@phdthesis{24751, abstract = {{Das Thema der vorliegenden Dissertation ist die "Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren". Über eine definierte Qualitätsprozesskette werden sämtliche, auf die Produktqualität relevanten Einflussparameter, bestimmt und berücksichtigt. Unterschiedliche Methoden zur Materialcharakterisierung des pulverförmigen Ausgangsmaterials werden analysiert und bewertet. Rheologische sowie chemische Eigenschaften, aber auch die Partikelgrößenverteilung oder die Schüttdichte werden hinsichtlich Relevanz, Einfluss und Anwenderfreundlichkeit untersucht. Das Ziel ist eine sinnvolle Bestimmung des Ausgangszustandes des Pulvers anhand definierter, relevanter Materialeigenschaften, um reproduzierbare technische Bauteileigenschaften zu gewährleisten. Dazu werden mechanische, dynamisch-mechanische, physikalische, elektrische, thermische sowie chemische Untersuchungen durchgeführt und hinsichtlich wichtiger Einflussparameter evaluiert. Die Bestimmung erfolgt über entwickelte Referenzjobs, in denen die hauptsächlichen Einflussfaktoren auf das Polymer-Lasersinterverfahren entlang der Qualitätsprozesskette berücksichtigt werden. Die charakterisierten Daten dienen zur Auslegung eines fiktiven Produktes aus der Luftfahrtindustrie. Mit Hilfe dieser Methoden lassen sich Materialkennwerte für diverse Simulationstools eindeutig bestimmen um eine realitätsnahe Berechnung zu gewährleisten. }}, author = {{Rüsenberg, Stefan}}, keywords = {{Additive Fertigung, Polymere, Lasersintern, Methode, Qualität, Konstruktion, Eigenschaften, Material, Charakterisierung, Qualifizierung}}, pages = {{242}}, publisher = {{Shaker Verlag GmbH}}, title = {{{Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren}}}, volume = {{Band, 2}}, year = {{2015}}, } @inproceedings{248, author = {{John, Thomas}}, booktitle = {{AIS SIGPRAG Pre-ICIS Workshop: Practice-based Design and Innovation of Digital Artifacts}}, location = {{Fort Worth, USA}}, title = {{{Supporting Business Model Idea Generation Through Machine-generated Ideas - Towards a Design Theory}}}, year = {{2015}}, } @techreport{249, abstract = {{We analyze the stability of networks when two intermediaries strategically form costly links to customers. We interpret these links as customer relationships that enable trade to sell a product. Equilibrium prices and equilibrium quantities on the output as well as on the input market are determined endogenously for a given network of customer relationships. We investigate in how far the substitutability of the intermediaries' products and the costs of link formation influence the intermediaries' equilibrium profits and thus have an impact on the incentives to strategically form relationships to customers. For networks with three customers we characterize locally stable networks, in particular existence is guaranteed for any degree of substitutability. Moreover for the special cases of perfect complements, independent products and perfect substitutes, local stability coincides with the stronger concept of Nash stability. Additionally, for networks with n customers we analyze stability regions for selected networks and determine their limits when n goes to infinity. It turns out that the shape of the stability regions for those networks does not significantly change compared to a setting with a small number of customers. }}, author = {{Brangewitz, Sonja and Haake, Claus-Jochen and Möhlmeier, Philipp}}, publisher = {{Universität Paderborn}}, title = {{{Strategic Formation of Customer Relationship Networks}}}, volume = {{91}}, year = {{2015}}, } @inproceedings{250, abstract = {{Before execution, users should formally validate the correctness of software received from untrusted providers. To accelerate this validation, in the proof carrying code (PCC) paradigm the provider delivers the software together with a certificate, a formal proof of the software’s correctness. Thus, the user only checks if the attached certificate shows correctness of the delivered software.Recently, we introduced configurable program certification, a generic, PCC based framework supporting various software analyses and safety properties. Evaluation of our framework revealed that validation suffers from certificate reading. In this paper, we present two orthogonal approaches which improve certificate validation, both reducing the impact of certificate reading. The first approach reduces the certificate size, storing information only if it cannot easily be recomputed. The second approach partitions the certificate into independently checkable parts. The trick is to read parts of the certificate while already checking read parts. Our experiments show that validation highly benefits from our improvements.}}, author = {{Jakobs, Marie-Christine}}, booktitle = {{Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)}}, pages = {{159----174}}, title = {{{Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning}}}, doi = {{10.1007/978-3-319-22969-0_12}}, year = {{2015}}, } @inproceedings{25073, abstract = {{In this paper, we introduce an approach for combining embedded systems with Service-oriented Computing techniques based on a concrete application scenario from the robotics domain. Our proposed Service-oriented Architecture allows for incorporating computational expensive functionality as services into a distributed computing environment. Furthermore, our framework facilitates a seamless integration of embedded systems such as robots as service providers into the computing environment. The entire communication is based on so-called recipes, which can be interpreted as autonomous messages that contain all necessary information for executing compositions of services.}}, author = {{Jungmann, Alexander and Jatzkowski, Jan and Kleinjohann, Bernd}}, booktitle = {{Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)}}, publisher = {{Springer-Verlag}}, title = {{{Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study}}}, year = {{2015}}, } @inproceedings{25074, author = {{Jatzkowski, Jan and Kreutz, Marcio Eduardo and Rettberg, Achim}}, booktitle = {{Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)}}, publisher = {{Springer}}, title = {{{Hierarchical Multicore-Scheduling for Virtualization of Dependent Real-Time Systems}}}, year = {{2015}}, } @inproceedings{25075, author = {{Stahl, Katharina and Stöcklein, Jörg and Li, Silja}}, booktitle = {{Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015}}, editor = {{Shumaker, Randall and Lackey, Stephanie}}, location = {{Los Angeles, CA, USA, 2. - 7. Aug. 2015}}, pages = {{499--512}}, publisher = {{Springer International Publishing Switzerland}}, title = {{{Evaluation of Autonomous Approaches using Virtual Environments}}}, volume = {{ 9179}}, year = {{2015}}, } @inproceedings{25076, abstract = {{Automated service composition aims at automatically generating software solutions based on services to provide more complex functionality. In this paper, we give an initial overview about why adaptivity becomes increasingly important when aiming for automated composition of service functionality in dynamic and freely accessible environments such as service markets. We systematically derive dependencies among crucial processes such as service composition and service execution in a holistic view. Furthermore, we briefly discuss the influences and effects of changes in the environment according to the derived dependencies, and discuss possible future research directions.}}, author = {{Jungmann, Alexander}}, booktitle = {{Proceedings of the IEEE 11th World Congress on Services (SERVICES)}}, pages = {{329--332}}, publisher = {{IEEE Computer Society}}, title = {{{On Adaptivity for Automated Composition of Service Functionality}}}, year = {{2015}}, } @inproceedings{25080, abstract = {{ervices are self-contained and platform independent software components that aim at maximizing software reuse. The automated composition of services to a target software artifact has been tackled with many AI techniques, but existing approaches make unreasonably strong assumptions such as a predefined data flow, are limited to tiny problem sizes, ignore non-functional properties, or assume offline service repositories. This paper presents an algorithm that automatically composes services without making such assumptions. We employ a backward search algorithm that starts from an empty composition and prepends service calls to already discovered candidates until a solution is found. Available services are determined during the search process. We implemented our algorithm, performed an experimental evaluation, and compared it to other approaches.}}, author = {{Mohr, Felix and Jungmann, Alexander and Kleine Büning, Hans}}, booktitle = {{Proceedings of the 12th IEEE International Conference on Services Computing (SCC)}}, pages = {{57--64}}, publisher = {{ IEEE Computer Society}}, title = {{{Automated Online Service Composition}}}, year = {{2015}}, } @inproceedings{25082, author = {{Jatzkowski, Jan and Kreutz, Marcio Eduardo and Rettberg, Achim}}, booktitle = {{Proceedings of Electronic System Level Synthesis Conference (ESLsyn)}}, title = {{{Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-based Virtualization}}}, year = {{2015}}, }