TY - CONF AU - Münkhoff, E AU - Garnefeld, I AU - Bruns, A ID - 7735 T2 - roceedings of the 42nd European Marketing Academy (EMAC) Conference TI - How to prolong a sales promotion – Ex-post time extension versus reframing ER - TY - CONF AU - Posner , T AU - Garnefeld, I AU - Eggert, A ID - 7736 T2 - Proceedings of the 42nd European Marketing Academy (EMAC) Conference TI - Creating Emotional Brand Attachment through the Salesperson's Brand-Consistent Behavior ER - TY - CONF AU - Steinhoff, L AU - Palmatier, R. W ID - 7737 T2 - Proceedings of the 42nd European Marketing Academy (EMAC) Conference TI - The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance ER - TY - CONF AU - Eggert, A AU - Thiesbrummel, C AU - Deutscher, C ID - 7738 T2 - 2013 AMA Winter Marketing Educators' Proceedings TI - Exploring differential effects of product and service innovations on industrial firms’ financial performance ER - TY - CONF AU - Cicconetti, Claudio AU - Morelli, Arianna AU - Dräxler, Martin AU - Karl, Holger AU - Mancuso, Vincenzo AU - Sciancalepore, Vincenzo AU - Gupta, Rohit AU - de la Oliva, Antonio AU - Isabel Sanchez, M. AU - Serrano, Pablo AU - Roullet, Laurent ID - 774 T2 - 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013 TI - The playground of Wireless Dense networks of the future ER - TY - CONF AU - Keller, Matthias AU - Peuster, Manuel AU - Robbert, Christoph AU - Karl, Holger ID - 775 T2 - 17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013 TI - A topology-aware adaptive deployment framework for elastic applications ER - TY - CONF AU - Herlich, Matthias AU - Karl, Holger ID - 776 T2 - ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013 TI - Energy-Efficient Assignment of User Equipment to Cooperative Base Stations ER - TY - GEN ED - Fazal-Baqaie, Masud ID - 7762 TI - Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch und Wirklichkeit - Proceedings der 20. Tagung der Fachgruppe Vorgehensmodelle im Fachgebiet Wirtschaftsinformatik (WI-VM) der Gesellschaft für Informatik e.V., Lörrach (Germany) VL - P-224 ER - TY - CONF AU - Dräxler, Martin AU - Karl, Holger ID - 777 T2 - 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013 TI - Cross-layer scheduling for multi-quality video streaming in cellular wireless networks ER - TY - GEN AU - Dräxler, Martin AU - Blobel, Johannes AU - Dreimann, Philipp AU - Valentin, Stefan AU - Karl, Holger ID - 781 T2 - CoRR TI - Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming ER - TY - CONF AB - The paradigm of service-oriented architectures has emerged as an architectural style for designing enterprise applications. Requirements engineering for such applications comprises the specification of business goal models representing stakeholder objectives and the operationalization to business process models that specify the required composition of services. Inconsistencies between business goals and derived business processes can lead to service compositions that are not in line with the actual stakeholder objectives. For preserving consistency it is required to consider logical and temporal dependencies among goals (e.g. the order in which they need to be achieved) in the derivation of business processes. In previous work, we provided a technique for the elicitation and specification of dependencies between business goals. Extending this approach, we aim at validating the consistency between business goal models and business process models regarding these dependencies. In this paper, we present a pattern-based approach for the automated generation of verifiable business process quality constraints from business goal models. We describe how these constraints can be used to check the consistency between business goals and business processes and demonstrate the applicability of our approach in a case study by using the implemented tool support. AU - Nagel, Benjamin AU - Gerth, Christian AU - Post, Jennifer AU - Engels, Gregor ID - 8057 T2 - Proceedings of the 17th IEEE International EDOC Conference (EDOC'13) TI - Ensuring Consistency Among Business Goals and Business Process Models ER - TY - CONF AU - Schumacher, Claudia AU - Engels, Gregor AU - Güldali, Baris AU - Niehammer, Markus AU - Hamburg, Matthias ED - Kowalewski, Stefan ED - Rumpe, Bernhard ID - 8058 T2 - Proceedings of the conference on Software Enginneering, Fachtagung des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany) TI - Modellbasierte Bewertung von Testprozessen nach TPI NEXT® mit Geschäftsprozess-Mustern VL - P-213 ER - TY - CONF AU - Engels, Gregor ID - 8059 T2 - Software Engineering 2013 TI - On-the-Fly Computing - Das Entwicklungs- und Betriebsparadigma für Softwaresysteme der Zukunft VL - P-213 ER - TY - CONF AU - Huma, Zille AU - Gerth, Christian AU - Engels, Gregor AU - Juwig, Oliver ID - 8060 T2 - Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC'13) TI - Automated Service Composition for On-the-Fly SOAs VL - 8274 ER - TY - CONF AU - Luckey, Markus AU - Engels, Gregor ID - 8061 T2 - Proceeding of the 8th international symposium on Software engineering for adaptive and self-managing systems TI - High-­Quality Specification of Self-­Adaptive Software Systems ER - TY - CONF AU - Brüseke, Frank AU - Becker, Steffen AU - Engels, Gregor ID - 8062 T2 - Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic) TI - Decision Support via Automated Metric Comparison for the Palladio-based Performance Blame Analysis ER - TY - CONF AU - Becker, Matthias AU - Luckey, Markus AU - Becker, Steffen ID - 8063 T2 - Ninth International ACM Sigsoft Conference on the Quality of Software Architectures TI - Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time ER - TY - GEN AU - Küster, Jochen AU - Kovács, Dániel AU - Bauer, Eduard AU - Gerth, Christian ID - 8222 TI - Integrating Coverage Analysis into Test-driven Development of Model Transformations ER - TY - GEN AU - Huma, Zille AU - Gerth, Christian AU - Engels, Gregor ID - 8223 TI - Automated Service Discovery and Composition for On-the-Fly SOAs ER - TY - JOUR AU - de Meer, Hermann AU - Diener, Michael AU - Herkenhöner, Ralph AU - Kucera, Markus AU - Niedermeier, Michael AU - Reisser, Andreas AU - Schryen, Guido AU - Vetter, Michael AU - Waas, Thomas AU - Yasasin, Emrah ID - 5682 IS - 3 JF - PIK - Praxis der Informationsverarbeitung und Kommunikation TI - Sicherheitsherausforderungen in hochverteilten Systemen VL - 36 ER - TY - JOUR AB - Smart interactive services, in contrast with other technology-based services, require significant human-to-human interaction and collaboration in addition to the service provided by the embedded technology itself. The authors’ foundational Delphi study confirms smart interactive services (e.g., remote diagnosis, remote repair of equipment, and telemedicine) are a rapidly growing innovation category across industries. Yet, gaining user acceptance of these types of services presents a significant challenge for managers. To address this challenge, the authors employ a grounded theory approach, drawing on depth interviews, to develop a framework of barriers and facilitators to users’ attitudinal and behavioral responses to smart interactive services. The findings reveal a new set of beliefs that are critical in this context. These beliefs are tied to the human element and specifically pertain to beliefs about the “service counterpart (SC),” who is the provider’s employee controlling the technology. Control, trustworthiness, and collaboration beliefs emerge jointly as important and interrelated influencers tied to the SC. Contrary to conventional wisdom that focuses on features of the technology itself to gain user acceptance, this research encourages providers to emphasize the interpersonal elements of the service by providing control cues, raising social presence, and enhancing human trust mechanisms. AU - Wünderlich, Nancy AU - Wangenheim, Florian V AU - Bitner, Mary Jo ID - 5715 IS - 1 JF - Journal of Service Research KW - service technology KW - technology-mediated service KW - service counterpart KW - smart service KW - remote service KW - technology adoption TI - High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services. VL - 16 ER - TY - CONF AU - Yigitbas, Enes AU - Gerth, Christian AU - Sauer, Stefan ID - 5752 T2 - Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland TI - Konzeption modellbasierter Benutzungsschnittstellen für verteilte Selbstbedienungssysteme ER - TY - CONF AU - Menke, Peter AU - McCrae, John AU - Cimiano, Philipp ID - 6054 T2 - Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and linking lexicons, terminologies and other language data TI - Releasing multimodal data as Linguistic Linked Open Data: An experience report ER - TY - JOUR AU - Kabst, Rüdiger AU - Wehner, M C ID - 6101 IS - 4 JF - PERSONALquartely TI - Editorial: Internationales Personalmanagement: Den kulturellen Kontext gestalten VL - 65 ER - TY - CHAP AU - Weber, P AU - Kabst, Rüdiger ED - Hill, Hermann ID - 6147 T2 - Verwaltungskommunikation - Wissenschaftliche Analyse und praktische Beispiele TI - Unterstützung von Kommunalverwaltung bei Bürgerbeteiligung ER - TY - JOUR AU - Wex, Felix AU - Schryen, Guido ID - 6166 IS - 28 JF - Blick in die Wissenschaft TI - Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung ER - TY - CONF AU - Weber, H AU - Wehner, M AU - Kabst, Rüdiger ID - 6271 TI - Institutional Determinants of Work-Family Practices: An International Comparative Examination. ER - TY - CONF AU - Golubovic, S AU - Wehner, M AU - Baum, M AU - Kabst, Rüdiger ID - 6272 TI - HR-Praktiken und Innovation: Wie können Wissens- und Technologievorsprünge im Unternehmen generiert werden? ER - TY - CONF AU - Isidor, R AU - Wehner, M AU - Li, C AU - Kabst, Rüdiger ID - 6274 TI - Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany ER - TY - CHAP AU - Klompmaker, Florian AU - Paelke, Volker AU - Fischer, Holger Gerhard ID - 6276 SN - 0302-9743 T2 - Distributed, Ambient, and Pervasive Interactions TI - A Taxonomy-Based Approach towards NUI Interaction Design VL - 8028 ER - TY - CHAP AU - Fischer, Holger Gerhard AU - Strenge, Benjamin AU - Nebe, Karsten ID - 6279 SN - 0302-9743 T2 - Design, User Experience, and Usability. Design Philosophy, Methods, and Tools TI - Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design VL - 8012 ER - TY - CONF AU - Fischer, Holger Gerhard AU - Geis, Thomas AU - Molich, Rolf AU - Kluge, Oliver AU - Heimgärtner, Rüdiger AU - Hunkirchen, Peter ID - 6284 T2 - Jahresband Usability Professionals TI - Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA ER - TY - CHAP AU - Kremer, H.-Hugo ED - Feng, X. ED - Rützel, J. ED - Kremer, H.-H. ID - 6448 T2 - Standardization, professionalizationn and the measurements TI - Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen ER - TY - CHAP AU - Kremer, H.-Hugo ED - Feng, X. ED - Rützel, J. ED - Kremer, H.-H. ID - 6449 T2 - Standardization, professionalization and the measurements TI - Social Media: Potenziale und Herausforderungen für die berufliche Bildung ER - TY - CHAP AU - Kremer, H.-Hugo AU - Zoyke, A. ED - Niedermair, G. ID - 6450 T2 - Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven TI - Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs ER - TY - CHAP AU - Beutner, Marc AU - Kremer, H.-Hugo AU - Zoyke, A. ED - Seifried, J. ED - Wuttke, E. ID - 6452 T2 - Transitions in Vocational Education, Research in Vocational Education TI - Exploring Personalized Learning in the Context of the Transition System, vol. 2. Opladen ER - TY - CHAP AU - Kremer, H.-Hugo ED - Seufert, S. ED - Metzger, C. ID - 6454 T2 - Kompetenzentwicklung in unterschiedlichen Lernkulturen TI - Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung ER - TY - CHAP AU - Kremer, H.-Hugo ED - Beck, K. ED - Zlatkin-Troitschanskaia, O. ID - 6455 T2 - From Diagnostics to Learning Success. Proceedings in Vocational Education and Training TI - Social Media: Potentials and Challenges for Vocational Education ER - TY - JOUR AB - Kompetenzorientierung ist ein wichtiges aktuelles Ziel bei der Studienprogrammentwicklung. Allerdings ist die Umsetzung in der Praxis mit zwei wesentlichen Herausforderungen verbunden: So ist zum einen der Wechsel von disziplinären Inhalten hin zu Kompetenzen wenig intuitiv; zum anderen wird die Formulierung so genannter Learning Outcomes als administrative Übung betrachtet. An der Universität St. Gallen wurde ein systematischer Prozess für die Qualitätsentwicklung der Studienprogramme eingeführt. Im Beitrag wird dieser Prozess im Hinblick auf die Kompetenzorientierung reflektiert. Es erscheint wesentlich, den Programmen möglichst viel Freiraum auf ihrem Weg zur Kompetenzorientierung zu überlassen und sie auf diese Weise zu unterstützen. AU - Brahm, Taiga AU - Jenert, Tobias ID - 4427 IS - 1 JF - Zeitschrift für Hochschulentwicklung KW - Kompetenzorientierung KW - Studienprogrammentwicklung KW - Hochschulentwicklung KW - Hochschule KW - Learning Outcomes TI - Herausforderungen der Kompetenzorientierung in der Studienprogrammentwicklung VL - 8 ER - TY - JOUR AB - Die Auseinandersetzung mit Bildungstechnologien erfolgt häufig ausgehend von einem technologischen Trend bzw. einer Klasse innovativer Werkzeuge (bspw. mobile Technologien). Es geht dann darum, die Potenziale dieser Tools für das Lernen zu ergründen, also letztlich eine Passung zwischen den technologischen Möglichkeiten und pädagogisch-didaktischen Erfordernissen zu konstruieren. In diesem Beitrag kehren wir diese Perspektive um: Ausgehend von einer bestimmten pädagogischen Problemstellung - der Bearbeitung heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung - entwickeln wir unterschiedliche didaktische Handlungsoptionen. Am Ende entsteht ein Werkzeug, das sich in Design und Funktionsumfang auf den Kern der pädagogischen Zielsetzung beschränkt. AU - Jenert, Tobias AU - Brahm, Taiga ID - 4428 IS - 4 JF - Journal für LehrerInnenbildung KW - Portfolio KW - Lehrerbildung KW - Wirtschaftspädagogik SN - 1681-7028 TI - Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung VL - 13 ER - TY - CONF AB - The aim of this qualitative study is first to investigate the attitude development of students in their initial year at university. College effectiveness research has shown that attitudes towards studying as well as to one's university are key factors influencing student engagement. Up to now, little is known about the processes through which such attitudes develop. Based on the theory of planned behaviour (Ajzen & Fishbein, 1980), the study addresses this research gap in three parts: a) development paths of students' attitudes towards studying and the university; b) the normative behaviour of the fellow students as well as significant persons, c) university-related experiences during the first year influencing students' attitude development. To answer these research questions, a series of five interviews was conducted throughout the first year with a total of 13 first-year students at the University of St. Gallen/Switzerland. Data analysis was performed referring to the procedures suggested by Neale (2012) for qualitative longitudinal data. To master the challenge of displaying developments over time, graphical analysis was used to construct a case history (cf. Henderson, Holland et al., 2012) for each individual. Regarding the students' developments over time, the analysis shows the participants' attitudes towards the university became more differentiated over time. A second major result concerns frictions between students' own attitudes and what they perceive to be the dominant normative behaviour. It became obvious that this developmental process is influenced by concrete incidents students experience during the first year and thus, can be shaped by structural changes. AU - Jenert, Tobias AU - Brahm, Taiga ID - 4477 KW - student attitudes KW - qualitative research KW - longitudinal study KW - student motivation TI - How Business Students Attitudes towards their University and Studying Develop during the First Year: A Qualitative Longitudinal Study ER - TY - CONF AB - The purpose of the research was to develop and validate an instrument for the assessment of attitudes towards the study environment in higher education contexts. The questionnaire is designed to measure students' attitudes towards two particular objects: the university (or Higher Education Institution) and the process of studying. Five studies at two different universities were conducted to develop and validate the Attitudes towards the Study Environment Questionnaire (ASEQ). In total, 1640 students filled in the questionnaire. Reliability tests and exploratory factor analysis as well as confirmatory factor analysis showed satisfactory psychometric characteristics of the ASEQ. Each part of the questionnaire is internally consistent and construct validity of the scales is supported by correlations with other constructs as assumed by current theories: Positive attitudinal constructs (normative behavior, autonomy, joy, self-efficacy, and task value) are positively related to intrinsic motivation and the expected study performance while anxiety is negatively related to these constructs. Since attitudes towards the study situation are connected to student engagement and motivation, the study contributes to the theory of student learning by providing a validated instrument to assess attitudes. Thus, the ASEQ can support further research on student performance and development by providing an instrument for the hitherto neglected but nonetheless extremely relevant domain of attitudes. Also, the questionnaire can be used as a diagnostic instrument for higher education faculty and administration to trace students' attitudinal development over time - a factor of prime importance for student socialization during the introductory phase of studying. AU - Brahm, Taiga AU - Jenert, Tobias AU - Euler, Dieter ID - 4478 KW - attitudes KW - teaching and learning KW - studying KW - higher education institution KW - theory of planned behavior KW - instrument development TI - On the assessment of attitudes towards the study process and the university: Attitudes towards the Study Environment Questionnaire (ASEQ) ER - TY - CONF AB - The proposed paper aims to investigate the longitudinal development of students' motivation over the first year of their studies at a business school by using latent growth curve modeling. The study tackles the following core research questions: How do first-year university students' intrinsic and extrinsic vary over time? Which (motivational) factors are related to students' motivational development? Although motivational dispositions have been analyzed extensively in previous studies, their longitudinal development has hitherto not been examined in the higher education context. This longitudinal study is conducted at the University of St. Gallen in Switzerland. The current sample includes 280 first-year students who have been surveyed three times and who are representative of the first-year student population. Descriptive results show that prior to their studies, students were motivated most by intrinsic factors, however, extrinsic motivation was also quite high. Employing latent growth curve modeling, it could be shown that both intrinsic and extrinsic motivation decline significantly over the course of the first year (8 months). The study contributes to motivation theory by providing further insights into the development of academic motivation over time. Latent growth curve modeling as a method can be well used for longitudinal data analysis, thus, excluding measurement error from longitudinal data. Furthermore, the study supports educational developers by determining factors influencing students' motivational development. AU - Brahm, Taiga AU - Jenert, Tobias ID - 4480 KW - motivation KW - intrinsic motivation KW - extrinsic motivation KW - latent growth curve modeling KW - longitudinal data analysis KW - ASEQ KW - higher education KW - studying TI - A latent growth curve analysis of Business students' intrinsic and extrinsic motivation ER - TY - CONF AB - Die vorliegende Untersuchung an der Universität St. Gallen soll Erkenntnisse über die Verläufe der Einstellungsveränderungen der Studierenden geben (vgl. Brahm & Jenert, 2012). Basierend auf der Theorie des geplanten Verhaltens (Ajzen & Fishbein, 1980) werden drei Forschungsfragen adressiert: (1) Gibt es typische Pfade der Einstellungsentwicklung? (2) Wie wird das normative Verhalten von Mitstudierenden und anderen Personen wahrgenommen? (3) Welche Erfahrungen beeinflussen die Entwicklung? Zur Beantwortung dieser Fragen wurde über das erste Studienjahr hinweg eine Interviewserie mit 13 Studierenden durchgeführt. Die Datenanalyse mithilfe grafischer Case Histories zeigt, dass die Einstellungen der Probanden über die Zeit differenzierter werden. Zudem gibt es Widersprüche zwischen den Einstellungen und dem wahrgenommenen normativen Verhalten. Dabei ist die Einstellungsentwicklung von konkreten Ereignissen geprägt und kann damit durch strukturelle Interventionen beeinflusst werden. AU - Jenert, Tobias AU - Brahm, Taiga ID - 4481 KW - student attitudes KW - theory of planned behaviour KW - Einstellungsentwicklung KW - student motivation TI - Die Entwicklung studien-und hochschulbezogener Einstellungen an einer Wirtschaftsuniversität: eine qualitative Längsschnittstudie ER - TY - CHAP AU - Jenert, Tobias AU - Brahm , Taiga ED - Spiekermann, Annette ID - 4509 SN - 978-3-7639-5194-9 T2 - Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis TI - Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen VL - 124 ER - TY - CHAP AU - Jenert, Tobias AU - Gebhardt , Anja ED - Seuffert, Sabine ED - Metzger, Christoph ID - 4510 SN - 1613-0677 T2 - Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag TI - Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm ER - TY - JOUR AU - Feng, Yuanhua AU - Guo, Zhichao AU - Peitz, Christian ID - 4596 IS - 2 JF - Journal of Industry, Competition and Trade SN - 1566-1679 TI - A Tree-form Constant Market Share Model for Growth Causes in International Trade Based on Multi-level Classification VL - 14 ER - TY - JOUR AU - Guo, Zhichao AU - Feng, Yuanhua ID - 4600 JF - Economic Modelling SN - 0264-9993 TI - Modeling of the impact of the financial crisis and China's accession to WTO on China's exports to Germany VL - 31 ER - TY - BOOK AU - Beran, Jan AU - Feng, Yuanhua AU - Ghosh, Sucharita AU - Kulik, Rafal ID - 4628 SN - 9783642355110 TI - Long-Memory Processes ER - TY - GEN AU - Feng, Yuanhua AU - Sun, Lixin ID - 4657 TI - A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets ER - TY - GEN AU - Feng, Yuanhua ID - 4658 TI - Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects ER - TY - CONF AB - Runtime monitoring aims at ensuring program safety by monitoring the program's behaviour during execution and taking appropriate action before a program violates some property.Runtime monitoring is in particular important when an exhaustive formal verification fails. While the approach allows for a safe execution of programs, it may impose a significant runtime overhead.In this paper, we propose a novel technique combining verification and monitoring which incurs no overhead during runtime at all. The technique proceeds by using the inconclusive result of a verification run as the basis for transforming the program into one where all potential points of failure are replaced by HALT statements. The new program is safe by construction, behaviourally equivalent to the original program (except for unsafe behaviour),and has the same performance characteristics. AU - Wonisch, Daniel AU - Schremmer, Alexander AU - Wehrheim, Heike ID - 469 T2 - Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM) TI - Zero Overhead Runtime Monitoring ER - TY - CONF AU - Gregor, Shirley AU - Müller, Oliver AU - Seidel, Stefan ID - 4698 KW - Abstraction KW - Affordances KW - Design Science Research KW - Design Theory KW - Information Systems Development KW - Reflection KW - Theorizing T2 - European Conference on Information Systems TI - Reflection, abstraction and theorizing in design and development research ER - TY - JOUR AU - Becker, Jörg AU - Beverungen, Daniel AU - Knackstedt, Ralf AU - Matzner, Martin AU - Müller, Oliver AU - Pöppelbuss, Jens ID - 4699 IS - 1 JF - Scandinavian Journal of Information Systems KW - Business process management KW - Conceptual modeling KW - Interaction routines KW - Modular design KW - Service networks KW - Social construction SN - 09050167 TI - Designing interaction routines in service networks: A modularity and social construction-based approach ER - TY - CONF AB - In OpenFlow [1], multiple switches share the same control plane which is centralized atwhat is called the OpenFlow controller. A switch only consists of a forwarding plane. Rules for forwarding individual packets (called ow entries in OpenFlow) are pushed from the controller to the switches. In a network with a high arrival rate of new ows, such as in a data center, the control trac between the switch and controller can become very high. As a consequence, routing of new ows will be slow. One way to reduce control trac is to use wildcarded ow entries. Wildcard ow entries can be used to create default routes in the network. However, since switches do not keep track of ows covered by a wildcard ow entry, the controller no longer has knowledge about individual ows. To nd out about these individual ows we propose an extension to the current OpenFlow standard to enable packet sampling of wildcard ow entries. AU - Wette, Philip AU - Karl, Holger ID - 470 T2 - Proceedings of the ACM SIGCOMM '13 TI - Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow ER - TY - JOUR AU - Becker, Jorg AU - Beverungen, Daniel AU - Knackstedt, Ralf AU - Matzner, Martin AU - Müller, Oliver AU - Pöppelbuss, Jens ID - 4700 IS - 3 JF - IEEE Transactions on Engineering Management KW - Action research KW - boundary spanning KW - business process management (BPM) KW - service blueprinting KW - service networks SN - 00189391 TI - Bridging the gap between manufacturing and service through IT-based boundary objects ER - TY - GEN AU - Tezer, Alina ID - 471 TI - Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen ER - TY - GEN AU - Engelbrecht, Marco ID - 472 TI - Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern ER - TY - CONF AB - We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party - in contrast to most related work on privacy-preserving DRM - is based on a re-encryption scheme that runs on any mobile Android device. Only a minor security-critical part needs to be performed on the device's smartcard which could, for instance, be a SIM card. AU - Petrlic, Ronald AU - Sekula, Stephan ED - Wang, Lingyu ED - Shafiq, Basit ID - 473 T2 - Data and Applications Security and Privacy XXVII TI - Unlinkable content playbacks in a multiparty DRM system ER - TY - GEN AB - Suppose some individuals are allowed to engage in different groups at the same time and they generate a certain welfare by cooperation. Finding appropriate ways for distributing this welfare is a non-trivial issue. The purpose of this work is to analyze two-stage allocation procedures where first each group receives a share of the welfare which is then, subsequently, distributed among the corresponding members. To study these procedures in a structured way, cooperative games and network games are combined in a general framework by using mathematical hypergraphs. Moreover, several convincing requirements on allocation procedures are discussed and formalized. Thereby it will be shown, for example, that the Position Value and iteratively applying the Myerson Value can be characterized by similar axiomatizations. AU - Röhl, Nils ID - 474 TI - Two-Stage Allocation Procedures ER - TY - CONF AB - We propose a privacy-preserving digital rights management scheme for (future) cloud computing. Users buy software from software providers and execute it at computing centers. Our solution allows software providers to provide different license models, like execute at most n-times models. Users’ anonymity and unlinkability of actions are preserved and thus, profile building is not even possible under (a) pseudonym. Privacy protection in the honest-but-curious model is achieved by combining ring signatures with an anonymous recipient scheme.We employ secret sharing in a unique manner that allows the software provider to expose the user’s identity if the user commits fraud, e.g. by exceeding the execution limit n. AU - Joshi, Nakul AU - Petrlic, Ronald ID - 475 T2 - Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC) TI - Towards practical privacy-preserving Digital Rights Management for Cloud Computing ER - TY - JOUR AB - An elementary h-route ow, for an integer h 1, is a set of h edge- disjoint paths between a source and a sink, each path carrying a unit of ow, and an h-route ow is a non-negative linear combination of elementary h-routeows. An h-route cut is a set of edges whose removal decreases the maximum h-route ow between a given source-sink pair (or between every source-sink pair in the multicommodity setting) to zero. The main result of this paper is an approximate duality theorem for multicommodity h-route cuts and ows, for h 3: The size of a minimum h-route cut is at least f=h and at most O(log4 k f) where f is the size of the maximum h-routeow and k is the number of commodities. The main step towards the proof of this duality is the design and analysis of a polynomial-time approximation algorithm for the minimum h-route cut problem for h = 3 that has an approximation ratio of O(log4 k). Previously, polylogarithmic approximation was known only for h-route cuts for h 2. A key ingredient of our algorithm is a novel rounding technique that we call multilevel ball-growing. Though the proof of the duality relies on this algorithm, it is not a straightforward corollary of it as in the case of classical multicommodity ows and cuts. Similar results are shown also for the sparsest multiroute cut problem. AU - Kolman, Petr AU - Scheideler, Christian ID - 476 IS - 2 JF - Theory of Computing Systems TI - Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing ER - TY - CONF AB - We consider the k-token dissemination problem, where k initially arbitrarily distributed tokens have to be disseminated to all nodes in a dynamic network (as introduced by Kuhn et al., STOC 2010). In contrast to general dynamic networks, our dynamic networks are unit disk graphs, i.e., nodes are embedded into the Euclidean plane and two nodes are connected if and only if their distance is at most R. Our worst-case adversary is allowed to move the nodes on the plane, but the maximum velocity v_max of each node is limited and the graph must be connected in each round. For this model, we provide almost tight lower and upper bounds for k-token dissemination if nodes are restricted to send only one token per round. It turns out that the maximum velocity v_max is a meaningful parameter to characterize dynamics in our model. AU - Abshoff, Sebastian AU - Benter, Markus AU - Cord-Landwehr, Andreas AU - Malatyali, Manuel AU - Meyer auf der Heide, Friedhelm ID - 477 T2 - Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers TI - Token Dissemination in Geometric Dynamic Networks ER - TY - THES AB - Software systems are playing an increasing role in our everyday life, and as the amount of software applications grows, so does their complexity and the relevance of their computations. Software components can be found in many systems that are charged with safety-critical tasks, such as control systems for aviation or power plants. Hence, software verification techniques that are capable of proving the absence of critical errors are becoming more and more important in the field software engineering. A well-established approach to software verification is model checking. Applying this technique involves an exhaustive exploration of a state space model corresponding to the system under consideration. The major challenge in model checking is the so-called state explosion problem: The state space of a software system grows exponentially with its size. Thus, the straightforward modelling of real-life systems practically impossible. A common approach to this problem is the application of abstraction techniques, which reduce the original state space by mapping it on a significantly smaller abstract one. Abstraction inherently involves a loss of information, and thus, the resulting abstract model may be too imprecise for a definite result in verification. Therefore, abstraction is typically combined with abstraction refinement: An initially very coarse abstract model is iteratively refined, i.e. enriched with new details about the original system, until a level of abstraction is reached that is precise enough for a definite outcome. Abstraction refinement-based model checking is fully automatable and it is considered as one of the most promising approaches to the state explosion problem in verification. However, it is still faced with a number of challenges. There exist several types of abstraction techniques and not every type is equally well-suited for all kinds of systems and verification tasks. Moreover, the selection of adequate refinement steps is nontrivial and typically the most crucial part of the overall approach: Unfavourable refinement decisions can compromise the state space-reducing effect of abstraction, and as a consequence, can easily lead to the failure of verification. It is, however, hard to predict which refinement steps will eventually be expedient for verification – and which not. AU - Timm, Nils ID - 478 TI - Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems ER - TY - JOUR AB - Although of considerable practical importance, the separate impact of individual and collective reputation on firm performance (e.g. product prices) has not yet been convincingly demonstrated. We use a sample of some 70 different wineries offering more than 1,300 different Riesling wines from the Mosel valley to isolate the returns to individual reputation (measured by expert ratings in a highly respected wine guide) from the returns to collective reputation (measured by membership in two different professional associations where members are assumed to monitor each other very closely). We find that both effects are statistically significant and economically relevant with the latter being more important in quantitative terms than the former. AU - Frick, Bernd AU - Simmons, Robert ID - 480 IS - 2 JF - Journal of Business Economics TI - The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley VL - 83 ER - TY - CONF AB - Cloud computing offers high availability, dynamic scalability, and elasticity requiring only very little administration. However, this service comes with financial costs. Peer-to-peer systems, in contrast, operate at very low costs but cannot match the quality of service of the cloud. This paper focuses on the case study of Wikipedia and presents an approach to reduce the operational costs of hosting similar websites in the cloud by using a practical peer-to-peer approach. The visitors of the site are joining a Chord overlay, which acts as first cache for article lookups. Simulation results show, that up to 72% of the article lookups in Wikipedia could be answered by other visitors instead of using the cloud. AU - Graffi, Kalman AU - Bremer, Lars ID - 481 T2 - Proceedings of the International Conference on Communications (ICC'13) TI - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case ER - TY - GEN AU - Bieshaar, Maarten ID - 482 TI - Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen ER - TY - CONF AB - Modern software systems adapt themselves to changing environments, to meet quality-of-service requirements, such as response time limits. The engineering of the system’s self-adaptation logic does not only require new modeling methods, but also new analyzes of transient phases. Model-driven software performance engineering methods already allow design-time analysis of steady states of non-adaptive system models. In order to validate requirements for transient phases, new modeling and analysis methods are needed. In this paper, we present SimuLizar, our initial model-driven approach to model self-adaptive systems and analyze the performance of their transient phases. Our evaluation of a load balancer toy example shows the applicability of our modeling approach. Additionally, a comparison of our performance analysis with a prototypical implementation of our example system shows that the prediction accuracy is sufficient to identify unsatisfactory self-adaptations. AU - Becker, Matthias AU - Becker, Steffen AU - Meyer, Joachim ID - 483 T2 - Proceedings of the Software Engineering Conference (SE) TI - SimuLizar: Design-Time modeling and Performance Analysis of Self-Adaptive Systems ER - TY - CONF AB - One of the main ideas of Service-Oriented Computing (SOC) is the delivery of flexibly composable services provided on world-wide markets. For a successful service discovery,service requests have to be matched with the available service offers. However, in a situation in which no service that completely matches the request can be discovered, the customer may tolerate slight discrepancies between request and offer. Some existing fuzzy matching approaches are able to detectsuch service variants, but they do not allow to explicitly specify which parts of a request are not mandatory. In this paper, we improve an existing service matching approach based onVisual Contracts leveraging our preliminary work of design pattern detection. Thereby, we support explicit specifications of service variants and realize gradual matching results that can be ranked in order to discover the service offer that matches a customer’s request best. AU - Platenius, Marie Christin AU - von Detten, Markus AU - Gerth, Christian AU - Schäfer, Wilhelm AU - Engels, Gregor ID - 484 T2 - IEEE 20th International Conference on Web Services (ICWS 2013) TI - Service Matching under Consideration of Explicitly Specified Service Variants ER - TY - CONF AB - Software composition has been studied as a subject of state based planning for decades. Existing composition approaches that are efficient enough to be used in practice are limited to sequential arrangements of software components. This restriction dramatically reduces the number of composition problems that can be solved. However, there are many composition problems that could be solved by existing approaches if they had a possibility to combine components in very simple non-sequential ways. To this end, we present an approach that arranges not only basic components but also composite components. Composite components enhance the structure of the composition by conditional control flows. Through algorithms that are written by experts, composite components are automatically generated before the composition process starts. Therefore, our approach is not a substitute for existing composition algorithms but complements them with a preprocessing step. We verified the validity of our approach through implementation of the presented algorithms. AU - Mohr, Felix AU - Kleine Büning, Hans ID - 485 T2 - Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS) TI - Semi-Automated Software Composition Through Generated Components ER - TY - JOUR AU - Garnefeld, Ina AU - Eggert, Andreas AU - Helm, Sabrina V AU - Tax, Stephen S ID - 4851 IS - 4 JF - Journal of Marketing TI - Growing existing customers' revenue streams through customer referral programs ER - TY - JOUR AU - Haas, Alexander AU - Eggert, Andreas AU - Terho, Harri AU - Ulaga, Wolfgang ID - 4852 IS - 4 JF - Marketing Review St. Gallen TI - Erfolgsfaktor Value-Based Selling—Verkaufen, wenn Kundenorientierung nicht zum Erfolg führt ER - TY - GEN AU - Otte, Oliver ID - 486 TI - Seitenkanalresistenz paarungsbasierter Kryptographie ER - TY - GEN AU - Bobolz, Jan ID - 487 TI - Security Proofs for Pairing-Based Cryptography in the Generic Group Model ER - TY - CONF AB - Unattended systems are key ingredients of various critical infrastruc-tures like networks of self service terminals or automated teller machines.For cost and efficiency reasons they should mostly run autonomously.Unattended systems are attractive and lucrative targets for various kindsof attacks, including attacks on the integrity of their components and thecommunication between components. In this paper, we propose a gen-eral cryptographic framework to protect unattended systems. We alsodemonstrate that instantiating the framework with techniques from iden-tity based cryptography is particularly well-suited to efficiently secureunattended systems. AU - Blömer, Johannes AU - Günther, Peter AU - Krummel, Volker ID - 488 T2 - Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) TI - Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study ER - TY - JOUR AU - St{\, Susi AU - Fahr, Rene ID - 4880 IS - 19 JF - Applied Economics TI - Individual determinants of work attendance: Evidence on the role of personality ER - TY - GEN AU - Knopf, Michael ID - 489 TI - Scheduling Variants with Speed-Scaling via the Primal-Dual Approach ER - TY - GEN AU - Wallaschek, Felix ID - 490 TI - Routing in heterogenen OpenFlow Netzwerken ER - TY - BOOK AU - Zimmermann, Klaus F AU - Bauer, Thomas K AU - Bonin, Holger AU - Fahr, Rene AU - Hinte, Holger ID - 4911 TI - Arbeitskräftebedarf bei hoher Arbeitslosigkeit: ein ökonomisches Zuwanderungskonzept für Deutschland ER - TY - GEN AU - Mir Djawadi, Behnud AU - Fahr, Rene ID - 4915 TI - The impact of risk perception and risk attitudes on corrupt behavior: Evidence from a petty corruption experiment ER - TY - GEN AU - Djawadi, Behnud Mir AU - Fahr, Rene ID - 4917 TI - The impact of tax knowledge and budget spending influence on tax compliance ER - TY - GEN AU - Robbert, Christoph ID - 492 TI - Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case ER - TY - GEN AU - Terentjew, Artjom ID - 493 TI - Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen ER - TY - THES AB - The maintenance of component-based software systems requires up-to-date models of their concrete architecture, i.e. the architecture that is realised in the source code. These models help in systematically planning, analysing and executing typical reengineering activities. Often no or only outdated architectural models of such systems exist. Therefore, various reverse engineering methods have been developed which try to recover a system's components, subsystems and connectors. However, these reverse engineering methods are severely impacted by design deciencies in the system's code base, especially violations of the component encapsulation. As long as design deciencies are not considered in the reverse engineering process, they reduce the quality of the recovered component structures. Despite this impact of design deciencies, no existing architecture reconstruction approach explicitly integrates a systematic deciency detection and removal into the recovery process. Therefore, I have developed Archimetrix. Archimetrix is a tool-supported architecture reconstruction process. It enhances a clustering-based architecture recovery approach with an extensible, pattern-based deciency detection. After the detection of deciencies, Archimetrix supports the software architect in removing the de ciencies and provides the means to preview the architectural consequences of such a removal. I also provide a process to identify and formalise additional deciencies. I validated the approach on three case studies which show that Archimetrix is able to identify relevant deciencies and that the removal of these deciencies leads to an increased quality of the recovered architectures, i.e. they are closer to the corresponding conceptual architectures. AU - von Detten, Markus ID - 494 TI - Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies ER - TY - CONF AB - Automated service composition has been studied as a subject of state based planning for a decade. A great deal of service composition tasks can only be solved if concrete output values of the services are considered in the composition process. However, the fact that those values are not known before runtime leads to nondeterministic planning problems, which have proven to be notoriously difficult in practical automated service composition applications. Even though this problem is frequently recognized, it has still received remarkably few attention and remains unsolved.This paper shows how nondeterminism in automated service composition can be reduced. We introduce context rules as a means to derive semantic knowledge from output values of services. These rules enable us to replace nondeterministic composition operations by less nondeterministic or even completely deterministic ones. We show the validity of our solutions not only theoretically but also have evaluated them practically through implementation. AU - Mohr, Felix AU - Lettmann, Theodor AU - Kleine Büning, Hans ID - 495 T2 - Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA) TI - Reducing Nondeterminism in Automated Service Composition ER - TY - CONF AB - Within reactive topology control, a node determines its adjacent edges of a network subgraph without prior knowledge of its neighborhood. The goal is to construct a local view on a topology which provides certain desired properties such as planarity. During algorithm execution, a node, in general, is not allowed to determine all its neighbors of the network graph. There are well-known reactive algorithms for computing planar subgraphs. However, the subgraphs obtained do not have constant Euclidean spanning ratio. This means that routing along these subgraphs may result in potentially long detours. So far, it has been unknown if planar spanners can be constructed reactively. In this work, we show that at least under the unit disk network model, this is indeed possible, by proposing an algorithm for reactive construction of the partial Delaunay triangulation, which recently turned out to be a spanner. Furthermore, we show that our algorithm is message-optimal as a node will only exchange messages with nodes that are also neighbors in the spanner. The algorithm’s presentation is complemented by a rigorous proof of correctness. AU - Benter, Markus AU - Neumann, Florentin AU - Frey, Hannes ID - 496 T2 - Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM) TI - Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks ER - TY - CONF AB - Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space. AU - Wonisch, Daniel AU - Schremmer, Alexander AU - Wehrheim, Heike ID - 498 T2 - Proceedings of the 25th International Conference on Computer Aided Verification (CAV) TI - Programs from Proofs – A PCC Alternative ER - TY - CONF AB - We present a new online algorithm for profit-oriented scheduling on multiple speed-scalable processors.Moreover, we provide a tight analysis of the algorithm's competitiveness.Our results generalize and improve upon work by \citet{Chan:2010}, which considers a single speed-scalable processor.Using significantly different techniques, we can not only extend their model to multiprocessors but also prove an enhanced and tight competitive ratio for our algorithm.In our scheduling problem, jobs arrive over time and are preemptable.They have different workloads, values, and deadlines.The scheduler may decide not to finish a job but instead to suffer a loss equaling the job's value.However, to process a job's workload until its deadline the scheduler must invest a certain amount of energy.The cost of a schedule is the sum of lost values and invested energy.In order to finish a job the scheduler has to determine which processors to use and set their speeds accordingly.A processor's energy consumption is power $\Power{s}$ integrated over time, where $\Power{s}=s^{\alpha}$ is the power consumption when running at speed $s$.Since we consider the online variant of the problem, the scheduler has no knowledge about future jobs.This problem was introduced by~\citet{Chan:2010} for the case of a single processor.They presented an online algorithm which is $\alpha^{\alpha}+2e\alpha$-competitive.We provide an online algorithm for the case of multiple processors with an improved competitive ratio of $\alpha^{\alpha}$. AU - Kling, Peter AU - Pietrzyk, Peter ID - 499 T2 - Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) TI - Profitable Scheduling on Multiple Speed-Scalable Processors ER - TY - CONF AU - Oertel, Simon AU - Thommes, Kirsten AU - Walgenbach, Peter ID - 4991 IS - 1 T2 - Academy of Management Proceedings TI - Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations ER - TY - CONF AU - Thommes, Kirsten AU - Akkerman, Agnes AU - Vyrastekova, Jana ID - 4992 IS - 1 T2 - Academy of Management Proceedings TI - The after effects of strikes on team collaboration-experimental evidence ER - TY - BOOK ED - Beutner, Marc ED - Kremer, H.-Hugo ED - Wirth, W. ID - 6984 TI - Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug ER - TY - JOUR AU - Kremer, H.-Hugo AU - Fischer, M. AU - Tramm, T. ID - 6985 IS - 24 JF - bwp@ Berufs- und Wirtschaftspädagogik - online TI - Didaktik beruflicher Bildung ER - TY - BOOK ED - Feng, X. ED - Rützel, J. ED - Kremer, H.-Hugo ID - 6986 TI - Standardization, professionalization and the measurements ER - TY - JOUR AU - Lo, Fang-Yuh AU - Guo, Jhong-Yu AU - Huang, Cheng-De AU - Chou, Kai-Chieh AU - Liu, Hsiang-Lin AU - Ney, Verena AU - Ney, Andreas AU - Chern, Ming-Yau AU - Shvarkov, Stepan AU - Reuter, Dirk AU - Wieck, Andreas D. AU - Pezzagna, Sébastien AU - Massies, Jean ID - 7236 JF - Current Applied Physics SN - 1567-1739 TI - Evidences of defect contribution in magnetically ordered Sm-implanted GaN VL - 14 ER - TY - JOUR AU - Steinhoff, A. AU - Kurtze, H. AU - Gartner, P. AU - Florian, M. AU - Reuter, Dirk AU - Wieck, A. D. AU - Bayer, M. AU - Jahnke, F. ID - 7239 IS - 20 JF - Physical Review B SN - 1098-0121 TI - Combined influence of Coulomb interaction and polarons on the carrier dynamics in InGaAs quantum dots VL - 88 ER - TY - JOUR AU - Henn, T. AU - Kiessling, T. AU - Ossau, W. AU - Molenkamp, L. W. AU - Reuter, Dirk AU - Wieck, A. D. ID - 7240 IS - 19 JF - Physical Review B SN - 1098-0121 TI - Picosecond real-space imaging of electron spin diffusion in GaAs VL - 88 ER - TY - JOUR AU - Henn, T. AU - Heckel, A. AU - Beck, M. AU - Kiessling, T. AU - Ossau, W. AU - Molenkamp, L. W. AU - Reuter, Dirk AU - Wieck, A. D. ID - 7258 IS - 8 JF - Physical Review B SN - 1098-0121 TI - Hot carrier effects on the magneto-optical detection of electron spins in GaAs VL - 88 ER - TY - JOUR AU - Buß, J. H. AU - Rudolph, J. AU - Shvarkov, S. AU - Semond, F. AU - Reuter, Dirk AU - Wieck, A. D. AU - Hägele, D. ID - 7259 IS - 9 JF - Applied Physics Letters SN - 0003-6951 TI - Magneto-optical studies of Gd-implanted GaN: No spin alignment of conduction band electrons VL - 103 ER - TY - JOUR AU - Carrad, D J AU - Burke, A M AU - Reece, P J AU - Lyttleton, R W AU - Waddington, D E J AU - Rai, A AU - Reuter, Dirk AU - Wieck, A D AU - Micolich, A P ID - 7260 IS - 32 JF - Journal of Physics: Condensed Matter SN - 0953-8984 TI - The effect of (NH4)2Sxpassivation on the (311)A GaAs surface and its use in AlGaAs/GaAs heterostructure devices VL - 25 ER - TY - JOUR AU - Höpfner, Henning AU - Fritsche, Carola AU - Ludwig, Arne AU - Ludwig, Astrid AU - Stromberg, Frank AU - Wende, Heiko AU - Keune, Werner AU - Reuter, Dirk AU - Wieck, Andreas D. AU - Gerhardt, Nils C. AU - Hofmann, Martin R. ID - 7261 IS - 9 JF - physica status solidi (c) SN - 1862-6351 TI - Spin relaxation length in quantum dot spin LEDs VL - 10 ER -