[{"date_updated":"2022-01-06T06:54:34Z","publisher":"Springer Berlin Heidelberg","author":[{"last_name":"Falzon","full_name":"Falzon, Kevin","first_name":"Kevin"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-12-14T14:20:20Z","title":"Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels","doi":"10.1007/978-3-662-49635-0_7","main_file_link":[{"url":"http://www.bodden.de/pubs/fb16mitigating.pdf"}],"publication_identifier":{"isbn":["978-3-662-49635-0"]},"place":"Berlin, Heidelberg","year":"2016","page":"116-138","citation":{"mla":"Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.” <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i>, edited by Frank Piessens and Luca Vigan’o, Springer Berlin Heidelberg, 2016, pp. 116–38, doi:<a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">10.1007/978-3-662-49635-0_7</a>.","bibtex":"@inproceedings{Falzon_Bodden_2016, place={Berlin, Heidelberg}, title={Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">10.1007/978-3-662-49635-0_7</a>}, booktitle={Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings}, publisher={Springer Berlin Heidelberg}, author={Falzon, Kevin and Bodden, Eric}, editor={Piessens, Frank and Vigan’o, Luca}, year={2016}, pages={116–138} }","short":"K. Falzon, E. Bodden, in: F. Piessens, L. Vigan’o (Eds.), Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg, 2016, pp. 116–138.","apa":"Falzon, K., &#38; Bodden, E. (2016). Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. In F. Piessens &#38; L. Vigan’o (Eds.), <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i> (pp. 116–138). Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">https://doi.org/10.1007/978-3-662-49635-0_7</a>","ama":"Falzon K, Bodden E. Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. In: Piessens F, Vigan’o L, eds. <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i>. Springer Berlin Heidelberg; 2016:116-138. doi:<a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">10.1007/978-3-662-49635-0_7</a>","ieee":"K. Falzon and E. Bodden, “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels,” in <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i>, 2016, pp. 116–138, doi: <a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">10.1007/978-3-662-49635-0_7</a>.","chicago":"Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.” In <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i>, edited by Frank Piessens and Luca Vigan’o, 116–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">https://doi.org/10.1007/978-3-662-49635-0_7</a>."},"_id":"20726","department":[{"_id":"76"}],"user_id":"5786","language":[{"iso":"eng"}],"publication":"Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings","type":"conference","editor":[{"full_name":"Piessens, Frank","last_name":"Piessens","first_name":"Frank"},{"first_name":"Luca","last_name":"Vigan'o","full_name":"Vigan'o, Luca"}],"status":"public"},{"author":[{"first_name":"Siegfried","last_name":"Rasthofer","full_name":"Rasthofer, Siegfried"},{"last_name":"Arzt","full_name":"Arzt, Steven","first_name":"Steven"},{"last_name":"Miltenberger","full_name":"Miltenberger, Marc","first_name":"Marc"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647"}],"date_created":"2020-12-14T14:21:41Z","date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://www.bodden.de/pubs/ssme16harvesting.pdf"}],"title":"Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques","citation":{"short":"S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed System Security Symposium (NDSS), 2016.","bibtex":"@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques}, booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016} }","mla":"Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” <i>Network and Distributed System Security Symposium (NDSS)</i>, 2016.","apa":"Rasthofer, S., Arzt, S., Miltenberger, M., &#38; Bodden, E. (2016). Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. <i>Network and Distributed System Security Symposium (NDSS)</i>.","ama":"Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In: <i>Network and Distributed System Security Symposium (NDSS)</i>. ; 2016.","ieee":"S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.","chicago":"Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” In <i>Network and Distributed System Security Symposium (NDSS)</i>, 2016."},"year":"2016","user_id":"5786","department":[{"_id":"76"}],"_id":"20727","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"type":"conference","publication":"Network and Distributed System Security Symposium (NDSS)","status":"public"},{"_id":"20728","department":[{"_id":"76"}],"user_id":"5786","keyword":["CROSSING","ITSECWEBSITE"],"language":[{"iso":"eng"}],"publication":"International Conference for Software Engineering (ICSE)","type":"conference","status":"public","date_updated":"2022-01-06T06:54:34Z","author":[{"full_name":"Nadi, Sarah","last_name":"Nadi","first_name":"Sarah"},{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"first_name":"Mira","last_name":"Mezini","full_name":"Mezini, Mira"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"date_created":"2020-12-14T14:22:36Z","title":"Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?","main_file_link":[{"url":"http://www.bodden.de/pubs/nkm+16jumping.pdf"}],"year":"2016","page":"935-946","citation":{"apa":"Nadi, S., Krüger, S., Mezini, M., &#38; Bodden, E. (2016). Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? <i>International Conference for Software Engineering (ICSE)</i>, 935–946.","mla":"Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” <i>International Conference for Software Engineering (ICSE)</i>, 2016, pp. 935–46.","short":"S. Nadi, S. Krüger, M. Mezini, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016, pp. 935–946.","bibtex":"@inproceedings{Nadi_Krüger_Mezini_Bodden_2016, title={Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?}, booktitle={International Conference for Software Engineering (ICSE)}, author={Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric}, year={2016}, pages={935–946} }","ama":"Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? In: <i>International Conference for Software Engineering (ICSE)</i>. ; 2016:935-946.","ieee":"S. Nadi, S. Krüger, M. Mezini, and E. Bodden, “Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?,” in <i>International Conference for Software Engineering (ICSE)</i>, 2016, pp. 935–946.","chicago":"Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” In <i>International Conference for Software Engineering (ICSE)</i>, 935–46, 2016."}},{"citation":{"ama":"Arzt S, Bodden E. StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. In: <i>International Conference for Software Engineering (ICSE)</i>. ; 2016.","chicago":"Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework.” In <i>International Conference for Software Engineering (ICSE)</i>, 2016.","ieee":"S. Arzt and E. Bodden, “StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework,” 2016.","apa":"Arzt, S., &#38; Bodden, E. (2016). StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. <i>International Conference for Software Engineering (ICSE)</i>.","mla":"Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework.” <i>International Conference for Software Engineering (ICSE)</i>, 2016.","short":"S. Arzt, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016.","bibtex":"@inproceedings{Arzt_Bodden_2016, title={StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework}, booktitle={International Conference for Software Engineering (ICSE)}, author={Arzt, Steven and Bodden, Eric}, year={2016} }"},"year":"2016","main_file_link":[{"url":"http://www.bodden.de/pubs/ab16stubdroid.pdf"}],"title":"StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework","author":[{"full_name":"Arzt, Steven","last_name":"Arzt","first_name":"Steven"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-12-14T14:23:29Z","date_updated":"2022-01-06T06:54:34Z","status":"public","type":"conference","publication":"International Conference for Software Engineering (ICSE)","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE"],"user_id":"5786","department":[{"_id":"76"}],"_id":"20729"},{"publication":"2016 49th Hawaii International Conference on System Sciences (HICSS)","type":"conference","status":"public","_id":"20730","department":[{"_id":"76"}],"user_id":"5786","language":[{"iso":"eng"}],"publication_identifier":{"issn":["1530-1605"]},"year":"2016","page":"3666-3675","citation":{"ama":"Eling N, Rasthofer S, Kolhagen M, Bodden E, Buxmann P. Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment. In: <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>. ; 2016:3666-3675. doi:<a href=\"https://doi.org/10.1109/HICSS.2016.458\">10.1109/HICSS.2016.458</a>","chicago":"Eling, N., S. Rasthofer, M. Kolhagen, Eric Bodden, and P. Buxmann. “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.” In <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 3666–75, 2016. <a href=\"https://doi.org/10.1109/HICSS.2016.458\">https://doi.org/10.1109/HICSS.2016.458</a>.","ieee":"N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, and P. Buxmann, “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment,” in <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 2016, pp. 3666–3675, doi: <a href=\"https://doi.org/10.1109/HICSS.2016.458\">10.1109/HICSS.2016.458</a>.","mla":"Eling, N., et al. “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.” <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 2016, pp. 3666–75, doi:<a href=\"https://doi.org/10.1109/HICSS.2016.458\">10.1109/HICSS.2016.458</a>.","bibtex":"@inproceedings{Eling_Rasthofer_Kolhagen_Bodden_Buxmann_2016, title={Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment}, DOI={<a href=\"https://doi.org/10.1109/HICSS.2016.458\">10.1109/HICSS.2016.458</a>}, booktitle={2016 49th Hawaii International Conference on System Sciences (HICSS)}, author={Eling, N. and Rasthofer, S. and Kolhagen, M. and Bodden, Eric and Buxmann, P.}, year={2016}, pages={3666–3675} }","short":"N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, P. Buxmann, in: 2016 49th Hawaii International Conference on System Sciences (HICSS), 2016, pp. 3666–3675.","apa":"Eling, N., Rasthofer, S., Kolhagen, M., Bodden, E., &#38; Buxmann, P. (2016). Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment. <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 3666–3675. <a href=\"https://doi.org/10.1109/HICSS.2016.458\">https://doi.org/10.1109/HICSS.2016.458</a>"},"date_updated":"2022-01-06T06:54:34Z","author":[{"full_name":"Eling, N.","last_name":"Eling","first_name":"N."},{"first_name":"S.","last_name":"Rasthofer","full_name":"Rasthofer, S."},{"first_name":"M.","full_name":"Kolhagen, M.","last_name":"Kolhagen"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647"},{"last_name":"Buxmann","full_name":"Buxmann, P.","first_name":"P."}],"date_created":"2020-12-14T14:24:12Z","title":"Investigating Users' Reaction to Fine-Grained Data Requests: A Market Experiment","doi":"10.1109/HICSS.2016.458","main_file_link":[{"url":"http://www.bodden.de/pubs/erk+15investigating.pdf"}]},{"date_updated":"2022-01-06T06:54:39Z","date_created":"2017-10-17T12:41:32Z","author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"title":"Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes","doi":"10.1007/978-3-319-29485-8_25","has_accepted_license":"1","year":"2016","page":"431-447","citation":{"chicago":"Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.” In <i>Proceedings of the CT-RSA 2016</i>, 431–47. LNCS, 2016. <a href=\"https://doi.org/10.1007/978-3-319-29485-8_25\">https://doi.org/10.1007/978-3-319-29485-8_25</a>.","ieee":"J. Blömer and G. Liske, “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes,” in <i>Proceedings of the CT-RSA 2016</i>, 2016, pp. 431–447.","ama":"Blömer J, Liske G. Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. In: <i>Proceedings of the CT-RSA 2016</i>. LNCS. ; 2016:431-447. doi:<a href=\"https://doi.org/10.1007/978-3-319-29485-8_25\">10.1007/978-3-319-29485-8_25</a>","apa":"Blömer, J., &#38; Liske, G. (2016). Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. In <i>Proceedings of the CT-RSA 2016</i> (pp. 431–447). <a href=\"https://doi.org/10.1007/978-3-319-29485-8_25\">https://doi.org/10.1007/978-3-319-29485-8_25</a>","mla":"Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.” <i>Proceedings of the CT-RSA 2016</i>, 2016, pp. 431–47, doi:<a href=\"https://doi.org/10.1007/978-3-319-29485-8_25\">10.1007/978-3-319-29485-8_25</a>.","bibtex":"@inproceedings{Blömer_Liske_2016, series={LNCS}, title={Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-29485-8_25\">10.1007/978-3-319-29485-8_25</a>}, booktitle={Proceedings of the CT-RSA 2016}, author={Blömer, Johannes and Liske, Gennadij}, year={2016}, pages={431–447}, collection={LNCS} }","short":"J. Blömer, G. Liske, in: Proceedings of the CT-RSA 2016, 2016, pp. 431–447."},"_id":"208","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"department":[{"_id":"64"}],"user_id":"477","series_title":"LNCS","ddc":["040"],"file_date_updated":"2018-03-21T10:43:36Z","publication":"Proceedings of the CT-RSA 2016","type":"conference","abstract":[{"text":"This paper presents a new framework for constructing fully CCA-secure predicate encryption schemes from pair encoding schemes. Our construction is the first in the context of predicate encryption which uses the technique of well-formedness proofs known from public key encryption. The resulting constructions are simpler and more efficient compared to the schemes achieved using known generic transformations from CPA-secure to CCA-secure schemes. The reduction costs of our framework are comparable to the reduction costs of the underlying CPA-secure framework. We achieve this last result by applying the dual system encryption methodology in a novel way.","lang":"eng"}],"status":"public","file":[{"file_name":"208-aCCA_P-KEM_final.pdf","access_level":"closed","file_id":"1521","file_size":462666,"creator":"florida","date_created":"2018-03-21T10:43:36Z","date_updated":"2018-03-21T10:43:36Z","relation":"main_file","success":1,"content_type":"application/pdf"}]},{"date_created":"2020-12-22T09:24:42Z","author":[{"first_name":"Stefan","full_name":"Dziwok, Stefan","id":"3901","orcid":"http://orcid.org/0000-0002-8679-6673","last_name":"Dziwok"},{"first_name":"Uwe","last_name":"Pohlmann","full_name":"Pohlmann, Uwe"},{"first_name":"Goran","full_name":"Piskachev, Goran","id":"41936","last_name":"Piskachev","orcid":"0000-0003-4424-5838"},{"first_name":"David","id":"9106","full_name":"Schubert, David","last_name":"Schubert"},{"full_name":"Thiele, Sebastian","last_name":"Thiele","first_name":"Sebastian"},{"full_name":"Gerking, Christopher","last_name":"Gerking","first_name":"Christopher"}],"date_updated":"2022-01-06T06:54:40Z","title":"The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling","citation":{"apa":"Dziwok, S., Pohlmann, U., Piskachev, G., Schubert, D., Thiele, S., &#38; Gerking, C. (2016). <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>.","bibtex":"@book{Dziwok_Pohlmann_Piskachev_Schubert_Thiele_Gerking_2016, place={Zukunftsmeile 1, 33102 Paderborn, Germany}, title={The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling}, author={Dziwok, Stefan and Pohlmann, Uwe and Piskachev, Goran and Schubert, David and Thiele, Sebastian and Gerking, Christopher}, year={2016} }","short":"S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, C. Gerking, The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling, Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.","mla":"Dziwok, Stefan, et al. <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>. 2016.","ama":"Dziwok S, Pohlmann U, Piskachev G, Schubert D, Thiele S, Gerking C. <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>.; 2016.","ieee":"S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, and C. Gerking, <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>. Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.","chicago":"Dziwok, Stefan, Uwe Pohlmann, Goran Piskachev, David Schubert, Sebastian Thiele, and Christopher Gerking. <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>. Zukunftsmeile 1, 33102 Paderborn, Germany, 2016."},"place":"Zukunftsmeile 1, 33102 Paderborn, Germany","year":"2016","department":[{"_id":"76"},{"_id":"241"}],"user_id":"5786","_id":"20822","language":[{"iso":"eng"}],"type":"report","status":"public","abstract":[{"lang":"eng","text":"Several examples of mechatronic systems can be found nowadays in modern cars, production systems, and medical technology. Day by day, the number of innovative functionalities in such mechatronic systems is increasing. These functionalities are realized with complex software. Such software exhibits hard real-time, safety requirements. The adherence to these requirements must be thoroughly analyzed and verified. Moreover, to obtain a significant increment in the reliability, performance, and efficiency of such software, it needs to maintain the self-adaptation of its properties. In order to develop such systems with a high quality and within a short time, we need a systematic and consistent design method. For this purpose, the software engineering group at the University of Paderborn and the Fraunhofer IEM in Paderborn propose the MechatronicUML method. This method provides a comprehensive model-driven process support, that starts from requirements and reaches the executable software after passing through several design and analysis steps. This process improves the comprehension during development and makes complex systems manageable. MechatronicUML emphasizes mainly on: (1) modeling and (formal) verification of reconfigurable software architectures, (2) the coordination among system components in such architectures, and (3) the integration of discrete software events with the continuous behavior of control devices."}]},{"_id":"20823","user_id":"5786","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"report","abstract":[{"lang":"eng","text":"In this technical report, we present the MechatronicUML requirements engineering method. The method encompasses a process and a scenario-based modeling language for the documentation and analysis of requirements on the message-based interaction behavior of software-intensive systems. The modeling language uses a scenario notation based on Modal Sequence Diagrams (MSDs), which borrows concepts of UML Interactions as well as of Live Sequence Charts. Furthermore, we introduce the so-called Emergency Braking & Evasion System (EBEAS) as a running example, which is based on current and upcoming real-world driver assistance systems. "}],"status":"public","date_updated":"2022-01-06T06:54:40Z","date_created":"2020-12-22T09:28:23Z","author":[{"first_name":"Jörg","id":"3875","full_name":"Holtmann, Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571"},{"full_name":"Fockel, Markus","id":"8472","last_name":"Fockel","orcid":"0000-0002-1269-0702","first_name":"Markus"},{"first_name":"Thorsten","full_name":"Koch, Thorsten","id":"13616","last_name":"Koch"},{"last_name":"Schmelter","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","id":"40982","first_name":"David"},{"first_name":"Christian","last_name":"Brenner","full_name":"Brenner, Christian"},{"first_name":"Ruslan","last_name":"Bernijazov","full_name":"Bernijazov, Ruslan"},{"first_name":"Marcel","full_name":"Sander, Marcel","last_name":"Sander"}],"title":"The MechatronicUML Requirements Engineering Method: Process and Language","doi":"10.13140/RG.2.2.33223.29606","year":"2016","citation":{"apa":"Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov, R., &#38; Sander, M. (2016). <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. <a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">https://doi.org/10.13140/RG.2.2.33223.29606</a>","mla":"Holtmann, Jörg, et al. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. 2016, doi:<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>.","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, C. Brenner, R. Bernijazov, M. Sander, The MechatronicUML Requirements Engineering Method: Process and Language, 2016.","bibtex":"@book{Holtmann_Fockel_Koch_Schmelter_Brenner_Bernijazov_Sander_2016, title={The MechatronicUML Requirements Engineering Method: Process and Language}, DOI={<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David and Brenner, Christian and Bernijazov, Ruslan and Sander, Marcel}, year={2016} }","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, David Schmelter, Christian Brenner, Ruslan Bernijazov, and Marcel Sander. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>, 2016. <a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">https://doi.org/10.13140/RG.2.2.33223.29606</a>.","ieee":"J. Holtmann <i>et al.</i>, <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. 2016.","ama":"Holtmann J, Fockel M, Koch T, et al. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>.; 2016. doi:<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>"}},{"type":"conference","publication":"Tagungsband Embedded Software Engineering Kongress 2016","status":"public","abstract":[{"lang":"ger","text":"Für die Ausführung der Software müssen die Softwarekomponenten auf ECUs verteilt werden. Dabei unterliegt die Verteilung sicherheitskritischen Constraints. Das Suchen der optimalen und gültigen Verteilung ist sehr komplex. Die Lösung kann effizient durch Verfahren des Operations Research ermittelt werden. Jedoch ist die manuelle Kodierung sehr aufwändig. Dieser Beitrag stellt eine modellgetriebene Methode und Werkzeugunterstützung vor, welche die Beschreibung von Constraints und Optimierungen vereinfacht sowie die formale Kodierung und Lösungssuche automatisiert. Dies erlaubt die effiziente Nutzung der Macht von formalen Modellen ohne Kenntnis der formalen mathematischen Verfahren. Die Vorteile der Methode werden anhand eines Beispiels aus der Automobilindustrie beschrieben. "}],"user_id":"15249","department":[{"_id":"241"}],"_id":"20824","language":[{"iso":"eng"}],"citation":{"apa":"Pohlmann, U., Holtmann, J., &#38; Meyer, M. (2016). Das Erwachen der Macht – Automatische Softwareverteilung. In <i>Tagungsband Embedded Software Engineering Kongress 2016</i> (pp. 587–592).","mla":"Pohlmann, Uwe, et al. “Das Erwachen Der Macht – Automatische Softwareverteilung.” <i>Tagungsband Embedded Software Engineering Kongress 2016</i>, 2016, pp. 587–92.","bibtex":"@inproceedings{Pohlmann_Holtmann_Meyer_2016, title={Das Erwachen der Macht – Automatische Softwareverteilung}, booktitle={Tagungsband Embedded Software Engineering Kongress 2016}, author={Pohlmann, Uwe and Holtmann, Jörg and Meyer, Matthias}, year={2016}, pages={587–592} }","short":"U. Pohlmann, J. Holtmann, M. Meyer, in: Tagungsband Embedded Software Engineering Kongress 2016, 2016, pp. 587–592.","ieee":"U. Pohlmann, J. Holtmann, and M. Meyer, “Das Erwachen der Macht – Automatische Softwareverteilung,” in <i>Tagungsband Embedded Software Engineering Kongress 2016</i>, 2016, pp. 587–592.","chicago":"Pohlmann, Uwe, Jörg Holtmann, and Matthias Meyer. “Das Erwachen Der Macht – Automatische Softwareverteilung.” In <i>Tagungsband Embedded Software Engineering Kongress 2016</i>, 587–92, 2016.","ama":"Pohlmann U, Holtmann J, Meyer M. Das Erwachen der Macht – Automatische Softwareverteilung. In: <i>Tagungsband Embedded Software Engineering Kongress 2016</i>. ; 2016:587-592."},"page":"587-592","year":"2016","date_created":"2020-12-22T09:30:16Z","author":[{"last_name":"Pohlmann","full_name":"Pohlmann, Uwe","first_name":"Uwe"},{"orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875","first_name":"Jörg"},{"last_name":"Meyer","full_name":"Meyer, Matthias","id":"683","first_name":"Matthias"}],"date_updated":"2022-01-06T06:54:40Z","title":"Das Erwachen der Macht – Automatische Softwareverteilung"},{"date_created":"2020-12-22T09:32:08Z","author":[{"last_name":"Greinert","full_name":"Greinert, Matthias","first_name":"Matthias"},{"last_name":"Tschirner","full_name":"Tschirner, Christian","first_name":"Christian"},{"first_name":"Jörg","full_name":"Holtmann, Jörg","id":"3875","orcid":"0000-0001-6141-4571","last_name":"Holtmann"}],"publisher":"Gesellschaft f{\\\"u}r Systems Engineering e.V.","date_updated":"2022-01-06T06:54:40Z","doi":"10.3139/9783446451414.008","title":"Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme","page":"77-86","citation":{"ama":"Greinert M, Tschirner C, Holtmann J. Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. In: <i>Tag Des Systems Engineering 2016</i>. Gesellschaft f{\\\"u}r Systems Engineering e.V.; 2016:77-86. doi:<a href=\"https://doi.org/10.3139/9783446451414.008\">10.3139/9783446451414.008</a>","chicago":"Greinert, Matthias, Christian Tschirner, and Jörg Holtmann. “Anwendung von Methoden Der Produktentstehung Auf Basis Des Systemmodells Mechatronischer Systeme.” In <i>Tag Des Systems Engineering 2016</i>, 77–86. Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016. <a href=\"https://doi.org/10.3139/9783446451414.008\">https://doi.org/10.3139/9783446451414.008</a>.","ieee":"M. Greinert, C. Tschirner, and J. Holtmann, “Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme,” in <i>Tag des Systems Engineering 2016</i>, 2016, pp. 77–86, doi: <a href=\"https://doi.org/10.3139/9783446451414.008\">10.3139/9783446451414.008</a>.","apa":"Greinert, M., Tschirner, C., &#38; Holtmann, J. (2016). Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. <i>Tag Des Systems Engineering 2016</i>, 77–86. <a href=\"https://doi.org/10.3139/9783446451414.008\">https://doi.org/10.3139/9783446451414.008</a>","mla":"Greinert, Matthias, et al. “Anwendung von Methoden Der Produktentstehung Auf Basis Des Systemmodells Mechatronischer Systeme.” <i>Tag Des Systems Engineering 2016</i>, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016, pp. 77–86, doi:<a href=\"https://doi.org/10.3139/9783446451414.008\">10.3139/9783446451414.008</a>.","short":"M. Greinert, C. Tschirner, J. Holtmann, in: Tag Des Systems Engineering 2016, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016, pp. 77–86.","bibtex":"@inproceedings{Greinert_Tschirner_Holtmann_2016, title={Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme}, DOI={<a href=\"https://doi.org/10.3139/9783446451414.008\">10.3139/9783446451414.008</a>}, booktitle={Tag des Systems Engineering 2016}, publisher={Gesellschaft f{\\\"u}r Systems Engineering e.V.}, author={Greinert, Matthias and Tschirner, Christian and Holtmann, Jörg}, year={2016}, pages={77–86} }"},"year":"2016","department":[{"_id":"76"}],"user_id":"5786","_id":"20825","language":[{"iso":"eng"}],"publication":"Tag des Systems Engineering 2016","type":"conference","status":"public","abstract":[{"text":"Das Systemmodell ist der Kern des Model-Based Systems Engineering (MBSE). Während jedoch im Systems Engineering dem Zusammenspiel von Produkt und Projekt ein hoher Stellenwert beigemessen wird, liegt der Fokus im MBSE noch sehr stark auf technischen Prozessen. Im Hinblick auf die Idee des Systemmodells als zentrale Datenquelle sollten auch Stakeholder jenseits der direkten Entwicklungsaktivitäten das Systemmodell entsprechend nutzen können und davon profitieren. Dazu wird ein Demonstrator vorgestellt, welcher die Anwendung einer Komplexitätsanalyse auf Basis des Systemmodells mechatronischer Systeme stellvertretend für Methoden in Sinne der technischen Managementprozesse der ISO/IEC 15288 aufzeigt. Grundlage des Demonstrators bildet das Systemmodell eines Pedelecs. Die darin modellierten Strukturen dienen als Input für die Komplexitätsanalyse. Über die automatisierte Anwendung der Komplexitätsanalyse ergibt sich als Output ein Portfolio, das die Komplexität der funktionserfüllenden Komponenten mit der Bewertung der Funktionalität in Beziehung setzt und somit eine Beurteilung und entsprechende Handlungsempfehlungen der Komponenten ermöglicht.","lang":"ger"}]},{"doi":"10.1016/j.protcy.2016.08.057","title":"Towards Feature-based Product Line Engineering of Technical Systems","author":[{"first_name":"Thorsten","full_name":"Koch, Thorsten","id":"13616","last_name":"Koch"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875"},{"full_name":"Schubert, David","id":"9106","last_name":"Schubert","first_name":"David"},{"first_name":"Timo","full_name":"Lindemann, Timo","last_name":"Lindemann"}],"date_created":"2020-12-22T09:33:36Z","date_updated":"2022-01-06T06:54:40Z","publisher":"Elsevier","citation":{"ama":"Koch T, Holtmann J, Schubert D, Lindemann T. Towards Feature-based Product Line Engineering of Technical Systems. In: Trächtler A, Denkena B, Thoben K-D, eds. <i>3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>. Elsevier; 2016:447-454. doi:<a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">10.1016/j.protcy.2016.08.057</a>","ieee":"T. Koch, J. Holtmann, D. Schubert, and T. Lindemann, “Towards Feature-based Product Line Engineering of Technical Systems,” in <i>3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>, 2016, pp. 447–454.","chicago":"Koch, Thorsten, Jörg Holtmann, David Schubert, and Timo Lindemann. “Towards Feature-Based Product Line Engineering of Technical Systems.” In <i>3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>, edited by Ansgar Trächtler, Berend Denkena, and Klaus-Dieter Thoben, 447–54. Elsevier, 2016. <a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">https://doi.org/10.1016/j.protcy.2016.08.057</a>.","mla":"Koch, Thorsten, et al. “Towards Feature-Based Product Line Engineering of Technical Systems.” <i>3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>, edited by Ansgar Trächtler et al., Elsevier, 2016, pp. 447–54, doi:<a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">10.1016/j.protcy.2016.08.057</a>.","bibtex":"@inproceedings{Koch_Holtmann_Schubert_Lindemann_2016, title={Towards Feature-based Product Line Engineering of Technical Systems}, DOI={<a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">10.1016/j.protcy.2016.08.057</a>}, booktitle={3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)}, publisher={Elsevier}, author={Koch, Thorsten and Holtmann, Jörg and Schubert, David and Lindemann, Timo}, editor={Trächtler, Ansgar and Denkena, Berend and Thoben, Klaus-DieterEditors}, year={2016}, pages={447–454} }","short":"T. Koch, J. Holtmann, D. Schubert, T. Lindemann, in: A. Trächtler, B. Denkena, K.-D. Thoben (Eds.), 3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016), Elsevier, 2016, pp. 447–454.","apa":"Koch, T., Holtmann, J., Schubert, D., &#38; Lindemann, T. (2016). Towards Feature-based Product Line Engineering of Technical Systems. In A. Trächtler, B. Denkena, &#38; K.-D. Thoben (Eds.), <i>3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i> (pp. 447–454). Elsevier. <a href=\"https://doi.org/10.1016/j.protcy.2016.08.057\">https://doi.org/10.1016/j.protcy.2016.08.057</a>"},"page":"447-454","year":"2016","language":[{"iso":"eng"}],"user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"_id":"20826","status":"public","abstract":[{"text":"The development of today’s technical products (e.g., in automation) is characterized by high customer expectations regarding the product individualization, which causes a wide range of product variants. Original equipment manufacturers (OEMs) can apply classical approaches from product line engineering, like feature modeling, to cope with the variability and the induced development complexity. Our tool support for feature models integrates a variety of feature model extensions like feature attributes and properties, logical constraints between features and feature properties, and the distinction between features and feature realizations. Furthermore, technical products have geometrical dimensions. The OEM specifies Computer Aided Design (CAD) models to consider these geometric dimensions and to virtually layout particular product variants. Geometric assembly constraints specify how parts of the product can be arranged in a CAD model. However, a potential product customer cannot configure an individual product variant and virtually layout this variant in the same software tool since the respective information stems from different sources. In order to cope with this problem, we present in this paper an extension of our tool support for feature models to specify geometric assembly constraints. Based on the proposed extension, we outline our research roadmap to consider these constraints in an online shop of an e-commerce system, in which a potential customer shall be able to configure a product variant and to virtually layout it according to the assembly constraints.\r\n","lang":"eng"}],"editor":[{"last_name":"Trächtler","full_name":"Trächtler, Ansgar","first_name":"Ansgar"},{"first_name":"Berend","full_name":"Denkena, Berend","last_name":"Denkena"},{"first_name":"Klaus-Dieter","last_name":"Thoben","full_name":"Thoben, Klaus-Dieter"}],"type":"conference","publication":"3rd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)"},{"language":[{"iso":"eng"}],"_id":"20827","department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","series_title":"Lecture Notes in Computer Science (LNCS)","abstract":[{"text":"Cyber-physical systems like self-driving cars are highly complex and safety-critical. This results in a great number of safety requirements that have different levels of criticality. In automotive, the criticality is categorized in Automotive Safety Integrity Levels (ASIL). As a high ASIL causes high development effort, the goal is to develop most subsystems with lower ASIL requirements. To achieve this ASIL tailoring, subsystems need to be separated or redundantly implemented. These safety measures are usually integrated late in the development process and thus cause costly development iterations. In this paper, we present a systematic, tool-supported ASIL tailoring process for the requirements analysis phase. It is applied on formal safety requirements and automatically generated fault trees for a functional view of the system. The process supports early planning of safety efforts for mixed-criticality systems and avoids costly late development iterations.","lang":"eng"}],"status":"public","publication":"5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)","type":"conference","title":"ASIL Tailoring on Functional Safety Requirements","publisher":"Springer International Publishing Switzerland","date_updated":"2022-01-06T06:54:40Z","volume":9923,"author":[{"first_name":"Markus","id":"8472","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel"}],"date_created":"2020-12-22T09:35:16Z","year":"2016","place":"Trondheim, Norway","page":"298–310","intvolume":"      9923","citation":{"ama":"Fockel M. ASIL Tailoring on Functional Safety Requirements. In: <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i>. Vol 9923. Lecture Notes in Computer Science (LNCS). Trondheim, Norway: Springer International Publishing Switzerland; 2016:298–310.","ieee":"M. Fockel, “ASIL Tailoring on Functional Safety Requirements,” in <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i>, 2016, vol. 9923, pp. 298–310.","chicago":"Fockel, Markus. “ASIL Tailoring on Functional Safety Requirements.” In <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i>, 9923:298–310. Lecture Notes in Computer Science (LNCS). Trondheim, Norway: Springer International Publishing Switzerland, 2016.","apa":"Fockel, M. (2016). ASIL Tailoring on Functional Safety Requirements. In <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i> (Vol. 9923, pp. 298–310). Trondheim, Norway: Springer International Publishing Switzerland.","short":"M. Fockel, in: 5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR), Springer International Publishing Switzerland, Trondheim, Norway, 2016, pp. 298–310.","bibtex":"@inproceedings{Fockel_2016, place={Trondheim, Norway}, series={Lecture Notes in Computer Science (LNCS)}, title={ASIL Tailoring on Functional Safety Requirements}, volume={9923}, booktitle={5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)}, publisher={Springer International Publishing Switzerland}, author={Fockel, Markus}, year={2016}, pages={298–310}, collection={Lecture Notes in Computer Science (LNCS)} }","mla":"Fockel, Markus. “ASIL Tailoring on Functional Safety Requirements.” <i>5th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR)</i>, vol. 9923, Springer International Publishing Switzerland, 2016, pp. 298–310."}},{"main_file_link":[{"url":"http://www.sigs-datacom.de/uploads/tx_dmjournals/fockel_holtmann_koch_schmelter_OTS_RE_16.pdf"}],"title":"Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?","date_created":"2020-12-22T09:36:49Z","author":[{"first_name":"Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","id":"3875"},{"last_name":"Fockel","orcid":"0000-0002-1269-0702","full_name":"Fockel, Markus","id":"8472","first_name":"Markus"},{"last_name":"Koch","full_name":"Koch, Thorsten","id":"13616","first_name":"Thorsten"},{"full_name":"Schmelter, David","id":"40982","last_name":"Schmelter","orcid":"0000-0001-7787-5380","first_name":"David"}],"date_updated":"2022-01-06T06:54:40Z","citation":{"bibtex":"@article{Holtmann_Fockel_Koch_Schmelter_2016, title={Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?}, number={RE/2016}, journal={OBJEKTspektrum}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David}, year={2016} }","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, OBJEKTspektrum (2016).","mla":"Holtmann, Jörg, et al. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?” <i>OBJEKTspektrum</i>, no. RE/2016, 2016.","apa":"Holtmann, J., Fockel, M., Koch, T., &#38; Schmelter, D. (2016). Requirements Engineering - Zusatzaufgabe oder Kernkompetenz? <i>OBJEKTspektrum</i>, (RE/2016).","ieee":"J. Holtmann, M. Fockel, T. Koch, and D. Schmelter, “Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?,” <i>OBJEKTspektrum</i>, no. RE/2016, 2016.","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, and David Schmelter. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?” <i>OBJEKTspektrum</i>, no. RE/2016 (2016).","ama":"Holtmann J, Fockel M, Koch T, Schmelter D. Requirements Engineering - Zusatzaufgabe oder Kernkompetenz? <i>OBJEKTspektrum</i>. 2016;(RE/2016)."},"year":"2016","issue":"RE/2016","language":[{"iso":"eng"}],"department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","_id":"20828","status":"public","abstract":[{"text":"In verschiedenen Unternehmen wird mit Anforderungen unterschiedlich umgegangen. Je nach Größe, Branche und Unternehmenskultur ist das Thema Requirements Engineering (RE) mal weniger, mal mehr etabliert. In einigen Unternehmen wird es als lästige Zusatzaufgabe betrachtet, während andere Unternehmen ganze Abteilungen mit RE als Kernkompetenz betreiben. RE wird allerdings in jedem Projekt - bewusst oder unbewusst - durchgeführt! RE ist die Basis für den weiteren Entwicklungsprozess, die Validierung/Verifikation und die Plan- und Messbarkeit des Projekts. Darüber hinaus können Fehler, die auf Anforderungsebene gefunden werden, weniger aufwendig und somit günstiger behoben werden als in späteren Entwicklungsphasen. Am Fraunhofer IEM beraten wir Unternehmen und erforschen neue Methoden bezüglich der Entwicklung von intelligenten technischen Systemen. In diesem Artikel berichten wir über unsere Erfahrungen aus Projekten, in denen wir Unternehmen aus verschiedenen Branchen und mit unterschiedlichem RE-Reifegrad zwecks Leistungssteigerung des RE begleitet haben. Auf Basis dieser Projekterfahrungen zeigen wir Wege auf, wie der Stand des RE mittels eines Reifegradmodells im eigenen Unternehmen verbessert werden kann.","lang":"ger"}],"publication":"OBJEKTspektrum","type":"journal_article"},{"user_id":"40982","department":[{"_id":"241"},{"_id":"662"}],"_id":"20829","language":[{"iso":"eng"}],"type":"journal_article","publication":"Journal of Software Evolution and Process","status":"public","abstract":[{"text":"The development of software-intensive technical systems involves several engineering disciplines like mechanical, electrical, control, and particularly software engineering. Model-based Systems Engineering (MBSE) coordinates these disciplines throughout the development by means of discipline-spanning processes and a system model. Such a system model provides a common understanding of the system under development and serves as a starting point for the discipline-specific development. An integral part of MBSE is the requirements engineering on the system level. However, these requirements need to be refined for the discipline-specific development to start, e.g., into specific requirements for the embedded software. Since existing MBSE approaches lack support for this refinement step, we conceived in previous work a systematic transition from MBSE to model-based software requirements engineering. We automated the steps of the transition where possible, in order to avoid error-prone and time-consuming manual tasks. In this paper, we extend this approach with support for subsequent process iterations and provide an algorithm for the automated steps. We illustrate the approach and perform a case study with an example of an automotive embedded system.","lang":"eng"}],"date_created":"2020-12-22T09:39:46Z","author":[{"full_name":"Holtmann, Jörg","id":"3875","orcid":"0000-0001-6141-4571","last_name":"Holtmann","first_name":"Jörg"},{"last_name":"Bernijazov","full_name":"Bernijazov, Ruslan","first_name":"Ruslan"},{"full_name":"Meyer, Matthias","id":"683","last_name":"Meyer","first_name":"Matthias"},{"last_name":"Schmelter","orcid":"0000-0001-7787-5380","id":"40982","full_name":"Schmelter, David","first_name":"David"},{"first_name":"Christian","full_name":"Tschirner, Christian","last_name":"Tschirner"}],"date_updated":"2022-01-06T06:54:40Z","doi":"10.1002/smr.1780","title":"Integrated and iterative systems engineering and software requirements engineering for technical systems","citation":{"apa":"Holtmann, J., Bernijazov, R., Meyer, M., Schmelter, D., &#38; Tschirner, C. (2016). Integrated and iterative systems engineering and software requirements engineering for technical systems. <i>Journal of Software Evolution and Process</i>. <a href=\"https://doi.org/10.1002/smr.1780\">https://doi.org/10.1002/smr.1780</a>","mla":"Holtmann, Jörg, et al. “Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems.” <i>Journal of Software Evolution and Process</i>, 2016, doi:<a href=\"https://doi.org/10.1002/smr.1780\">10.1002/smr.1780</a>.","bibtex":"@article{Holtmann_Bernijazov_Meyer_Schmelter_Tschirner_2016, title={Integrated and iterative systems engineering and software requirements engineering for technical systems}, DOI={<a href=\"https://doi.org/10.1002/smr.1780\">10.1002/smr.1780</a>}, journal={Journal of Software Evolution and Process}, author={Holtmann, Jörg and Bernijazov, Ruslan and Meyer, Matthias and Schmelter, David and Tschirner, Christian}, year={2016} }","short":"J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, C. Tschirner, Journal of Software Evolution and Process (2016).","ama":"Holtmann J, Bernijazov R, Meyer M, Schmelter D, Tschirner C. Integrated and iterative systems engineering and software requirements engineering for technical systems. <i>Journal of Software Evolution and Process</i>. 2016. doi:<a href=\"https://doi.org/10.1002/smr.1780\">10.1002/smr.1780</a>","chicago":"Holtmann, Jörg, Ruslan Bernijazov, Matthias Meyer, David Schmelter, and Christian Tschirner. “Integrated and Iterative Systems Engineering and Software Requirements Engineering for Technical Systems.” <i>Journal of Software Evolution and Process</i>, 2016. <a href=\"https://doi.org/10.1002/smr.1780\">https://doi.org/10.1002/smr.1780</a>.","ieee":"J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, and C. Tschirner, “Integrated and iterative systems engineering and software requirements engineering for technical systems,” <i>Journal of Software Evolution and Process</i>, 2016."},"year":"2016"},{"publisher":"ACM","date_updated":"2022-01-06T06:54:40Z","author":[{"last_name":"Schubert","full_name":"Schubert, David","id":"9106","first_name":"David"},{"full_name":"Heinzemann, Christian","last_name":"Heinzemann","first_name":"Christian"},{"first_name":"Christopher","last_name":"Gerking","full_name":"Gerking, Christopher"}],"date_created":"2020-12-22T09:41:56Z","title":"Towards Safe Execution of Reconfigurations in Cyber-Physical Systems","year":"2016","citation":{"apa":"Schubert, D., Heinzemann, C., &#38; Gerking, C. (2016). Towards Safe Execution of Reconfigurations in Cyber-Physical Systems. <i>Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering</i>.","short":"D. Schubert, C. Heinzemann, C. Gerking, in: Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering, ACM, 2016.","bibtex":"@inproceedings{Schubert_Heinzemann_Gerking_2016, title={Towards Safe Execution of Reconfigurations in Cyber-Physical Systems}, booktitle={Proceedings of the 19th international ACM Sigsoft symposium on component-based software engineering}, publisher={ACM}, author={Schubert, David and Heinzemann, Christian and Gerking, Christopher}, year={2016} }","mla":"Schubert, David, et al. “Towards Safe Execution of Reconfigurations in Cyber-Physical Systems.” <i>Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering</i>, ACM, 2016.","ama":"Schubert D, Heinzemann C, Gerking C. Towards Safe Execution of Reconfigurations in Cyber-Physical Systems. In: <i>Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering</i>. ACM; 2016.","ieee":"D. Schubert, C. Heinzemann, and C. Gerking, “Towards Safe Execution of Reconfigurations in Cyber-Physical Systems,” 2016.","chicago":"Schubert, David, Christian Heinzemann, and Christopher Gerking. “Towards Safe Execution of Reconfigurations in Cyber-Physical Systems.” In <i>Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering</i>. ACM, 2016."},"_id":"20830","user_id":"5786","department":[{"_id":"76"},{"_id":"241"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 19th international ACM Sigsoft symposium on component-based software engineering","status":"public"},{"date_created":"2017-10-17T12:41:32Z","title":"Congestion Games with Mixed Objectives","year":"2016","external_id":{"arxiv":["1607.05143"]},"ddc":["000"],"language":[{"iso":"eng"}],"publication":"Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)","abstract":[{"text":"We study a new class of games which generalizes congestion games and its bottleneck variant. We introduce congestion games with mixed objectives to model network scenarios in which players seek to optimize for latency and bandwidths alike. We characterize the existence of pure Nash equilibria (PNE) and the convergence of improvement dynamics. For games that do not possess PNE we give bounds on the approximation ratio of approximate pure Nash equilibria.","lang":"eng"}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-10-31T17:03:44Z","creator":"feldi","date_created":"2018-10-31T17:03:44Z","file_size":235739,"file_name":"Feldotto2016_Chapter_CongestionGamesWithMixedObject.pdf","file_id":"5233","access_level":"closed"}],"date_updated":"2022-01-06T06:54:41Z","author":[{"first_name":"Matthias","orcid":"0000-0003-1348-6516","last_name":"Feldotto","id":"14052","full_name":"Feldotto, Matthias"},{"first_name":"Lennart","full_name":"Leder, Lennart","last_name":"Leder"},{"last_name":"Skopalik","id":"40384","full_name":"Skopalik, Alexander","first_name":"Alexander"}],"doi":"10.1007/978-3-319-48749-6_47","has_accepted_license":"1","citation":{"chicago":"Feldotto, Matthias, Lennart Leder, and Alexander Skopalik. “Congestion Games with Mixed Objectives.” In <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 655--669. LNCS, 2016. <a href=\"https://doi.org/10.1007/978-3-319-48749-6_47\">https://doi.org/10.1007/978-3-319-48749-6_47</a>.","ieee":"M. Feldotto, L. Leder, and A. Skopalik, “Congestion Games with Mixed Objectives,” in <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 2016, pp. 655--669.","ama":"Feldotto M, Leder L, Skopalik A. Congestion Games with Mixed Objectives. In: <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>. LNCS. ; 2016:655--669. doi:<a href=\"https://doi.org/10.1007/978-3-319-48749-6_47\">10.1007/978-3-319-48749-6_47</a>","bibtex":"@inproceedings{Feldotto_Leder_Skopalik_2016, series={LNCS}, title={Congestion Games with Mixed Objectives}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-48749-6_47\">10.1007/978-3-319-48749-6_47</a>}, booktitle={Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)}, author={Feldotto, Matthias and Leder, Lennart and Skopalik, Alexander}, year={2016}, pages={655--669}, collection={LNCS} }","mla":"Feldotto, Matthias, et al. “Congestion Games with Mixed Objectives.” <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 2016, pp. 655--669, doi:<a href=\"https://doi.org/10.1007/978-3-319-48749-6_47\">10.1007/978-3-319-48749-6_47</a>.","short":"M. Feldotto, L. Leder, A. Skopalik, in: Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 655--669.","apa":"Feldotto, M., Leder, L., &#38; Skopalik, A. (2016). Congestion Games with Mixed Objectives. In <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i> (pp. 655--669). <a href=\"https://doi.org/10.1007/978-3-319-48749-6_47\">https://doi.org/10.1007/978-3-319-48749-6_47</a>"},"page":"655--669","project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"209","series_title":"LNCS","user_id":"14052","department":[{"_id":"63"},{"_id":"541"}],"file_date_updated":"2018-10-31T17:03:44Z","type":"conference","status":"public"},{"has_accepted_license":"1","citation":{"bibtex":"@inproceedings{Gutt_Kundisch_2016, title={Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals}, booktitle={Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland}, author={Gutt, Dominik and Kundisch, Dennis}, year={2016} }","mla":"Gutt, Dominik, and Dennis Kundisch. “Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals.” <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>, 2016.","short":"D. Gutt, D. Kundisch, in: Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland, 2016.","apa":"Gutt, D., &#38; Kundisch, D. (2016). Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals. In <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>. Dublin, Ireland.","chicago":"Gutt, Dominik, and Dennis Kundisch. “Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals.” In <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>, 2016.","ieee":"D. Gutt and D. Kundisch, “Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals,” in <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>, Dublin, Ireland, 2016.","ama":"Gutt D, Kundisch D. Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals. In: <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>. ; 2016."},"year":"2016","date_created":"2017-10-17T12:41:27Z","author":[{"last_name":"Gutt","full_name":"Gutt, Dominik","id":"14368","first_name":"Dominik"},{"last_name":"Kundisch","id":"21117","full_name":"Kundisch, Dennis","first_name":"Dennis"}],"date_updated":"2022-01-06T06:53:25Z","conference":{"name":"37th International Conference on Information Systems (ICIS)","location":"Dublin, Ireland"},"title":"Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals","publication":"Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland","type":"conference","status":"public","file":[{"file_size":435668,"file_id":"1534","access_level":"closed","file_name":"180-ICIS_2016_Money_Talks_revision_final.pdf","date_updated":"2018-03-21T12:33:18Z","creator":"florida","date_created":"2018-03-21T12:33:18Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Recent literature reports concerns about implausibly high Overall ratings in the sharing economy, which undermines the credibility of this rating as a quality signal. This study empirically investigates the relationship between quality and price, commonly captured by the Value dimension in multidimensional rating systems, to reveal whether reviewers form a perception of quality that they then express in the Value dimension, rather than in the Overall rating. We test our hypotheses on a comprehensive panel dataset for 14,859 Airbnb listings in New York. Our preliminary empirical findings show that an increase in price leads to a significant and substantial decrease in the Value rating, suggesting that Value ratings can offer a valuable source of information for potential buyers in addition to the supposedly inflated Overall rating. Moreover, this mechanism has substantial implications for potential buyers who seek to evaluate a listing’s quality and for a seller’s price setting. "}],"department":[{"_id":"276"}],"user_id":"16205","_id":"180","project":[{"name":"SFB 901","_id":"1"},{"_id":"8","name":"SFB 901 - Subprojekt A4"},{"name":"SFB 901 - Project Area A","_id":"2"}],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-21T12:33:18Z","ddc":["040"]},{"_id":"18011","user_id":"21240","department":[{"_id":"137"}],"language":[{"iso":"eng"}],"type":"book","status":"public","publisher":"kopaed","date_updated":"2022-01-06T06:53:25Z","date_created":"2020-08-17T11:31:11Z","author":[{"first_name":"M.","full_name":"Brüggemann, M.","last_name":"Brüggemann"},{"first_name":"T.","full_name":"Knaus, T.","last_name":"Knaus"},{"id":"346","full_name":"Meister, Dorothee M.","last_name":"Meister","first_name":"Dorothee M."}],"title":"Kommunikationskulturen in digitalen Welten. Konzepte und Strategien der Medienpädagogik und Medienbildung","year":"2016","place":"München","citation":{"chicago":"Brüggemann, M., T. Knaus, and Dorothee M. Meister. <i>Kommunikationskulturen in Digitalen Welten. Konzepte Und Strategien Der Medienpädagogik Und Medienbildung</i>. München: kopaed, 2016.","ieee":"M. Brüggemann, T. Knaus, and D. M. Meister, <i>Kommunikationskulturen in digitalen Welten. Konzepte und Strategien der Medienpädagogik und Medienbildung</i>. München: kopaed, 2016.","ama":"Brüggemann M, Knaus T, Meister DM. <i>Kommunikationskulturen in Digitalen Welten. Konzepte Und Strategien Der Medienpädagogik Und Medienbildung</i>. München: kopaed; 2016.","short":"M. Brüggemann, T. Knaus, D.M. Meister, Kommunikationskulturen in Digitalen Welten. Konzepte Und Strategien Der Medienpädagogik Und Medienbildung, kopaed, München, 2016.","bibtex":"@book{Brüggemann_Knaus_Meister_2016, place={München}, title={Kommunikationskulturen in digitalen Welten. Konzepte und Strategien der Medienpädagogik und Medienbildung}, publisher={kopaed}, author={Brüggemann, M. and Knaus, T. and Meister, Dorothee M.}, year={2016} }","mla":"Brüggemann, M., et al. <i>Kommunikationskulturen in Digitalen Welten. Konzepte Und Strategien Der Medienpädagogik Und Medienbildung</i>. kopaed, 2016.","apa":"Brüggemann, M., Knaus, T., &#38; Meister, D. M. (2016). <i>Kommunikationskulturen in digitalen Welten. Konzepte und Strategien der Medienpädagogik und Medienbildung</i>. München: kopaed."}},{"language":[{"iso":"ger"}],"_id":"18015","user_id":"21240","department":[{"_id":"137"}],"status":"public","type":"book","title":"Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen","date_updated":"2022-01-06T06:53:25Z","publisher":"INVIA Verlag","date_created":"2020-08-17T11:48:06Z","author":[{"last_name":"Kamin","full_name":"Kamin, A. M.","first_name":"A. M."},{"first_name":"A.-D.","full_name":"Greiner, A.-D.","last_name":"Greiner"},{"last_name":"Meister","full_name":"Meister, Dorothee M.","id":"346","first_name":"Dorothee M."},{"first_name":"I.","full_name":"Darmann-Finck, I.","last_name":"Darmann-Finck"}],"year":"2016","place":"Paderborn","citation":{"apa":"Kamin, A. M., Greiner, A.-D., Meister, D. M., &#38; Darmann-Finck, I. (2016). <i>Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen</i>. Paderborn: INVIA Verlag.","short":"A.M. Kamin, A.-D. Greiner, D.M. Meister, I. Darmann-Finck, Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen, INVIA Verlag, Paderborn, 2016.","bibtex":"@book{Kamin_Greiner_Meister_Darmann-Finck_2016, place={Paderborn}, title={Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen}, publisher={INVIA Verlag}, author={Kamin, A. M. and Greiner, A.-D. and Meister, Dorothee M. and Darmann-Finck, I.}, year={2016} }","mla":"Kamin, A. M., et al. <i>Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen</i>. INVIA Verlag, 2016.","ieee":"A. M. Kamin, A.-D. Greiner, D. M. Meister, and I. Darmann-Finck, <i>Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen</i>. Paderborn: INVIA Verlag, 2016.","chicago":"Kamin, A. M., A.-D. Greiner, Dorothee M. Meister, and I. Darmann-Finck. <i>Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen</i>. Paderborn: INVIA Verlag, 2016.","ama":"Kamin AM, Greiner A-D, Meister DM, Darmann-Finck I. <i>Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen</i>. Paderborn: INVIA Verlag; 2016."}},{"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"department":[{"_id":"79"}],"user_id":"15504","_id":"18025","citation":{"chicago":"Heuchler, Sebastian. <i>Nibbler: Implementing a Turing Machine to Simulate the Busy Beaver Problem</i>, 2016.","ieee":"S. Heuchler, <i>Nibbler: Implementing a Turing machine to simulate the Busy Beaver problem</i>. 2016.","ama":"Heuchler S. <i>Nibbler: Implementing a Turing Machine to Simulate the Busy Beaver Problem</i>.; 2016.","short":"S. Heuchler, Nibbler: Implementing a Turing Machine to Simulate the Busy Beaver Problem, 2016.","mla":"Heuchler, Sebastian. <i>Nibbler: Implementing a Turing Machine to Simulate the Busy Beaver Problem</i>. 2016.","bibtex":"@book{Heuchler_2016, title={Nibbler: Implementing a Turing machine to simulate the Busy Beaver problem}, author={Heuchler, Sebastian}, year={2016} }","apa":"Heuchler, S. (2016). <i>Nibbler: Implementing a Turing machine to simulate the Busy Beaver problem</i>."},"year":"2016","title":"Nibbler: Implementing a Turing machine to simulate the Busy Beaver problem","author":[{"first_name":"Sebastian","last_name":"Heuchler","full_name":"Heuchler, Sebastian"}],"supervisor":[{"first_name":"Christian","last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792"}],"date_created":"2020-08-18T08:38:22Z","date_updated":"2022-01-06T06:53:25Z"}]
