[{"supervisor":[{"id":"464","full_name":"Schmid, Hans-Joachim","last_name":"Schmid","first_name":"Hans-Joachim"}],"author":[{"last_name":"Rüsenberg","full_name":"Rüsenberg, Stefan","first_name":"Stefan"}],"volume":"Band, 2","date_updated":"2022-01-06T06:56:33Z","main_file_link":[{"url":"https://www.shaker.de/de/content/catalogue/index.asp?lang=de&ID=8&ISBN=978-3-8440-3507-0&search=yes"}],"publication_status":"published","publication_identifier":{"unknown":["978-3-8440-3507-0"]},"citation":{"short":"S. Rüsenberg, Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren, Shaker Verlag GmbH, Düren, 2015.","bibtex":"@book{Rüsenberg_2015, place={Düren}, series={Forschungsberichte des Direct Manufacturing Research Centers}, title={Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren}, volume={Band, 2}, publisher={Shaker Verlag GmbH}, author={Rüsenberg, Stefan}, year={2015}, collection={Forschungsberichte des Direct Manufacturing Research Centers} }","mla":"Rüsenberg, Stefan. <i>Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren</i>. Shaker Verlag GmbH, 2015.","apa":"Rüsenberg, S. (2015). <i>Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren: Vol. Band, 2</i>. Shaker Verlag GmbH.","ama":"Rüsenberg S. <i>Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren</i>. Vol Band, 2. Shaker Verlag GmbH; 2015.","chicago":"Rüsenberg, Stefan. <i>Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren</i>. Vol. Band, 2. Forschungsberichte des Direct Manufacturing Research Centers. Düren: Shaker Verlag GmbH, 2015.","ieee":"S. Rüsenberg, <i>Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren</i>, vol. Band, 2. Düren: Shaker Verlag GmbH, 2015."},"page":"242","place":"Düren","user_id":"71545","series_title":"Forschungsberichte des Direct Manufacturing Research Centers","department":[{"_id":"150"},{"_id":"624"},{"_id":"219"}],"_id":"24751","type":"dissertation","status":"public","date_created":"2021-09-21T11:17:14Z","publisher":"Shaker Verlag GmbH","title":"Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren","year":"2015","language":[{"iso":"ger"}],"keyword":["Additive Fertigung","Polymere","Lasersintern","Methode","Qualität","Konstruktion","Eigenschaften","Material","Charakterisierung","Qualifizierung"],"abstract":[{"text":"Das Thema der vorliegenden Dissertation ist die \"Prozessqualifizierung zur verlässlichen Herstellung von Produkten im Polymer Lasersinterverfahren\". Über eine definierte Qualitätsprozesskette werden sämtliche, auf die Produktqualität relevanten Einflussparameter, bestimmt und berücksichtigt. Unterschiedliche Methoden zur Materialcharakterisierung des pulverförmigen Ausgangsmaterials werden analysiert und bewertet. Rheologische sowie chemische Eigenschaften, aber auch die Partikelgrößenverteilung oder die Schüttdichte werden hinsichtlich Relevanz, Einfluss und Anwenderfreundlichkeit untersucht. Das Ziel ist eine sinnvolle Bestimmung des Ausgangszustandes des Pulvers anhand definierter, relevanter Materialeigenschaften, um reproduzierbare technische Bauteileigenschaften zu gewährleisten. Dazu werden mechanische, dynamisch-mechanische, physikalische, elektrische, thermische sowie chemische Untersuchungen durchgeführt und hinsichtlich wichtiger Einflussparameter evaluiert. Die Bestimmung erfolgt über entwickelte Referenzjobs, in denen die hauptsächlichen Einflussfaktoren auf das Polymer-Lasersinterverfahren entlang der Qualitätsprozesskette berücksichtigt werden. Die charakterisierten Daten dienen zur Auslegung eines fiktiven Produktes aus der Luftfahrtindustrie. Mit Hilfe dieser Methoden lassen sich Materialkennwerte für diverse Simulationstools eindeutig bestimmen um eine realitätsnahe Berechnung zu gewährleisten. ","lang":"ger"}]},{"_id":"248","project":[{"name":"SFB 901","_id":"1"},{"_id":"17","name":"SFB 901 - Subprojekt C5"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"276"}],"user_id":"477","ddc":["000"],"file_date_updated":"2018-11-02T15:13:37Z","language":[{"iso":"eng"}],"publication":"AIS SIGPRAG Pre-ICIS Workshop: Practice-based Design and Innovation of Digital Artifacts","type":"conference_abstract","status":"public","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":652902,"file_id":"5295","file_name":"John-Supporting-Business-Model-Idea-Generation.pdf","access_level":"closed","date_updated":"2018-11-02T15:13:37Z","date_created":"2018-11-02T15:13:37Z","creator":"ups"}],"date_updated":"2022-01-06T06:56:36Z","author":[{"first_name":"Thomas","last_name":"John","full_name":"John, Thomas","id":"3952"}],"date_created":"2017-10-17T12:41:40Z","title":"Supporting Business Model Idea Generation Through Machine-generated Ideas - Towards a Design Theory","conference":{"name":"AIS SIGPRAG Pre-ICIS Workshop: Practice-based Design and Innovation of Digital Artifacts","location":"Fort Worth, USA"},"main_file_link":[{"url":"http://sigprag.net/workshop-programme/"}],"has_accepted_license":"1","year":"2015","citation":{"ama":"John T. Supporting Business Model Idea Generation Through Machine-generated Ideas - Towards a Design Theory. In: <i>AIS SIGPRAG Pre-ICIS Workshop: Practice-Based Design and Innovation of Digital Artifacts</i>. ; 2015.","chicago":"John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas - Towards a Design Theory.” In <i>AIS SIGPRAG Pre-ICIS Workshop: Practice-Based Design and Innovation of Digital Artifacts</i>, 2015.","ieee":"T. John, “Supporting Business Model Idea Generation Through Machine-generated Ideas - Towards a Design Theory,” in <i>AIS SIGPRAG Pre-ICIS Workshop: Practice-based Design and Innovation of Digital Artifacts</i>, Fort Worth, USA, 2015.","apa":"John, T. (2015). Supporting Business Model Idea Generation Through Machine-generated Ideas - Towards a Design Theory. In <i>AIS SIGPRAG Pre-ICIS Workshop: Practice-based Design and Innovation of Digital Artifacts</i>. Fort Worth, USA.","bibtex":"@inproceedings{John_2015, title={Supporting Business Model Idea Generation Through Machine-generated Ideas - Towards a Design Theory}, booktitle={AIS SIGPRAG Pre-ICIS Workshop: Practice-based Design and Innovation of Digital Artifacts}, author={John, Thomas}, year={2015} }","short":"T. John, in: AIS SIGPRAG Pre-ICIS Workshop: Practice-Based Design and Innovation of Digital Artifacts, 2015.","mla":"John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas - Towards a Design Theory.” <i>AIS SIGPRAG Pre-ICIS Workshop: Practice-Based Design and Innovation of Digital Artifacts</i>, 2015."}},{"type":"working_paper","urn":"2499","status":"public","_id":"249","project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"205"},{"_id":"475"}],"series_title":"Working Papers CIE","user_id":"65453","file_date_updated":"2018-08-09T09:13:36Z","has_accepted_license":"1","intvolume":"        91","citation":{"ama":"Brangewitz S, Haake C-J, Möhlmeier P. <i>Strategic Formation of Customer Relationship Networks</i>. Vol 91. Universität Paderborn; 2015.","ieee":"S. Brangewitz, C.-J. Haake, and P. Möhlmeier, <i>Strategic Formation of Customer Relationship Networks</i>, vol. 91. Universität Paderborn, 2015.","chicago":"Brangewitz, Sonja, Claus-Jochen Haake, and Philipp Möhlmeier. <i>Strategic Formation of Customer Relationship Networks</i>. Vol. 91. Working Papers CIE. Universität Paderborn, 2015.","apa":"Brangewitz, S., Haake, C.-J., &#38; Möhlmeier, P. (2015). <i>Strategic Formation of Customer Relationship Networks</i> (Vol. 91). Universität Paderborn.","short":"S. Brangewitz, C.-J. Haake, P. Möhlmeier, Strategic Formation of Customer Relationship Networks, Universität Paderborn, 2015.","bibtex":"@book{Brangewitz_Haake_Möhlmeier_2015, series={Working Papers CIE}, title={Strategic Formation of Customer Relationship Networks}, volume={91}, publisher={Universität Paderborn}, author={Brangewitz, Sonja and Haake, Claus-Jochen and Möhlmeier, Philipp}, year={2015}, collection={Working Papers CIE} }","mla":"Brangewitz, Sonja, et al. <i>Strategic Formation of Customer Relationship Networks</i>. Vol. 91, Universität Paderborn, 2015."},"date_updated":"2022-01-06T06:56:40Z","volume":91,"author":[{"full_name":"Brangewitz, Sonja","last_name":"Brangewitz","first_name":"Sonja"},{"first_name":"Claus-Jochen","id":"20801","full_name":"Haake, Claus-Jochen","last_name":"Haake"},{"full_name":"Möhlmeier, Philipp","last_name":"Möhlmeier","first_name":"Philipp"}],"abstract":[{"lang":"eng","text":"We analyze the stability of networks when two intermediaries strategically form costly links to customers. We interpret these links as customer relationships that enable trade to sell a product. Equilibrium prices and equilibrium quantities on the output as well as on the input market are determined endogenously for a given network of customer relationships. We investigate in how far the substitutability of the intermediaries' products and the costs of link formation influence the intermediaries' equilibrium profits and thus have an impact on the incentives to strategically form relationships to customers. For networks with three customers we characterize locally stable networks, in particular existence is guaranteed for any degree of substitutability. Moreover for the special cases of perfect complements, independent products and perfect substitutes, local stability coincides with the stronger concept of Nash stability. Additionally, for networks with n customers we analyze stability regions for selected networks and determine their limits when n goes to infinity. It turns out that the shape of the stability regions for those networks does not significantly change compared to a setting with a small number of customers. "}],"file":[{"date_created":"2018-08-09T09:10:34Z","creator":"cjhaake","date_updated":"2018-08-09T09:13:36Z","file_name":"WP - Strategic Formation of Customer Relationship Networks.pdf","file_id":"3865","access_level":"closed","file_size":908865,"title":"Strategic Formation of Customer Relationship Networks","content_type":"application/pdf","relation":"main_file"}],"ddc":["040"],"language":[{"iso":"eng"}],"year":"2015","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:40Z","title":"Strategic Formation of Customer Relationship Networks"},{"author":[{"full_name":"Jakobs, Marie-Christine","last_name":"Jakobs","first_name":"Marie-Christine"}],"date_updated":"2022-01-06T06:56:43Z","doi":"10.1007/978-3-319-22969-0_12","has_accepted_license":"1","page":"159--174","citation":{"apa":"Jakobs, M.-C. (2015). Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning. In <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i> (pp. 159--174). <a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">https://doi.org/10.1007/978-3-319-22969-0_12</a>","mla":"Jakobs, Marie-Christine. “Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning.” <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 2015, pp. 159--174, doi:<a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">10.1007/978-3-319-22969-0_12</a>.","bibtex":"@inproceedings{Jakobs_2015, series={LNCS}, title={Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">10.1007/978-3-319-22969-0_12</a>}, booktitle={Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)}, author={Jakobs, Marie-Christine}, year={2015}, pages={159--174}, collection={LNCS} }","short":"M.-C. Jakobs, in: Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM), 2015, pp. 159--174.","ama":"Jakobs M-C. Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning. In: <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i>. LNCS. ; 2015:159--174. doi:<a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">10.1007/978-3-319-22969-0_12</a>","chicago":"Jakobs, Marie-Christine. “Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning.” In <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 159--174. LNCS, 2015. <a href=\"https://doi.org/10.1007/978-3-319-22969-0_12\">https://doi.org/10.1007/978-3-319-22969-0_12</a>.","ieee":"M.-C. Jakobs, “Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning,” in <i>Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)</i>, 2015, pp. 159--174."},"department":[{"_id":"77"}],"series_title":"LNCS","user_id":"477","_id":"250","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"file_date_updated":"2018-03-21T09:45:15Z","type":"conference","status":"public","date_created":"2017-10-17T12:41:40Z","title":"Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning","year":"2015","language":[{"iso":"eng"}],"ddc":["040"],"publication":"Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM)","file":[{"creator":"florida","date_created":"2018-03-21T09:45:15Z","date_updated":"2018-03-21T09:45:15Z","access_level":"closed","file_name":"250-Jakobs2015.pdf","file_id":"1489","file_size":724308,"content_type":"application/pdf","relation":"main_file","success":1}],"abstract":[{"text":"Before execution, users should formally validate the correctness of software received from untrusted providers. To accelerate this validation, in the proof carrying code (PCC) paradigm the provider delivers the software together with a certificate, a formal proof of the software’s correctness. Thus, the user only checks if the attached certificate shows correctness of the delivered software.Recently, we introduced configurable program certification, a generic, PCC based framework supporting various software analyses and safety properties. Evaluation of our framework revealed that validation suffers from certificate reading. In this paper, we present two orthogonal approaches which improve certificate validation, both reducing the impact of certificate reading. The first approach reduces the certificate size, storing information only if it cannot easily be recomputed. The second approach partitions the certificate into independently checkable parts. The trick is to read parts of the certificate while already checking read parts. Our experiments show that validation highly benefits from our improvements.","lang":"eng"}]},{"user_id":"21240","department":[{"_id":"672"}],"_id":"25073","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)","status":"public","abstract":[{"text":"In this paper, we introduce an approach for combining embedded systems with Service-oriented Computing techniques based on a concrete application scenario from the robotics domain. Our proposed Service-oriented Architecture allows for incorporating computational expensive functionality as services into a distributed computing environment. Furthermore, our framework facilitates a seamless integration of embedded systems such as robots as service providers into the computing environment. The entire communication is based on so-called recipes, which can be interpreted as autonomous messages that contain all necessary information for executing compositions of services.","lang":"eng"}],"author":[{"first_name":"Alexander","last_name":"Jungmann","full_name":"Jungmann, Alexander"},{"first_name":"Jan","last_name":"Jatzkowski","full_name":"Jatzkowski, Jan"},{"first_name":"Bernd","last_name":"Kleinjohann","full_name":"Kleinjohann, Bernd"}],"date_created":"2021-09-28T11:42:10Z","publisher":"Springer-Verlag","date_updated":"2022-01-06T06:56:50Z","conference":{"start_date":"2015-11-03","end_date":"2015-11-06"},"title":"Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study","citation":{"apa":"Jungmann, A., Jatzkowski, J., &#38; Kleinjohann, B. (2015). Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study. <i>Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)</i>.","short":"A. Jungmann, J. Jatzkowski, B. Kleinjohann, in: Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS), Springer-Verlag, 2015.","bibtex":"@inproceedings{Jungmann_Jatzkowski_Kleinjohann_2015, title={Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study}, booktitle={Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)}, publisher={Springer-Verlag}, author={Jungmann, Alexander and Jatzkowski, Jan and Kleinjohann, Bernd}, year={2015} }","mla":"Jungmann, Alexander, et al. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” <i>Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)</i>, Springer-Verlag, 2015.","ieee":"A. Jungmann, J. Jatzkowski, and B. Kleinjohann, “Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study,” 2015.","chicago":"Jungmann, Alexander, Jan Jatzkowski, and Bernd Kleinjohann. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” In <i>Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)</i>. Springer-Verlag, 2015.","ama":"Jungmann A, Jatzkowski J, Kleinjohann B. Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study. In: <i>Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)</i>. Springer-Verlag; 2015."},"year":"2015"},{"publication":"Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)","type":"conference","status":"public","_id":"25074","department":[{"_id":"672"}],"user_id":"21240","language":[{"iso":"eng"}],"year":"2015","citation":{"short":"J. Jatzkowski, M.E. Kreutz, A. Rettberg, in: Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS), Springer, 2015.","bibtex":"@inproceedings{Jatzkowski_Kreutz_Rettberg_2015, title={Hierarchical Multicore-Scheduling for Virtualization of Dependent Real-Time Systems}, booktitle={Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)}, publisher={Springer}, author={Jatzkowski, Jan and Kreutz, Marcio Eduardo and Rettberg, Achim}, year={2015} }","mla":"Jatzkowski, Jan, et al. “Hierarchical Multicore-Scheduling for Virtualization of Dependent Real-Time Systems.” <i>Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)</i>, Springer, 2015.","apa":"Jatzkowski, J., Kreutz, M. E., &#38; Rettberg, A. (2015). Hierarchical Multicore-Scheduling for Virtualization of Dependent Real-Time Systems. <i>Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)</i>.","ama":"Jatzkowski J, Kreutz ME, Rettberg A. Hierarchical Multicore-Scheduling for Virtualization of Dependent Real-Time Systems. In: <i>Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)</i>. Springer; 2015.","chicago":"Jatzkowski, Jan, Marcio Eduardo Kreutz, and Achim Rettberg. “Hierarchical Multicore-Scheduling for Virtualization of Dependent Real-Time Systems.” In <i>Proceedings of the 5th IFIP International Embedded Systems Symposium (IESS)</i>. Springer, 2015.","ieee":"J. Jatzkowski, M. E. Kreutz, and A. Rettberg, “Hierarchical Multicore-Scheduling for Virtualization of Dependent Real-Time Systems,” 2015."},"publisher":"Springer","date_updated":"2022-01-06T06:56:50Z","author":[{"first_name":"Jan","last_name":"Jatzkowski","full_name":"Jatzkowski, Jan"},{"last_name":"Kreutz","full_name":"Kreutz, Marcio Eduardo","first_name":"Marcio Eduardo"},{"full_name":"Rettberg, Achim","last_name":"Rettberg","first_name":"Achim"}],"date_created":"2021-09-28T11:45:59Z","title":"Hierarchical Multicore-Scheduling for Virtualization of Dependent Real-Time Systems","conference":{"end_date":"2015-11-06","start_date":"2015-11-03"}},{"title":"Evaluation of Autonomous Approaches using Virtual Environments","conference":{"location":"Los Angeles, CA, USA, 2. - 7. Aug. 2015","end_date":"2015-08-07","start_date":"2015-08-02"},"date_updated":"2022-01-06T06:56:50Z","publisher":"Springer International Publishing Switzerland","author":[{"full_name":"Stahl, Katharina","last_name":"Stahl","first_name":"Katharina"},{"first_name":"Jörg","full_name":"Stöcklein, Jörg","last_name":"Stöcklein"},{"first_name":"Silja","last_name":"Li","full_name":"Li, Silja"}],"date_created":"2021-09-28T11:54:54Z","volume":" 9179","year":"2015","citation":{"apa":"Stahl, K., Stöcklein, J., &#38; Li, S. (2015). Evaluation of Autonomous Approaches using Virtual Environments. In R. Shumaker &#38; S. Lackey (Eds.), <i>Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015</i> (Vol. 9179, pp. 499–512). Springer International Publishing Switzerland.","mla":"Stahl, Katharina, et al. “Evaluation of Autonomous Approaches Using Virtual Environments.” <i>Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015</i>, edited by Randall Shumaker and Stephanie Lackey, vol. 9179, Springer International Publishing Switzerland, 2015, pp. 499–512.","bibtex":"@inproceedings{Stahl_Stöcklein_Li_2015, series={LNCS}, title={Evaluation of Autonomous Approaches using Virtual Environments}, volume={9179}, booktitle={Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015}, publisher={Springer International Publishing Switzerland}, author={Stahl, Katharina and Stöcklein, Jörg and Li, Silja}, editor={Shumaker, Randall and Lackey, Stephanie}, year={2015}, pages={499–512}, collection={LNCS} }","short":"K. Stahl, J. Stöcklein, S. Li, in: R. Shumaker, S. Lackey (Eds.), Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015, Springer International Publishing Switzerland, 2015, pp. 499–512.","ieee":"K. Stahl, J. Stöcklein, and S. Li, “Evaluation of Autonomous Approaches using Virtual Environments,” in <i>Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015</i>, Los Angeles, CA, USA, 2. - 7. Aug. 2015, 2015, vol. 9179, pp. 499–512.","chicago":"Stahl, Katharina, Jörg Stöcklein, and Silja Li. “Evaluation of Autonomous Approaches Using Virtual Environments.” In <i>Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015</i>, edited by Randall Shumaker and Stephanie Lackey, 9179:499–512. LNCS. Springer International Publishing Switzerland, 2015.","ama":"Stahl K, Stöcklein J, Li S. Evaluation of Autonomous Approaches using Virtual Environments. In: Shumaker R, Lackey S, eds. <i>Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015</i>. Vol 9179. LNCS. Springer International Publishing Switzerland; 2015:499-512."},"page":"499-512","language":[{"iso":"eng"}],"_id":"25075","user_id":"21240","series_title":"LNCS","department":[{"_id":"672"}],"editor":[{"last_name":"Shumaker","full_name":"Shumaker, Randall","first_name":"Randall"},{"first_name":"Stephanie","last_name":"Lackey","full_name":"Lackey, Stephanie"}],"status":"public","type":"conference","publication":"Virtual, Augmented and Mixed Reality VAMR 2015 Held as Part of HCI International 2015"},{"year":"2015","page":"329-332","citation":{"mla":"Jungmann, Alexander. “On Adaptivity for Automated Composition of Service Functionality.” <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>, IEEE Computer Society, 2015, pp. 329–32.","bibtex":"@inproceedings{Jungmann_2015, title={On Adaptivity for Automated Composition of Service Functionality}, booktitle={Proceedings of the IEEE 11th World Congress on Services (SERVICES)}, publisher={IEEE Computer Society}, author={Jungmann, Alexander}, year={2015}, pages={329–332} }","short":"A. Jungmann, in: Proceedings of the IEEE 11th World Congress on Services (SERVICES), IEEE Computer Society, 2015, pp. 329–332.","apa":"Jungmann, A. (2015). On Adaptivity for Automated Composition of Service Functionality. <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>, 329–332.","ieee":"A. Jungmann, “On Adaptivity for Automated Composition of Service Functionality,” in <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>, 2015, pp. 329–332.","chicago":"Jungmann, Alexander. “On Adaptivity for Automated Composition of Service Functionality.” In <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>, 329–32. IEEE Computer Society, 2015.","ama":"Jungmann A. On Adaptivity for Automated Composition of Service Functionality. In: <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>. IEEE Computer Society; 2015:329-332."},"date_updated":"2022-01-06T06:56:50Z","publisher":"IEEE Computer Society","author":[{"full_name":"Jungmann, Alexander","last_name":"Jungmann","first_name":"Alexander"}],"date_created":"2021-09-28T12:06:08Z","title":"On Adaptivity for Automated Composition of Service Functionality","conference":{"end_date":"2015-07-02","start_date":"2016-06-26"},"publication":"Proceedings of the IEEE 11th World Congress on Services (SERVICES)","type":"conference","abstract":[{"text":"Automated service composition aims at automatically generating software solutions based on services to provide more complex functionality. In this paper, we give an initial overview about why adaptivity becomes increasingly important when aiming for automated composition of service functionality in dynamic and freely accessible environments such as service markets. We systematically derive dependencies among crucial processes such as service composition and service execution in a holistic view. Furthermore, we briefly discuss the influences and effects of changes in the environment according to the derived dependencies, and discuss possible future research directions.","lang":"eng"}],"status":"public","_id":"25076","department":[{"_id":"672"}],"user_id":"21240","language":[{"iso":"eng"}]},{"status":"public","abstract":[{"lang":"eng","text":"ervices are self-contained and platform independent software components that aim at maximizing software reuse. The automated composition of services to a target software artifact has been tackled with many AI techniques, but existing approaches make unreasonably strong assumptions such as a predefined data flow, are limited to tiny problem sizes, ignore non-functional properties, or assume offline service repositories. This paper presents an algorithm that automatically composes services without making such assumptions. We employ a backward search algorithm that starts from an empty composition and prepends service calls to already discovered candidates until a solution is found. Available services are determined during the search process. We implemented our algorithm, performed an experimental evaluation, and compared it to other approaches."}],"type":"conference","publication":"Proceedings of the 12th IEEE International Conference on Services Computing (SCC)","language":[{"iso":"eng"}],"user_id":"21240","department":[{"_id":"672"}],"_id":"25080","citation":{"apa":"Mohr, F., Jungmann, A., &#38; Kleine Büning, H. (2015). Automated Online Service Composition. <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>, 57–64.","bibtex":"@inproceedings{Mohr_Jungmann_Kleine Büning_2015, title={Automated Online Service Composition}, booktitle={Proceedings of the 12th IEEE International Conference on Services Computing (SCC)}, publisher={ IEEE Computer Society}, author={Mohr, Felix and Jungmann, Alexander and Kleine Büning, Hans}, year={2015}, pages={57–64} }","short":"F. Mohr, A. Jungmann, H. Kleine Büning, in: Proceedings of the 12th IEEE International Conference on Services Computing (SCC),  IEEE Computer Society, 2015, pp. 57–64.","mla":"Mohr, Felix, et al. “Automated Online Service Composition.” <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>,  IEEE Computer Society, 2015, pp. 57–64.","ama":"Mohr F, Jungmann A, Kleine Büning H. Automated Online Service Composition. In: <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>.  IEEE Computer Society; 2015:57-64.","ieee":"F. Mohr, A. Jungmann, and H. Kleine Büning, “Automated Online Service Composition,” in <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>, 2015, pp. 57–64.","chicago":"Mohr, Felix, Alexander Jungmann, and Hans Kleine Büning. “Automated Online Service Composition.” In <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>, 57–64.  IEEE Computer Society, 2015."},"page":"57-64","year":"2015","conference":{"end_date":"2015-07-02","start_date":"2015-06-26"},"title":"Automated Online Service Composition","author":[{"first_name":"Felix","full_name":"Mohr, Felix","last_name":"Mohr"},{"last_name":"Jungmann","full_name":"Jungmann, Alexander","first_name":"Alexander"},{"first_name":"Hans","full_name":"Kleine Büning, Hans","last_name":"Kleine Büning"}],"date_created":"2021-09-28T12:27:27Z","publisher":" IEEE Computer Society","date_updated":"2022-01-06T06:56:50Z"},{"date_updated":"2022-01-06T06:56:50Z","author":[{"last_name":"Jatzkowski","full_name":"Jatzkowski, Jan","first_name":"Jan"},{"last_name":"Kreutz","full_name":"Kreutz, Marcio Eduardo","first_name":"Marcio Eduardo"},{"full_name":"Rettberg, Achim","last_name":"Rettberg","first_name":"Achim"}],"date_created":"2021-09-28T12:31:36Z","title":"Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-based Virtualization","conference":{"end_date":"2015-06-11","start_date":"2015-06-10"},"year":"2015","citation":{"apa":"Jatzkowski, J., Kreutz, M. E., &#38; Rettberg, A. (2015). Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-based Virtualization. <i>Proceedings of Electronic System Level Synthesis Conference (ESLsyn)</i>.","short":"J. Jatzkowski, M.E. Kreutz, A. Rettberg, in: Proceedings of Electronic System Level Synthesis Conference (ESLsyn), 2015.","mla":"Jatzkowski, Jan, et al. “Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-Based Virtualization.” <i>Proceedings of Electronic System Level Synthesis Conference (ESLsyn)</i>, 2015.","bibtex":"@inproceedings{Jatzkowski_Kreutz_Rettberg_2015, title={Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-based Virtualization}, booktitle={Proceedings of Electronic System Level Synthesis Conference (ESLsyn)}, author={Jatzkowski, Jan and Kreutz, Marcio Eduardo and Rettberg, Achim}, year={2015} }","ama":"Jatzkowski J, Kreutz ME, Rettberg A. Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-based Virtualization. In: <i>Proceedings of Electronic System Level Synthesis Conference (ESLsyn)</i>. ; 2015.","ieee":"J. Jatzkowski, M. E. Kreutz, and A. Rettberg, “Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-based Virtualization,” 2015.","chicago":"Jatzkowski, Jan, Marcio Eduardo Kreutz, and Achim Rettberg. “Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-Based Virtualization.” In <i>Proceedings of Electronic System Level Synthesis Conference (ESLsyn)</i>, 2015."},"_id":"25082","department":[{"_id":"672"}],"user_id":"21240","language":[{"iso":"eng"}],"publication":"Proceedings of Electronic System Level Synthesis Conference (ESLsyn)","type":"conference","status":"public"},{"_id":"25083","user_id":"21240","department":[{"_id":"672"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Mechatronics","status":"public","date_updated":"2022-01-06T06:56:50Z","publisher":"Elsevier","date_created":"2021-09-28T12:42:40Z","author":[{"first_name":"Jan","last_name":"Jatzkowski","full_name":"Jatzkowski, Jan"},{"full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann","first_name":"Bernd"}],"title":"Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems","conference":{"location":"Mai 2015"},"year":"2015","citation":{"apa":"Jatzkowski, J., &#38; Kleinjohann, B. (2015). Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems. <i>Mechatronics</i>.","mla":"Jatzkowski, Jan, and Bernd Kleinjohann. “Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems.” <i>Mechatronics</i>, Elsevier, 2015.","bibtex":"@inproceedings{Jatzkowski_Kleinjohann_2015, title={Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems}, booktitle={Mechatronics}, publisher={Elsevier}, author={Jatzkowski, Jan and Kleinjohann, Bernd}, year={2015} }","short":"J. Jatzkowski, B. Kleinjohann, in: Mechatronics, Elsevier, 2015.","ama":"Jatzkowski J, Kleinjohann B. Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems. In: <i>Mechatronics</i>. Elsevier; 2015.","chicago":"Jatzkowski, Jan, and Bernd Kleinjohann. “Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems.” In <i>Mechatronics</i>. Elsevier, 2015.","ieee":"J. Jatzkowski and B. Kleinjohann, “Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems,” Mai 2015, 2015."}},{"project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"251","user_id":"14052","department":[{"_id":"63"},{"_id":"541"}],"status":"public","type":"mastersthesis","title":"Solving the aggregated bandits problem","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:56:50Z","date_created":"2017-10-17T12:41:41Z","supervisor":[{"last_name":"Skopalik","full_name":"Skopalik, Alexander","id":"40384","first_name":"Alexander"}],"author":[{"first_name":"Karlson","last_name":"Pfannschmidt","full_name":"Pfannschmidt, Karlson"}],"year":"2015","citation":{"chicago":"Pfannschmidt, Karlson. <i>Solving the Aggregated Bandits Problem</i>. Universität Paderborn, 2015.","ieee":"K. Pfannschmidt, <i>Solving the aggregated bandits problem</i>. Universität Paderborn, 2015.","ama":"Pfannschmidt K. <i>Solving the Aggregated Bandits Problem</i>. Universität Paderborn; 2015.","bibtex":"@book{Pfannschmidt_2015, title={Solving the aggregated bandits problem}, publisher={Universität Paderborn}, author={Pfannschmidt, Karlson}, year={2015} }","short":"K. Pfannschmidt, Solving the Aggregated Bandits Problem, Universität Paderborn, 2015.","mla":"Pfannschmidt, Karlson. <i>Solving the Aggregated Bandits Problem</i>. Universität Paderborn, 2015.","apa":"Pfannschmidt, K. (2015). <i>Solving the aggregated bandits problem</i>. Universität Paderborn."}},{"abstract":[{"text":"On-the-fly composition of service-based software solutions is still a challenging task. Even more challenges emerge when facing automatic service composition in markets of composed services for end users. In this paper, we focus on the functional discrepancy between “what a user wants” specified in terms of a request and “what a user gets” when executing a composed service. To meet the challenge of functional discrepancy, we propose the combination of existing symbolic composition approaches with machine learning techniques. We developed a learning recommendation system that expands the capabilities of existing composition algorithms to facilitate adaptivity and consequently reduces functional discrepancy. As a representative of symbolic techniques, an Artificial Intelligence planning based approach produces solutions that are correct with respect to formal specifications. Our learning recommendation system supports the symbolic approach in decision-making. Reinforcement Learning techniques enable the recommendation system to adjust its recommendation strategy over time based on user ratings. We implemented the proposed functionality in terms of a prototypical composition framework. Preliminary results from experiments conducted in the image processing domain illustrate the benefit of combining both complementary techniques.","lang":"eng"}],"status":"public","type":"journal_article","publication":"Journal of Internet Services and Applications 6(1)","language":[{"iso":"eng"}],"_id":"25107","user_id":"21240","department":[{"_id":"672"}],"year":"2015","citation":{"chicago":"Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” <i>Journal of Internet Services and Applications 6(1)</i>, 2015, 1–18.","ieee":"A. Jungmann and F. Mohr, “An approach towards adaptive service composition in markets of composed services,” <i>Journal of Internet Services and Applications 6(1)</i>, pp. 1–18, 2015.","ama":"Jungmann A, Mohr F. An approach towards adaptive service composition in markets of composed services. <i>Journal of Internet Services and Applications 6(1)</i>. Published online 2015:1-18.","bibtex":"@article{Jungmann_Mohr_2015, title={An approach towards adaptive service composition in markets of composed services}, journal={Journal of Internet Services and Applications 6(1)}, author={Jungmann, Alexander and Mohr, Felix}, year={2015}, pages={1–18} }","short":"A. Jungmann, F. Mohr, Journal of Internet Services and Applications 6(1) (2015) 1–18.","mla":"Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” <i>Journal of Internet Services and Applications 6(1)</i>, 2015, pp. 1–18.","apa":"Jungmann, A., &#38; Mohr, F. (2015). An approach towards adaptive service composition in markets of composed services. <i>Journal of Internet Services and Applications 6(1)</i>, 1–18."},"page":"1-18","title":"An approach towards adaptive service composition in markets of composed services","date_updated":"2022-01-06T06:56:51Z","date_created":"2021-09-29T09:39:32Z","author":[{"last_name":"Jungmann","full_name":"Jungmann, Alexander","first_name":"Alexander"},{"first_name":"Felix","last_name":"Mohr","full_name":"Mohr, Felix"}]},{"abstract":[{"lang":"eng","text":"Autonomous adaptation in self-adapting embedded real-time systems introduces novel risks as it may lead to unforeseen system behavior. An anomaly detection framework integrated in a real-time operating system can ease the identification of such suspicious novel behavior and, thereby, offers the potential to enhance the reliability of the considered self-x system. However, anomaly detection is based on knowledge about normal behavior. When dealing with self-reconfiguring applications, normal behavior changes. Hence, knowledge base requires adaptation or even re-construction at runtime. The stringent restrictions of real-time systems considering runtime and memory consumption make this task to a really challenging problem. We present our idea for online construction of application behavior knowledge that does not rely on training phase. The applications' behavior is defined by the application's system call invocations. For the knowledge base, we exploit suffix trees as they offer potentials to represent application behavior patterns and associated information in a compact manner. The online algorithm provided by suffix trees is a basis to construct the knowledge base with low computational effort. Anomaly detection and classification is integrated into the online construction method. New behavioral patterns do not unconditionally update the behavior knowledge base. They are evaluated in a context-related manner inspired by Danger Theory, a special discipline of artificial immune systems. Copyright © 2015 John Wiley & Sons, Ltd."}],"status":"public","publication":"Concurrency and Computation: Practice and Experience ","type":"journal_article","language":[{"iso":"eng"}],"_id":"25108","department":[{"_id":"672"}],"user_id":"21240","year":"2015","citation":{"ama":"Rammig F-J, Stahl K. Online behavior classification for anomaly detection in self-x real-time systems. <i>Concurrency and Computation: Practice and Experience </i>. Published online 2015.","ieee":"F.-J. Rammig and K. Stahl, “Online behavior classification for anomaly detection in self-x real-time systems,” <i>Concurrency and Computation: Practice and Experience </i>, 2015.","chicago":"Rammig, Franz-Josef, and Katharina Stahl. “Online Behavior Classification for Anomaly Detection in Self-x Real-Time Systems.” <i>Concurrency and Computation: Practice and Experience </i>, 2015.","apa":"Rammig, F.-J., &#38; Stahl, K. (2015). Online behavior classification for anomaly detection in self-x real-time systems. <i>Concurrency and Computation: Practice and Experience </i>.","mla":"Rammig, Franz-Josef, and Katharina Stahl. “Online Behavior Classification for Anomaly Detection in Self-x Real-Time Systems.” <i>Concurrency and Computation: Practice and Experience </i>, 2015.","bibtex":"@article{Rammig_Stahl_2015, title={Online behavior classification for anomaly detection in self-x real-time systems}, journal={Concurrency and Computation: Practice and Experience }, author={Rammig, Franz-Josef and Stahl, Katharina}, year={2015} }","short":"F.-J. Rammig, K. Stahl, Concurrency and Computation: Practice and Experience  (2015)."},"title":"Online behavior classification for anomaly detection in self-x real-time systems","date_updated":"2022-01-06T06:56:51Z","date_created":"2021-09-29T09:43:32Z","author":[{"first_name":"Franz-Josef","last_name":"Rammig","full_name":"Rammig, Franz-Josef"},{"first_name":"Katharina","full_name":"Stahl, Katharina","last_name":"Stahl"}]},{"status":"public","citation":{"bibtex":"@article{Sudhakar_Zhao_Rammig_2015, title={Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System}, journal={Concurrency and Computation: Practice and Experience }, author={Sudhakar, Krishna and Zhao, Yuhong and Rammig, Franz-Josef}, year={2015} }","short":"K. Sudhakar, Y. Zhao, F.-J. Rammig, Concurrency and Computation: Practice and Experience  (2015).","mla":"Sudhakar, Krishna, et al. “Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System.” <i>Concurrency and Computation: Practice and Experience </i>, 2015.","apa":"Sudhakar, K., Zhao, Y., &#38; Rammig, F.-J. (2015). Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System. <i>Concurrency and Computation: Practice and Experience </i>.","ieee":"K. Sudhakar, Y. Zhao, and F.-J. Rammig, “Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System,” <i>Concurrency and Computation: Practice and Experience </i>, 2015.","chicago":"Sudhakar, Krishna, Yuhong Zhao, and Franz-Josef Rammig. “Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System.” <i>Concurrency and Computation: Practice and Experience </i>, 2015.","ama":"Sudhakar K, Zhao Y, Rammig F-J. Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System. <i>Concurrency and Computation: Practice and Experience </i>. Published online 2015."},"year":"2015","publication":"Concurrency and Computation: Practice and Experience ","type":"journal_article","language":[{"iso":"eng"}],"title":"Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System","department":[{"_id":"672"}],"user_id":"21240","date_created":"2021-09-29T09:53:25Z","author":[{"last_name":"Sudhakar","full_name":"Sudhakar, Krishna","first_name":"Krishna"},{"first_name":"Yuhong","full_name":"Zhao, Yuhong","last_name":"Zhao"},{"last_name":"Rammig","full_name":"Rammig, Franz-Josef","first_name":"Franz-Josef"}],"_id":"25109","date_updated":"2022-01-06T06:56:51Z"},{"department":[{"_id":"672"}],"user_id":"21240","_id":"25110","language":[{"iso":"eng"}],"publication":"Int. J. of Embedded Systems","type":"journal_article","status":"public","author":[{"first_name":"M. tech. Mabel Mary","full_name":"Joy, M. tech. Mabel Mary","last_name":"Joy"},{"first_name":"Franz-Josef","last_name":"Rammig","full_name":"Rammig, Franz-Josef"}],"date_created":"2021-09-29T09:55:59Z","date_updated":"2022-01-06T06:56:51Z","title":"A hybrid methodology to detect memory leaks in soft real time embedded systems software","citation":{"ieee":"M. tech. M. M. Joy and F.-J. Rammig, “A hybrid methodology to detect memory leaks in soft real time embedded systems software,” <i>Int. J. of Embedded Systems</i>, 2015.","chicago":"Joy, M. tech. Mabel Mary, and Franz-Josef Rammig. “A Hybrid Methodology to Detect Memory Leaks in Soft Real Time Embedded Systems Software.” <i>Int. J. of Embedded Systems</i>, 2015.","ama":"Joy M tech. MM, Rammig F-J. A hybrid methodology to detect memory leaks in soft real time embedded systems software. <i>Int J of Embedded Systems</i>. Published online 2015.","mla":"Joy, M. tech. Mabel Mary, and Franz-Josef Rammig. “A Hybrid Methodology to Detect Memory Leaks in Soft Real Time Embedded Systems Software.” <i>Int. J. of Embedded Systems</i>, 2015.","bibtex":"@article{Joy_Rammig_2015, title={A hybrid methodology to detect memory leaks in soft real time embedded systems software}, journal={Int. J. of Embedded Systems}, author={Joy, M. tech. Mabel Mary and Rammig, Franz-Josef}, year={2015} }","short":"M. tech. M.M. Joy, F.-J. Rammig, Int. J. of Embedded Systems (2015).","apa":"Joy, M. tech. M. M., &#38; Rammig, F.-J. (2015). A hybrid methodology to detect memory leaks in soft real time embedded systems software. <i>Int. J. of Embedded Systems</i>."},"year":"2015"},{"citation":{"apa":"Khaluf, Y., Birattari, M., &#38; Rammig, F.-J. (2015). Analysis of long-term swarm performance based on short-term experiments. <i>Springer Jounal Soft Computing </i>.","short":"Y. Khaluf, M. Birattari, F.-J. Rammig, Springer Jounal Soft Computing  (2015).","bibtex":"@article{Khaluf_Birattari_Rammig_2015, title={Analysis of long-term swarm performance based on short-term experiments}, journal={Springer Jounal Soft Computing }, author={Khaluf, Yara and Birattari, Mauro and Rammig, Franz-Josef}, year={2015} }","mla":"Khaluf, Yara, et al. “Analysis of Long-Term Swarm Performance Based on Short-Term Experiments.” <i>Springer Jounal Soft Computing </i>, 2015.","chicago":"Khaluf, Yara, Mauro Birattari, and Franz-Josef Rammig. “Analysis of Long-Term Swarm Performance Based on Short-Term Experiments.” <i>Springer Jounal Soft Computing </i>, 2015.","ieee":"Y. Khaluf, M. Birattari, and F.-J. Rammig, “Analysis of long-term swarm performance based on short-term experiments,” <i>Springer Jounal Soft Computing </i>, 2015.","ama":"Khaluf Y, Birattari M, Rammig F-J. Analysis of long-term swarm performance based on short-term experiments. <i>Springer Jounal Soft Computing </i>. Published online 2015."},"year":"2015","title":"Analysis of long-term swarm performance based on short-term experiments","date_created":"2021-09-29T09:58:49Z","author":[{"last_name":"Khaluf","full_name":"Khaluf, Yara","first_name":"Yara"},{"last_name":"Birattari","full_name":"Birattari, Mauro","first_name":"Mauro"},{"first_name":"Franz-Josef","last_name":"Rammig","full_name":"Rammig, Franz-Josef"}],"date_updated":"2022-01-06T06:56:51Z","status":"public","publication":"Springer Jounal Soft Computing ","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"672"}],"user_id":"21240","_id":"25111"},{"abstract":[{"text":"Video streaming is in high demand by mobile users. In cellular networks, however, the unreliable wireless channel leads to two major problems. Poor channel states degrade video quality and interrupt the playback when a user cannot sufficiently fill its local playout buffer: buffer underruns occur. In contrast, good channel conditions cause common greedy buffering schemes to buffer too much data. Such over-buffering wastes expensive wireless channel capacity. Assuming that we can anticipate future data rates, we plan the quality and download time of video segments ahead. This anticipatory download scheduling avoids buffer underruns by downloading a large number of segments before a drop in available data rate occurs, without wasting wireless capacity by excessive buffering.We developed a practical anticipatory scheduling algorithm for segmented video streaming protocols (e.g., HLS or MPEG DASH). Simulation results and testbed measurements show that our solution essentially eliminates playback interruptions without significantly decreasing video quality.","lang":"eng"}],"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"252-DBDVK15.pdf","access_level":"closed","file_id":"1488","file_size":587685,"creator":"florida","date_created":"2018-03-21T09:44:45Z","date_updated":"2018-03-21T09:44:45Z"}],"publication":"Proceedings of the 2nd International Conference on Networked Systems (NetSys)","type":"conference","ddc":["040"],"file_date_updated":"2018-03-21T09:44:45Z","_id":"252","department":[{"_id":"75"}],"user_id":"15572","year":"2015","page":"1--8","citation":{"ama":"Dräxler M, Blobel J, Dreimann P, Valentin S, Karl H. SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming. In: <i>Proceedings of the 2nd International Conference on Networked Systems (NetSys)</i>. ; 2015:1--8. doi:<a href=\"https://doi.org/10.1109/NetSys.2015.7089073\">10.1109/NetSys.2015.7089073</a>","ieee":"M. Dräxler, J. Blobel, P. Dreimann, S. Valentin, and H. Karl, “SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming,” in <i>Proceedings of the 2nd International Conference on Networked Systems (NetSys)</i>, 2015, pp. 1--8.","chicago":"Dräxler, Martin, Johannes Blobel, Philipp Dreimann, Stefan Valentin, and Holger Karl. “SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming.” In <i>Proceedings of the 2nd International Conference on Networked Systems (NetSys)</i>, 1--8, 2015. <a href=\"https://doi.org/10.1109/NetSys.2015.7089073\">https://doi.org/10.1109/NetSys.2015.7089073</a>.","mla":"Dräxler, Martin, et al. “SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming.” <i>Proceedings of the 2nd International Conference on Networked Systems (NetSys)</i>, 2015, pp. 1--8, doi:<a href=\"https://doi.org/10.1109/NetSys.2015.7089073\">10.1109/NetSys.2015.7089073</a>.","bibtex":"@inproceedings{Dräxler_Blobel_Dreimann_Valentin_Karl_2015, title={SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming}, DOI={<a href=\"https://doi.org/10.1109/NetSys.2015.7089073\">10.1109/NetSys.2015.7089073</a>}, booktitle={Proceedings of the 2nd International Conference on Networked Systems (NetSys)}, author={Dräxler, Martin and Blobel, Johannes and Dreimann, Philipp and Valentin, Stefan and Karl, Holger}, year={2015}, pages={1--8} }","short":"M. Dräxler, J. Blobel, P. Dreimann, S. Valentin, H. Karl, in: Proceedings of the 2nd International Conference on Networked Systems (NetSys), 2015, pp. 1--8.","apa":"Dräxler, M., Blobel, J., Dreimann, P., Valentin, S., &#38; Karl, H. (2015). SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming. In <i>Proceedings of the 2nd International Conference on Networked Systems (NetSys)</i> (pp. 1--8). <a href=\"https://doi.org/10.1109/NetSys.2015.7089073\">https://doi.org/10.1109/NetSys.2015.7089073</a>"},"has_accepted_license":"1","title":"SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming","doi":"10.1109/NetSys.2015.7089073","main_file_link":[{"url":"http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=7089073"}],"date_updated":"2022-01-06T06:56:55Z","author":[{"full_name":"Dräxler, Martin","last_name":"Dräxler","first_name":"Martin"},{"last_name":"Blobel","full_name":"Blobel, Johannes","first_name":"Johannes"},{"first_name":"Philipp","last_name":"Dreimann","full_name":"Dreimann, Philipp"},{"full_name":"Valentin, Stefan","last_name":"Valentin","first_name":"Stefan"},{"first_name":"Holger","full_name":"Karl, Holger","id":"126","last_name":"Karl"}],"date_created":"2017-10-17T12:41:41Z"},{"doi":"10.1007/978-3-319-32859-1_14","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"first_name":"Jakob","last_name":"Juhnke","id":"48090","full_name":"Juhnke, Jakob"},{"first_name":"Nils","full_name":"Löken, Nils","id":"13703","last_name":"Löken"}],"date_updated":"2022-01-06T06:59:07Z","page":"166-180","citation":{"ama":"Blömer J, Juhnke J, Löken N. Short Group Signatures with Distributed Traceability. In: <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. LNCS. ; 2015:166-180. doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">10.1007/978-3-319-32859-1_14</a>","ieee":"J. Blömer, J. Juhnke, and N. Löken, “Short Group Signatures with Distributed Traceability,” in <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2015, pp. 166–180.","chicago":"Blömer, Johannes, Jakob Juhnke, and Nils Löken. “Short Group Signatures with Distributed Traceability.” In <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 166–80. LNCS, 2015. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">https://doi.org/10.1007/978-3-319-32859-1_14</a>.","bibtex":"@inproceedings{Blömer_Juhnke_Löken_2015, series={LNCS}, title={Short Group Signatures with Distributed Traceability}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">10.1007/978-3-319-32859-1_14</a>}, booktitle={Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}, author={Blömer, Johannes and Juhnke, Jakob and Löken, Nils}, year={2015}, pages={166–180}, collection={LNCS} }","mla":"Blömer, Johannes, et al. “Short Group Signatures with Distributed Traceability.” <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2015, pp. 166–80, doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">10.1007/978-3-319-32859-1_14</a>.","short":"J. Blömer, J. Juhnke, N. Löken, in: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.","apa":"Blömer, J., Juhnke, J., &#38; Löken, N. (2015). Short Group Signatures with Distributed Traceability. In <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (pp. 166–180). <a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">https://doi.org/10.1007/978-3-319-32859-1_14</a>"},"related_material":{"record":[{"status":"public","id":"325","relation":"other"}]},"has_accepted_license":"1","file_date_updated":"2018-11-02T14:08:23Z","department":[{"_id":"64"}],"series_title":"LNCS","user_id":"13703","_id":"253","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"KogniHome - die mitdenkende Wohnung","_id":"44"}],"status":"public","type":"conference","title":"Short Group Signatures with Distributed Traceability","date_created":"2017-10-17T12:41:41Z","year":"2015","language":[{"iso":"eng"}],"ddc":["000"],"file":[{"date_updated":"2018-11-02T14:08:23Z","date_created":"2018-11-02T14:08:23Z","creator":"ups","file_size":262436,"file_name":"ShortGroupSignaturesWithDistri.pdf","file_id":"5262","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"lang":"eng","text":"Group signatures, introduced by Chaum and van Heyst [15], are an important primitive in cryptography. In group signature schemes every group member can anonymously sign messages on behalf of the group. In case of disputes a dedicated opening manager is able to trace signatures - he can extract the identity of the producer of a given signature. A formal model for static group signatures schemes and their security is defined by Bellare, Micciancio, and Warinschi [4], the case of dynamic groups is considered by Bellare, Shi, and Zhang [5]. Both models define group signature schemes with a single opening manager. The main difference between these models is that the number of group members in static schemes is fixed, while in dynamic schemes group members can join the group over time."}],"publication":"Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)"},{"status":"public","publication":"International Journal of Adhesion and Adhesives","type":"journal_article","language":[{"iso":"eng"}],"_id":"25312","department":[{"_id":"321"},{"_id":"301"}],"user_id":"32","year":"2015","page":"9-13","citation":{"apa":"Strube, O. I., Rüdiger, A. A., &#38; Bremser, W. (2015). Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein. <i>International Journal of Adhesion and Adhesives</i>, 9–13. <a href=\"https://doi.org/10.1016/j.ijadhadh.2015.08.001\">https://doi.org/10.1016/j.ijadhadh.2015.08.001</a>","mla":"Strube, Oliver I., et al. “Buildup of Biobased Adhesive Layers by Enzymatically Controlled Deposition on the Example of Casein.” <i>International Journal of Adhesion and Adhesives</i>, 2015, pp. 9–13, doi:<a href=\"https://doi.org/10.1016/j.ijadhadh.2015.08.001\">10.1016/j.ijadhadh.2015.08.001</a>.","short":"O.I. Strube, A.A. Rüdiger, W. Bremser, International Journal of Adhesion and Adhesives (2015) 9–13.","bibtex":"@article{Strube_Rüdiger_Bremser_2015, title={Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein}, DOI={<a href=\"https://doi.org/10.1016/j.ijadhadh.2015.08.001\">10.1016/j.ijadhadh.2015.08.001</a>}, journal={International Journal of Adhesion and Adhesives}, author={Strube, Oliver I. and Rüdiger, Arne A. and Bremser, Wolfgang}, year={2015}, pages={9–13} }","chicago":"Strube, Oliver I., Arne A. Rüdiger, and Wolfgang Bremser. “Buildup of Biobased Adhesive Layers by Enzymatically Controlled Deposition on the Example of Casein.” <i>International Journal of Adhesion and Adhesives</i>, 2015, 9–13. <a href=\"https://doi.org/10.1016/j.ijadhadh.2015.08.001\">https://doi.org/10.1016/j.ijadhadh.2015.08.001</a>.","ieee":"O. I. Strube, A. A. Rüdiger, and W. Bremser, “Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein,” <i>International Journal of Adhesion and Adhesives</i>, pp. 9–13, 2015, doi: <a href=\"https://doi.org/10.1016/j.ijadhadh.2015.08.001\">10.1016/j.ijadhadh.2015.08.001</a>.","ama":"Strube OI, Rüdiger AA, Bremser W. Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein. <i>International Journal of Adhesion and Adhesives</i>. Published online 2015:9-13. doi:<a href=\"https://doi.org/10.1016/j.ijadhadh.2015.08.001\">10.1016/j.ijadhadh.2015.08.001</a>"},"publication_identifier":{"issn":["0143-7496"]},"publication_status":"published","title":"Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein","doi":"10.1016/j.ijadhadh.2015.08.001","date_updated":"2022-01-06T06:57:00Z","date_created":"2021-10-04T13:39:25Z","author":[{"full_name":"Strube, Oliver I.","last_name":"Strube","first_name":"Oliver I."},{"first_name":"Arne A.","full_name":"Rüdiger, Arne A.","last_name":"Rüdiger"},{"full_name":"Bremser, Wolfgang","last_name":"Bremser","first_name":"Wolfgang"}]}]
