---
_id: '20726'
author:
- first_name: Kevin
  full_name: Falzon, Kevin
  last_name: Falzon
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Falzon K, Bodden E. Towards a Comprehensive Model of Isolation for Mitigating
    Illicit Channels. In: Piessens F, Vigan’o L, eds. <i>Principles of Security and
    Trust: 5th International Conference, POST 2016, Held as Part of the European Joint
    Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands,
    April 2--8, 2016, Proceedings</i>. Springer Berlin Heidelberg; 2016:116-138. doi:<a
    href="https://doi.org/10.1007/978-3-662-49635-0_7">10.1007/978-3-662-49635-0_7</a>'
  apa: 'Falzon, K., &#38; Bodden, E. (2016). Towards a Comprehensive Model of Isolation
    for Mitigating Illicit Channels. In F. Piessens &#38; L. Vigan’o (Eds.), <i>Principles
    of Security and Trust: 5th International Conference, POST 2016, Held as Part of
    the European Joint Conferences on Theory and Practice of Software, ETAPS 2016,
    Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i> (pp. 116–138). Springer
    Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-662-49635-0_7">https://doi.org/10.1007/978-3-662-49635-0_7</a>'
  bibtex: '@inproceedings{Falzon_Bodden_2016, place={Berlin, Heidelberg}, title={Towards
    a Comprehensive Model of Isolation for Mitigating Illicit Channels}, DOI={<a href="https://doi.org/10.1007/978-3-662-49635-0_7">10.1007/978-3-662-49635-0_7</a>},
    booktitle={Principles of Security and Trust: 5th International Conference, POST
    2016, Held as Part of the European Joint Conferences on Theory and Practice of
    Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings},
    publisher={Springer Berlin Heidelberg}, author={Falzon, Kevin and Bodden, Eric},
    editor={Piessens, Frank and Vigan’o, Luca}, year={2016}, pages={116–138} }'
  chicago: 'Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation
    for Mitigating Illicit Channels.” In <i>Principles of Security and Trust: 5th
    International Conference, POST 2016, Held as Part of the European Joint Conferences
    on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April
    2--8, 2016, Proceedings</i>, edited by Frank Piessens and Luca Vigan’o, 116–38.
    Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. <a href="https://doi.org/10.1007/978-3-662-49635-0_7">https://doi.org/10.1007/978-3-662-49635-0_7</a>.'
  ieee: 'K. Falzon and E. Bodden, “Towards a Comprehensive Model of Isolation for
    Mitigating Illicit Channels,” in <i>Principles of Security and Trust: 5th International
    Conference, POST 2016, Held as Part of the European Joint Conferences on Theory
    and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8,
    2016, Proceedings</i>, 2016, pp. 116–138, doi: <a href="https://doi.org/10.1007/978-3-662-49635-0_7">10.1007/978-3-662-49635-0_7</a>.'
  mla: 'Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation
    for Mitigating Illicit Channels.” <i>Principles of Security and Trust: 5th International
    Conference, POST 2016, Held as Part of the European Joint Conferences on Theory
    and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8,
    2016, Proceedings</i>, edited by Frank Piessens and Luca Vigan’o, Springer Berlin
    Heidelberg, 2016, pp. 116–38, doi:<a href="https://doi.org/10.1007/978-3-662-49635-0_7">10.1007/978-3-662-49635-0_7</a>.'
  short: 'K. Falzon, E. Bodden, in: F. Piessens, L. Vigan’o (Eds.), Principles of
    Security and Trust: 5th International Conference, POST 2016, Held as Part of the
    European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven,
    The Netherlands, April 2--8, 2016, Proceedings, Springer Berlin Heidelberg, Berlin,
    Heidelberg, 2016, pp. 116–138.'
date_created: 2020-12-14T14:20:20Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: 10.1007/978-3-662-49635-0_7
editor:
- first_name: Frank
  full_name: Piessens, Frank
  last_name: Piessens
- first_name: Luca
  full_name: Vigan'o, Luca
  last_name: Vigan'o
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/fb16mitigating.pdf
page: 116-138
place: Berlin, Heidelberg
publication: 'Principles of Security and Trust: 5th International Conference, POST
  2016, Held as Part of the European Joint Conferences on Theory and Practice of Software,
  ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings'
publication_identifier:
  isbn:
  - 978-3-662-49635-0
publisher: Springer Berlin Heidelberg
status: public
title: Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20727'
author:
- first_name: Siegfried
  full_name: Rasthofer, Siegfried
  last_name: Rasthofer
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Marc
  full_name: Miltenberger, Marc
  last_name: Miltenberger
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in
    Android Applications That Feature Anti-Analysis Techniques. In: <i>Network and
    Distributed System Security Symposium (NDSS)</i>. ; 2016.'
  apa: Rasthofer, S., Arzt, S., Miltenberger, M., &#38; Bodden, E. (2016). Harvesting
    Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
    <i>Network and Distributed System Security Symposium (NDSS)</i>.
  bibtex: '@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting
    Runtime Values in Android Applications That Feature Anti-Analysis Techniques},
    booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer,
    Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016}
    }'
  chicago: Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden.
    “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis
    Techniques.” In <i>Network and Distributed System Security Symposium (NDSS)</i>,
    2016.
  ieee: S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime
    Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.
  mla: Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications
    That Feature Anti-Analysis Techniques.” <i>Network and Distributed System Security
    Symposium (NDSS)</i>, 2016.
  short: 'S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed
    System Security Symposium (NDSS), 2016.'
date_created: 2020-12-14T14:21:41Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ssme16harvesting.pdf
publication: Network and Distributed System Security Symposium (NDSS)
status: public
title: Harvesting Runtime Values in Android Applications That Feature Anti-Analysis
  Techniques
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20728'
author:
- first_name: Sarah
  full_name: Nadi, Sarah
  last_name: Nadi
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers
    Struggle With Cryptography APIs? In: <i>International Conference for Software
    Engineering (ICSE)</i>. ; 2016:935-946.'
  apa: 'Nadi, S., Krüger, S., Mezini, M., &#38; Bodden, E. (2016). Jumping Through
    Hoops: Why do Java Developers Struggle With Cryptography APIs? <i>International
    Conference for Software Engineering (ICSE)</i>, 935–946.'
  bibtex: '@inproceedings{Nadi_Krüger_Mezini_Bodden_2016, title={Jumping Through Hoops:
    Why do Java Developers Struggle With Cryptography APIs?}, booktitle={International
    Conference for Software Engineering (ICSE)}, author={Nadi, Sarah and Krüger, Stefan
    and Mezini, Mira and Bodden, Eric}, year={2016}, pages={935–946} }'
  chicago: 'Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden. “Jumping Through
    Hoops: Why Do Java Developers Struggle With Cryptography APIs?” In <i>International
    Conference for Software Engineering (ICSE)</i>, 935–46, 2016.'
  ieee: 'S. Nadi, S. Krüger, M. Mezini, and E. Bodden, “Jumping Through Hoops: Why
    do Java Developers Struggle With Cryptography APIs?,” in <i>International Conference
    for Software Engineering (ICSE)</i>, 2016, pp. 935–946.'
  mla: 'Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle
    With Cryptography APIs?” <i>International Conference for Software Engineering
    (ICSE)</i>, 2016, pp. 935–46.'
  short: 'S. Nadi, S. Krüger, M. Mezini, E. Bodden, in: International Conference for
    Software Engineering (ICSE), 2016, pp. 935–946.'
date_created: 2020-12-14T14:22:36Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- CROSSING
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/nkm+16jumping.pdf
page: 935-946
publication: International Conference for Software Engineering (ICSE)
status: public
title: 'Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20729'
author:
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Arzt S, Bodden E. StubDroid: Automatic Inference of Precise Data-flow Summaries
    for the Android Framework. In: <i>International Conference for Software Engineering
    (ICSE)</i>. ; 2016.'
  apa: 'Arzt, S., &#38; Bodden, E. (2016). StubDroid: Automatic Inference of Precise
    Data-flow Summaries for the Android Framework. <i>International Conference for
    Software Engineering (ICSE)</i>.'
  bibtex: '@inproceedings{Arzt_Bodden_2016, title={StubDroid: Automatic Inference
    of Precise Data-flow Summaries for the Android Framework}, booktitle={International
    Conference for Software Engineering (ICSE)}, author={Arzt, Steven and Bodden,
    Eric}, year={2016} }'
  chicago: 'Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise
    Data-Flow Summaries for the Android Framework.” In <i>International Conference
    for Software Engineering (ICSE)</i>, 2016.'
  ieee: 'S. Arzt and E. Bodden, “StubDroid: Automatic Inference of Precise Data-flow
    Summaries for the Android Framework,” 2016.'
  mla: 'Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise
    Data-Flow Summaries for the Android Framework.” <i>International Conference for
    Software Engineering (ICSE)</i>, 2016.'
  short: 'S. Arzt, E. Bodden, in: International Conference for Software Engineering
    (ICSE), 2016.'
date_created: 2020-12-14T14:23:29Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ab16stubdroid.pdf
publication: International Conference for Software Engineering (ICSE)
status: public
title: 'StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android
  Framework'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20730'
author:
- first_name: N.
  full_name: Eling, N.
  last_name: Eling
- first_name: S.
  full_name: Rasthofer, S.
  last_name: Rasthofer
- first_name: M.
  full_name: Kolhagen, M.
  last_name: Kolhagen
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: P.
  full_name: Buxmann, P.
  last_name: Buxmann
citation:
  ama: 'Eling N, Rasthofer S, Kolhagen M, Bodden E, Buxmann P. Investigating Users’
    Reaction to Fine-Grained Data Requests: A Market Experiment. In: <i>2016 49th
    Hawaii International Conference on System Sciences (HICSS)</i>. ; 2016:3666-3675.
    doi:<a href="https://doi.org/10.1109/HICSS.2016.458">10.1109/HICSS.2016.458</a>'
  apa: 'Eling, N., Rasthofer, S., Kolhagen, M., Bodden, E., &#38; Buxmann, P. (2016).
    Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.
    <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 3666–3675.
    <a href="https://doi.org/10.1109/HICSS.2016.458">https://doi.org/10.1109/HICSS.2016.458</a>'
  bibtex: '@inproceedings{Eling_Rasthofer_Kolhagen_Bodden_Buxmann_2016, title={Investigating
    Users’ Reaction to Fine-Grained Data Requests: A Market Experiment}, DOI={<a href="https://doi.org/10.1109/HICSS.2016.458">10.1109/HICSS.2016.458</a>},
    booktitle={2016 49th Hawaii International Conference on System Sciences (HICSS)},
    author={Eling, N. and Rasthofer, S. and Kolhagen, M. and Bodden, Eric and Buxmann,
    P.}, year={2016}, pages={3666–3675} }'
  chicago: 'Eling, N., S. Rasthofer, M. Kolhagen, Eric Bodden, and P. Buxmann. “Investigating
    Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.” In <i>2016
    49th Hawaii International Conference on System Sciences (HICSS)</i>, 3666–75,
    2016. <a href="https://doi.org/10.1109/HICSS.2016.458">https://doi.org/10.1109/HICSS.2016.458</a>.'
  ieee: 'N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, and P. Buxmann, “Investigating
    Users’ Reaction to Fine-Grained Data Requests: A Market Experiment,” in <i>2016
    49th Hawaii International Conference on System Sciences (HICSS)</i>, 2016, pp.
    3666–3675, doi: <a href="https://doi.org/10.1109/HICSS.2016.458">10.1109/HICSS.2016.458</a>.'
  mla: 'Eling, N., et al. “Investigating Users’ Reaction to Fine-Grained Data Requests:
    A Market Experiment.” <i>2016 49th Hawaii International Conference on System Sciences
    (HICSS)</i>, 2016, pp. 3666–75, doi:<a href="https://doi.org/10.1109/HICSS.2016.458">10.1109/HICSS.2016.458</a>.'
  short: 'N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, P. Buxmann, in: 2016 49th
    Hawaii International Conference on System Sciences (HICSS), 2016, pp. 3666–3675.'
date_created: 2020-12-14T14:24:12Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: 10.1109/HICSS.2016.458
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/erk+15investigating.pdf
page: 3666-3675
publication: 2016 49th Hawaii International Conference on System Sciences (HICSS)
publication_identifier:
  issn:
  - 1530-1605
status: public
title: 'Investigating Users'' Reaction to Fine-Grained Data Requests: A Market Experiment'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '208'
abstract:
- lang: eng
  text: This paper presents a new framework for constructing fully CCA-secure predicate
    encryption schemes from pair encoding schemes. Our construction is the first in
    the context of predicate encryption which uses the technique of well-formedness
    proofs known from public key encryption. The resulting constructions are simpler
    and more efficient compared to the schemes achieved using known generic transformations
    from CPA-secure to CCA-secure schemes. The reduction costs of our framework are
    comparable to the reduction costs of the underlying CPA-secure framework. We achieve
    this last result by applying the dual system encryption methodology in a novel
    way.
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: 'Blömer J, Liske G. Construction of Fully CCA-Secure Predicate Encryptions
    from Pair Encoding Schemes. In: <i>Proceedings of the CT-RSA 2016</i>. LNCS. ;
    2016:431-447. doi:<a href="https://doi.org/10.1007/978-3-319-29485-8_25">10.1007/978-3-319-29485-8_25</a>'
  apa: Blömer, J., &#38; Liske, G. (2016). Construction of Fully CCA-Secure Predicate
    Encryptions from Pair Encoding Schemes. In <i>Proceedings of the CT-RSA 2016</i>
    (pp. 431–447). <a href="https://doi.org/10.1007/978-3-319-29485-8_25">https://doi.org/10.1007/978-3-319-29485-8_25</a>
  bibtex: '@inproceedings{Blömer_Liske_2016, series={LNCS}, title={Construction of
    Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes}, DOI={<a href="https://doi.org/10.1007/978-3-319-29485-8_25">10.1007/978-3-319-29485-8_25</a>},
    booktitle={Proceedings of the CT-RSA 2016}, author={Blömer, Johannes and Liske,
    Gennadij}, year={2016}, pages={431–447}, collection={LNCS} }'
  chicago: Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure
    Predicate Encryptions from Pair Encoding Schemes.” In <i>Proceedings of the CT-RSA
    2016</i>, 431–47. LNCS, 2016. <a href="https://doi.org/10.1007/978-3-319-29485-8_25">https://doi.org/10.1007/978-3-319-29485-8_25</a>.
  ieee: J. Blömer and G. Liske, “Construction of Fully CCA-Secure Predicate Encryptions
    from Pair Encoding Schemes,” in <i>Proceedings of the CT-RSA 2016</i>, 2016, pp.
    431–447.
  mla: Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate
    Encryptions from Pair Encoding Schemes.” <i>Proceedings of the CT-RSA 2016</i>,
    2016, pp. 431–47, doi:<a href="https://doi.org/10.1007/978-3-319-29485-8_25">10.1007/978-3-319-29485-8_25</a>.
  short: 'J. Blömer, G. Liske, in: Proceedings of the CT-RSA 2016, 2016, pp. 431–447.'
date_created: 2017-10-17T12:41:32Z
date_updated: 2022-01-06T06:54:39Z
ddc:
- '040'
department:
- _id: '64'
doi: 10.1007/978-3-319-29485-8_25
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:43:36Z
  date_updated: 2018-03-21T10:43:36Z
  file_id: '1521'
  file_name: 208-aCCA_P-KEM_final.pdf
  file_size: 462666
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:43:36Z
has_accepted_license: '1'
page: 431-447
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the CT-RSA 2016
series_title: LNCS
status: public
title: Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
type: conference
user_id: '477'
year: '2016'
...
---
_id: '20822'
abstract:
- lang: eng
  text: 'Several examples of mechatronic systems can be found nowadays in modern cars,
    production systems, and medical technology. Day by day, the number of innovative
    functionalities in such mechatronic systems is increasing. These functionalities
    are realized with complex software. Such software exhibits hard real-time, safety
    requirements. The adherence to these requirements must be thoroughly analyzed
    and verified. Moreover, to obtain a significant increment in the reliability,
    performance, and efficiency of such software, it needs to maintain the self-adaptation
    of its properties. In order to develop such systems with a high quality and within
    a short time, we need a systematic and consistent design method. For this purpose,
    the software engineering group at the University of Paderborn and the Fraunhofer
    IEM in Paderborn propose the MechatronicUML method. This method provides a comprehensive
    model-driven process support, that starts from requirements and reaches the executable
    software after passing through several design and analysis steps. This process
    improves the comprehension during development and makes complex systems manageable.
    MechatronicUML emphasizes mainly on: (1) modeling and (formal) verification of
    reconfigurable software architectures, (2) the coordination among system components
    in such architectures, and (3) the integration of discrete software events with
    the continuous behavior of control devices.'
author:
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Uwe
  full_name: Pohlmann, Uwe
  last_name: Pohlmann
- first_name: Goran
  full_name: Piskachev, Goran
  id: '41936'
  last_name: Piskachev
  orcid: 0000-0003-4424-5838
- first_name: David
  full_name: Schubert, David
  id: '9106'
  last_name: Schubert
- first_name: Sebastian
  full_name: Thiele, Sebastian
  last_name: Thiele
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
citation:
  ama: 'Dziwok S, Pohlmann U, Piskachev G, Schubert D, Thiele S, Gerking C. <i>The
    MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>.;
    2016.'
  apa: 'Dziwok, S., Pohlmann, U., Piskachev, G., Schubert, D., Thiele, S., &#38; Gerking,
    C. (2016). <i>The MechatronicUML Design Method: Process and Language for Platform-Independent
    Modeling</i>.'
  bibtex: '@book{Dziwok_Pohlmann_Piskachev_Schubert_Thiele_Gerking_2016, place={Zukunftsmeile
    1, 33102 Paderborn, Germany}, title={The MechatronicUML Design Method: Process
    and Language for Platform-Independent Modeling}, author={Dziwok, Stefan and Pohlmann,
    Uwe and Piskachev, Goran and Schubert, David and Thiele, Sebastian and Gerking,
    Christopher}, year={2016} }'
  chicago: 'Dziwok, Stefan, Uwe Pohlmann, Goran Piskachev, David Schubert, Sebastian
    Thiele, and Christopher Gerking. <i>The MechatronicUML Design Method: Process
    and Language for Platform-Independent Modeling</i>. Zukunftsmeile 1, 33102 Paderborn,
    Germany, 2016.'
  ieee: 'S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, and C. Gerking,
    <i>The MechatronicUML Design Method: Process and Language for Platform-Independent
    Modeling</i>. Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.'
  mla: 'Dziwok, Stefan, et al. <i>The MechatronicUML Design Method: Process and Language
    for Platform-Independent Modeling</i>. 2016.'
  short: 'S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, C. Gerking,
    The MechatronicUML Design Method: Process and Language for Platform-Independent
    Modeling, Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.'
date_created: 2020-12-22T09:24:42Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '76'
- _id: '241'
language:
- iso: eng
place: Zukunftsmeile 1, 33102 Paderborn, Germany
status: public
title: 'The MechatronicUML Design Method: Process and Language for Platform-Independent
  Modeling'
type: report
user_id: '5786'
year: '2016'
...
---
_id: '20823'
abstract:
- lang: eng
  text: 'In this technical report, we present the MechatronicUML requirements engineering
    method. The method encompasses a process and a scenario-based modeling language
    for the documentation and analysis of requirements on the message-based interaction
    behavior of software-intensive systems. The modeling language uses a scenario
    notation based on Modal Sequence Diagrams (MSDs), which borrows concepts of UML
    Interactions as well as of Live Sequence Charts. Furthermore, we introduce the
    so-called Emergency Braking & Evasion System (EBEAS) as a running example, which
    is based on current and upcoming real-world driver assistance systems. '
author:
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: David
  full_name: Schmelter, David
  id: '40982'
  last_name: Schmelter
  orcid: 0000-0001-7787-5380
- first_name: Christian
  full_name: Brenner, Christian
  last_name: Brenner
- first_name: Ruslan
  full_name: Bernijazov, Ruslan
  last_name: Bernijazov
- first_name: Marcel
  full_name: Sander, Marcel
  last_name: Sander
citation:
  ama: 'Holtmann J, Fockel M, Koch T, et al. <i>The MechatronicUML Requirements Engineering
    Method: Process and Language</i>.; 2016. doi:<a href="https://doi.org/10.13140/RG.2.2.33223.29606">10.13140/RG.2.2.33223.29606</a>'
  apa: 'Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov,
    R., &#38; Sander, M. (2016). <i>The MechatronicUML Requirements Engineering Method:
    Process and Language</i>. <a href="https://doi.org/10.13140/RG.2.2.33223.29606">https://doi.org/10.13140/RG.2.2.33223.29606</a>'
  bibtex: '@book{Holtmann_Fockel_Koch_Schmelter_Brenner_Bernijazov_Sander_2016, title={The
    MechatronicUML Requirements Engineering Method: Process and Language}, DOI={<a
    href="https://doi.org/10.13140/RG.2.2.33223.29606">10.13140/RG.2.2.33223.29606</a>},
    author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David
    and Brenner, Christian and Bernijazov, Ruslan and Sander, Marcel}, year={2016}
    }'
  chicago: 'Holtmann, Jörg, Markus Fockel, Thorsten Koch, David Schmelter, Christian
    Brenner, Ruslan Bernijazov, and Marcel Sander. <i>The MechatronicUML Requirements
    Engineering Method: Process and Language</i>, 2016. <a href="https://doi.org/10.13140/RG.2.2.33223.29606">https://doi.org/10.13140/RG.2.2.33223.29606</a>.'
  ieee: 'J. Holtmann <i>et al.</i>, <i>The MechatronicUML Requirements Engineering
    Method: Process and Language</i>. 2016.'
  mla: 'Holtmann, Jörg, et al. <i>The MechatronicUML Requirements Engineering Method:
    Process and Language</i>. 2016, doi:<a href="https://doi.org/10.13140/RG.2.2.33223.29606">10.13140/RG.2.2.33223.29606</a>.'
  short: 'J. Holtmann, M. Fockel, T. Koch, D. Schmelter, C. Brenner, R. Bernijazov,
    M. Sander, The MechatronicUML Requirements Engineering Method: Process and Language,
    2016.'
date_created: 2020-12-22T09:28:23Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '76'
- _id: '241'
- _id: '662'
doi: 10.13140/RG.2.2.33223.29606
language:
- iso: eng
status: public
title: 'The MechatronicUML Requirements Engineering Method: Process and Language'
type: report
user_id: '5786'
year: '2016'
...
---
_id: '20824'
abstract:
- lang: ger
  text: 'Für die Ausführung der Software müssen die Softwarekomponenten auf ECUs verteilt
    werden. Dabei unterliegt die Verteilung sicherheitskritischen Constraints. Das
    Suchen der optimalen und gültigen Verteilung ist sehr komplex. Die Lösung kann
    effizient durch Verfahren des Operations Research ermittelt werden. Jedoch ist
    die manuelle Kodierung sehr aufwändig. Dieser Beitrag stellt eine modellgetriebene
    Methode und Werkzeugunterstützung vor, welche die Beschreibung von Constraints
    und Optimierungen vereinfacht sowie die formale Kodierung und Lösungssuche automatisiert.
    Dies erlaubt die effiziente Nutzung der Macht von formalen Modellen ohne Kenntnis
    der formalen mathematischen Verfahren. Die Vorteile der Methode werden anhand
    eines Beispiels aus der Automobilindustrie beschrieben. '
author:
- first_name: Uwe
  full_name: Pohlmann, Uwe
  last_name: Pohlmann
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Matthias
  full_name: Meyer, Matthias
  id: '683'
  last_name: Meyer
citation:
  ama: 'Pohlmann U, Holtmann J, Meyer M. Das Erwachen der Macht – Automatische Softwareverteilung.
    In: <i>Tagungsband Embedded Software Engineering Kongress 2016</i>. ; 2016:587-592.'
  apa: Pohlmann, U., Holtmann, J., &#38; Meyer, M. (2016). Das Erwachen der Macht
    – Automatische Softwareverteilung. In <i>Tagungsband Embedded Software Engineering
    Kongress 2016</i> (pp. 587–592).
  bibtex: '@inproceedings{Pohlmann_Holtmann_Meyer_2016, title={Das Erwachen der Macht
    – Automatische Softwareverteilung}, booktitle={Tagungsband Embedded Software Engineering
    Kongress 2016}, author={Pohlmann, Uwe and Holtmann, Jörg and Meyer, Matthias},
    year={2016}, pages={587–592} }'
  chicago: Pohlmann, Uwe, Jörg Holtmann, and Matthias Meyer. “Das Erwachen Der Macht
    – Automatische Softwareverteilung.” In <i>Tagungsband Embedded Software Engineering
    Kongress 2016</i>, 587–92, 2016.
  ieee: U. Pohlmann, J. Holtmann, and M. Meyer, “Das Erwachen der Macht – Automatische
    Softwareverteilung,” in <i>Tagungsband Embedded Software Engineering Kongress
    2016</i>, 2016, pp. 587–592.
  mla: Pohlmann, Uwe, et al. “Das Erwachen Der Macht – Automatische Softwareverteilung.”
    <i>Tagungsband Embedded Software Engineering Kongress 2016</i>, 2016, pp. 587–92.
  short: 'U. Pohlmann, J. Holtmann, M. Meyer, in: Tagungsband Embedded Software Engineering
    Kongress 2016, 2016, pp. 587–592.'
date_created: 2020-12-22T09:30:16Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '241'
language:
- iso: eng
page: 587-592
publication: Tagungsband Embedded Software Engineering Kongress 2016
status: public
title: Das Erwachen der Macht – Automatische Softwareverteilung
type: conference
user_id: '15249'
year: '2016'
...
---
_id: '20825'
abstract:
- lang: ger
  text: Das Systemmodell ist der Kern des Model-Based Systems Engineering (MBSE).
    Während jedoch im Systems Engineering dem Zusammenspiel von Produkt und Projekt
    ein hoher Stellenwert beigemessen wird, liegt der Fokus im MBSE noch sehr stark
    auf technischen Prozessen. Im Hinblick auf die Idee des Systemmodells als zentrale
    Datenquelle sollten auch Stakeholder jenseits der direkten Entwicklungsaktivitäten
    das Systemmodell entsprechend nutzen können und davon profitieren. Dazu wird ein
    Demonstrator vorgestellt, welcher die Anwendung einer Komplexitätsanalyse auf
    Basis des Systemmodells mechatronischer Systeme stellvertretend für Methoden in
    Sinne der technischen Managementprozesse der ISO/IEC 15288 aufzeigt. Grundlage
    des Demonstrators bildet das Systemmodell eines Pedelecs. Die darin modellierten
    Strukturen dienen als Input für die Komplexitätsanalyse. Über die automatisierte
    Anwendung der Komplexitätsanalyse ergibt sich als Output ein Portfolio, das die
    Komplexität der funktionserfüllenden Komponenten mit der Bewertung der Funktionalität
    in Beziehung setzt und somit eine Beurteilung und entsprechende Handlungsempfehlungen
    der Komponenten ermöglicht.
author:
- first_name: Matthias
  full_name: Greinert, Matthias
  last_name: Greinert
- first_name: Christian
  full_name: Tschirner, Christian
  last_name: Tschirner
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
citation:
  ama: 'Greinert M, Tschirner C, Holtmann J. Anwendung von Methoden der Produktentstehung
    auf Basis des Systemmodells mechatronischer Systeme. In: <i>Tag Des Systems Engineering
    2016</i>. Gesellschaft f{\"u}r Systems Engineering e.V.; 2016:77-86. doi:<a href="https://doi.org/10.3139/9783446451414.008">10.3139/9783446451414.008</a>'
  apa: Greinert, M., Tschirner, C., &#38; Holtmann, J. (2016). Anwendung von Methoden
    der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. <i>Tag
    Des Systems Engineering 2016</i>, 77–86. <a href="https://doi.org/10.3139/9783446451414.008">https://doi.org/10.3139/9783446451414.008</a>
  bibtex: '@inproceedings{Greinert_Tschirner_Holtmann_2016, title={Anwendung von Methoden
    der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme}, DOI={<a
    href="https://doi.org/10.3139/9783446451414.008">10.3139/9783446451414.008</a>},
    booktitle={Tag des Systems Engineering 2016}, publisher={Gesellschaft f{\"u}r
    Systems Engineering e.V.}, author={Greinert, Matthias and Tschirner, Christian
    and Holtmann, Jörg}, year={2016}, pages={77–86} }'
  chicago: Greinert, Matthias, Christian Tschirner, and Jörg Holtmann. “Anwendung
    von Methoden Der Produktentstehung Auf Basis Des Systemmodells Mechatronischer
    Systeme.” In <i>Tag Des Systems Engineering 2016</i>, 77–86. Gesellschaft f{\"u}r
    Systems Engineering e.V., 2016. <a href="https://doi.org/10.3139/9783446451414.008">https://doi.org/10.3139/9783446451414.008</a>.
  ieee: 'M. Greinert, C. Tschirner, and J. Holtmann, “Anwendung von Methoden der Produktentstehung
    auf Basis des Systemmodells mechatronischer Systeme,” in <i>Tag des Systems Engineering
    2016</i>, 2016, pp. 77–86, doi: <a href="https://doi.org/10.3139/9783446451414.008">10.3139/9783446451414.008</a>.'
  mla: Greinert, Matthias, et al. “Anwendung von Methoden Der Produktentstehung Auf
    Basis Des Systemmodells Mechatronischer Systeme.” <i>Tag Des Systems Engineering
    2016</i>, Gesellschaft f{\"u}r Systems Engineering e.V., 2016, pp. 77–86, doi:<a
    href="https://doi.org/10.3139/9783446451414.008">10.3139/9783446451414.008</a>.
  short: 'M. Greinert, C. Tschirner, J. Holtmann, in: Tag Des Systems Engineering
    2016, Gesellschaft f{\"u}r Systems Engineering e.V., 2016, pp. 77–86.'
date_created: 2020-12-22T09:32:08Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '76'
doi: 10.3139/9783446451414.008
language:
- iso: eng
page: 77-86
publication: Tag des Systems Engineering 2016
publisher: Gesellschaft f{\"u}r Systems Engineering e.V.
status: public
title: Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer
  Systeme
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20826'
abstract:
- lang: eng
  text: "The development of today’s technical products (e.g., in automation) is characterized
    by high customer expectations regarding the product individualization, which causes
    a wide range of product variants. Original equipment manufacturers (OEMs) can
    apply classical approaches from product line engineering, like feature modeling,
    to cope with the variability and the induced development complexity. Our tool
    support for feature models integrates a variety of feature model extensions like
    feature attributes and properties, logical constraints between features and feature
    properties, and the distinction between features and feature realizations. Furthermore,
    technical products have geometrical dimensions. The OEM specifies Computer Aided
    Design (CAD) models to consider these geometric dimensions and to virtually layout
    particular product variants. Geometric assembly constraints specify how parts
    of the product can be arranged in a CAD model. However, a potential product customer
    cannot configure an individual product variant and virtually layout this variant
    in the same software tool since the respective information stems from different
    sources. In order to cope with this problem, we present in this paper an extension
    of our tool support for feature models to specify geometric assembly constraints.
    Based on the proposed extension, we outline our research roadmap to consider these
    constraints in an online shop of an e-commerce system, in which a potential customer
    shall be able to configure a product variant and to virtually layout it according
    to the assembly constraints.\r\n"
author:
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: David
  full_name: Schubert, David
  id: '9106'
  last_name: Schubert
- first_name: Timo
  full_name: Lindemann, Timo
  last_name: Lindemann
citation:
  ama: 'Koch T, Holtmann J, Schubert D, Lindemann T. Towards Feature-based Product
    Line Engineering of Technical Systems. In: Trächtler A, Denkena B, Thoben K-D,
    eds. <i>3rd International Conference on System-Integrated Intelligence: New Challenges
    for Product and Production Engineering (SysInt 2016)</i>. Elsevier; 2016:447-454.
    doi:<a href="https://doi.org/10.1016/j.protcy.2016.08.057">10.1016/j.protcy.2016.08.057</a>'
  apa: 'Koch, T., Holtmann, J., Schubert, D., &#38; Lindemann, T. (2016). Towards
    Feature-based Product Line Engineering of Technical Systems. In A. Trächtler,
    B. Denkena, &#38; K.-D. Thoben (Eds.), <i>3rd International Conference on System-integrated
    Intelligence: New Challenges for Product and Production Engineering (SysInt 2016)</i>
    (pp. 447–454). Elsevier. <a href="https://doi.org/10.1016/j.protcy.2016.08.057">https://doi.org/10.1016/j.protcy.2016.08.057</a>'
  bibtex: '@inproceedings{Koch_Holtmann_Schubert_Lindemann_2016, title={Towards Feature-based
    Product Line Engineering of Technical Systems}, DOI={<a href="https://doi.org/10.1016/j.protcy.2016.08.057">10.1016/j.protcy.2016.08.057</a>},
    booktitle={3rd International Conference on System-integrated Intelligence: New
    Challenges for Product and Production Engineering (SysInt 2016)}, publisher={Elsevier},
    author={Koch, Thorsten and Holtmann, Jörg and Schubert, David and Lindemann, Timo},
    editor={Trächtler, Ansgar and Denkena, Berend and Thoben, Klaus-DieterEditors},
    year={2016}, pages={447–454} }'
  chicago: 'Koch, Thorsten, Jörg Holtmann, David Schubert, and Timo Lindemann. “Towards
    Feature-Based Product Line Engineering of Technical Systems.” In <i>3rd International
    Conference on System-Integrated Intelligence: New Challenges for Product and Production
    Engineering (SysInt 2016)</i>, edited by Ansgar Trächtler, Berend Denkena, and
    Klaus-Dieter Thoben, 447–54. Elsevier, 2016. <a href="https://doi.org/10.1016/j.protcy.2016.08.057">https://doi.org/10.1016/j.protcy.2016.08.057</a>.'
  ieee: 'T. Koch, J. Holtmann, D. Schubert, and T. Lindemann, “Towards Feature-based
    Product Line Engineering of Technical Systems,” in <i>3rd International Conference
    on System-integrated Intelligence: New Challenges for Product and Production Engineering
    (SysInt 2016)</i>, 2016, pp. 447–454.'
  mla: 'Koch, Thorsten, et al. “Towards Feature-Based Product Line Engineering of
    Technical Systems.” <i>3rd International Conference on System-Integrated Intelligence:
    New Challenges for Product and Production Engineering (SysInt 2016)</i>, edited
    by Ansgar Trächtler et al., Elsevier, 2016, pp. 447–54, doi:<a href="https://doi.org/10.1016/j.protcy.2016.08.057">10.1016/j.protcy.2016.08.057</a>.'
  short: 'T. Koch, J. Holtmann, D. Schubert, T. Lindemann, in: A. Trächtler, B. Denkena,
    K.-D. Thoben (Eds.), 3rd International Conference on System-Integrated Intelligence:
    New Challenges for Product and Production Engineering (SysInt 2016), Elsevier,
    2016, pp. 447–454.'
date_created: 2020-12-22T09:33:36Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '241'
- _id: '662'
doi: 10.1016/j.protcy.2016.08.057
editor:
- first_name: Ansgar
  full_name: Trächtler, Ansgar
  last_name: Trächtler
- first_name: Berend
  full_name: Denkena, Berend
  last_name: Denkena
- first_name: Klaus-Dieter
  full_name: Thoben, Klaus-Dieter
  last_name: Thoben
language:
- iso: eng
page: 447-454
publication: '3rd International Conference on System-integrated Intelligence: New
  Challenges for Product and Production Engineering (SysInt 2016)'
publisher: Elsevier
status: public
title: Towards Feature-based Product Line Engineering of Technical Systems
type: conference
user_id: '13616'
year: '2016'
...
---
_id: '20827'
abstract:
- lang: eng
  text: Cyber-physical systems like self-driving cars are highly complex and safety-critical.
    This results in a great number of safety requirements that have different levels
    of criticality. In automotive, the criticality is categorized in Automotive Safety
    Integrity Levels (ASIL). As a high ASIL causes high development effort, the goal
    is to develop most subsystems with lower ASIL requirements. To achieve this ASIL
    tailoring, subsystems need to be separated or redundantly implemented. These safety
    measures are usually integrated late in the development process and thus cause
    costly development iterations. In this paper, we present a systematic, tool-supported
    ASIL tailoring process for the requirements analysis phase. It is applied on formal
    safety requirements and automatically generated fault trees for a functional view
    of the system. The process supports early planning of safety efforts for mixed-criticality
    systems and avoids costly late development iterations.
author:
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
citation:
  ama: 'Fockel M. ASIL Tailoring on Functional Safety Requirements. In: <i>5th International
    Workshop on Next Generation of System Assurance Approaches for Safety-Critical
    Systems (SASSUR)</i>. Vol 9923. Lecture Notes in Computer Science (LNCS). Trondheim,
    Norway: Springer International Publishing Switzerland; 2016:298–310.'
  apa: 'Fockel, M. (2016). ASIL Tailoring on Functional Safety Requirements. In <i>5th
    International Workshop on Next Generation of System Assurance Approaches for Safety-Critical
    Systems (SASSUR)</i> (Vol. 9923, pp. 298–310). Trondheim, Norway: Springer International
    Publishing Switzerland.'
  bibtex: '@inproceedings{Fockel_2016, place={Trondheim, Norway}, series={Lecture
    Notes in Computer Science (LNCS)}, title={ASIL Tailoring on Functional Safety
    Requirements}, volume={9923}, booktitle={5th International Workshop on Next Generation
    of System Assurance Approaches for Safety-Critical Systems (SASSUR)}, publisher={Springer
    International Publishing Switzerland}, author={Fockel, Markus}, year={2016}, pages={298–310},
    collection={Lecture Notes in Computer Science (LNCS)} }'
  chicago: 'Fockel, Markus. “ASIL Tailoring on Functional Safety Requirements.” In
    <i>5th International Workshop on Next Generation of System Assurance Approaches
    for Safety-Critical Systems (SASSUR)</i>, 9923:298–310. Lecture Notes in Computer
    Science (LNCS). Trondheim, Norway: Springer International Publishing Switzerland,
    2016.'
  ieee: M. Fockel, “ASIL Tailoring on Functional Safety Requirements,” in <i>5th International
    Workshop on Next Generation of System Assurance Approaches for Safety-Critical
    Systems (SASSUR)</i>, 2016, vol. 9923, pp. 298–310.
  mla: Fockel, Markus. “ASIL Tailoring on Functional Safety Requirements.” <i>5th
    International Workshop on Next Generation of System Assurance Approaches for Safety-Critical
    Systems (SASSUR)</i>, vol. 9923, Springer International Publishing Switzerland,
    2016, pp. 298–310.
  short: 'M. Fockel, in: 5th International Workshop on Next Generation of System Assurance
    Approaches for Safety-Critical Systems (SASSUR), Springer International Publishing
    Switzerland, Trondheim, Norway, 2016, pp. 298–310.'
date_created: 2020-12-22T09:35:16Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '241'
- _id: '662'
intvolume: '      9923'
language:
- iso: eng
page: 298–310
place: Trondheim, Norway
publication: 5th International Workshop on Next Generation of System Assurance Approaches
  for Safety-Critical Systems (SASSUR)
publisher: Springer International Publishing Switzerland
series_title: Lecture Notes in Computer Science (LNCS)
status: public
title: ASIL Tailoring on Functional Safety Requirements
type: conference
user_id: '8472'
volume: 9923
year: '2016'
...
---
_id: '20828'
abstract:
- lang: ger
  text: In verschiedenen Unternehmen wird mit Anforderungen unterschiedlich umgegangen.
    Je nach Größe, Branche und Unternehmenskultur ist das Thema Requirements Engineering
    (RE) mal weniger, mal mehr etabliert. In einigen Unternehmen wird es als lästige
    Zusatzaufgabe betrachtet, während andere Unternehmen ganze Abteilungen mit RE
    als Kernkompetenz betreiben. RE wird allerdings in jedem Projekt - bewusst oder
    unbewusst - durchgeführt! RE ist die Basis für den weiteren Entwicklungsprozess,
    die Validierung/Verifikation und die Plan- und Messbarkeit des Projekts. Darüber
    hinaus können Fehler, die auf Anforderungsebene gefunden werden, weniger aufwendig
    und somit günstiger behoben werden als in späteren Entwicklungsphasen. Am Fraunhofer
    IEM beraten wir Unternehmen und erforschen neue Methoden bezüglich der Entwicklung
    von intelligenten technischen Systemen. In diesem Artikel berichten wir über unsere
    Erfahrungen aus Projekten, in denen wir Unternehmen aus verschiedenen Branchen
    und mit unterschiedlichem RE-Reifegrad zwecks Leistungssteigerung des RE begleitet
    haben. Auf Basis dieser Projekterfahrungen zeigen wir Wege auf, wie der Stand
    des RE mittels eines Reifegradmodells im eigenen Unternehmen verbessert werden
    kann.
author:
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: David
  full_name: Schmelter, David
  id: '40982'
  last_name: Schmelter
  orcid: 0000-0001-7787-5380
citation:
  ama: Holtmann J, Fockel M, Koch T, Schmelter D. Requirements Engineering - Zusatzaufgabe
    oder Kernkompetenz? <i>OBJEKTspektrum</i>. 2016;(RE/2016).
  apa: Holtmann, J., Fockel, M., Koch, T., &#38; Schmelter, D. (2016). Requirements
    Engineering - Zusatzaufgabe oder Kernkompetenz? <i>OBJEKTspektrum</i>, (RE/2016).
  bibtex: '@article{Holtmann_Fockel_Koch_Schmelter_2016, title={Requirements Engineering
    - Zusatzaufgabe oder Kernkompetenz?}, number={RE/2016}, journal={OBJEKTspektrum},
    author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David},
    year={2016} }'
  chicago: Holtmann, Jörg, Markus Fockel, Thorsten Koch, and David Schmelter. “Requirements
    Engineering - Zusatzaufgabe Oder Kernkompetenz?” <i>OBJEKTspektrum</i>, no. RE/2016
    (2016).
  ieee: J. Holtmann, M. Fockel, T. Koch, and D. Schmelter, “Requirements Engineering
    - Zusatzaufgabe oder Kernkompetenz?,” <i>OBJEKTspektrum</i>, no. RE/2016, 2016.
  mla: Holtmann, Jörg, et al. “Requirements Engineering - Zusatzaufgabe Oder Kernkompetenz?”
    <i>OBJEKTspektrum</i>, no. RE/2016, 2016.
  short: J. Holtmann, M. Fockel, T. Koch, D. Schmelter, OBJEKTspektrum (2016).
date_created: 2020-12-22T09:36:49Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '241'
- _id: '662'
issue: RE/2016
language:
- iso: eng
main_file_link:
- url: http://www.sigs-datacom.de/uploads/tx_dmjournals/fockel_holtmann_koch_schmelter_OTS_RE_16.pdf
publication: OBJEKTspektrum
status: public
title: Requirements Engineering - Zusatzaufgabe oder Kernkompetenz?
type: journal_article
user_id: '8472'
year: '2016'
...
---
_id: '20829'
abstract:
- lang: eng
  text: The development of software-intensive technical systems involves several engineering
    disciplines like mechanical, electrical, control, and particularly software engineering.
    Model-based Systems Engineering (MBSE) coordinates these disciplines throughout
    the development by means of discipline-spanning processes and a system model.
    Such a system model provides a common understanding of the system under development
    and serves as a starting point for the discipline-specific development. An integral
    part of MBSE is the requirements engineering on the system level. However, these
    requirements need to be refined for the discipline-specific development to start,
    e.g., into specific requirements for the embedded software. Since existing MBSE
    approaches lack support for this refinement step, we conceived in previous work
    a systematic transition from MBSE to model-based software requirements engineering.
    We automated the steps of the transition where possible, in order to avoid error-prone
    and time-consuming manual tasks. In this paper, we extend this approach with support
    for subsequent process iterations and provide an algorithm for the automated steps.
    We illustrate the approach and perform a case study with an example of an automotive
    embedded system.
author:
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Ruslan
  full_name: Bernijazov, Ruslan
  last_name: Bernijazov
- first_name: Matthias
  full_name: Meyer, Matthias
  id: '683'
  last_name: Meyer
- first_name: David
  full_name: Schmelter, David
  id: '40982'
  last_name: Schmelter
  orcid: 0000-0001-7787-5380
- first_name: Christian
  full_name: Tschirner, Christian
  last_name: Tschirner
citation:
  ama: Holtmann J, Bernijazov R, Meyer M, Schmelter D, Tschirner C. Integrated and
    iterative systems engineering and software requirements engineering for technical
    systems. <i>Journal of Software Evolution and Process</i>. 2016. doi:<a href="https://doi.org/10.1002/smr.1780">10.1002/smr.1780</a>
  apa: Holtmann, J., Bernijazov, R., Meyer, M., Schmelter, D., &#38; Tschirner, C.
    (2016). Integrated and iterative systems engineering and software requirements
    engineering for technical systems. <i>Journal of Software Evolution and Process</i>.
    <a href="https://doi.org/10.1002/smr.1780">https://doi.org/10.1002/smr.1780</a>
  bibtex: '@article{Holtmann_Bernijazov_Meyer_Schmelter_Tschirner_2016, title={Integrated
    and iterative systems engineering and software requirements engineering for technical
    systems}, DOI={<a href="https://doi.org/10.1002/smr.1780">10.1002/smr.1780</a>},
    journal={Journal of Software Evolution and Process}, author={Holtmann, Jörg and
    Bernijazov, Ruslan and Meyer, Matthias and Schmelter, David and Tschirner, Christian},
    year={2016} }'
  chicago: Holtmann, Jörg, Ruslan Bernijazov, Matthias Meyer, David Schmelter, and
    Christian Tschirner. “Integrated and Iterative Systems Engineering and Software
    Requirements Engineering for Technical Systems.” <i>Journal of Software Evolution
    and Process</i>, 2016. <a href="https://doi.org/10.1002/smr.1780">https://doi.org/10.1002/smr.1780</a>.
  ieee: J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, and C. Tschirner, “Integrated
    and iterative systems engineering and software requirements engineering for technical
    systems,” <i>Journal of Software Evolution and Process</i>, 2016.
  mla: Holtmann, Jörg, et al. “Integrated and Iterative Systems Engineering and Software
    Requirements Engineering for Technical Systems.” <i>Journal of Software Evolution
    and Process</i>, 2016, doi:<a href="https://doi.org/10.1002/smr.1780">10.1002/smr.1780</a>.
  short: J. Holtmann, R. Bernijazov, M. Meyer, D. Schmelter, C. Tschirner, Journal
    of Software Evolution and Process (2016).
date_created: 2020-12-22T09:39:46Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '241'
- _id: '662'
doi: 10.1002/smr.1780
language:
- iso: eng
publication: Journal of Software Evolution and Process
status: public
title: Integrated and iterative systems engineering and software requirements engineering
  for technical systems
type: journal_article
user_id: '40982'
year: '2016'
...
---
_id: '20830'
author:
- first_name: David
  full_name: Schubert, David
  id: '9106'
  last_name: Schubert
- first_name: Christian
  full_name: Heinzemann, Christian
  last_name: Heinzemann
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
citation:
  ama: 'Schubert D, Heinzemann C, Gerking C. Towards Safe Execution of Reconfigurations
    in Cyber-Physical Systems. In: <i>Proceedings of the 19th International ACM Sigsoft
    Symposium on Component-Based Software Engineering</i>. ACM; 2016.'
  apa: Schubert, D., Heinzemann, C., &#38; Gerking, C. (2016). Towards Safe Execution
    of Reconfigurations in Cyber-Physical Systems. <i>Proceedings of the 19th International
    ACM Sigsoft Symposium on Component-Based Software Engineering</i>.
  bibtex: '@inproceedings{Schubert_Heinzemann_Gerking_2016, title={Towards Safe Execution
    of Reconfigurations in Cyber-Physical Systems}, booktitle={Proceedings of the
    19th international ACM Sigsoft symposium on component-based software engineering},
    publisher={ACM}, author={Schubert, David and Heinzemann, Christian and Gerking,
    Christopher}, year={2016} }'
  chicago: Schubert, David, Christian Heinzemann, and Christopher Gerking. “Towards
    Safe Execution of Reconfigurations in Cyber-Physical Systems.” In <i>Proceedings
    of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering</i>.
    ACM, 2016.
  ieee: D. Schubert, C. Heinzemann, and C. Gerking, “Towards Safe Execution of Reconfigurations
    in Cyber-Physical Systems,” 2016.
  mla: Schubert, David, et al. “Towards Safe Execution of Reconfigurations in Cyber-Physical
    Systems.” <i>Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based
    Software Engineering</i>, ACM, 2016.
  short: 'D. Schubert, C. Heinzemann, C. Gerking, in: Proceedings of the 19th International
    ACM Sigsoft Symposium on Component-Based Software Engineering, ACM, 2016.'
date_created: 2020-12-22T09:41:56Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '76'
- _id: '241'
language:
- iso: eng
publication: Proceedings of the 19th international ACM Sigsoft symposium on component-based
  software engineering
publisher: ACM
status: public
title: Towards Safe Execution of Reconfigurations in Cyber-Physical Systems
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '209'
abstract:
- lang: eng
  text: We study a new class of games which generalizes congestion games and its bottleneck
    variant. We introduce congestion games with mixed objectives to model network
    scenarios in which players seek to optimize for latency and bandwidths alike.
    We characterize the existence of pure Nash equilibria (PNE) and the convergence
    of improvement dynamics. For games that do not possess PNE we give bounds on the
    approximation ratio of approximate pure Nash equilibria.
author:
- first_name: Matthias
  full_name: Feldotto, Matthias
  id: '14052'
  last_name: Feldotto
  orcid: 0000-0003-1348-6516
- first_name: Lennart
  full_name: Leder, Lennart
  last_name: Leder
- first_name: Alexander
  full_name: Skopalik, Alexander
  id: '40384'
  last_name: Skopalik
citation:
  ama: 'Feldotto M, Leder L, Skopalik A. Congestion Games with Mixed Objectives. In:
    <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization
    and Applications (COCOA)</i>. LNCS. ; 2016:655--669. doi:<a href="https://doi.org/10.1007/978-3-319-48749-6_47">10.1007/978-3-319-48749-6_47</a>'
  apa: Feldotto, M., Leder, L., &#38; Skopalik, A. (2016). Congestion Games with Mixed
    Objectives. In <i>Proceedings of the 10th Annual International Conference on Combinatorial
    Optimization and Applications (COCOA)</i> (pp. 655--669). <a href="https://doi.org/10.1007/978-3-319-48749-6_47">https://doi.org/10.1007/978-3-319-48749-6_47</a>
  bibtex: '@inproceedings{Feldotto_Leder_Skopalik_2016, series={LNCS}, title={Congestion
    Games with Mixed Objectives}, DOI={<a href="https://doi.org/10.1007/978-3-319-48749-6_47">10.1007/978-3-319-48749-6_47</a>},
    booktitle={Proceedings of the 10th Annual International Conference on Combinatorial
    Optimization and Applications (COCOA)}, author={Feldotto, Matthias and Leder,
    Lennart and Skopalik, Alexander}, year={2016}, pages={655--669}, collection={LNCS}
    }'
  chicago: Feldotto, Matthias, Lennart Leder, and Alexander Skopalik. “Congestion
    Games with Mixed Objectives.” In <i>Proceedings of the 10th Annual International
    Conference on Combinatorial Optimization and Applications (COCOA)</i>, 655--669.
    LNCS, 2016. <a href="https://doi.org/10.1007/978-3-319-48749-6_47">https://doi.org/10.1007/978-3-319-48749-6_47</a>.
  ieee: M. Feldotto, L. Leder, and A. Skopalik, “Congestion Games with Mixed Objectives,”
    in <i>Proceedings of the 10th Annual International Conference on Combinatorial
    Optimization and Applications (COCOA)</i>, 2016, pp. 655--669.
  mla: Feldotto, Matthias, et al. “Congestion Games with Mixed Objectives.” <i>Proceedings
    of the 10th Annual International Conference on Combinatorial Optimization and
    Applications (COCOA)</i>, 2016, pp. 655--669, doi:<a href="https://doi.org/10.1007/978-3-319-48749-6_47">10.1007/978-3-319-48749-6_47</a>.
  short: 'M. Feldotto, L. Leder, A. Skopalik, in: Proceedings of the 10th Annual International
    Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 655--669.'
date_created: 2017-10-17T12:41:32Z
date_updated: 2022-01-06T06:54:41Z
ddc:
- '000'
department:
- _id: '63'
- _id: '541'
doi: 10.1007/978-3-319-48749-6_47
external_id:
  arxiv:
  - '1607.05143'
file:
- access_level: closed
  content_type: application/pdf
  creator: feldi
  date_created: 2018-10-31T17:03:44Z
  date_updated: 2018-10-31T17:03:44Z
  file_id: '5233'
  file_name: Feldotto2016_Chapter_CongestionGamesWithMixedObject.pdf
  file_size: 235739
  relation: main_file
  success: 1
file_date_updated: 2018-10-31T17:03:44Z
has_accepted_license: '1'
language:
- iso: eng
page: 655--669
project:
- _id: '1'
  name: SFB 901
- _id: '7'
  name: SFB 901 - Subprojekt A3
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the 10th Annual International Conference on Combinatorial
  Optimization and Applications (COCOA)
series_title: LNCS
status: public
title: Congestion Games with Mixed Objectives
type: conference
user_id: '14052'
year: '2016'
...
---
_id: '180'
abstract:
- lang: eng
  text: 'Recent literature reports concerns about implausibly high Overall ratings
    in the sharing economy, which undermines the credibility of this rating as a quality
    signal. This study empirically investigates the relationship between quality and
    price, commonly captured by the Value dimension in multidimensional rating systems,
    to reveal whether reviewers form a perception of quality that they then express
    in the Value dimension, rather than in the Overall rating. We test our hypotheses
    on a comprehensive panel dataset for 14,859 Airbnb listings in New York. Our preliminary
    empirical findings show that an increase in price leads to a significant and substantial
    decrease in the Value rating, suggesting that Value ratings can offer a valuable
    source of information for potential buyers in addition to the supposedly inflated
    Overall rating. Moreover, this mechanism has substantial implications for potential
    buyers who seek to evaluate a listing’s quality and for a seller’s price setting. '
author:
- first_name: Dominik
  full_name: Gutt, Dominik
  id: '14368'
  last_name: Gutt
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
citation:
  ama: 'Gutt D, Kundisch D. Money Talks (Even) in the Sharing Economy: Empirical Evidence
    for Price Effects in Online Ratings as Quality Signals. In: <i>Proceedings of
    the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>.
    ; 2016.'
  apa: 'Gutt, D., &#38; Kundisch, D. (2016). Money Talks (Even) in the Sharing Economy:
    Empirical Evidence for Price Effects in Online Ratings as Quality Signals. In
    <i>Proceedings of the 37th International Conference on Information Systems (ICIS),
    Dublin, Ireland</i>. Dublin, Ireland.'
  bibtex: '@inproceedings{Gutt_Kundisch_2016, title={Money Talks (Even) in the Sharing
    Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals},
    booktitle={Proceedings of the 37th International Conference on Information Systems
    (ICIS), Dublin, Ireland}, author={Gutt, Dominik and Kundisch, Dennis}, year={2016}
    }'
  chicago: 'Gutt, Dominik, and Dennis Kundisch. “Money Talks (Even) in the Sharing
    Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals.”
    In <i>Proceedings of the 37th International Conference on Information Systems
    (ICIS), Dublin, Ireland</i>, 2016.'
  ieee: 'D. Gutt and D. Kundisch, “Money Talks (Even) in the Sharing Economy: Empirical
    Evidence for Price Effects in Online Ratings as Quality Signals,” in <i>Proceedings
    of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>,
    Dublin, Ireland, 2016.'
  mla: 'Gutt, Dominik, and Dennis Kundisch. “Money Talks (Even) in the Sharing Economy:
    Empirical Evidence for Price Effects in Online Ratings as Quality Signals.” <i>Proceedings
    of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>,
    2016.'
  short: 'D. Gutt, D. Kundisch, in: Proceedings of the 37th International Conference
    on Information Systems (ICIS), Dublin, Ireland, 2016.'
conference:
  location: Dublin, Ireland
  name: 37th International Conference on Information Systems (ICIS)
date_created: 2017-10-17T12:41:27Z
date_updated: 2022-01-06T06:53:25Z
ddc:
- '040'
department:
- _id: '276'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T12:33:18Z
  date_updated: 2018-03-21T12:33:18Z
  file_id: '1534'
  file_name: 180-ICIS_2016_Money_Talks_revision_final.pdf
  file_size: 435668
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T12:33:18Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '8'
  name: SFB 901 - Subprojekt A4
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the 37th International Conference on Information Systems
  (ICIS), Dublin, Ireland
status: public
title: 'Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects
  in Online Ratings as Quality Signals'
type: conference
user_id: '16205'
year: '2016'
...
---
_id: '18011'
author:
- first_name: M.
  full_name: Brüggemann, M.
  last_name: Brüggemann
- first_name: T.
  full_name: Knaus, T.
  last_name: Knaus
- first_name: Dorothee M.
  full_name: Meister, Dorothee M.
  id: '346'
  last_name: Meister
citation:
  ama: 'Brüggemann M, Knaus T, Meister DM. <i>Kommunikationskulturen in Digitalen
    Welten. Konzepte Und Strategien Der Medienpädagogik Und Medienbildung</i>. München:
    kopaed; 2016.'
  apa: 'Brüggemann, M., Knaus, T., &#38; Meister, D. M. (2016). <i>Kommunikationskulturen
    in digitalen Welten. Konzepte und Strategien der Medienpädagogik und Medienbildung</i>.
    München: kopaed.'
  bibtex: '@book{Brüggemann_Knaus_Meister_2016, place={München}, title={Kommunikationskulturen
    in digitalen Welten. Konzepte und Strategien der Medienpädagogik und Medienbildung},
    publisher={kopaed}, author={Brüggemann, M. and Knaus, T. and Meister, Dorothee
    M.}, year={2016} }'
  chicago: 'Brüggemann, M., T. Knaus, and Dorothee M. Meister. <i>Kommunikationskulturen
    in Digitalen Welten. Konzepte Und Strategien Der Medienpädagogik Und Medienbildung</i>.
    München: kopaed, 2016.'
  ieee: 'M. Brüggemann, T. Knaus, and D. M. Meister, <i>Kommunikationskulturen in
    digitalen Welten. Konzepte und Strategien der Medienpädagogik und Medienbildung</i>.
    München: kopaed, 2016.'
  mla: Brüggemann, M., et al. <i>Kommunikationskulturen in Digitalen Welten. Konzepte
    Und Strategien Der Medienpädagogik Und Medienbildung</i>. kopaed, 2016.
  short: M. Brüggemann, T. Knaus, D.M. Meister, Kommunikationskulturen in Digitalen
    Welten. Konzepte Und Strategien Der Medienpädagogik Und Medienbildung, kopaed,
    München, 2016.
date_created: 2020-08-17T11:31:11Z
date_updated: 2022-01-06T06:53:25Z
department:
- _id: '137'
language:
- iso: eng
place: München
publisher: kopaed
status: public
title: Kommunikationskulturen in digitalen Welten. Konzepte und Strategien der Medienpädagogik
  und Medienbildung
type: book
user_id: '21240'
year: '2016'
...
---
_id: '18015'
author:
- first_name: A. M.
  full_name: Kamin, A. M.
  last_name: Kamin
- first_name: A.-D.
  full_name: Greiner, A.-D.
  last_name: Greiner
- first_name: Dorothee M.
  full_name: Meister, Dorothee M.
  id: '346'
  last_name: Meister
- first_name: I.
  full_name: Darmann-Finck, I.
  last_name: Darmann-Finck
citation:
  ama: 'Kamin AM, Greiner A-D, Meister DM, Darmann-Finck I. <i>Mediengestütztes Lernen
    in der Pflege - zwischen Traditionen und Innovationen</i>. Paderborn: INVIA Verlag;
    2016.'
  apa: 'Kamin, A. M., Greiner, A.-D., Meister, D. M., &#38; Darmann-Finck, I. (2016).
    <i>Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen</i>.
    Paderborn: INVIA Verlag.'
  bibtex: '@book{Kamin_Greiner_Meister_Darmann-Finck_2016, place={Paderborn}, title={Mediengestütztes
    Lernen in der Pflege - zwischen Traditionen und Innovationen}, publisher={INVIA
    Verlag}, author={Kamin, A. M. and Greiner, A.-D. and Meister, Dorothee M. and
    Darmann-Finck, I.}, year={2016} }'
  chicago: 'Kamin, A. M., A.-D. Greiner, Dorothee M. Meister, and I. Darmann-Finck.
    <i>Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen</i>.
    Paderborn: INVIA Verlag, 2016.'
  ieee: 'A. M. Kamin, A.-D. Greiner, D. M. Meister, and I. Darmann-Finck, <i>Mediengestütztes
    Lernen in der Pflege - zwischen Traditionen und Innovationen</i>. Paderborn: INVIA
    Verlag, 2016.'
  mla: Kamin, A. M., et al. <i>Mediengestütztes Lernen in der Pflege - zwischen Traditionen
    und Innovationen</i>. INVIA Verlag, 2016.
  short: A.M. Kamin, A.-D. Greiner, D.M. Meister, I. Darmann-Finck, Mediengestütztes
    Lernen in der Pflege - zwischen Traditionen und Innovationen, INVIA Verlag, Paderborn,
    2016.
date_created: 2020-08-17T11:48:06Z
date_updated: 2022-01-06T06:53:25Z
department:
- _id: '137'
language:
- iso: ger
place: Paderborn
publisher: INVIA Verlag
status: public
title: Mediengestütztes Lernen in der Pflege - zwischen Traditionen und Innovationen
type: book
user_id: '21240'
year: '2016'
...
---
_id: '18025'
author:
- first_name: Sebastian
  full_name: Heuchler, Sebastian
  last_name: Heuchler
citation:
  ama: 'Heuchler S. <i>Nibbler: Implementing a Turing Machine to Simulate the Busy
    Beaver Problem</i>.; 2016.'
  apa: 'Heuchler, S. (2016). <i>Nibbler: Implementing a Turing machine to simulate
    the Busy Beaver problem</i>.'
  bibtex: '@book{Heuchler_2016, title={Nibbler: Implementing a Turing machine to simulate
    the Busy Beaver problem}, author={Heuchler, Sebastian}, year={2016} }'
  chicago: 'Heuchler, Sebastian. <i>Nibbler: Implementing a Turing Machine to Simulate
    the Busy Beaver Problem</i>, 2016.'
  ieee: 'S. Heuchler, <i>Nibbler: Implementing a Turing machine to simulate the Busy
    Beaver problem</i>. 2016.'
  mla: 'Heuchler, Sebastian. <i>Nibbler: Implementing a Turing Machine to Simulate
    the Busy Beaver Problem</i>. 2016.'
  short: 'S. Heuchler, Nibbler: Implementing a Turing Machine to Simulate the Busy
    Beaver Problem, 2016.'
date_created: 2020-08-18T08:38:22Z
date_updated: 2022-01-06T06:53:25Z
department:
- _id: '79'
language:
- iso: eng
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: 'Nibbler: Implementing a Turing machine to simulate the Busy Beaver problem'
type: bachelorsthesis
user_id: '15504'
year: '2016'
...
