>"},"page":"524--532"},{"type":"bachelorsthesis","status":"public","citation":{"ieee":"K. Meckenstock, <i>Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse</i>. Universität Paderborn, 2013.","chicago":"Meckenstock, Kevin. <i>Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse</i>. Universität Paderborn, 2013.","ama":"Meckenstock K. <i>Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse</i>. Universität Paderborn; 2013.","apa":"Meckenstock, K. (2013). <i>Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse</i>. Universität Paderborn.","mla":"Meckenstock, Kevin. <i>Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse</i>. Universität Paderborn, 2013.","bibtex":"@book{Meckenstock_2013, title={Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse}, publisher={Universität Paderborn}, author={Meckenstock, Kevin}, year={2013} }","short":"K. Meckenstock, Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse, Universität Paderborn, 2013."},"year":"2013","author":[{"first_name":"Kevin","last_name":"Meckenstock","full_name":"Meckenstock, Kevin"}],"date_created":"2017-10-17T12:42:39Z","user_id":"477","_id":"552","project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"date_updated":"2022-01-06T07:01:57Z","publisher":"Universität Paderborn","language":[{"iso":"ger"}],"title":"Auktionen im Beschaffungsmanagement - Eine spieltheoretische Analyse"},{"date_created":"2017-10-17T12:42:40Z","author":[{"first_name":"Kathlén","full_name":"Kohn, Kathlén","last_name":"Kohn"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:57Z","title":"Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise","citation":{"mla":"Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.","bibtex":"@book{Kohn_2013, title={Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise}, publisher={Universität Paderborn}, author={Kohn, Kathlén}, year={2013} }","short":"K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.","apa":"Kohn, K. (2013). <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn.","ieee":"K. Kohn, <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.","chicago":"Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.","ama":"Kohn K. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn; 2013."},"year":"2013","user_id":"477","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"553","language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public"},{"page":"224 - 227","citation":{"apa":"Brangewitz, S., &#38; Gamp, J.-P. (2013). Asymmetric Nash bargaining solutions and competitive payoffs. <i>Economics Letters</i>, (2), 224–227. <a href=\"https://doi.org/10.1016/j.econlet.2013.08.013\">https://doi.org/10.1016/j.econlet.2013.08.013</a>","bibtex":"@article{Brangewitz_Gamp_2013, title={Asymmetric Nash bargaining solutions and competitive payoffs}, DOI={<a href=\"https://doi.org/10.1016/j.econlet.2013.08.013\">10.1016/j.econlet.2013.08.013</a>}, number={2}, journal={Economics Letters}, publisher={Elsevier}, author={Brangewitz, Sonja and Gamp, Jan-Philip}, year={2013}, pages={224–227} }","mla":"Brangewitz, Sonja, and Jan-Philip Gamp. “Asymmetric Nash Bargaining Solutions and Competitive Payoffs.” <i>Economics Letters</i>, no. 2, Elsevier, 2013, pp. 224–27, doi:<a href=\"https://doi.org/10.1016/j.econlet.2013.08.013\">10.1016/j.econlet.2013.08.013</a>.","short":"S. Brangewitz, J.-P. Gamp, Economics Letters (2013) 224–227.","ieee":"S. Brangewitz and J.-P. Gamp, “Asymmetric Nash bargaining solutions and competitive payoffs,” <i>Economics Letters</i>, no. 2, pp. 224–227, 2013.","chicago":"Brangewitz, Sonja, and Jan-Philip Gamp. “Asymmetric Nash Bargaining Solutions and Competitive Payoffs.” <i>Economics Letters</i>, no. 2 (2013): 224–27. <a href=\"https://doi.org/10.1016/j.econlet.2013.08.013\">https://doi.org/10.1016/j.econlet.2013.08.013</a>.","ama":"Brangewitz S, Gamp J-P. Asymmetric Nash bargaining solutions and competitive payoffs. <i>Economics Letters</i>. 2013;(2):224-227. doi:<a href=\"https://doi.org/10.1016/j.econlet.2013.08.013\">10.1016/j.econlet.2013.08.013</a>"},"has_accepted_license":"1","doi":"10.1016/j.econlet.2013.08.013","date_updated":"2022-01-06T07:01:58Z","author":[{"first_name":"Sonja","last_name":"Brangewitz","full_name":"Brangewitz, Sonja"},{"first_name":"Jan-Philip","last_name":"Gamp","full_name":"Gamp, Jan-Philip"}],"status":"public","type":"journal_article","file_date_updated":"2018-03-15T10:29:34Z","_id":"554","project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"205"}],"user_id":"477","year":"2013","issue":"2","title":"Asymmetric Nash bargaining solutions and competitive payoffs","publisher":"Elsevier","date_created":"2017-10-17T12:42:40Z","abstract":[{"text":"We establish a link between cooperative and competitive behavior. For every possible vector of weights of an asymmetric Nash bargaining solution there exists a market that has this asymmetric Nash bargaining solution as its unique competitive payoff vector.","lang":"eng"}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"554-Asymmetric_Nash_bargaining_solutions_and_competitive_payoffs.pdf","access_level":"closed","file_id":"1284","file_size":374965,"date_created":"2018-03-15T10:29:34Z","creator":"florida","date_updated":"2018-03-15T10:29:34Z"}],"publication":"Economics Letters","ddc":["040"],"language":[{"iso":"eng"}]},{"type":"mastersthesis","status":"public","user_id":"477","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"555","citation":{"ieee":"A. Setzer, <i>Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs</i>. Universität Paderborn, 2013.","chicago":"Setzer, Alexander. <i>Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs</i>. Universität Paderborn, 2013.","ama":"Setzer A. <i>Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs</i>. Universität Paderborn; 2013.","apa":"Setzer, A. (2013). <i>Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs</i>. Universität Paderborn.","short":"A. Setzer, Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs, Universität Paderborn, 2013.","bibtex":"@book{Setzer_2013, title={Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs}, publisher={Universität Paderborn}, author={Setzer, Alexander}, year={2013} }","mla":"Setzer, Alexander. <i>Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs</i>. Universität Paderborn, 2013."},"year":"2013","date_created":"2017-10-17T12:42:40Z","author":[{"last_name":"Setzer","id":"11108","full_name":"Setzer, Alexander","first_name":"Alexander"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:59Z","title":"Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs"}]
