publicationsMatthiasRohr.bib

@inproceedings{GoeringMeisterLehnhoffHerdtJungRohr2017AReferenceArchitectureForOpenMaintainableAndSecureSoftwareForTheOperationOfEnergyNetworks,
  author = {Andre Goering and Juergen Meister and Sebastian Lehnhoff and Peter Herdt and Martin Jung and Matthias Rohr},
  title = {A Reference Architecture for open, maintainable and secure Software for the Operation of Energy Networks},
  booktitle = {Proceedings of the 24th CIRED International Conference on Electricity Distribution},
  year = {2017},
  publisher = {CIRED},
  pdf = {http://cired.net/publications/cired2017/pdfs/CIRED2017_0965_final.pdf},
  month = jun,
  abstract = {Regulatory effects, business pressure, and the transformation to smart grids foster the need for up-to-date software systems for managing and operating the grid operators electric power grids. The complexity of these systems has grown over decades. This makes enhancements and development of new functionalities in existing systems cost intensive, vendor/system specific and often prevents meeting time to market and quality requirements. Public interfaces and open data formats allow the development of enhancements and new functionality as re-usable modules by 3rd parties, thus enable the integration of best-of-breed systems in the system landscape at grid operators. A reduction of system complexity is a precondition to develop such re-usable modules while meeting time to market and quality requirements in critical infrastructure. This is accomplished by defining a reference architecture with a common architecture framework, common processes and quality standards.}
}
@inproceedings{RohrBoliniusBuschGuoLuhmannStadler2013TransformerMonitoringForCostEfficientAndRobustSmartGrids,
  author = {Matthias Rohr and Frank Bolinius and R\"{u}diger Busch and Xin Guo and Till Luhmann and Michael Stadler},
  title = {Transformer Monitoring for Cost-efficient and Robust Smart Grids},
  booktitle = {World Smart Grid Forum 2013, Berlin},
  year = {2013},
  publisher = {IEC, State Grid Corporation of China, VDE},
  month = sep,
  pdf = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/RohrBoliniusBuschGuoLuhmannStadler2013TransformerMonitoringForCostEfficientAndRobustSmartGrids.pdf},
  slides = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/RohrBoliniusBuschGuoLuhmannStadler2013TransformerMonitoringForCostEfficientAndRobustSmartGrids-Poster.pdf},
  abstract = {Smart Transformer Monitoring is being used in a Pilot installation in Northern Germany in order to increase the efficient use of substation transformers in the context of weather-dependent fluctuating power feed-in from renewables. This action allows to accommodate renewable energy resources while minimising the need of extending the electrical grid by avoiding preliminary aging.}
}
@incollection{RohrSpechtStadlerGruendlerLuhmannWolfMarwedeWischVogel2012RealisierungEinerSmartGridArchitektur,
  author = {Rohr, Matthias and Specht, Michael and Stadler, Michael and Gr\"{u}ndler, Michael and Luhmann, Till and Wolf, Konrad and Marwede, Nina and Wisch, Johannes and Vogel, Nils},
  affiliation = {BTC AG, Escherweg 5, 26121 Oldenburg, Deutschland},
  title = {Realisierung einer Smart Grid-Architektur},
  booktitle = {IT-Architekturentwicklung im Smart Grid},
  editor = {Appelrath, Hans-J\"{u}rgen and Beenken, Petra and Bischofs, Ludger and Uslar, Mathias},
  publisher = {Springer Berlin Heidelberg},
  isbn = {978-3-642-29208-8},
  keyword = {Business and Economics},
  pages = {227-249},
  doi = {10.1007/978-3-642-29208-8\_9},
  year = {2012}
}
@techreport{vanHoornRohrHasselbringWallerEhlersFreyKieselhorst2009TRContinuousMonitoringOfSoftwareServicesDesignAndApplicationOfTheKiekerFramework,
  author = {van Hoorn, Andr\'{e} and Rohr, Matthias and Hasselbring,
            Wilhelm and Waller, Jan and Ehlers, Jens and Frey, S\"{o}ren
            and Kieselhorst, Dennis},
  pdf = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/vanHoornRohrHasselbringWallerEhlersFreyKieselhorst2009TRContinuousMonitoringOfSoftwareServicesDesignAndApplicationOfTheKiekerFramework-final.pdf},
  title = {Continuous Monitoring of Software Services: {D}esign and Application of the {K}ieker Framework},
  institution = {Department of Computer Science,
                 University of Kiel, Germany},
  year = {2009},
  number = {TR-0921},
  month = nov
}
@inproceedings{BeerBischofsPriesUslarNiesseAppelrathRohrStadler2009DieEtelligenceReferenzarchitekturEineStandardbasierteArchitekturFuerRegionaleStrommaerkte,
  author = {Beer, Sebastian and Bischofs, Ludger and Pries, Christine and Uslar, Mathias and Nie\ss{}e, Astrid and Appelrath, H.-J\"{u}rgen and Rohr, Matthias and Stadler, Michael},
  title = {Die e{T}elligence-{R}eferenzarchitektur - {E}ine standardbasierte {A}rchitektur f\"{u}r regionale {S}tromm\"{a}rkte},
  booktitle = {Internationaler ETG-Kongress 2009 - Intelligente Netze und Leistungselektronik in Netzen},
  year = {2009},
  isbn = {978-3-8007-3194-7},
  month = oct,
  publisher = {VDE Verlag Berlin-Offenbach},
  abstract = {Aus dem aktuellen Wandel in der Energiewirtschaft hin zu einer dezentralen Energieversorgung ergeben sich sowohl technische und konzeptuelle Herausforderungen als auch \"{o}konomische und \"{o}kologische Potenziale. Im E-Energy-Projekt eTelligence wird derzeit eine Referenzarchitektur entwickelt, welche die grunds\"{a}tzlichen Anforderungen an einen regionalen Strommarkt erfasst und auf eine abstrakte Systemarchitektur abbildet. Prozesse der Gesch\"{a}fts- und Automatisierungsebene werden dabei vorrangig auf Basis internationaler Standards (IEC 61850, IEC 61968/61970) umgesetzt. Dieser Beitrag gibt erste Einblicke in die Struktur und Schwerpunkte der entwickelten Architektur.}
}
@inproceedings{StreekmannGieseckeReentsRohrStadlerVogelFrenzelFriebeLuhmann2012TowardsAModularAndScalableArchitectureForHighLevelSmartGridApplications,
  author = {Niels Streekmann and Simon Giesecke and Gerriet Reents and Matthias Rohr and Michael Stadler and Nils Vogel and Martin Frenzel and J\"{o}rg Friebe and Till Luhmann},
  title = {Towards a Modular and Scalable Architecture for High-Level Smart Grid Applications},
  booktitle = {Proceedings of the ICSE 2012 International Workshop on Software Engineering Challenges for the Smart Grid (SE4SG'12)},
  year = {2012},
  month = jun,
  publisher = {IEEE},
  abstract = {Sensor and actor population within future smart distribution grids is much denser than within transmission grids. Thereby, future grid management systems have to cope with larger amounts of data than today's grid management systems. Also, future high-level applications for network management must be suited for use within automatic control loops. This results in new challenges for designing high-level application components for power grid management. This paper addresses related software engineering challenges and presents solutions for designing software within the context of grid management.}
}
@inproceedings{RohrVanHoornHasselbringLuebckeAlekseev2010WorkloadIntensitySensitiveTimingBehaviorAnalysisForDistributedMultiUserSoftwareSystems,
  author = {Matthias Rohr and Andr{\'e} van Hoorn and Wilhelm Hasselbring and Marco L\"{u}bcke and Sergej Alekseev},
  title = {Workload-Intensity-Sensitive Timing Behavior Analysis for Distributed Multi-User Software Systems},
  booktitle = {Proceedings of the Joint WOSP/SIPEW International Conference on Performance Engineering (WOSP/SIPEW'10)},
  year = {2010},
  editor = {},
  isbn = {978-1-60558-563-5},
  pages = {87--92},
  doi = {10.1145/1712605.1712621},
  month = jan,
  pdf = {http://dl.acm.org/authorize?203943},
  publisher = {ACM},
  abstract = {In many multi-user software systems, such as online shopping systems, varying workload intensity causes high statistical variance in timing behavior distributions. However, this major impact on timing behavior is often ignored. This paper introduces our approach WITiBA (Workload-Intensity-Sensitive Timing Behavior Analysis) to consider inter-dependencies between concurrent executions of software operations within a distributed system to reduce the standard deviation for succeeding analysis steps. This can be beneficial for analysis methods or simulation methods in terms of tighter confidence intervals, or shorter simulations.},
  location = {January 28--30, 2010, San Jose, California, USA}
}
@inproceedings{vanHoornHasselbringRohr2009EngineeringAndContinuouslyOperatingSelfAdaptiveSoftwareSystemsRequiredDesignDecisions,
  author = {Andr\'e van Hoorn and Wilhelm Hasselbring and
            Matthias Rohr},
  title = {Engineering and Continuously Operating Self-Adaptive Software
           Systems: {R}equired Design Decisions},
  booktitle = {Design for Future -- Langlebige Softwaresysteme:
               Proceedings 1.\ Workshops des GI-Arbeitskreises
               ,,Langlebige Softwaresysteme~(L2S2)''},
  year = {2009},
  editor = {Engels, Gregor and Reussner, Ralf and Momm, Christof
            and Sauer, Stefan},
  month = oct,
  pages = {52--63},
  publisher = {CEUR}
}
@inproceedings{vanHoornRohrGulHasselbring2009AnAdaptationFrameworkEnablingResourceEfficientOperationOfSoftwareSystems,
  author = {Andr{\'e} van Hoorn and Matthias Rohr and Asad Gul and Wilhelm Hasselbring},
  title = {An Adaptation Framework Enabling Resource-Efficient Operation of
	Software Systems},
  booktitle = {Proceedings of the 2nd ACM/IEEE ICSE~2010 Warm-Up Workshop (WUP~2009)},
  year = {2009},
  editor = {Nenad Medvidovic and Tetsuo Tamai},
  isbn = {978-1-60558-565-9},
  pages = {41--44},
  doi = {10.1145/1527033.1527047},
  pdf = {http://dl.acm.org/authorize?179166},
  month = apr,
  publisher = {ACM},
  location = {April 1--3, 2009, Cape Town, South Africa},
  abstract = {This paper gives an overview about our current work on a framework which aims at operating component-based software systems more efficiently. Efficiency, in terms of the number of allocated data center resources, is improved by executing architecture-level runtime adaptations based on current workload situations. The proposed framework, called SLAstic, is described and open questions to be answered in future work are raised.}
}
@inproceedings{MarwedeRohrHoornHasselbring2009AutomaticFailureDiagnosisInDistributedLargeScaleSoftwareSystemsBasedOnTimingBehaviorAnomalyCorrelation,
  author = {Nina Marwede and Matthias Rohr and Andr\'{e} van Hoorn and Wilhelm Hasselbring},
  title = {Automatic Failure Diagnosis in Distributed Large-Scale Software Systems based on Timing Behavior Anomaly Correlation},
  slides = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/MarwedeRohrHoornHasselbring2008AutomaticFailureDiagnosisSupportInDistributedLargeScaleSoftwareSystemsBasedOnTimingBehaviorAnomalyCorrelation-slides.pdf},
  booktitle = {Proceedings of the 13th European Conference on Software Maintenance and Reengineering (CSMR'09)},
  year = {2009},
  publisher = {IEEE},
  editor = {Andreas Winter and Rudolf Ferenc and Jens Knodel},
  isbn = {978-0-7695-3589-0},
  location = {Kaiserslautern, Germany},
  month = mar,
  pages = {47--57},
  doi = {10.1109/CSMR.2009.15},
  keywords = {failure diagnosis, fault localization, software faults, software dependability, anomaly detection, component dependency graphs},
  abstract = {Manual failure diagnosis in large-scale software systems is time-consuming and error-prone. Automatic failure diagnosis support mechanisms can potentially narrow down, or even localize faults within a very short time which both helps to preserve system availability. A large class of automatic failure diagnosis approaches consists of two steps: 1) computation of component anomaly scores; 2) global correlation of the anomaly scores for fault localization.

In this paper, we present an architecture-centric approach for the second step. In our approach, component anomaly scores are correlated based on architectural dependency graphs of the software system and a rule set to address error propagation. Moreover, the results are graphically visualized in order to support fault localization and to enhance maintainability. The visualization combines architectural diagrams automatically derived from monitoring data with failure diagnosis results. In a case study, the approach is applied to a distributed sample Web application which is subject to fault injection.}
}
@inproceedings{GulSommerRohrVanHoornHasselbring2008EvaluationOfControlFlowTracesInSoftwareApplicationsForIntrusionDetection,
  author = {Imran Asad Gul and Nils Sommer and Matthias Rohr and
            Andr\'{e} van Hoorn and Wilhelm Hasselbring},
  title = {Evaluation of Control Flow Traces in Software Applications
           for Intrusion Detection},
  booktitle = {Proceedings of the 12th IEEE International Multitopic
               Conference (IEEE INMIC 2008)},
  year = {2008},
  pages = {368--373},
  month = dec,
  publisher = {IEEE},
  isbn = {978-1-4244-2824-3},
  doi = {10.1109/INMIC.2008.4777765},
  abstract = {Software security has become an important requirement, particularly for systems that are publicly accessible through the Internet. Such systems can be equipped with intrusion detection systems to uncover security breaches. In this paper, we present a novel application-level intrusion detection approach. A normal behavior profile is created from application-internal control flow in terms of operation execution traces. Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system. A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.}
}
@inproceedings{GieseckeRohrHasselbring2008ArchitecturalStylesForEarlyGoalDrivenMiddlewareSelection,
  author = {Simon Giesecke and Matthias Rohr and Wilhelm Hasselbring},
  title = {Architectural Styles for Early Goal-driven Middleware Selection},
  booktitle = {Proceedings of the 13th European Conference on Pattern Languages of Programs (EuroPLoP'08)},
  year = {2008},
  month = jul,
  note = {(accepted for publication)}
}
@inproceedings{VanHoornRohrHasselbring2008GeneratingProbabilisticAndIntensityVaryingWorkloadForWebBasedSoftwareSystems,
  author = {Andr\'e van Hoorn and Matthias Rohr and Wilhelm Hasselbring},
  title = {Generating Probabilistic and Intensity-varying Workload for Web-based
	Software Systems},
  booktitle = {Proceedings of the SPEC International Performance Evaluation Workshop (SIPEW'08)},
  year = {2008},
  editor = {Samuel Kounev and Ian Gorton and Kai Sachs},
  volume = {5119},
  series = {Lecture Notes in Computer Science (LNCS)},
  pages = {124--143},
  month = jun,
  pdf = {http://www.informatik.uni-oldenburg.de/~voorn/bib/avanhoorn/vanHoornRohrHasselbring2008GeneratingProbabilisticAndIntensityVaryingWorkloadForWebBasedSoftwareSystems-Final-stamped-finalPageNumbers.pdf},
  slides = {http://www.informatik.uni-oldenburg.de/~voorn/bib/avanhoorn/vanHoornRohrHasselbring2008GeneratingProbabilisticAndIntensityVaryingWorkloadForWebBasedSoftwareSystems-slides-2x3.pdf},
  organization = {SPEC},
  publisher = {Springer Verlag},
  address = {Heidelberg},
  doi = {10.1007/978-3-540-69814-2\_9},
  location = {Darmstadt, Germany},
  isbn = {978-3-540-69813-5},
  keywords = {}
}
@inproceedings{RohrVanHoornGieseckeMatevskaHasselbringAlekseev08TraceContextSensitivePerformanceProfilingForEnterpriseSoftwareApplications,
  author = {Matthias Rohr and Andr\'{e} van Hoorn and Simon Giesecke and Jasminka Matevska and Wilhelm Hasselbring and Sergej Alekseev},
  title = {Trace-context sensitive performance profiling for enterprise software applications},
  booktitle = {Proceedings of the SPEC International Performance Evaluation Workshop (SIPEW'08)},
  series = {Lecture Notes in Computer Science (LNCS)},
  volume = 5119,
  publisher = {Springer Verlag},
  address = {Heidelberg},
  pages = {283--302},
  location = {Darmstadt, Germany},
  month = jun,
  year = {2008},
  slides = {http://www.sipew2008.org/presentations/Sipew-MatthiasRohr.pdf},
  pdf = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/RohrVanHoornGieseckeMatevskaHasselbringAlekseev08TraceContextSensitivePerformanceProfilingForEnterpriseSoftwareApplications.pdf},
  editor = {Samuel Kounev and Ian Gorton and Kai Sachs},
  doi = {10.1007/978-3-540-69814-2\_18},
  isbn = {978-3-540-69813-5},
  keywords = {}
}
@inproceedings{RohrVanHoornGieseckeMatevskaHasselbring08TraceContextSensitivePerformanceModelsFromMonitoringDataOfSoftwareSystems,
  author = {Matthias Rohr and Andr\'{e} van Hoorn and Simon Giesecke and Jasminka Matevska and Wilhelm Hasselbring},
  title = {Trace-Context Sensitive Performance Models from Monitoring Data of Software Systems},
  editor = {Carl Lebsack},
  booktitle = {Proceedings of the Workshop on Tools Infrastructures and Methodologies for the Evaluation of Research Systems (TIMERS'08) at IEEE International Symposium on Performance Analysis of Systems and Software 2008},
  month = apr,
  year = 2008,
  pages = {37--44},
  keywords = {}
}
@inproceedings{RohrGieseckeHasselbringHielHeuvelWeigand06AClassificationSchemeForSelfAdaptationResearch,
  author = {Matthias Rohr and Simon Giesecke and Wilhelm Hasselbring and Marcel
	Hiel and Willem-Jan van den Heuvel and Hans Weigand},
  title = {{A} {C}lassification {S}cheme for {S}elf-adaptation {R}esearch},
  booktitle = {Proceedings of the International Conference on Self-Organization
	and Autonomous Systems In Computing and Communications (SOAS'2006)},
  year = {2006},
  month = sep,
  pdf = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/RohrGieseckeHasselbringHielHeuvelWeigand06AClassificationSchemeForSelfAdaptationResearch.pdf},
  keywords = {}
}
@misc{Rohr2007TimingBehaviorAnomalyDetectionForAutomaticFailureDetectionAndDiagnosis,
  author = {Matthias Rohr},
  title = {Timing Behavior Anomaly Detection for Automatic Failure Detection and Diagnosis},
  year = {2007},
  month = apr,
  slides = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/Rohr2007TimingBehaviorAnomalyDetectionForAutomaticFailureDetectionAndDiagnosis-slides.pdf},
  pdf = {http://d3s.mff.cuni.cz/research/seminar/download/2007-04-10-Rohr-TimingAnomaly.pdf},
  url = {http://d3s.mff.cuni.cz/research/seminar/download/2007-04-10-Rohr-TimingAnomaly.pdf},
  note = {Last Access: 2014-04-03. Presentation at Charles Univerity Prague}
}
@inproceedings{GieseckeRohrHasselbring06SoftwareBetriebsLeitstaendeFuerUnternehmensanwendungslandschaften,
  title = {Software-{B}etriebs-{L}eitst{\"a}nde f{\"u}r {U}nternehmensanwendungslandschaften},
  booktitle = {Proceedings of the Workshop ``{S}oftware-{L}eitst{\"a}nde: {I}ntegrierte {W}erkzeuge zur {S}oftware\-qualit{\"a}ts\-sicherung''},
  series = {Lecture Notes in Informatics},
  publisher = {Gesellschaft f\"{u}r Informatik},
  volume = {P-94},
  author = {Simon Giesecke and Matthias Rohr and Wilhelm Hasselbring},
  year = {2006},
  month = oct,
  pages = {110--117},
  isbn = {978-3-88579-188-1},
  abstract = {In Kontrollzentren f\"{u}r Telefon-, Verkehrs- oder Energieversorgungsnetzen werden Leitst\"{a}nde verwendet, um dem Betriebspersonal einen schnellen \"{U}berblick \"{u}ber die Netzarchitektur und deren gegenw\"{a}rtige Eigenschaften (z.B. Auslastung) zu bieten. Leitst\"{a}nde sind ein grundlegender Bestandteil von Kontrollzentren z.B. f\"{u}r Energieversorgungsnetze. F\"{u}r Softwaresysteme sind solche \"{U}berwachungs- und Steuerungssysteme bislang wenig verbreitet. Leitst\"{a}nde k\"{o}nnen bei der System\"{u}berwachung und dem Erkennen und Beheben von St\"{o}rungen helfen, da Betriebsdaten im Zusammenhang \"{u}berblickt werden k\"{o}nnen.Wir charakterisieren Software-Betriebs-Leitst\"{a}nde mit Hilfe einer Taxonomie von Software-Leitst\"{a}nden und beschreiben Anforderungen an solche Leitst\"{a}nde, beispielhaft f\"{u}r JavaEE-basierte Systeme.},
  keywords = {Software-Betriebsleitst\"{a}nde, Software-Cockpit}
}
@inproceedings{RohrBoskovicGieseckeHasselbring06ModelDrivenDevelopmentOfSelfManagingSoftwareSystems,
  title = {Model-driven Development of Self-managing Software Systems},
  booktitle = {Proceedings of the Workshop ``Models@run.time'' at the 9th International Conference on Model Driven Engineering Languages and Systems (MoDELS/UML'06) 2006},
  author = {Matthias Rohr and Marko Boskovic and Simon Giesecke and Wilhelm Hasselbring},
  year = {2006},
  pdf = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/RohrBoskovicGieseckeHasselbring06ModelDrivenDevelopmentOfSelfManagingSoftwareSystems.pdf},
  month = oct,
  abstract = {
The promise of self-management is to increase the dependability of complex software systems and its quality-of-service. However, self-management is a very complex task if implemented manually at code level. It introduces high risks to the system's maintainability and dependability. Model-driven development of self-management at the architectural level is a promising alternative to manual low-level approaches.

This paper outlines a model-driven approach for the model-driven realisation of self-management. The core of the approach are meta-models to specify constraints (based on architectural views), monitoring, and reconfiguration operations. These models can be used to generate selfmanagement consisting of (1.) the monitoring instrumentation, (2.) the runtime model that reflects the current state of the system in causal connection to architectural entities, (3.) the automatic checking of the conformance of the current runtime model to the given constraints, and (4.) the mapping to the reconfiguration operations that are provided by the employed middleware platforms.}
}
@inproceedings{WintelerRohr06RechtlicheInfektionProprietaererSystemeDurchGPLLizensierteSoftware,
  title = {{R}echtliche {I}nfektion propriet{\"a}rer {S}ysteme durch {GPL}-lizensierte {S}oftware},
  booktitle = {Tagungsband 7. {H}erbstakademie Deutsche Stiftung f{\"u}r Recht und Informatik ``{A}ktuelle {R}echtsfragen von {IT} und {I}nternet''},
  publisher = {Oldenburger Verlag f{\"u}r Wirtschaft, Informatik und Recht},
  author = {Daniel Winteler and Matthias Rohr},
  year = {2006},
  pages = {195--204},
  location = {Rothenburg ob der Tauber, Germany},
  month = sep,
  isbn = {3-939704-03-2},
  abstract = {Open Source Software (OSS) gewinnt zunehmend an Bedeutung. Die mit Abstand gebr\"{a}uchlichste Lizenz f\"{u}r OSS ist dabei die GNU General Public License (GPL). Diese bestimmt, dass propriet\"{a}re Software, die gemeinsam mit GPL-lizenzierter Software vertrieben wird, unter bestimmten Voraussetzungen ihrerseits GPL-lizenziert und damit quelloffen gemacht werden muss, andernfalls entfallen die an der OSS einger\"{a}umten Nutzungsrechte und eine Klage wegen Urheberrechtsverletzung droht. Am Beispiel von Ger\"{a}tetreibern f\"{u}r das GPL-lizenzierte Betriebssystem Linux und die f\"{u}r den Linux-Kernel diskutierte Lizenzabfrage sollen Reichweite und Grenzen der rechtlichen ,,Infektion'' propriet\"{a}rer Software durch GPL-lizenzierte Software aufgezeigt werden.}
}
@inproceedings{RohrHoornMatevskaSommerStoeverGieseckeHasselbring08KiekerContinuousMonitoringAndOnDemandVisualizationOfJavaSoftwareBehavior,
  author = {Matthias Rohr and Andr\'{e} van Hoorn and Jasminka Matevska and  Nils Sommer and Lena Stoever and Simon Giesecke and Wilhelm Hasselbring},
  title = {Kieker: Continuous Monitoring and on demand Visualization of {J}ava Software Behavior},
  booktitle = {Proceedings of the IASTED International Conference on Software Engineering 2008},
  year = {2008},
  publisher = {ACTA Press},
  month = feb,
  isbn = {978-0-88986-715-4},
  pages = {80--85},
  abstract = {Software behavior visualizations such as UML Sequence Diagrams are valuable to continuous program comprehension and analysis. This paper introduces an approach and implementation to the continuous monitoring and on demand visualization of software behavior, with a focus on multi-user Java Web applications. Our tool, called Kieker, monitors response times and control-flow for selected operations of a software application. The monitoring overhead is intended to be small enough to continuously monitor a selection of operations during normal operation. Besides monitoring, Kieker offers the reconstruction and visualization of models of current or past software system behavior in terms of UML Sequence Diagrams, Markov chains, Component Dependency Graphs, Trace Timing Diagrams, as well as Execution and Message trace models.},
  keywords = {}
}
@inproceedings{Rohr07TimingBehaviorAnomalyDetectionForAutomaticFailureDetectionAndDiagnosis,
  title = {Timing {B}ehavior {A}nomaly {D}etection for {A}utomatic {F}ailure {D}etection and {D}iagnosis},
  booktitle = {Proceedings of the Dagstuhl Graduate School Meeting 2007 ``Dagstuhl Zehn plus Eins'' },
  author = {Matthias Rohr},
  year = {2007},
  month = jun,
  publisher = {Verlagshaus Mainz GmbH Aachen},
  isbn = {3-86130-882-7},
  keywords = {}
}
@inproceedings{Rohr05ReliabilityPredictionOfDynamicDistributedComponentBasedSoftwareSystems,
  title = {Reliability {P}rediction of {D}ynamic, {D}istributed, {C}omponent-based {S}oftware {S}ystems},
  booktitle = {Proceedings of the ``Treffen der Graduiertenkollegs 2005'', Dagstuhl},
  author = {Matthias Rohr},
  year = {2005},
  keywords = {}
}
@inproceedings{Rohr06TimingBehaviorAnomalyDetectionForFaultLocalization,
  title = {Timing {B}ehavior {A}nomaly {D}etection for {F}ault {L}ocalization},
  author = {Matthias Rohr},
  booktitle = {Proceedings of the International Research Training Groups Workshop, Dagstuhl},
  crossref = {dagstuhl06res},
  isbn = {3-936771-871},
  pages = {20},
  year = {2006},
  keywords = {}
}
@proceedings{dagstuhl06res,
  editor = {Jens Happe and Heiko Koziolek and Matthias Rohr and Christian Strom and Timo Warns},
  title = {Proceedings of the International Research Training Groups Workshop, Dagstuhl},
  isbn = {3-936771-871},
  year = {2006},
  month = nov,
  keywords = {}
}
@mastersthesis{Rohr04AutomaticFaceDetectionAndRecognitionBasedOnEigenfacesAndColor,
  author = {Matthias Rohr},
  title = {Automatic {F}ace {D}etection and {R}ecognition {B}ased on {E}igenfaces and {C}olor},
  school = {Dept. of Computer Science and Software Engineering, Monash University, Australia},
  year = 2004,
  pages = 92,
  keywords = {}
}
@inproceedings{Rohr05ExampleOfEmpiricalResearchNVersionProgramming,
  title = {Example Of {E}mpirical {R}esearch: n-{V}ersion {P}rogramming},
  booktitle = {Research Methods in Software Engineering},
  series = {Trustworthy Software Systems},
  author = {Matthias Rohr},
  publisher = {GITO Verlag},
  address = {Berlin},
  isbn = {3-936771-57-x},
  pages = {39--62},
  year = {2005},
  language = {english},
  editor = {Wilhelm Hasselbring and Simon Giesecke},
  volume = 1,
  keywords = {}
}
@article{RohrOsterlohGruendlerLuhmannStadlerVogel2011UsingCimForSmartGridIntegration,
  title = {Using {CIM} for {S}mart {G}rid {ICT} {I}ntegration},
  author = {Matthias Rohr and Andre Osterloh and Michael Gr{\"u}ndler and Till Luhmann and Michael Stadler and Nils Vogel},
  journal = {International Journal of Interoperability in Business Information Systems},
  volume = {6},
  issn = {1862-6378},
  pages = {45--61},
  pdf = {http://www.ibis.uni-oldenburg.de/download/issues/11/Using_CIM_for_Smart_Grid_ICT_integration.pdf},
  month = sep,
  year = {2011},
  abstract = {The {eTelligence} project explores and demonstrates various smart energy grid ideas by using modern {ICT} (information and communications technology). For this purpose, many new and heterogeneous types of smart grid systems have to be developed and integrated, such as a regional energy market, distributed energy management systems, and an advanced metering infrastructure. The future interaction scenarios of such new systems are still topics of research, which calls for an architecture easily supporting future changes. The integration capabilities of the {eTelligence} {ICT} architecture are based on standardized communication, especially using {IEC} 61970/61968 {(Common} Information Model, {CIM)} and an easily extensible market product description language also realized with {CIM.} Additionally, we present a process model for using {CIM}, and report our experiences from using {CIM} for integration.}
}
@article{HasselbringRohrTaegerWinteler06LiabilityRisksInReUsingThirdPartySoftware,
  title = {Liability {R}isks in {R}eusing {T}hird-{P}arty {S}oftware},
  author = {Wilhelm Hasselbring and Matthias Rohr and J{\"u}rgen Taeger and Daniel Winteler},
  journal = {Communications of the ACM},
  volume = {49},
  number = {12},
  year = {2006},
  issn = {0001-0782},
  pages = {144},
  doi = {10.1145/1183236.1183258},
  publisher = {ACM},
  keywords = {}
}
@book{eprint-id403,
  title = {Trustworthy {S}oftware {S}ystems: {A} {D}iscussion of {B}asic {C}oncepts and {T}erminology},
  author = {Becker, Steffen and Boscovic, Marco and Dhama, Abhishek and Giesecke, Simon and Happe, Jens and Hasselbring, Wilhelm and Koziolek, Heiko and Lipskoch, Henrik and Meyer, Roland and Muhle, Margarethe and Paul, Alexander and Ploski, Jan and Rohr, Matthias and Swaminathan, Mani and Warns, Timo and Winteler, Daniel},
  year = {2006},
  month = sep,
  publisher = {Carl von Ossietzky Universit{\"a}t of Oldenburg},
  pages = {43},
  keywords = {}
}
@article{BeckerHasselbringPaulBoskovicKoziolekPloskiDhamaLipskochRohrWintelerGieseckeMeyerSwaminathanHappeMuhleWarns06TrustworthySoftwareSystemsADiscussionOfBasicConceptsAndTerminology,
  author = {Steffen Becker and Wilhelm Hasselbring and Alexandra Paul and Marko Boskovic and Heiko Koziolek and Jan Ploski and Abhishek Dhama and Henrik Lipskoch and Matthias Rohr and Daniel Winteler and Simon Giesecke and Roland Meyer and Mani Swaminathan and Jens Happe and Margarete Muhle and Timo Warns},
  title = {Trustworthy {S}oftware {S}ystems: a {D}iscussion of {B}asic {C}oncepts and {T}erminology},
  journal = {SIGSOFT Softw. Eng. Notes},
  volume = {31},
  number = {6},
  year = {2006},
  month = nov,
  issn = {0163-5948},
  pages = {1--18},
  doi = {10.1145/1218776.1218781},
  pdf = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/BeckerHasselbringPaulBoskovicKoziolekPloskiDhamaLipskochRohrWintelerGieseckeMeyerSwaminathanHappeMuhleWarns06TrustworthySoftwareSystemsADiscussionOfBasicConceptsAndTerminology.pdf},
  publisher = {ACM},
  abstract = {Basic concepts and terminology for trustworthy software systems are discussed. Our discussion of definitions for terms in the domain of trustworthy software systems is based on former achievements in dependable, trustworthy and survivable systems. We base our discussion on the established literature and on approved standards. These concepts are discussed in the context of our graduate school TrustSoft on trustworthy software systems. In TrustSoft, we consider trustworthiness of software systems as determined by correctness, safety, quality of service (performance, reliability, availability), security, and privacy. Particular means to achieve trustworthiness of component-based software systems - as investigated in TrustSoft - are formal verification, quality prediction and certification; complemented by fault diagnosis and fault tolerance for increased robustness.},
  keywords = {}
}
@inproceedings{GieseckeMarwedeRohrHasselbring07AStyleBasedArchitectureModellingApproachForUML2ComponentDiagrams,
  author = {Simon Giesecke and Florian Marwede and Matthias Rohr and Wilhelm Hasselbring},
  title = {A Style-based Architecture Modelling Approach for
                  UML 2 Component Diagrams},
  booktitle = {Proceedings of the 11th IASTED International Conference Software Engineering and Applications (SEA'2007)},
  pages = {530-538},
  year = 2007,
  month = nov,
  isbn = {978-0-88986-705-5},
  publisher = {ACTA Press},
  keywords = {}
}
@article{PloskiRohrSchwenkenbergHasselbring07ResearchIssuesInSoftwareFaultCategorization,
  author = {Jan Ploski and Matthias Rohr and Peter Schwenkenberg and Wilhelm Hasselbring },
  title = {Research {I}ssues in {S}oftware {F}ault {C}ategorization},
  journal = {SIGSOFT Software Engineering Notes},
  volume = {32},
  number = {6},
  year = {2007},
  month = nov,
  issn = {0163-5948},
  pdf = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/PloskiRohrSchwenkenbergHasselbring07ResearchIssuesInSoftwareFaultCategorization.pdf},
  doi = {10.1145/1317471.1317478},
  pages = {1--8},
  publisher = {ACM},
  abstract = {Software faults are a major threat for the dependability of software systems. When we intend to study the impact of software faults on software behavior, examine the quality of fault tolerance mechanisms, or evaluate diagnostic techniques, the issue of distinguishing fault categories and their frequency distribution arises immediately. This article surveys the literature that provides quantitative data on categories of software faults and discusses the applicability of these software fault category distributions to fault injection case studies.},
  keywords = {Software Faults, Bugs, Software Fault Categorization, Software Reliability, Injection of Software Faults}
}
@inproceedings{RohrGieseckeHasselbring07TimingBehaviorAnomalyDetectionInEnterpriseInformationSystems,
  author = {Matthias Rohr and Simon Giesecke and Wilhelm Hasselbring},
  title = {Timing {B}ehavior {A}nomaly {D}etection in {E}nterprise {I}nformation {S}ystems},
  booktitle = {Proceedings of the Ninth International Conference on Enterprise Information Systems (ICEIS'07)},
  editor = {Jorge Cardoso and Jos\'{e} Cordeiro and Joaquim Filipe},
  publisher = {INSTICC Press},
  isbn = {978-972-8865-88-7},
  year = {2007},
  month = jun,
  volume = {DISI},
  pages = {494--497},
  abstract = {Business-critical Enterprise Information Systems (EIS) have to satisfy high availability requirements. In order to achieve the required availability, automatic failure detection and diagnosis techniques must be used. A major cause of failures in EIS are software faults in the application layer. In this paper, we propose to use anomaly detection to diagnose failures in the application layer of EIS.  Anomaly detection aims to identify unusual system behavior in monitoring data. These anomalies can be valuable indicators for availability or security problems, and support failure diagnosis. 

In this paper we outline the basic principles of anomaly detection, present the state of the art, and typical application challenges. We outline a new approach for anomaly detection in Enterprise Information Systems that addresses some of these challenges.}
}
@inproceedings{WiebenKummRohrStadlerHohn2014The5percentApproachAsBuildingBlockofAnEnergySystemDominatedByRenewables,
  author = {Enno Wieben and Thomas Kumm and Matthias Rohr and Michael Stadler and Elke Hohn},
  title = {The 5\% Approach as Building Block of an Energy System dominated by Renewables},
  booktitle = {Proceedings of the 28th International Conference on Informatics for Environmental Protection (EnviroInfo'14)},
  editor = {Jorge Marx G\'{o}mez and Michael Sonnenschein and Ute Vogel and Andreas Winter and Barbara Rapp and Nils Giesen},
  publisher = {{BIS}-Verlag, Oldenburg},
  isbn = {978-3-8142-2317-9},
  year = {2014},
  pages = {85--92},
  pdf = {http://www.enviroinfo.eu/sites/default/files/pdfs/vol8514/0085.pdf},
  url = {http://iai-uiserv1.iai.fzk.de/ictensure/site?mod=litdb&subject=art&pid=X4AA18255&action=detail},
  abstract = {We describe an approach for doubling distribution grid capacity for connecting renewable generators based on curtailing a maximum of 5\,\% of the yearly energy fed in to the grid on a pergenerator basis. The paper contains  information about the control unit needed for automatic minimum curtailment and the field test that has been set up to validate the approach. Furthermore, topics concerning the operationalization of the 5\,\% approach using both, operational technology and information technology are discussed.}
}
@inproceedings{WiebenKummTreydelGuoHohnLuhmannRohrStadler2015The5PApproachAsBuildingBlockOfAnEnergySystemDominatedByRenewables,
  author = {Enno Wieben and Thomas Kumm and Riccardo Treydel and Xin Guo and Elke Hohn and Till Luhmann and Matthias Rohr and Michael Stadler},
  title = {The 5\% Approach as Building Block of an Energy System dominated by Renewables},
  booktitle = {Advances and New Trends in Environmental and Energy Informatics},
  series = {Progress in IS},
  editor = {Jorge Marx G\'{o}mez and Michael Sonnenschein and Ute Vogel and Andreas Winter and Barbara Rapp and Nils Giesen},
  pages = {99--113},
  year = {2016},
  isbn = {978-3-319-23454-0},
  doi = {10.1007/978-3-319-23455-7},
  publisher = {Springer International Publishing}
}
@inproceedings{GoeringEtAl2016ArchitectureAndQualityStandardsForTheJointDevelopment,
  author = {Andre Goering and Juergen Meister and Sebastian Lehnhoff and Martin Jung and Matthias Rohr and Peter Herdt},
  title = {Architecture and Quality Standards for the Joint Development of Modular Open Source Software for Power Grid Distribution Management Systems},
  booktitle = {Proceedings of the 5th D-A-CH+ Energy Informatics Conference in conjunction with 7th Symposium on Communications for Energy Systems (ComForEn)},
  editor = {Friederich Kupzog},
  month = sep,
  pages = {36--39},
  year = {2016},
  isbn = {978-3-85133-090-8},
  pdf = {http://www.energieinformatik2016.org/wp-content/uploads/2016/09/Proceedings_DACH-Energy-Informatics_ComForEn-2016-Web.pdf},
  publisher = {{Eigenverlag des \"{O}sterreichischen Verbandes f\"{u}r Elektrotechnik, Wien}}
}
@inproceedings{WiebenKummRohrStadler20145prozentAnsatzAlsBausteinEinesModernenRegenerativenEnergiesystems,
  title = {Der ``5\,\% {A}nsatz'' als {B}austein eines modernen regenerativen {E}nergiesystems},
  author = {Enno Wieben and Thomas Kumm and Matthias Rohr and Michael Stadler},
  booktitle = {Proceedings of the {VDE}-Kongress 2014 {S}mart {C}ities},
  publisher = {VDE Verlag Berlin},
  pages = {251--254},
  isbn = {978-3-8007-3641-6},
  month = oct,
  year = {2014},
  abstract = {Dieser Beitrag besch\"{a}ftigt sich mit einer erh\"{o}hten Integration dezentraler Erzeugungsanlagen in das Verteilnetz. Die Integration Netzanschlusskapazit\"{a}t kann verdoppelt werden, wenn 5\,\% der erzeugten j\"{a}hrlichen Energie von Erzeugungsanlagen Netzanschlusskapazit\"{a}t gezielt disponiert werden k\"{o}nnten.}
}
@article{Rohr2014SichererStromImStadtwerkenetz,
  title = {Sicherer {S}trom im {S}tadtwerkenetz},
  journal = {{E}nergy 2.0 : {Z}ukunft {E}nergie},
  number = {6},
  author = {Matthias Rohr},
  year = 2014,
  month = sep,
  pages = {32--35},
  publisher = {publish-industry Verlag M\"{u}nchen},
  url = {http://www.industr.com/Energy20-Magazin/de_DE/themen/Panorama/sicherer-strom-im-stadtwerkenetz-68997},
  issn = {1866-1335},
  abstract = {Stadtwerke sind mehr und mehr gefordert, mitzuhelfen, die Risiken f\"{u}r die Stromversorgung im Gesamtnetz einzud\"{a}mmen. Gleichzeitig gilt es, den Zustand des eigenen Netzes zu \"{u}berwachen und zu beeinflussen. Sowohl f\"{u}r die Rolle im Gesamtnetz als auch f\"{u}r die Betriebsf\"{u}hrung im eigenen Netz sind effiziente und sichere IT-Systeme eine zentrale Voraussetzung.}
}
@article{Rohr2016UeberproduktionWasNun,
  title = {{\"{U}berproduktion - was nun?}},
  journal = {{E}nergy 2.0 : {Z}ukunft {E}nergie},
  number = {4},
  author = {Matthias Rohr},
  year = 2016,
  month = may,
  pages = {24--25},
  publisher = {publish-industry Verlag M\"{u}nchen},
  url = {http://www.industr.com/Energy20-Magazin/de_DE/themen/Panorama/ueberproduktion-was-nun-1335897},
  issn = {1866-1335},
  abstract = {Das neue Strommarktgesetz erlaubt es Netzbetreibern, Erzeugungsspitzen bei drohender \"{U}berlastung zu kappen. Ein neuer Regler \"{u}berwacht automatisch und leitsystementkoppelt das Verteilnetz.}
}
@article{Rohr2016DynamischeKappungVonErzeugungsspitzenEineAlternativeZumKonventionellenVerteilnetzausbau,
  title = {{Dynamische Kappung von Erzeugungsspitzen - eine Alternative zum konventionellen Verteilnetzausbau}},
  journal = {Energiewirtschaftliche Tagesfragen (et)},
  number = {8},
  author = {Matthias Rohr},
  year = 2016,
  month = aug,
  pages = {33--35},
  publisher = {etv Energieverlag GmbH, Essen},
  pdf = {https://www.btc-ag.com/de/SID-7DB5063F-B2701D20/documents/ET_8-16_Rohr.pdf},
  issn = {0720-6240},
  abstract = {Das Ende Juni vom Bundestag verabschiedete Strommarktgesetz leitet einen Paradigmenwechsel im Netzausbau ein. Die Betreiber d\"{u}rfen k\"{u}nftig bei drohender \"{U}berlastung ihrer Netze bis zu 3 \% der j\"{a}hrlichen Stromerzeugung von Photovoltaik- und Windenergieanlagen kappen. Mehrere Studien und ein erster erfolgreicher Feldtest belegen die Wirksamkeit einer solchen Strategie. In vielen Netzen wird sich mittels dynamischer Spitzenkappung und intelligenter Regelungstechnik die Anschlusskapazit\"{a}t verdoppeln lassen.}
}
@article{Rohr2017StadtUndWerk-SoftwareRegeltLadestrom,
  title = {{Elektromobilit\"{a}t: Software regelt Ladestrom}},
  journal = {Stadt + Werk : Energiepolitik, Klimaschutz, Rekommunalisierung},
  number = {7-8},
  author = {Matthias Rohr},
  year = 2017,
  month = jul,
  publisher = {T\"{u}bingen : K21 Media AG},
  url = {http://www.stadt-und-werk.de/heftarchiv_231_stadt%2Bwerk52017.html},
  issn = {2193-195X},
  abstract = {Beim Aufbau einer st\"{a}dtischen Lade-Infrastruktur f\"{u}r Elektroautos gibt es eine Alternative zum teuren Netzausbau. IT-basierte Netzregler erkennen kritische Situationen und greifen steuernd ein, wenn es zu Lastspitzen kommt.}
}
@article{2017-09-SteinertRohr-BWK-KeinBlindflugBeiBlindleistung,
  title = {{Kein Blindflug bei Blindleistung - Intelligentes Management stabilisiert das Netz und vermeidet Kosten}},
  journal = {BWK : das Energie-Fachmagazin},
  number = {9},
  author = {Sandra Steinert and Matthias Rohr},
  year = 2017,
  month = sep,
  pages = {26--27},
  publisher = {Springer-VDI-Verlag},
  url = {http://www.ingenieur.de/BWK/2017/Ausgabe-9/Erneuerbare-Energien/Kein-Blindflug-bei-Blindleistung},
  issn = {1618-193X},
  abstract = {Die fluktuierende Stromerzeugung aus erneuerbaren Energietr\"{a}gern ver\"{a}ndert die Arbeit der Netzbetreiber und Stromerzeuger nachhaltig. Um weiterhin eine hohe Versorgungsqualit\"{a}t zu garantieren, stehen \"{U}bertragungsnetz- und Verteilnetzbetreiber in der Pflicht, Schwankungen abzufedern. Eine IT-gest\"{u}tzte Regelungstechnik schafft die Voraussetzung, Wirk- und Blindleistung dynamisch aufeinander abzustimmen, um die Spannungsstabilit\"{a}t im Netz zu garantieren, Grenzwerte einzuhalten und gleichzeitig den Blindleistungshaushalt zu optimieren. In einem
aktuellen Projekt mit Feldtest werden Praxistauglichkeit und wirtschaftliches Potenzial gepr\"{u}ft.}
}
@article{Rohr2016VerdoppelteAnschlusskapazitaet,
  title = {{Verdoppelte Anschlusskapazit\"{a}t}},
  journal = {BWK : das Energie-Fachmagazin},
  number = {7-8},
  author = {Matthias Rohr},
  year = 2016,
  month = jul,
  pages = {45--46},
  publisher = {Springer-VDI-Verlag},
  url = {http://www.ingenieur.de/BWK/2016/Ausgabe-7-8/IT-Management/Verdoppelte-Anschlusskapazitaet},
  pdf = {https://www.btc-ag.com/de/SID-9C987DE4-9FA83C75/documents/BWK_07-08_2016_BWK_7-8-2016.pdf},
  issn = {1618-193X},
  abstract = {Das Strommarktgesetz, das am 23. Juni 2016 im Bundestag verabschiedet wurde, bringt f\"{u}r viele Verteilnetzbetreiber und Stadtwerke die erhoffte Wende und verg\"{u}nstigt f\"{u}r manchen Anlagenbetreiber den Netzanschluss. Mit der Spitzenkappung erhalten Netz betreiber eine zus\"{a}tzliche Option f\"{u}r den effizienten Netzausbau. Damit ist der Weg frei, Investitionen in die konventionelle Infrastruktur-Erweiterung mit Hilfe innovativer IT-basierter Regelungstechnik zu begrenzen und teilweise ganz zu vermeiden. Studien und ein erster Feldtest belegen, dass sich mittels dynamischer Spitzenkappung und intelligenter Regelungstechnik die Anschlusskapazit\"{a}t nahezu verdoppeln l\"{a}sst.}
}
@article{HohnRohr2014EinspeisemanagementUndEegErweiterungstoolUnterstuetzenNetzbetreiber,
  title = {{E}inspeisemanagement- und {EEG}-{E}rweiterungstool unterst\"{u}tzen {N}etzbetreiber},
  journal = {Netzpraxis},
  number = {9},
  author = {Elke Hohn and Matthias Rohr},
  year = 2014,
  month = sep,
  publisher = {EW Medien und Kongresse},
  issn = {1611-0412},
  abstract = {Immer mehr dezentrale Einspeiseanlagen in Deutschland erh\"{o}hen die Volatilit\"{a}t der Stromnetze. Netzleitsysteme k\"{o}nnen im Zusammenspiel mit IT-L\"{o}sungen den Ausbau von erneuerbaren Energien unterst\"{u}tzen und f\"{u}r eine sichere Stromversorgung sorgen. Der bisherige hohe manuelle Aufwand für die Abrechnung der alternativen Energie kann durch eine automatisierte EEG-Erweiterung zum SAP IS-U wesentlich reduziert werden.}
}
@article{Rohr2016ErstesProduktFuerDieIntelligenteSpitzenkappung,
  title = {{Erstes Produkt f\"{u}r die intelligente Spitzenkappung von erneuerbaren Energien auf dem Markt}},
  journal = {Netzpraxis},
  number = {4},
  author = {Matthias Rohr},
  year = 2016,
  month = apr,
  pdf = {https://www.btc-ag.com/de/SID-9C987DE4-9FA83C75/documents/Seite_67_BTC_aus_NP_04-2016_1.pdf},
  publisher = {EW Medien und Kongresse, Frankfurt am Main},
  issn = {1611-0412},
  abstract = {Das neue Strommarktgesetz, das im November 2015 im Bundeskabinett beschlossen wurde, bringt eine Wende f\"{u}r viele Verteilnetzbetreiber und Stadtwerke. In Zukunft d\"{u}rfen sie bis zu drei Prozent der jeweiligen j\"{a}hrlichen Stromerzeugung von PV- und Windenergieanlagen
abregeln, wenn Strom-\"{U}berlast droht. F\"{u}r die intelligente und dynamische Spitzenkappung auf Basis von Informationstechnik stellt die BTC Business Technology Consulting AG das erste Produkt auf dem Markt bereit: den BTC GRID Agent Netzregler.}
}
@inproceedings{FockeHasselbringRohrSchute07InstrumentierungZumMonitoringMittelsAspektOrientierterProgrammierung,
  title = {Instrumentierung zum {Monitoring} mittels
                  {Aspekt-orientierter} {Programmierung}},
  booktitle = {Proceedings of the GI Conference on Software Engineering 2007 (SE'07)},
  editor = {Wolf-Gideon Bleek and Henning Schwentner and Heinz Z\"{u}llighoven},
  publisher = {Gesellschaft f\"{u}r Informatik {(GI)}, Bonner K{\"o}llen Verlag},
  series = {GI-Edition -- Lecture Notes in Informatics (LNI)},
  author = {Thilo Focke and Wilhelm Hasselbring and Matthias
                  Rohr and Johannes-Gerhard Schute},
  year = 2007,
  isbn = {978-3-88579-199-7},
  issn = {1617-5468},
  volume = {106},
  pages = {55--59},
  month = mar,
  abstract = {Das Monitoring grosser, kontinuierlich laufender Softwaresysteme liefert wichtige Daten zu deren \"{U}berwachung und Fehlerdiagnose. Wenn die Wartbarkeit der zum Monitoring n\"{o}tigen Instrumentierung und der Softwareapplikation selbst kritisch ist, verbietet sich ein manuelles Einbringen des Messcodes. Aspekt-orientierte Programmierung (AOP) erm\"{o}glicht die isolierte Programmierung von Querschnittsbelangen und das automatisierte Integrieren in den Applikationscode per Annotationen. Unser Beitrag berichtet \"{u}ber Erfahrungen mit AOP zur Instrumentierung f\"{u}r Performance-Monitoring in einem verteilten Kundenportalsystem eines Telekommunikationsanbieters. Insbesondere bedarf der durch AOP erhoffte Wartbarkeitsvorteil einer kritischen Untersuchung.},
  keywords = {Application-level monitoring, Aspect-oriented programming, Software instrumentation monitoring}
}
@article{FockeHasselbringRohrSchute07EinVorgehensmodellFuerPerformanceMonitoringVonInformationssystemlandschaften,
  title = {Ein {V}orgehensmodell f{\"u}r {P}erformance-{M}onitoring von {I}nformationssystemlandschaften},
  journal = {EMISA Forum},
  volume = {27},
  number = {1},
  author = {Thilo Focke and Wilhelm Hasselbring and Matthias Rohr and Johannes-Gerhard Schute},
  year = 2007,
  month = jan,
  pages = {26--31},
  publisher = {Gesellschaft f\"{u}r Informatik e.V., Fachgruppe EMISA},
  pdf = {http://www.informatik.uni-oldenburg.de/~atzeko7/pub/FockeHasselbringRohrSchute07EinVorgehensmodellFuerPerformanceMonitoringVonInformationssystemlandschaften.pdf},
  issn = {1610-3351},
  abstract = {Der Betrieb von softwareintensiven, gesch\"{a}ftskritischen Informationssystemlandschaften ben\"{o}tigt ein Performance-Monitoring um die \"{U}berwachung und Analyse von Laufzeitverhaltens zu erm\"{o}glichen. W\"{a}hrend die rein technische Implementierung von Performance-Monitoring eher unproblematisch ist, bietet sich bisher kein Vorgehensmodell f\"{u}r den systematischen, zielgerichteten Einsatz in komplexen Systemen an. Somit haben die in der Praxis anzutreffenden ``ad-hoc''-Realisierungen oftmals eine mangelhafte Effektivit\{a}t und Wartbarkeit zur Folge. Aus diesem Grund wird in diesem Artikel ein Monitoring-Ansatz vorgestellt, dessen Kern aus einem Vorgehensmodell f\"{u}r die Planung und Integration eines Performance-Monitoring besteht. Damit zusammenh\"{a}ngend wurde eine wiederverwendbare Infrastruktur entwickelt, die die Monitoringdatenintegration f\"{u}r verteilte Systeme leistet. Der vorgestellte Ansatz wurde in einem Telekommunikationsunternehmen evaluiert und die dementsprechend umgesetzte Monitoring-L\{o}sung befindet sich seit Mai 2006 im operativen Betrieb.},
  keywords = {Software Monitoring, Application-level monitoring, Performance monitoring, Software instrumentation}
}
@phdthesis{rohr2015workloadSensitiveTimingBehaviorAnalysis,
  author = {Matthias Rohr},
  title = {Workload-sensitive Timing Behavior Analysis
    for Fault Localization in Software Systems},
  type = {Dissertation ({PhD} thesis)},
  address = {Kiel, Germany},
  school = {Faculty of Engineering, Kiel University},
  month = jan,
  year = {2015},
  isbn = {978-3-7347-4516-4},
  abstract = {Software timing behavior measurements, such as response times, often show high statistical variance. This variance can make the analysis difficult or even threaten the applicability of statistical techniques. This thesis introduces a method for improving the analysis of software response time measurements that show high variance. 
Our approach can find relations between timing behavior variance and both trace shape information and workload intensity information. This relation is used to provide timing behavior measurements with virtually less variance. This can make timing behavior analysis more robust (e.g., improved confidence and precision) and faster (e.g., less simulation runs and shorter monitoring period). The thesis contributes TracSTA (Trace-Context-Sensitive Timing Behavior Analysis) and WiSTA (Workload-Intensity-Sensitive Timing Behavior Analysis). TracSTA uses trace shape information (i.e., the shape of the control flow corresponding to a software operation execution) and WiSTA uses workload intensity metrics (e.g., the number of concurrent software executions) to create context-specific timing behavior profiles. 
Both the applicability and effectiveness are evaluated in several case studies and field studies. The evaluation shows a strong relation between timing behavior and the metrics considered by TracSTA and WiSTA. Additionally, a fault localization approach for enterprise software systems is presented as application scenario. It uses the timing behavior data provided by TracSTA and WiSTA for anomaly detection.}
}
@inproceedings{EusgeldHappeLimbourgRohrSalfner08Performability,
  title = {Performability},
  booktitle = {Dependability Metrics},
  series = {Lecture Notes in Computer Science (LNCS)},
  author = {Irene Eusgeld and Jens Happe and Philipp Limbourg and Matthias Rohr and Felix Salfner},
  editor = {Irene Eusgeld and Felix Freiling and Ralf Reussner},
  publisher = {Springer},
  year = {2008},
  isbn = {978-3-540-68946-1},
  doi = {10.1007/978-3-540-68947-8\_24},
  volume = 4909,
  chapter = 24,
  pages = {245--254},
  abstract = {Performability combines performance and reliability analysis in order to estimate the quality of service characteristics of a system in the presence of faults. This chapter provides an introduction to performability, discusses its relation to reliability and performance metrics, and presents common models used in performability analysis, such as Markov reward models or Stochastic Petri Nets.},
  keywords = {Software Performability, Software Dependability}
}
@inproceedings{EusgeldFraikinRohrSalfnerWappler08SoftwareReliability,
  title = {Software {R}eliability},
  booktitle = {Dependability Metrics},
  series = {Lecture Notes in Computer Science (LNCS)},
  author = {Irene Eusgeld and Falk Fraikin and Matthias Rohr and Felix Salfner and Ute Wappler},
  year = {2008},
  publisher = {Springer},
  volume = 4909,
  doi = {10.1007/978-3-540-68947-8\_10},
  pages = {104--125},
  chapter = 10,
  isbn = {978-3-540-68946-1},
  editor = {Irene Eusgeld and Felix Freiling and Ralf Reussner},
  abstract = {Many concepts of software reliability engineering can be adapted from the older and successful techniques of hardware reliability. However, this must be done with care, since there are some fundamental differences in the nature of hardware and software and its failure processes. This chapter gives an introduction into software reliability metrics.},
  keywords = {Software reliability}
}
@inproceedings{BuchholzMarwedeBungerHasselbringHitzschkeMatevskaMeyerMuellerOlkerOppermannRohrRudnerSonnenscheinStierandUflacker04KiekEineModellierungsUndSimulationsumgebungFuerHierarchischeAsymmetrischeZellulareAutomaten,
  author = {J. Buchholz and B. Marwede and T. Bunger and W. Hasselbring and A. Hitzschke and J. Matevska-Meyer and H. M\"uller and A. Olker and C. Oppermann and M. Rohr and M. Rudner and M. Sonnenschein and I. Stierand and M. Uflacker},
  title = {{K}iek -- Eine {M}odellierungsumgebung f\"{u}r {H}ierarchische {A}symmetrische {Z}ellulare {A}utomaten},
  editor = {J. Wittmann and R. Wieland},
  booktitle = {Simulation in Umwelt- und Geowissenschaften, ASIM-Mitteilung AMB 88},
  publisher = {Shaker Verlag},
  isbn = { 3-8322-2783-0},
  pages = {224--233},
  year = 2004
}

This file was generated by bibtex2html 1.98.