Refine
Year of publication
- 2019 (69) (remove)
Document Type
- Other (30)
- Article (19)
- Doctoral Thesis (13)
- Monograph/Edited Volume (6)
- Habilitation Thesis (1)
Is part of the Bibliography
- yes (69) (remove)
Keywords
- evaluation (3)
- BPMN (2)
- Business process models (2)
- DMN (2)
- Hasso Plattner Institute (2)
- Hasso-Plattner-Institut (2)
- Scrum (2)
- Teamwork (2)
- retrospective (2)
- software process improvement (2)
- user experience (2)
- 3D point clouds (1)
- 3D printing (1)
- Agile (1)
- Analyse (1)
- Android (1)
- Arzt-Patient-Beziehung (1)
- Audit (1)
- Batch activity (1)
- Batch processing (1)
- Bedrohungsanalyse (1)
- Bedrohungsmodell (1)
- Behavioral equivalence and refinement (1)
- Big Five Model (1)
- Bisimulation and simulation (1)
- Blockchain (1)
- Blockchain Governance (1)
- Blockchain-enabled Governance (1)
- Brand Personality (1)
- Business process choreographies (1)
- Business process improvement (1)
- CMOS technology (1)
- Case Management (1)
- Cloud (1)
- Cloud Computing (1)
- Clustering (1)
- Co-production (1)
- Colored Petri Net (1)
- Computervision (1)
- Conceptual Fit (1)
- Data-driven price anticipation (1)
- Datenanalyse (1)
- Decision models (1)
- Declarative modelling (1)
- Deep learning (1)
- Design Thinking (1)
- Design-Forschung (1)
- Digital Engineering (1)
- Digitization (1)
- Document classification (1)
- Drift (1)
- Dynamic pricing (1)
- Dynamic pricing competition (1)
- Dynamic programming (1)
- E-health (1)
- Entscheidungskorrektheit (1)
- Ereignisabonnement (1)
- Estimation-of-Distribution-Algorithmen (1)
- Estimation-of-distribution algorithm (1)
- Evaluation (1)
- Expressive rendering (1)
- First-hitting time (1)
- Formal verification of behavior preservation (1)
- Forschungskolleg (1)
- Gene Expression Data Analysis (1)
- Geodaten (1)
- German schools (1)
- Geschäftsprozess-Choreografien (1)
- Geschäftsprozessmanagement (1)
- Graph Algorithms (1)
- Graph Theory (1)
- Graph transformation (1)
- Graphreparatur (1)
- HPI Schul-Cloud (1)
- Hyperbolic Geometry (1)
- ICT (1)
- IEEE 802.15.4 (1)
- IT-Infrastruktur (1)
- IT-Sicherheit (1)
- IT-infrastructure (1)
- IT-security (1)
- In-Memory (1)
- Indoor environments (1)
- Industry 4.0 (1)
- Information flow control (1)
- Informationsflüsse (1)
- Informationsraum (1)
- Informationsraumverletzungen (1)
- Innovation (1)
- Integrative Gene Selection (1)
- Interactive control (1)
- Internet der Dinge (1)
- Invariant checking (1)
- Java (1)
- JavaScript (1)
- K-12 (1)
- Klausurtagung (1)
- Knowledge Bases (1)
- Konsistenzrestauration (1)
- Korrektheit (1)
- Laufzeitanalyse (1)
- Learning Factory (1)
- MAC security (1)
- MOOC (1)
- MOOCs (1)
- Machine Learning (1)
- Maschinenlernen (1)
- Mediumzugriffskontrolle (1)
- Meltdown (1)
- Memory Dumping (1)
- Mobile devices (1)
- Model extraction (1)
- Modellreparatur (1)
- Multiview classification (1)
- Nash equilibrium (1)
- Natural language analysis (1)
- Natural language processing (1)
- Network Science (1)
- Network creation games (1)
- Neural networks (1)
- New Public Governance (1)
- Non-photorealistic rendering (1)
- Parking search (1)
- Patents (1)
- Patientenermündigung (1)
- Pattern (1)
- Pattern Recognition (1)
- Peer Assessment (1)
- Personality Prediction (1)
- Ph.D. retreat (1)
- Prior Knowledge (1)
- Process Enactment (1)
- Process architecture (1)
- Process landscape (1)
- Process map (1)
- Process model (1)
- Programming course (1)
- Project-based learning (1)
- Prototyping (1)
- Psychotherapie (1)
- Python (1)
- REST-Interaktionen (1)
- RESTful choreographies (1)
- RESTful interactions (1)
- Random process (1)
- Relational model transformation (1)
- Response strategies (1)
- Roadmap (1)
- SAFE (1)
- SET effects (1)
- Schlafentzugsangriffe (1)
- School (1)
- Schriftartgestaltung (1)
- Schriftrendering (1)
- Schule (1)
- Schwachstelle (1)
- Secondary Education (1)
- Security (1)
- Semantic enrichment (1)
- Service-oriented (1)
- Service-oriented Systems Engineering (1)
- Situationsbewusstsein (1)
- Smalltalk (1)
- Social Media Analysis (1)
- Spatio-Temporal Data (1)
- Spatio-temporal data analysis (1)
- Spectre (1)
- Spezifikation von gezeiteten Graph Transformationen (1)
- Squeak (1)
- Style transfer (1)
- Subject-oriented learning (1)
- Suchtberatung und -therapie (1)
- Survey (1)
- Team Assessment (1)
- Team-based Learning (1)
- Theorie (1)
- Theory (1)
- Trajectory Data Management (1)
- Triple graph grammars (1)
- Unbiasedness (1)
- User Experience (1)
- Virtual Machine (1)
- WALA (1)
- Word embedding (1)
- action problems (1)
- addiction care (1)
- agile (1)
- allocation problem (1)
- analysis (1)
- availability (1)
- bachelor project (1)
- business process choreographies (1)
- business process managament (1)
- classification zone (1)
- classification zone violations (1)
- cloud (1)
- cloud computing (1)
- clustering (1)
- combinational logic (1)
- comparison (1)
- complex event processing (1)
- complex networks (1)
- computational hardness (1)
- computer science education (1)
- computer vision (1)
- computer-mediated therapy (1)
- computervermittelte Therapie (1)
- connectivity (1)
- consistency restoration (1)
- constrained optimization (1)
- context (1)
- data analytics (1)
- database replication (1)
- decision soundness (1)
- decision-aware process models (1)
- decoupling cells (1)
- deep learning (1)
- demand learning (1)
- denial of sleep (1)
- design research (1)
- developing countries (1)
- digital education (1)
- digital whiteboard (1)
- digitale Bildung (1)
- digitales Whiteboard (1)
- doctor-patient relationship (1)
- e-Commerce (1)
- e-commerce (1)
- edge-weighted networks (1)
- entscheidungsbewusste Prozessmodelle (1)
- estimation-of-distribution algorithms (1)
- event subscription (1)
- fabrication (1)
- field study (1)
- font engineering (1)
- font rendering (1)
- formal verification (1)
- formale Verifikation (1)
- framework (1)
- game dynamics (1)
- geographical distribution (1)
- geospatial data (1)
- graph analysis (1)
- graph repair (1)
- graphical query language (1)
- grobe Protokolle (1)
- healthcare (1)
- imbalanced learning (1)
- information flows (1)
- innovation (1)
- internet of things (1)
- internet topology (1)
- inventory management (1)
- key establishment (1)
- key management (1)
- key revocation (1)
- komplexe Ereignisverarbeitung (1)
- large-scale mechanism (1)
- learning factories (1)
- learning platform (1)
- linear programming (1)
- link layer security (1)
- machine learning (1)
- medical documentation (1)
- medical image analysis (1)
- medium access control (1)
- medizinische Bildanalyse (1)
- medizinische Dokumentation (1)
- metric termporal graph logic (1)
- metrisch temporale Graph Logic (1)
- model repair (1)
- nested graph conditions (1)
- oligopoly competition (1)
- patient empowerment (1)
- price of anarchy (1)
- probabilistic routing (1)
- production networks (1)
- project based learning (1)
- prototyping (1)
- pseudo-Boolean optimization (1)
- pseudoboolesche Optimierung (1)
- psychotherapy (1)
- radiation hardening (1)
- rekeying (1)
- reliability (1)
- research school (1)
- rough logs (1)
- run time analysis (1)
- secure data flow diagrams (DFDsec) (1)
- secure multi-execution (1)
- service-oriented systems engineering (1)
- sichere Datenflussdiagramme (DFDsec) (1)
- simulation (1)
- situational awareness (1)
- smalltalk (1)
- soccer analytics (1)
- software development (1)
- soundness (1)
- specification of timed graph transformations (1)
- squeak (1)
- task realization strategies (1)
- theory (1)
- threat analysis (1)
- threat model (1)
- tiefes Lernen (1)
- typed attributed graphs (1)
- typisierte attributierte Graphen (1)
- uBPMN (1)
- ubiquitous decision-aware business process (1)
- ubiquitous decisions (1)
- unbalancierter Datensatz (1)
- univariat (1)
- univariate (1)
- user research framework (1)
- user-centered design (1)
- variable geometry truss (1)
- verschachtelte Graphbedingungen (1)
- vocational training (1)
- vulnerability (1)
Institute
- Hasso-Plattner-Institut für Digital Engineering GmbH (69) (remove)
Technical report
(2019)
Design and Implementation of service-oriented architectures imposes a huge number of research questions from the fields of software engineering, system analysis and modeling, adaptability, and application integration. Component orientation and web services are two approaches for design and realization of complex web-based system. Both approaches allow for dynamic application adaptation as well as integration of enterprise application.
Commonly used technologies, such as J2EE and .NET, form de facto standards for the realization of complex distributed systems. Evolution of component systems has lead to web services and service-based architectures. This has been manifested in a multitude of industry standards and initiatives such as XML, WSDL UDDI, SOAP, etc. All these achievements lead to a new and promising paradigm in IT systems engineering which proposes to design complex software solutions as collaboration of contractually defined software services.
Service-Oriented Systems Engineering represents a symbiosis of best practices in object-orientation, component-based development, distributed computing, and business process management. It provides integration of business and IT concerns.
The annual Ph.D. Retreat of the Research School provides each member the opportunity to present his/her current state of their research and to give an outline of a prospective Ph.D. thesis. Due to the interdisciplinary structure of the research school, this technical report covers a wide range of topics. These include but are not limited to: Human Computer Interaction and Computer Vision as Service; Service-oriented Geovisualization Systems; Algorithm Engineering for Service-oriented Systems; Modeling and Verification of Self-adaptive Service-oriented Systems; Tools and Methods for Software Engineering in Service-oriented Systems; Security Engineering of Service-based IT Systems; Service-oriented Information Systems; Evolutionary Transition of Enterprise Applications to Service Orientation; Operating System Abstractions for Service-oriented Computing; and Services Specification, Composition, and Enactment.
In the era of social networks, internet of things and location-based services, many online services produce a huge amount of data that have valuable objective information, such as geographic coordinates and date time. These characteristics (parameters) in the combination with a textual parameter bring the challenge for the discovery of geospatiotemporal knowledge. This challenge requires efficient methods for clustering and pattern mining in spatial, temporal and textual spaces.
In this thesis, we address the challenge of providing methods and frameworks for geospatiotemporal data analytics. As an initial step, we address the challenges of geospatial data processing: data gathering, normalization, geolocation, and storage. That initial step is the basement to tackle the next challenge -- geospatial clustering challenge. The first step of this challenge is to design the method for online clustering of georeferenced data. This algorithm can be used as a server-side clustering algorithm for online maps that visualize massive georeferenced data. As the second step, we develop the extension of this method that considers, additionally, the temporal aspect of data. For that, we propose the density and intensity-based geospatiotemporal clustering algorithm with fixed distance and time radius.
Each version of the clustering algorithm has its own use case that we show in the thesis.
In the next chapter of the thesis, we look at the spatiotemporal analytics from the perspective of the sequential rule mining challenge. We design and implement the framework that transfers data into textual geospatiotemporal data - data that contain geographic coordinates, time and textual parameters. By this way, we address the challenge of applying pattern/rule mining algorithms in geospatiotemporal space. As the applicable use case study, we propose spatiotemporal crime analytics -- discovery spatiotemporal patterns of crimes in publicly available crime data.
The second part of the thesis, we dedicate to the application part and use case studies. We design and implement the application that uses the proposed clustering algorithms to discover knowledge in data. Jointly with the application, we propose the use case studies for analysis of georeferenced data in terms of situational and public safety awareness.
This paper investigates the applicability of CMOS decoupling cells for mitigating the Single Event Transient (SET) effects in standard combinational gates. The concept is based on the insertion of two decoupling cells between the gate's output and the power/ground terminals. To verify the proposed hardening approach, extensive SPICE simulations have been performed with standard combinational cells designed in IHP's 130 nm bulk CMOS technology. Obtained simulation results have shown that the insertion of decoupling cells results in the increase of the gate's critical charge, thus reducing the gate's soft error rate (SER). Moreover, the decoupling cells facilitate the suppression of SET pulses propagating through the gate. It has been shown that the decoupling cells may be a competitive alternative to gate upsizing and gate duplication for hardening the gates with lower critical charge and multiple (3 or 4) inputs, as well as for filtering the short SET pulses induced by low-LET particles.
Business process management is an established technique for business organizations to manage and support their processes. Those processes are typically represented by graphical models designed with modeling languages, such as the Business Process Model and Notation (BPMN).
Since process models do not only serve the purpose of documentation but are also a basis for implementation and automation of the processes, they have to satisfy certain correctness requirements. In this regard, the notion of soundness of workflow nets was developed, that can be applied to BPMN process models in order to verify their correctness. Because the original soundness criteria are very restrictive regarding the behavior of the model, different variants of the soundness notion have been developed for situations in which certain violations are not even harmful.
All of those notions do only consider the control-flow structure of a process model, however. This poses a problem, taking into account the fact that with the recent release and the ongoing development of the Decision Model and Notation (DMN) standard, an increasing number of process models are complemented by respective decision models. DMN is a dedicated modeling language for decision logic and separates the concerns of process and decision logic into two different models, process and decision models respectively.
Hence, this thesis is concerned with the development of decisionaware soundness notions, i.e., notions of soundness that build upon the original soundness ideas for process models, but additionally take into account complementary decision models. Similar to the various notions of workflow net soundness, this thesis investigates different notions of decision soundness that can be applied depending on the desired degree of restrictiveness. Since decision tables are a standardized means of DMN to represent decision logic, this thesis also puts special focus on decision tables, discussing how they can be translated into an unambiguous format and how their possible output values can be efficiently determined.
Moreover, a prototypical implementation is described that supports checking a basic version of decision soundness. The decision soundness notions were also empirically evaluated on models from participants of an online course on process and decision modeling as well as from a process management project of a large insurance company. The evaluation demonstrates that violations of decision soundness indeed occur and can be detected with our approach.
The interplay between process and decision models plays a crucial role in business process management, as decisions may be based on running processes and affect process outcomes. Often process models include decisions that are encoded through process control flow structures and data flow elements, thus reducing process model maintainability. The Decision Model and Notation (DMN) was proposed to achieve separation of concerns and to possibly complement the Business Process Model and Notation (BPMN) for designing decisions related to process models. Nevertheless, deriving decision models from process models remains challenging, especially when the same data underlie both process and decision models. In this paper, we explore how and to which extent the data modeled in BPMN processes and used for decision-making may be represented in the corresponding DMN decision models. To this end, we identify a set of patterns that capture possible representations of data in BPMN processes and that can be used to guide the derivation of decision models related to existing process models. Throughout the paper we refer to real-world healthcare processes to show the applicability of the proposed approach. (C) 2019 Elsevier Ltd. All rights reserved.
Creating fonts is a complex task that requires expert knowledge in a variety of domains. Often, this knowledge is not held by a single person, but spread across a number of domain experts. A central concept needed for designing fonts is the glyph, an elemental symbol representing a readable character. Required domains include designing glyph shapes, engineering rules to combine glyphs for complex scripts and checking legibility. This process is most often iterative and requires communication in all directions. This report outlines a platform that aims to enhance the means of communication, describes our prototyping process, discusses complex font rendering and editing in a live environment and an approach to generate code based on a user’s live-edits.
Modern production infrastructures of globally operating companies usually consist of multiple distributed production sites. While the organization of individual sites consisting of Industry 4.0 components itself is demanding, new questions regarding the organization and allocation of resources emerge considering the total production network. In an attempt to face the challenge of efficient distribution and processing both within and across sites, we aim to provide a hybrid simulation approach as a first step towards optimization. Using hybrid simulation allows us to include real and simulated concepts and thereby benchmark different approaches with reasonable effort. A simulation concept is conceptualized and demonstrated qualitatively using a global multi-site example.
Network Creation Games are a well-known approach for explaining and analyzing the structure, quality and dynamics of real-world networks like the Internet and other infrastructure networks which evolved via the interaction of selfish agents without a central authority. In these games selfish agents which correspond to nodes in a network strategically buy incident edges to improve their centrality. However, past research on these games has only considered the creation of networks with unit-weight edges. In practice, e.g. when constructing a fiber-optic network, the choice of which nodes to connect and also the induced price for a link crucially depends on the distance between the involved nodes and such settings can be modeled via edge-weighted graphs. We incorporate arbitrary edge weights by generalizing the well-known model by Fabrikant et al. [PODC'03] to edge-weighted host graphs and focus on the geometric setting where the weights are induced by the distances in some metric space. In stark contrast to the state-of-the-art for the unit-weight version, where the Price of Anarchy is conjectured to be constant and where resolving this is a major open problem, we prove a tight non-constant bound on the Price of Anarchy for the metric version and a slightly weaker upper bound for the non-metric case. Moreover, we analyze the existence of equilibria, the computational hardness and the game dynamics for several natural metrics. The model we propose can be seen as the game-theoretic analogue of a variant of the classical Network Design Problem. Thus, low-cost equilibria of our game correspond to decentralized and stable approximations of the optimum network design.
User-generated content on social media platforms is a rich source of latent information about individual variables. Crawling and analyzing this content provides a new approach for enterprises to personalize services and put forward product recommendations. In the past few years, brands made a gradual appearance on social media platforms for advertisement, customers support and public relation purposes and by now it became a necessity throughout all branches. This online identity can be represented as a brand personality that reflects how a brand is perceived by its customers. We exploited recent research in text analysis and personality detection to build an automatic brand personality prediction model on top of the (Five-Factor Model) and (Linguistic Inquiry and Word Count) features extracted from publicly available benchmarks. The proposed model reported significant accuracy in predicting specific personality traits form brands. For evaluating our prediction results on actual brands, we crawled the Facebook API for 100k posts from the most valuable brands' pages in the USA and we visualize exemplars of comparison results and present suggestions for future directions.
While the IEEE 802.15.4 radio standard has many features that meet the requirements of Internet of things applications, IEEE 802.15.4 leaves the whole issue of key management unstandardized. To address this gap, Krentz et al. proposed the Adaptive Key Establishment Scheme (AKES), which establishes session keys for use in IEEE 802.15.4 security. Yet, AKES does not cover all aspects of key management. In particular, AKES comprises no means for key revocation and rekeying. Moreover, existing protocols for key revocation and rekeying seem limited in various ways. In this paper, we hence propose a key revocation and rekeying protocol, which is designed to overcome various limitations of current protocols for key revocation and rekeying. For example, our protocol seems unique in that it routes around IEEE 802.15.4 nodes whose keys are being revoked. We successfully implemented and evaluated our protocol using the Contiki-NG operating system and aiocoap.