@misc{SerthPodlesnyBornsteinetal.2017, author = {Serth, Sebastian and Podlesny, Nikolai and Bornstein, Marvin and Lindemann, Jan and Latt, Johanna and Selke, Jan and Schlosser, Rainer and Boissier, Martin and Uflacker, Matthias}, title = {An interactive platform to simulate dynamic pricing competition on online marketplaces}, series = {2017 IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC)}, journal = {2017 IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC)}, publisher = {Institute of Electrical and Electronics Engineers}, address = {New York}, isbn = {978-1-5090-3045-3}, issn = {2325-6354}, doi = {10.1109/EDOC.2017.17}, pages = {61 -- 66}, year = {2017}, abstract = {E-commerce marketplaces are highly dynamic with constant competition. While this competition is challenging for many merchants, it also provides plenty of opportunities, e.g., by allowing them to automatically adjust prices in order to react to changing market situations. For practitioners however, testing automated pricing strategies is time-consuming and potentially hazardously when done in production. Researchers, on the other side, struggle to study how pricing strategies interact under heavy competition. As a consequence, we built an open continuous time framework to simulate dynamic pricing competition called Price Wars. The microservice-based architecture provides a scalable platform for large competitions with dozens of merchants and a large random stream of consumers. Our platform stores each event in a distributed log. This allows to provide different performance measures enabling users to compare profit and revenue of various repricing strategies in real-time. For researchers, price trajectories are shown which ease evaluating mutual price reactions of competing strategies. Furthermore, merchants can access historical marketplace data and apply machine learning. By providing a set of customizable, artificial merchants, users can easily simulate both simple rule-based strategies as well as sophisticated data-driven strategies using demand learning to optimize their pricing strategies.}, language = {en} } @misc{LimbergerScheibelTrappetal.2017, author = {Limberger, Daniel and Scheibel, Willy and Trapp, Matthias and D{\"o}llner, J{\"u}rgen Roland Friedrich}, title = {Mixed-projection treemaps}, series = {21st International Conference Information Visualisation (IV)}, journal = {21st International Conference Information Visualisation (IV)}, publisher = {Institute of Electrical and Electronics Engineers}, address = {Los Alamitos}, isbn = {978-1-5386-0831-9}, issn = {2375-0138}, doi = {10.1109/iV.2017.67}, pages = {164 -- 169}, year = {2017}, abstract = {This paper presents a novel technique for combining 2D and 2.5D treemaps using multi-perspective views to leverage the advantages of both treemap types. It enables a new form of overview+detail visualization for tree-structured data and contributes new concepts for real-time rendering of and interaction with treemaps. The technique operates by tilting the graphical elements representing inner nodes using affine transformations and animated state transitions. We explain how to mix orthogonal and perspective projections within a single treemap. Finally, we show application examples that benefit from the reduced interaction overhead.}, language = {en} } @misc{Giese2017, author = {Giese, Holger}, title = {Formal models and analysis for self-adaptive cyber-physical systems}, series = {Lecture notes in computer science}, volume = {10231}, journal = {Lecture notes in computer science}, editor = {Kouchnarenko, Olga and Khosravi, Ramtin}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-57666-4}, issn = {0302-9743}, doi = {10.1007/978-3-319-57666-4_1}, pages = {3 -- 9}, year = {2017}, abstract = {In this extended abstract, we will analyze the current challenges for the envisioned Self-Adaptive CPS. In addition, we will outline our results to approach these challenges with SMARTSOS [10] a generic approach based on extensions of graph transformation systems employing open and adaptive collaborations and models at runtime for trustworthy self-adaptation, self-organization, and evolution of the individual systems and the system-of-systems level taking the independent development, operation, management, and evolution of these systems into account.}, language = {en} } @misc{PlauthSterzEberhardtetal.2017, author = {Plauth, Max and Sterz, Christoph and Eberhardt, Felix and Feinbube, Frank and Polze, Andreas}, title = {Assessing NUMA performance based on hardware event counters}, series = {IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)}, journal = {IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)}, publisher = {Institute of Electrical and Electronics Engineers}, address = {New York}, isbn = {978-0-7695-6149-3}, issn = {2164-7062}, doi = {10.1109/IPDPSW.2017.51}, pages = {904 -- 913}, year = {2017}, abstract = {Cost models play an important role for the efficient implementation of software systems. These models can be embedded in operating systems and execution environments to optimize execution at run time. Even though non-uniform memory access (NUMA) architectures are dominating today's server landscape, there is still a lack of parallel cost models that represent NUMA system sufficiently. Therefore, the existing NUMA models are analyzed, and a two-step performance assessment strategy is proposed that incorporates low-level hardware counters as performance indicators. To support the two-step strategy, multiple tools are developed, all accumulating and enriching specific hardware event counter information, to explore, measure, and visualize these low-overhead performance indicators. The tools are showcased and discussed alongside specific experiments in the realm of performance assessment.}, language = {en} } @misc{LorenzKiekhebenSchnor2017, author = {Lorenz, Claas and Kiekheben, Sebastian and Schnor, Bettina}, title = {FaVe: Modeling IPv6 firewalls for fast formal verification}, series = {International Conference on Networked Systems (NetSys) 2017}, journal = {International Conference on Networked Systems (NetSys) 2017}, publisher = {IEEE}, address = {New York}, doi = {10.1109/NetSys.2017.7903956}, pages = {8}, year = {2017}, abstract = {As virtualization drives the automation of networking, the validation of security properties becomes more and more challenging eventually ruling out manual inspections. While formal verification in Software Defined Networks is provided by comprehensive tools with high speed reverification capabilities like NetPlumber for instance, the presence of middlebox functionality like firewalls is not considered. Also, they lack the ability to handle dynamic protocol elements like IPv6 extension header chains. In this work, we provide suitable modeling abstractions to enable both - the inclusion of firewalls and dynamic protocol elements. We exemplarily model the Linux ip6tables/netfilter packet filter and also provide abstractions for an application layer gateway. Finally, we present a prototype of our formal verification system FaVe.}, language = {en} } @misc{MalchowRenzBaueretal.2017, author = {Malchow, Martin and Renz, Jan and Bauer, Matthias and Meinel, Christoph}, title = {Embedded smart home}, series = {11th Annual IEEE International Systems Conference (SysCon)}, journal = {11th Annual IEEE International Systems Conference (SysCon)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5090-4623-2}, issn = {1944-7620}, doi = {10.1109/SYSCON.2017.7934728}, pages = {195 -- 200}, year = {2017}, abstract = {The popularity of MOOCs has increased considerably in the last years. A typical MOOC course consists of video content, self tests after a video and homework, which is normally in multiple choice format. After solving this homeworks for every week of a MOOC, the final exam certificate can be issued when the student has reached a sufficient score. There are also some attempts to include practical tasks, such as programming, in MOOCs for grading. Nevertheless, until now there is no known possibility to teach embedded system programming in a MOOC course where the programming can be done in a remote lab and where grading of the tasks is additionally possible. This embedded programming includes communication over GPIO pins to control LEDs and measure sensor values. We started a MOOC course called "Embedded Smart Home" as a pilot to prove the concept to teach real hardware programming in a MOOC environment under real life MOOC conditions with over 6000 students. Furthermore, also students with real hardware have the possibility to program on their own real hardware and grade their results in the MOOC course. Finally, we evaluate our approach and analyze the student acceptance of this approach to offer a course on embedded programming. We also analyze the hardware usage and working time of students solving tasks to find out if real hardware programming is an advantage and motivating achievement to support students learning success.}, language = {en} } @misc{AlibabaieGhasemzadehMeinel2017, author = {Alibabaie, Najmeh and Ghasemzadeh, Mohammad and Meinel, Christoph}, title = {A variant of genetic algorithm for non-homogeneous population}, series = {International Conference Applied Mathematics, Computational Science and Systems Engineering 2016}, volume = {9}, journal = {International Conference Applied Mathematics, Computational Science and Systems Engineering 2016}, publisher = {EDP Sciences}, address = {Les Ulis}, issn = {2271-2097}, doi = {10.1051/itmconf/20170902001}, pages = {8}, year = {2017}, abstract = {Selection of initial points, the number of clusters and finding proper clusters centers are still the main challenge in clustering processes. In this paper, we suggest genetic algorithm based method which searches several solution spaces simultaneously. The solution spaces are population groups consisting of elements with similar structure. Elements in a group have the same size, while elements in different groups are of different sizes. The proposed algorithm processes the population in groups of chromosomes with one gene, two genes to k genes. These genes hold corresponding information about the cluster centers. In the proposed method, the crossover and mutation operators can accept parents with different sizes; this can lead to versatility in population and information transfer among sub-populations. We implemented the proposed method and evaluated its performance against some random datasets and the Ruspini dataset as well. The experimental results show that the proposed method could effectively determine the appropriate number of clusters and recognize their centers. Overall this research implies that using heterogeneous population in the genetic algorithm can lead to better results.}, language = {en} } @misc{GawronChengMeinel2017, author = {Gawron, Marian and Cheng, Feng and Meinel, Christoph}, title = {PVD: Passive Vulnerability Detection}, series = {8th International Conference on Information and Communication Systems (ICICS)}, journal = {8th International Conference on Information and Communication Systems (ICICS)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5090-4243-2}, issn = {2471-125X}, doi = {10.1109/IACS.2017.7921992}, pages = {322 -- 327}, year = {2017}, abstract = {The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses the existing information and eliminates the necessity of a comprehensive scan of the target system. Since our approach is able to identify vulnerabilities without the additional effort of a scan, we are able to increase the overall performance of the detection. Because of the reuse and the removal of the active testing procedures, our approach could be classified as a passive vulnerability detection. We will explain the approach and illustrate the additional possibility to increase the security awareness of users. Therefore, we applied the approach on an experimental setup and extracted security relevant information from web logs.}, language = {en} } @misc{TorkuraSukmanaChengetal.2017, author = {Torkura, Kennedy A. and Sukmana, Muhammad Ihsan Haikal and Cheng, Feng and Meinel, Christoph}, title = {Leveraging cloud native design patterns for security-as-a-service applications}, series = {IEEE International Conference on Smart Cloud (SmartCloud)}, journal = {IEEE International Conference on Smart Cloud (SmartCloud)}, publisher = {Institute of Electrical and Electronics Engineers}, address = {New York}, isbn = {978-1-5386-3684-8}, doi = {10.1109/SmartCloud.2017.21}, pages = {90 -- 97}, year = {2017}, abstract = {This paper discusses a new approach for designing and deploying Security-as-a-Service (SecaaS) applications using cloud native design patterns. Current SecaaS approaches do not efficiently handle the increasing threats to computer systems and applications. For example, requests for security assessments drastically increase after a high-risk security vulnerability is disclosed. In such scenarios, SecaaS applications are unable to dynamically scale to serve requests. A root cause of this challenge is employment of architectures not specifically fitted to cloud environments. Cloud native design patterns resolve this challenge by enabling certain properties e.g. massive scalability and resiliency via the combination of microservice patterns and cloud-focused design patterns. However adopting these patterns is a complex process, during which several security issues are introduced. In this work, we investigate these security issues, we redesign and deploy a monolithic SecaaS application using cloud native design patterns while considering appropriate, layered security counter-measures i.e. at the application and cloud networking layer. Our prototype implementation out-performs traditional, monolithic applications with an average Scanner Time of 6 minutes, without compromising security. Our approach can be employed for designing secure, scalable and performant SecaaS applications that effectively handle unexpected increase in security assessment requests.}, language = {en} } @misc{StaubitzWilkinsHagedornetal.2017, author = {Staubitz, Thomas and Wilkins, Christian and Hagedorn, Christiane and Meinel, Christoph}, title = {The Gamification of a MOOC Platform}, series = {Proceedings of 2017 IEEE Global Engineering Education Conference (EDUCON)}, journal = {Proceedings of 2017 IEEE Global Engineering Education Conference (EDUCON)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5090-5467-1}, issn = {2165-9567}, doi = {10.1109/EDUCON.2017.7942952}, pages = {883 -- 892}, year = {2017}, abstract = {Massive Open Online Courses (MOOCs) have left their mark on the face of education during the recent years. At the Hasso Plattner Institute (HPI) in Potsdam, Germany, we are actively developing a MOOC platform, which provides our research with a plethora of e-learning topics, such as learning analytics, automated assessment, peer assessment, team-work, online proctoring, and gamification. We run several instances of this platform. On openHPI, we provide our own courses from within the HPI context. Further instances are openSAP, openWHO, and mooc.HOUSE, which is the smallest of these platforms, targeting customers with a less extensive course portfolio. In 2013, we started to work on the gamification of our platform. By now, we have implemented about two thirds of the features that we initially have evaluated as useful for our purposes. About a year ago we activated the implemented gamification features on mooc.HOUSE. Before activating the features on openHPI as well, we examined, and re-evaluated our initial considerations based on the data we collected so far and the changes in other contexts of our platforms.}, language = {en} }