@inproceedings{5438,
  author       = {{Gjøsteen, Kristian and Jager, Tibor}},
  booktitle    = {{Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II}},
  title        = {{{Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}}},
  doi          = {{10.1007/978-3-319-96881-0_4}},
  year         = {{2018}},
}

@article{5439,
  author       = {{Schneid, M and Isidor, R and Steinmetz, Holger and Kabst, Rüdiger}},
  journal      = {{Journal of Managerial Psychology.}},
  title        = {{{Age Diversity and team outcomes: A quantitative review. }}},
  year         = {{2018}},
}

@article{5441,
  author       = {{Isidor, R and Schwens, C and Hornung, F and Kabst, Rüdiger}},
  journal      = {{International Business Review (IBR).}},
  title        = {{{The Impact of Structural and Attitudinal Antecedents on the Instability of International Joint Ventures: The Mediating Role of Asymmetrical Changes in Commitment.}}},
  year         = {{2018}},
}

@inproceedings{5442,
  author       = {{Jager, Tibor and Kakvi, Saqib and May, Alexander}},
  booktitle    = {{Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS '18}},
  isbn         = {{9781450356930}},
  publisher    = {{ACM Press}},
  title        = {{{On the Security of the PKCS#1 v1.5 Signature Scheme}}},
  doi          = {{10.1145/3243734.3243798}},
  year         = {{2018}},
}

@article{5448,
  author       = {{Klonek, F and Isidor, R and Kauffeld, S}},
  journal      = {{Journal of Change Management.}},
  title        = {{{Different Stages of Entrepreneurship: Lessons From the Transtheoretical Model of Change. }}},
  year         = {{2018}},
}

@article{5450,
  author       = {{Schneid, M and Isidor, R and Schwens, C and Kabst, Rüdiger and Weber, I}},
  journal      = {{Die Betriebswirtschaft.}},
  title        = {{{Der Einfluss bio-demographischer und fachlicher Diversität auf die Leistung von Teams: Eine Metaanalyse.}}},
  year         = {{2018}},
}

@inproceedings{5469,
  abstract     = {{In diesem Beitrag werden simulatorische und messtechnische EMV-Untersuchungen von Gleichspannungswandlern vorgestellt. Der Fokus liegt auf leitungsgeführten Störspannungen, ihre Abhängigkeit vom Schaltungslayout und ihre Unterdrückung durch Filterung. Der Simulationsprozess besteht aus kombinierten Feld- und Netzwerksimulationen. Zur Bewertung der Simulationsresultate werden zwei Prototypen gezeigt, die gute und schlechte EMV-Eigenschaften aufweisen. Bei der Beurteilung der Resultate wird insbesondere Wert auf die Untersuchung gelegt, inwieweit einfache Schaltungssimulationen ausreichen, um leitungsgeführte Störspannungen korrekt vorherzusagen und wann aufwändigere Feldsimulationen notwendig sind.}},
  author       = {{Baumgarten, Tim and Scholz, Peter and Sievers, Denis and Förstner, Jens}},
  booktitle    = {{Elektromagnetische Verträglichkeit - Internationale Fachmesse und Kongress 2018}},
  editor       = {{Garbe, Heyno}},
  isbn         = {{978-3-95735-077-0}},
  location     = {{Düsseldorf}},
  pages        = {{47}},
  title        = {{{Simulation leitungsgeführter Störspannungen von DC-DC-Wandlern}}},
  year         = {{2018}},
}

@inproceedings{5480,
  author       = {{Salonen, A and Terho, H and Boehm, E and Rajala, R and Virtanen, A}},
  title        = {{{Engaging a product-oriented salesforce in solution sales}}},
  year         = {{2018}},
}

@inproceedings{5481,
  author       = {{Salonen, A and Terho, H and Boehm, E and Rajala, R and Virtanen, A}},
  title        = {{{How to transform a product-focused salesforce to solution sales?}}},
  year         = {{2018}},
}

@inproceedings{5530,
  abstract     = {{Software companies nowadays create ecosystems of users and third-party providers around their platforms. They often provide online stores so that the third-party developments can be exposed to users directly. The resulting ecosystems differ significantly from each other in their architectural designs because their providers differ in terms of business goals and contexts. Until now, this architectural diversity and rationale behind it are not well-understood. Therefore, it is not clear which software features contribute to ecosystem’s success with respect to certain business goals and context. This hinders systematic creation of ecosystems in the future. Thus, decision-making becomes too risky; for future ecosystem providers, which may lead to creation of inefficient ecosystems that lack critical features, and for third-party providers to rely on ad-hoc choices while deciding on suitability of an ecosystem for their future career. In this paper, we introduce three design patterns for store- oriented software ecosystems by classifying the design decisions, business goals, and context of 111 store-oriented software ecosystems. Each design pattern provides an architectural solution to achieve a different business goal while supporting a different context. We discuss how the design patterns are applied together in order to achieve more business goals. Our work supports ecosystem and third-party providers by sharing practice-proven architectural solutions, helping them to take informed architectural decisions and reduce technical risks.}},
  author       = {{Jazayeri, Bahar and Zimmermann, Olaf and Küster, Jochen and Engels, Gregor and Kundisch, Dennis and Szopinski, Daniel}},
  booktitle    = {{The Latin American Conference on Pattern Languages of Programs (SLPLoP)}},
  publisher    = {{ACM. To appear}},
  title        = {{{Patterns of Store-oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options}}},
  year         = {{2018}},
}

@article{5531,
  author       = {{Grytz, Raphael and Krohn-Grimberghe, Artus}},
  issn         = {{1947-3060}},
  journal      = {{International Journal of Systems and Service-Oriented Engineering}},
  number       = {{3}},
  pages        = {{37--59}},
  publisher    = {{IGI Global}},
  title        = {{{Business Intelligence and Analytics Cost Accounting: An Empirical Study of the Perceptions of Stakeholders and Their Implications}}},
  doi          = {{10.4018/IJSSOE.2018070103}},
  volume       = {{8}},
  year         = {{2018}},
}

@inproceedings{5547,
  author       = {{Lösch, Achim and Platzner, Marco}},
  booktitle    = {{2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)}},
  isbn         = {{9781538674796}},
  location     = {{Milan, Italy}},
  publisher    = {{IEEE}},
  title        = {{{A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes}}},
  doi          = {{10.1109/asap.2018.8445098}},
  year         = {{2018}},
}

@article{5586,
  abstract     = {{The need to protect resources against attackers is reflected by huge information security investments of firms worldwide. In the presence of budget constraints and a diverse set of assets to protect, organizations have to decide in which IT security measures to invest, how to evaluate those investment decisions, and how to learn from past decisions to optimize future security investment actions. While the academic literature has provided valuable insights into these issues, there is a lack of empirical contributions. To address this lack, we conduct a theory-based exploratory multiple case study. Our case study reveals that (1) firms? investments in information security are largely driven by external environmental and industry-related factors, (2) firms do not implement standardized decision processes, (3) the security process is perceived to impact the business process in a disturbing way, (4) both the implementation of evaluation processes and the application of metrics are hardly existent and (5) learning activities mainly occur at an ad-hoc basis.}},
  author       = {{Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}},
  journal      = {{Computers & Security}},
  keywords     = {{Information Security Investments, Multiple Case Study, Organizations, Single Loop Learning, Double Loop Learning}},
  pages        = {{807 -- 823}},
  publisher    = {{Elsevier}},
  title        = {{{Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning}}},
  volume       = {{77}},
  year         = {{2018}},
}

@inproceedings{5600,
  author       = {{Schuster, Richard and Wagner, Gerit and Schryen, Guido}},
  booktitle    = {{Proceedings of the 2018 International Conference on Information Systems (ICIS 2018)}},
  location     = {{San Francisco, CA, USA}},
  title        = {{{Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study}}},
  year         = {{2018}},
}

@inproceedings{6483,
  author       = {{Peuster, Manuel and Schneider, Stefan Balthasar and Christ, Frederic and Karl, Holger}},
  booktitle    = {{IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp}},
  location     = {{Verona}},
  publisher    = {{IEEE}},
  title        = {{{A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains}}},
  year         = {{2018}},
}

@techreport{6485,
  author       = {{Rosa, Raphael Vicente and Rothenberg, Christian Esteve and Peuster, Manuel and Karl, Holger}},
  publisher    = {{IETF}},
  title        = {{{Methodology for VNF Benchmarking Automation}}},
  year         = {{2018}},
}

@article{6505,
  author       = {{Smirnov, D. S. and Zhukov, E. A. and Kirstein, E. and Yakovlev, D. R. and Reuter, Dirk and Wieck, A. D. and Bayer, M. and Greilich, A. and Glazov, M. M.}},
  issn         = {{2469-9950}},
  journal      = {{Physical Review B}},
  number       = {{12}},
  publisher    = {{American Physical Society (APS)}},
  title        = {{{Theory of spin inertia in singly charged quantum dots}}},
  doi          = {{10.1103/physrevb.98.125306}},
  volume       = {{98}},
  year         = {{2018}},
}

@article{6516,
  author       = {{Mertens, Jan Cedric and Boschmann, Alexander and Schmidt, M. and Plessl, Christian}},
  issn         = {{1369-7072}},
  journal      = {{Sports Engineering}},
  number       = {{4}},
  pages        = {{441--451}},
  publisher    = {{Springer Nature}},
  title        = {{{Sprint diagnostic with GPS and inertial sensor fusion}}},
  doi          = {{10.1007/s12283-018-0291-0}},
  volume       = {{21}},
  year         = {{2018}},
}

@article{6525,
  author       = {{Krauter, Stefan}},
  journal      = {{Solar Energy}},
  pages        = {{768–776}},
  title        = {{{Simple and effective methods to match photovoltaic power generation to the grid load profile for a PV based energy system.}}},
  volume       = {{159}},
  year         = {{2018}},
}

@article{6562,
  author       = {{Feldmann, Nadine and Jurgelucks, Benjamin and Claes, Leander and Schulze, Veronika and Henning, Bernd and Walther, Andrea}},
  journal      = {{tm - Technisches Messen}},
  number       = {{2}},
  pages        = {{59--65}},
  publisher    = {{Walter de Gruyter GmbH}},
  title        = {{{An inverse approach to the characterisation of material parameters of piezoelectric discs with triple-ring-electrodes}}},
  doi          = {{10.1515/teme-2018-0066}},
  volume       = {{86}},
  year         = {{2018}},
}

