[{"citation":{"ama":"Lürwer-Brüggemeier K, Meyer auf der Heide F. Capabilities and complexity of computations with integer division. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg; 1993. doi:<a href=\"https://doi.org/10.1007/3-540-56503-5_46\">10.1007/3-540-56503-5_46</a>","ieee":"K. Lürwer-Brüggemeier and F. Meyer auf der Heide, “Capabilities and complexity of computations with integer division,” in <i>Lecture Notes in Computer Science</i>, Berlin, Heidelberg, 1993.","chicago":"Lürwer-Brüggemeier, Katharina, and Friedhelm Meyer auf der Heide. “Capabilities and Complexity of Computations with Integer Division.” In <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg, 1993. <a href=\"https://doi.org/10.1007/3-540-56503-5_46\">https://doi.org/10.1007/3-540-56503-5_46</a>.","apa":"Lürwer-Brüggemeier, K., &#38; Meyer auf der Heide, F. (1993). Capabilities and complexity of computations with integer division. In <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/3-540-56503-5_46\">https://doi.org/10.1007/3-540-56503-5_46</a>","short":"K. Lürwer-Brüggemeier, F. Meyer auf der Heide, in: Lecture Notes in Computer Science, Berlin, Heidelberg, 1993.","bibtex":"@inbook{Lürwer-Brüggemeier_Meyer auf der Heide_1993, place={Berlin, Heidelberg}, title={Capabilities and complexity of computations with integer division}, DOI={<a href=\"https://doi.org/10.1007/3-540-56503-5_46\">10.1007/3-540-56503-5_46</a>}, booktitle={Lecture Notes in Computer Science}, author={Lürwer-Brüggemeier, Katharina and Meyer auf der Heide, Friedhelm}, year={1993} }","mla":"Lürwer-Brüggemeier, Katharina, and Friedhelm Meyer auf der Heide. “Capabilities and Complexity of Computations with Integer Division.” <i>Lecture Notes in Computer Science</i>, 1993, doi:<a href=\"https://doi.org/10.1007/3-540-56503-5_46\">10.1007/3-540-56503-5_46</a>."},"year":"1993","place":"Berlin, Heidelberg","publication_status":"published","publication_identifier":{"isbn":["9783540565031","9783540475743"],"issn":["0302-9743","1611-3349"]},"doi":"10.1007/3-540-56503-5_46","title":"Capabilities and complexity of computations with integer division","author":[{"first_name":"Katharina","last_name":"Lürwer-Brüggemeier","full_name":"Lürwer-Brüggemeier, Katharina"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm"}],"date_created":"2020-04-20T11:25:51Z","date_updated":"2022-01-06T06:52:55Z","status":"public","type":"book_chapter","publication":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"}],"_id":"16732"},{"type":"journal_article","publication":"Parallel Processing Letters 2","abstract":[{"lang":"eng","text":"We consider the following periodic sorting procedure on two-dimensional meshes of processors: Initially, each node contains one number. We proceed in rounds each round consisting of sorting the columns of the grid, and, in the second phase, of sorting the rows according to the snake-like ordering. We exactly characterize the number of rounds necessary to sort on an l × m-grid in the worst case, where l is the number of the rows and m the number of the columns. An upper bound of ⌈ log l⌉ + 1was known before. This bound is tight for the case that m is not a power of 2. Surprisingly, it turns out that far fewer rounds are necessary if m is a power of 2 (and m ≪ l) in this case, exactly min { log m + 1, ⌈ log l⌉ + 1} rounds are needed in the worst case."}],"status":"public","_id":"18936","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0129-6264","1793-642X"]},"year":"1992","citation":{"chicago":"Kutylowski, Miroslaw, and Rolf Wanka. “Periodic Sorting on Two-Dimensional Meshes.” <i>Parallel Processing Letters 2</i>, 1992, 213–20. <a href=\"https://doi.org/10.1142/s0129626492000349\">https://doi.org/10.1142/s0129626492000349</a>.","ieee":"M. Kutylowski and R. Wanka, “Periodic Sorting on Two-Dimensional Meshes,” <i>Parallel Processing Letters 2</i>, pp. 213–220, 1992, doi: <a href=\"https://doi.org/10.1142/s0129626492000349\">10.1142/s0129626492000349</a>.","ama":"Kutylowski M, Wanka R. Periodic Sorting on Two-Dimensional Meshes. <i>Parallel Processing Letters 2</i>. Published online 1992:213-220. doi:<a href=\"https://doi.org/10.1142/s0129626492000349\">10.1142/s0129626492000349</a>","short":"M. Kutylowski, R. Wanka, Parallel Processing Letters 2 (1992) 213–220.","bibtex":"@article{Kutylowski_Wanka_1992, title={Periodic Sorting on Two-Dimensional Meshes}, DOI={<a href=\"https://doi.org/10.1142/s0129626492000349\">10.1142/s0129626492000349</a>}, journal={Parallel Processing Letters 2}, author={Kutylowski, Miroslaw and Wanka, Rolf}, year={1992}, pages={213–220} }","mla":"Kutylowski, Miroslaw, and Rolf Wanka. “Periodic Sorting on Two-Dimensional Meshes.” <i>Parallel Processing Letters 2</i>, 1992, pp. 213–20, doi:<a href=\"https://doi.org/10.1142/s0129626492000349\">10.1142/s0129626492000349</a>.","apa":"Kutylowski, M., &#38; Wanka, R. (1992). Periodic Sorting on Two-Dimensional Meshes. <i>Parallel Processing Letters 2</i>, 213–220. <a href=\"https://doi.org/10.1142/s0129626492000349\">https://doi.org/10.1142/s0129626492000349</a>"},"page":"213-220","date_updated":"2022-01-06T06:53:55Z","date_created":"2020-09-03T11:05:14Z","author":[{"full_name":"Kutylowski, Miroslaw","last_name":"Kutylowski","first_name":"Miroslaw"},{"last_name":"Wanka","full_name":"Wanka, Rolf","first_name":"Rolf"}],"title":"Periodic Sorting on Two-Dimensional Meshes","doi":"10.1142/s0129626492000349"},{"language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"}],"_id":"16733","status":"public","type":"book_chapter","publication":"Data structures and efficient algorithms","doi":"10.1007/3-540-55488-2_31","title":"High performance universal hashing, with applications to shared memory simulations","date_created":"2020-04-20T11:27:50Z","author":[{"full_name":"Dietzfelbinger, Martin","last_name":"Dietzfelbinger","first_name":"Martin"},{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","first_name":"Friedhelm"}],"date_updated":"2022-01-06T06:52:55Z","citation":{"ieee":"M. Dietzfelbinger and F. Meyer auf der Heide, “High performance universal hashing, with applications to shared memory simulations,” in <i>Data structures and efficient algorithms</i>, Berlin, Heidelberg, 1992.","chicago":"Dietzfelbinger, Martin, and Friedhelm Meyer auf der Heide. “High Performance Universal Hashing, with Applications to Shared Memory Simulations.” In <i>Data Structures and Efficient Algorithms</i>. Berlin, Heidelberg, 1992. <a href=\"https://doi.org/10.1007/3-540-55488-2_31\">https://doi.org/10.1007/3-540-55488-2_31</a>.","ama":"Dietzfelbinger M, Meyer auf der Heide F. High performance universal hashing, with applications to shared memory simulations. In: <i>Data Structures and Efficient Algorithms</i>. Berlin, Heidelberg; 1992. doi:<a href=\"https://doi.org/10.1007/3-540-55488-2_31\">10.1007/3-540-55488-2_31</a>","bibtex":"@inbook{Dietzfelbinger_Meyer auf der Heide_1992, place={Berlin, Heidelberg}, title={High performance universal hashing, with applications to shared memory simulations}, DOI={<a href=\"https://doi.org/10.1007/3-540-55488-2_31\">10.1007/3-540-55488-2_31</a>}, booktitle={Data structures and efficient algorithms}, author={Dietzfelbinger, Martin and Meyer auf der Heide, Friedhelm}, year={1992} }","short":"M. Dietzfelbinger, F. Meyer auf der Heide, in: Data Structures and Efficient Algorithms, Berlin, Heidelberg, 1992.","mla":"Dietzfelbinger, Martin, and Friedhelm Meyer auf der Heide. “High Performance Universal Hashing, with Applications to Shared Memory Simulations.” <i>Data Structures and Efficient Algorithms</i>, 1992, doi:<a href=\"https://doi.org/10.1007/3-540-55488-2_31\">10.1007/3-540-55488-2_31</a>.","apa":"Dietzfelbinger, M., &#38; Meyer auf der Heide, F. (1992). High performance universal hashing, with applications to shared memory simulations. In <i>Data structures and efficient algorithms</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/3-540-55488-2_31\">https://doi.org/10.1007/3-540-55488-2_31</a>"},"year":"1992","place":"Berlin, Heidelberg","publication_status":"published","publication_identifier":{"isbn":["9783540554882","9783540471035"],"issn":["0302-9743","1611-3349"]}},{"status":"public","publication":"Lecture Notes in Computer Science","type":"book_chapter","language":[{"iso":"eng"}],"_id":"16734","department":[{"_id":"63"}],"user_id":"15415","year":"1992","place":"Berlin, Heidelberg","citation":{"bibtex":"@inbook{Meyer auf der Heide_1992, place={Berlin, Heidelberg}, title={Hashing strategies for simulating shared memory on distributed memory machines}, DOI={<a href=\"https://doi.org/10.1007/3-540-56731-3_3\">10.1007/3-540-56731-3_3</a>}, booktitle={Lecture Notes in Computer Science}, author={Meyer auf der Heide, Friedhelm}, year={1992} }","short":"F. Meyer auf der Heide, in: Lecture Notes in Computer Science, Berlin, Heidelberg, 1992.","mla":"Meyer auf der Heide, Friedhelm. “Hashing Strategies for Simulating Shared Memory on Distributed Memory Machines.” <i>Lecture Notes in Computer Science</i>, 1992, doi:<a href=\"https://doi.org/10.1007/3-540-56731-3_3\">10.1007/3-540-56731-3_3</a>.","apa":"Meyer auf der Heide, F. (1992). Hashing strategies for simulating shared memory on distributed memory machines. In <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/3-540-56731-3_3\">https://doi.org/10.1007/3-540-56731-3_3</a>","ama":"Meyer auf der Heide F. Hashing strategies for simulating shared memory on distributed memory machines. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg; 1992. doi:<a href=\"https://doi.org/10.1007/3-540-56731-3_3\">10.1007/3-540-56731-3_3</a>","chicago":"Meyer auf der Heide, Friedhelm. “Hashing Strategies for Simulating Shared Memory on Distributed Memory Machines.” In <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg, 1992. <a href=\"https://doi.org/10.1007/3-540-56731-3_3\">https://doi.org/10.1007/3-540-56731-3_3</a>.","ieee":"F. Meyer auf der Heide, “Hashing strategies for simulating shared memory on distributed memory machines,” in <i>Lecture Notes in Computer Science</i>, Berlin, Heidelberg, 1992."},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540567318","9783540476375"]},"publication_status":"published","title":"Hashing strategies for simulating shared memory on distributed memory machines","doi":"10.1007/3-540-56731-3_3","date_updated":"2022-01-06T06:52:55Z","date_created":"2020-04-20T11:29:58Z","author":[{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}]},{"language":[{"iso":"eng"}],"_id":"16735","department":[{"_id":"63"}],"user_id":"15415","status":"public","publication":"STACS 92","type":"book_chapter","title":"On the performance of networks with multiple busses","doi":"10.1007/3-540-55210-3_176","date_updated":"2022-01-06T06:52:55Z","author":[{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"},{"last_name":"Pham","full_name":"Pham, Hieu Thien","first_name":"Hieu Thien"}],"date_created":"2020-04-20T11:31:58Z","year":"1992","place":"Berlin, Heidelberg","citation":{"apa":"Meyer auf der Heide, F., &#38; Pham, H. T. (1992). On the performance of networks with multiple busses. In <i>STACS 92</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/3-540-55210-3_176\">https://doi.org/10.1007/3-540-55210-3_176</a>","short":"F. Meyer auf der Heide, H.T. Pham, in: STACS 92, Berlin, Heidelberg, 1992.","mla":"Meyer auf der Heide, Friedhelm, and Hieu Thien Pham. “On the Performance of Networks with Multiple Busses.” <i>STACS 92</i>, 1992, doi:<a href=\"https://doi.org/10.1007/3-540-55210-3_176\">10.1007/3-540-55210-3_176</a>.","bibtex":"@inbook{Meyer auf der Heide_Pham_1992, place={Berlin, Heidelberg}, title={On the performance of networks with multiple busses}, DOI={<a href=\"https://doi.org/10.1007/3-540-55210-3_176\">10.1007/3-540-55210-3_176</a>}, booktitle={STACS 92}, author={Meyer auf der Heide, Friedhelm and Pham, Hieu Thien}, year={1992} }","ama":"Meyer auf der Heide F, Pham HT. On the performance of networks with multiple busses. In: <i>STACS 92</i>. Berlin, Heidelberg; 1992. doi:<a href=\"https://doi.org/10.1007/3-540-55210-3_176\">10.1007/3-540-55210-3_176</a>","ieee":"F. Meyer auf der Heide and H. T. Pham, “On the performance of networks with multiple busses,” in <i>STACS 92</i>, Berlin, Heidelberg, 1992.","chicago":"Meyer auf der Heide, Friedhelm, and Hieu Thien Pham. “On the Performance of Networks with Multiple Busses.” In <i>STACS 92</i>. Berlin, Heidelberg, 1992. <a href=\"https://doi.org/10.1007/3-540-55210-3_176\">https://doi.org/10.1007/3-540-55210-3_176</a>."},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540552109","9783540467755"]},"publication_status":"published"},{"publication_status":"published","publication_identifier":{"isbn":["0897915119"]},"citation":{"ama":"Karp RM, Luby M, Meyer auf der Heide F. Efficient PRAM simulation on a distributed memory machine. In: <i>Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing  - STOC ’92</i>. ; 1992. doi:<a href=\"https://doi.org/10.1145/129712.129743\">10.1145/129712.129743</a>","ieee":"R. M. Karp, M. Luby, and F. Meyer auf der Heide, “Efficient PRAM simulation on a distributed memory machine,” in <i>Proceedings of the twenty-fourth annual ACM symposium on Theory of computing  - STOC ’92</i>, 1992.","chicago":"Karp, Richard M., Michael Luby, and Friedhelm Meyer auf der Heide. “Efficient PRAM Simulation on a Distributed Memory Machine.” In <i>Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing  - STOC ’92</i>, 1992. <a href=\"https://doi.org/10.1145/129712.129743\">https://doi.org/10.1145/129712.129743</a>.","bibtex":"@inproceedings{Karp_Luby_Meyer auf der Heide_1992, title={Efficient PRAM simulation on a distributed memory machine}, DOI={<a href=\"https://doi.org/10.1145/129712.129743\">10.1145/129712.129743</a>}, booktitle={Proceedings of the twenty-fourth annual ACM symposium on Theory of computing  - STOC ’92}, author={Karp, Richard M. and Luby, Michael and Meyer auf der Heide, Friedhelm}, year={1992} }","short":"R.M. Karp, M. Luby, F. Meyer auf der Heide, in: Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing  - STOC ’92, 1992.","mla":"Karp, Richard M., et al. “Efficient PRAM Simulation on a Distributed Memory Machine.” <i>Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing  - STOC ’92</i>, 1992, doi:<a href=\"https://doi.org/10.1145/129712.129743\">10.1145/129712.129743</a>.","apa":"Karp, R. M., Luby, M., &#38; Meyer auf der Heide, F. (1992). Efficient PRAM simulation on a distributed memory machine. In <i>Proceedings of the twenty-fourth annual ACM symposium on Theory of computing  - STOC ’92</i>. <a href=\"https://doi.org/10.1145/129712.129743\">https://doi.org/10.1145/129712.129743</a>"},"year":"1992","author":[{"first_name":"Richard M.","full_name":"Karp, Richard M.","last_name":"Karp"},{"first_name":"Michael","full_name":"Luby, Michael","last_name":"Luby"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523"}],"date_created":"2020-04-20T11:33:22Z","date_updated":"2022-01-06T06:52:55Z","doi":"10.1145/129712.129743","title":"Efficient PRAM simulation on a distributed memory machine","type":"conference","publication":"Proceedings of the twenty-fourth annual ACM symposium on Theory of computing  - STOC '92","status":"public","user_id":"15415","department":[{"_id":"63"}],"_id":"16736","language":[{"iso":"eng"}]},{"status":"public","publication":"TEUBNER-TEXTE zur Informatik","type":"book_chapter","language":[{"iso":"eng"}],"_id":"16737","department":[{"_id":"63"}],"user_id":"15415","place":"Wiesbaden","year":"1992","citation":{"mla":"Dietzfelbinger, Martin, and Friedhelm Meyer auf der Heide. “Dynamic Hashing in Real Time.” <i>TEUBNER-TEXTE Zur Informatik</i>, 1992, doi:<a href=\"https://doi.org/10.1007/978-3-322-95233-2_7\">10.1007/978-3-322-95233-2_7</a>.","bibtex":"@inbook{Dietzfelbinger_Meyer auf der Heide_1992, place={Wiesbaden}, title={Dynamic Hashing in Real Time}, DOI={<a href=\"https://doi.org/10.1007/978-3-322-95233-2_7\">10.1007/978-3-322-95233-2_7</a>}, booktitle={TEUBNER-TEXTE zur Informatik}, author={Dietzfelbinger, Martin and Meyer auf der Heide, Friedhelm}, year={1992} }","short":"M. Dietzfelbinger, F. Meyer auf der Heide, in: TEUBNER-TEXTE Zur Informatik, Wiesbaden, 1992.","apa":"Dietzfelbinger, M., &#38; Meyer auf der Heide, F. (1992). Dynamic Hashing in Real Time. In <i>TEUBNER-TEXTE zur Informatik</i>. Wiesbaden. <a href=\"https://doi.org/10.1007/978-3-322-95233-2_7\">https://doi.org/10.1007/978-3-322-95233-2_7</a>","ama":"Dietzfelbinger M, Meyer auf der Heide F. Dynamic Hashing in Real Time. In: <i>TEUBNER-TEXTE Zur Informatik</i>. Wiesbaden; 1992. doi:<a href=\"https://doi.org/10.1007/978-3-322-95233-2_7\">10.1007/978-3-322-95233-2_7</a>","ieee":"M. Dietzfelbinger and F. Meyer auf der Heide, “Dynamic Hashing in Real Time,” in <i>TEUBNER-TEXTE zur Informatik</i>, Wiesbaden, 1992.","chicago":"Dietzfelbinger, Martin, and Friedhelm Meyer auf der Heide. “Dynamic Hashing in Real Time.” In <i>TEUBNER-TEXTE Zur Informatik</i>. Wiesbaden, 1992. <a href=\"https://doi.org/10.1007/978-3-322-95233-2_7\">https://doi.org/10.1007/978-3-322-95233-2_7</a>."},"publication_identifier":{"issn":["1615-4584"],"isbn":["9783815420331","9783322952332"]},"publication_status":"published","title":"Dynamic Hashing in Real Time","doi":"10.1007/978-3-322-95233-2_7","date_updated":"2022-01-06T06:52:55Z","date_created":"2020-04-20T11:35:06Z","author":[{"last_name":"Dietzfelbinger","full_name":"Dietzfelbinger, Martin","first_name":"Martin"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}]},{"page":"703-716","citation":{"ama":"Alt H, Blömer J, Wagener H. Approximation of convex polygons. In: <i>Automata, Languages and Programming</i>. Berlin/Heidelberg: Springer-Verlag; 1990:703-716. doi:<a href=\"https://doi.org/10.1007/bfb0032068\">10.1007/bfb0032068</a>","chicago":"Alt, Helmut, Johannes Blömer, and Hubert Wagener. “Approximation of Convex Polygons.” In <i>Automata, Languages and Programming</i>, 703–16. Berlin/Heidelberg: Springer-Verlag, 1990. <a href=\"https://doi.org/10.1007/bfb0032068\">https://doi.org/10.1007/bfb0032068</a>.","ieee":"H. Alt, J. Blömer, and H. Wagener, “Approximation of convex polygons,” in <i>Automata, Languages and Programming</i>, Berlin/Heidelberg: Springer-Verlag, 1990, pp. 703–716.","apa":"Alt, H., Blömer, J., &#38; Wagener, H. (1990). Approximation of convex polygons. In <i>Automata, Languages and Programming</i> (pp. 703–716). Berlin/Heidelberg: Springer-Verlag. <a href=\"https://doi.org/10.1007/bfb0032068\">https://doi.org/10.1007/bfb0032068</a>","short":"H. Alt, J. Blömer, H. Wagener, in: Automata, Languages and Programming, Springer-Verlag, Berlin/Heidelberg, 1990, pp. 703–716.","mla":"Alt, Helmut, et al. “Approximation of Convex Polygons.” <i>Automata, Languages and Programming</i>, Springer-Verlag, 1990, pp. 703–16, doi:<a href=\"https://doi.org/10.1007/bfb0032068\">10.1007/bfb0032068</a>.","bibtex":"@inbook{Alt_Blömer_Wagener_1990, place={Berlin/Heidelberg}, title={Approximation of convex polygons}, DOI={<a href=\"https://doi.org/10.1007/bfb0032068\">10.1007/bfb0032068</a>}, booktitle={Automata, Languages and Programming}, publisher={Springer-Verlag}, author={Alt, Helmut and Blömer, Johannes and Wagener, Hubert}, year={1990}, pages={703–716} }"},"place":"Berlin/Heidelberg","year":"1990","publication_identifier":{"isbn":["3540528261"]},"publication_status":"published","doi":"10.1007/bfb0032068","title":"Approximation of convex polygons","date_created":"2018-06-05T08:56:43Z","author":[{"last_name":"Alt","full_name":"Alt, Helmut","first_name":"Helmut"},{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"last_name":"Wagener","full_name":"Wagener, Hubert","first_name":"Hubert"}],"date_updated":"2022-01-06T06:58:54Z","publisher":"Springer-Verlag","status":"public","publication":"Automata, Languages and Programming","type":"book_chapter","extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"64"},{"_id":"63"}],"user_id":"14955","_id":"3050"},{"publication_status":"published","publication_identifier":{"isbn":["3540528261"]},"citation":{"chicago":"Dietzfelbinger, Martin, and Friedhelm Meyer auf der Heide. “A New Universal Class of Hash Functions and Dynamic Hashing in Real Time.” In <i>Automata, Languages and Programming</i>. Berlin/Heidelberg, 1990. <a href=\"https://doi.org/10.1007/bfb0032018\">https://doi.org/10.1007/bfb0032018</a>.","ieee":"M. Dietzfelbinger and F. Meyer auf der Heide, “A new universal class of hash functions and dynamic hashing in real time,” in <i>Automata, Languages and Programming</i>, Berlin/Heidelberg, 1990.","ama":"Dietzfelbinger M, Meyer auf der Heide F. A new universal class of hash functions and dynamic hashing in real time. In: <i>Automata, Languages and Programming</i>. Berlin/Heidelberg; 1990. doi:<a href=\"https://doi.org/10.1007/bfb0032018\">10.1007/bfb0032018</a>","bibtex":"@inbook{Dietzfelbinger_Meyer auf der Heide_1990, place={Berlin/Heidelberg}, title={A new universal class of hash functions and dynamic hashing in real time}, DOI={<a href=\"https://doi.org/10.1007/bfb0032018\">10.1007/bfb0032018</a>}, booktitle={Automata, Languages and Programming}, author={Dietzfelbinger, Martin and Meyer auf der Heide, Friedhelm}, year={1990} }","mla":"Dietzfelbinger, Martin, and Friedhelm Meyer auf der Heide. “A New Universal Class of Hash Functions and Dynamic Hashing in Real Time.” <i>Automata, Languages and Programming</i>, 1990, doi:<a href=\"https://doi.org/10.1007/bfb0032018\">10.1007/bfb0032018</a>.","short":"M. Dietzfelbinger, F. Meyer auf der Heide, in: Automata, Languages and Programming, Berlin/Heidelberg, 1990.","apa":"Dietzfelbinger, M., &#38; Meyer auf der Heide, F. (1990). A new universal class of hash functions and dynamic hashing in real time. In <i>Automata, Languages and Programming</i>. Berlin/Heidelberg. <a href=\"https://doi.org/10.1007/bfb0032018\">https://doi.org/10.1007/bfb0032018</a>"},"year":"1990","place":"Berlin/Heidelberg","date_created":"2020-04-20T11:37:37Z","author":[{"first_name":"Martin","full_name":"Dietzfelbinger, Martin","last_name":"Dietzfelbinger"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm"}],"date_updated":"2022-01-06T06:52:55Z","doi":"10.1007/bfb0032018","title":"A new universal class of hash functions and dynamic hashing in real time","type":"book_chapter","publication":"Automata, Languages and Programming","status":"public","user_id":"15415","department":[{"_id":"63"}],"_id":"16738","language":[{"iso":"eng"}]},{"date_created":"2020-04-20T11:39:31Z","author":[{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_updated":"2022-01-06T06:52:55Z","doi":"10.1007/bfb0029597","title":"Dynamic hashing strategies","publication_status":"published","publication_identifier":{"isbn":["3540529535"]},"citation":{"ieee":"F. Meyer auf der Heide, “Dynamic hashing strategies,” in <i>Lecture Notes in Computer Science</i>, Berlin/Heidelberg, 1990.","chicago":"Meyer auf der Heide, Friedhelm. “Dynamic Hashing Strategies.” In <i>Lecture Notes in Computer Science</i>. Berlin/Heidelberg, 1990. <a href=\"https://doi.org/10.1007/bfb0029597\">https://doi.org/10.1007/bfb0029597</a>.","ama":"Meyer auf der Heide F. Dynamic hashing strategies. In: <i>Lecture Notes in Computer Science</i>. Berlin/Heidelberg; 1990. doi:<a href=\"https://doi.org/10.1007/bfb0029597\">10.1007/bfb0029597</a>","mla":"Meyer auf der Heide, Friedhelm. “Dynamic Hashing Strategies.” <i>Lecture Notes in Computer Science</i>, 1990, doi:<a href=\"https://doi.org/10.1007/bfb0029597\">10.1007/bfb0029597</a>.","bibtex":"@inbook{Meyer auf der Heide_1990, place={Berlin/Heidelberg}, title={Dynamic hashing strategies}, DOI={<a href=\"https://doi.org/10.1007/bfb0029597\">10.1007/bfb0029597</a>}, booktitle={Lecture Notes in Computer Science}, author={Meyer auf der Heide, Friedhelm}, year={1990} }","short":"F. Meyer auf der Heide, in: Lecture Notes in Computer Science, Berlin/Heidelberg, 1990.","apa":"Meyer auf der Heide, F. (1990). Dynamic hashing strategies. In <i>Lecture Notes in Computer Science</i>. Berlin/Heidelberg. <a href=\"https://doi.org/10.1007/bfb0029597\">https://doi.org/10.1007/bfb0029597</a>"},"year":"1990","place":"Berlin/Heidelberg","user_id":"15415","department":[{"_id":"63"}],"_id":"16739","language":[{"iso":"eng"}],"type":"book_chapter","publication":"Lecture Notes in Computer Science","status":"public"},{"language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"}],"_id":"16740","status":"public","type":"book_chapter","publication":"Lecture Notes in Computer Science","doi":"10.1007/bfb0029630","title":"On the complexity of genuinely polynomial computation","author":[{"last_name":"Karpinski","full_name":"Karpinski, Marek","first_name":"Marek"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm"}],"date_created":"2020-04-20T11:40:17Z","date_updated":"2022-01-06T06:52:55Z","citation":{"apa":"Karpinski, M., &#38; Meyer auf der Heide, F. (1990). On the complexity of genuinely polynomial computation. In <i>Lecture Notes in Computer Science</i>. Berlin/Heidelberg. <a href=\"https://doi.org/10.1007/bfb0029630\">https://doi.org/10.1007/bfb0029630</a>","short":"M. Karpinski, F. Meyer auf der Heide, in: Lecture Notes in Computer Science, Berlin/Heidelberg, 1990.","bibtex":"@inbook{Karpinski_Meyer auf der Heide_1990, place={Berlin/Heidelberg}, title={On the complexity of genuinely polynomial computation}, DOI={<a href=\"https://doi.org/10.1007/bfb0029630\">10.1007/bfb0029630</a>}, booktitle={Lecture Notes in Computer Science}, author={Karpinski, Marek and Meyer auf der Heide, Friedhelm}, year={1990} }","mla":"Karpinski, Marek, and Friedhelm Meyer auf der Heide. “On the Complexity of Genuinely Polynomial Computation.” <i>Lecture Notes in Computer Science</i>, 1990, doi:<a href=\"https://doi.org/10.1007/bfb0029630\">10.1007/bfb0029630</a>.","ama":"Karpinski M, Meyer auf der Heide F. On the complexity of genuinely polynomial computation. In: <i>Lecture Notes in Computer Science</i>. Berlin/Heidelberg; 1990. doi:<a href=\"https://doi.org/10.1007/bfb0029630\">10.1007/bfb0029630</a>","chicago":"Karpinski, Marek, and Friedhelm Meyer auf der Heide. “On the Complexity of Genuinely Polynomial Computation.” In <i>Lecture Notes in Computer Science</i>. Berlin/Heidelberg, 1990. <a href=\"https://doi.org/10.1007/bfb0029630\">https://doi.org/10.1007/bfb0029630</a>.","ieee":"M. Karpinski and F. Meyer auf der Heide, “On the complexity of genuinely polynomial computation,” in <i>Lecture Notes in Computer Science</i>, Berlin/Heidelberg, 1990."},"place":"Berlin/Heidelberg","year":"1990","publication_status":"published","publication_identifier":{"isbn":["3540529535"]}},{"status":"public","type":"conference","publication":"Proceedings of the twenty-second annual ACM symposium on Theory of computing  - STOC '90","language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"}],"_id":"16741","citation":{"apa":"Dietzfelbinger, M., &#38; Meyer auf der Heide, F. (1990). How to distribute a dictionary in a complete network. In <i>Proceedings of the twenty-second annual ACM symposium on Theory of computing  - STOC ’90</i>. <a href=\"https://doi.org/10.1145/100216.100229\">https://doi.org/10.1145/100216.100229</a>","short":"M. Dietzfelbinger, F. Meyer auf der Heide, in: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing  - STOC ’90, 1990.","mla":"Dietzfelbinger, M., and Friedhelm Meyer auf der Heide. “How to Distribute a Dictionary in a Complete Network.” <i>Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing  - STOC ’90</i>, 1990, doi:<a href=\"https://doi.org/10.1145/100216.100229\">10.1145/100216.100229</a>.","bibtex":"@inproceedings{Dietzfelbinger_Meyer auf der Heide_1990, title={How to distribute a dictionary in a complete network}, DOI={<a href=\"https://doi.org/10.1145/100216.100229\">10.1145/100216.100229</a>}, booktitle={Proceedings of the twenty-second annual ACM symposium on Theory of computing  - STOC ’90}, author={Dietzfelbinger, M. and Meyer auf der Heide, Friedhelm}, year={1990} }","chicago":"Dietzfelbinger, M., and Friedhelm Meyer auf der Heide. “How to Distribute a Dictionary in a Complete Network.” In <i>Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing  - STOC ’90</i>, 1990. <a href=\"https://doi.org/10.1145/100216.100229\">https://doi.org/10.1145/100216.100229</a>.","ieee":"M. Dietzfelbinger and F. Meyer auf der Heide, “How to distribute a dictionary in a complete network,” in <i>Proceedings of the twenty-second annual ACM symposium on Theory of computing  - STOC ’90</i>, 1990.","ama":"Dietzfelbinger M, Meyer auf der Heide F. How to distribute a dictionary in a complete network. In: <i>Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing  - STOC ’90</i>. ; 1990. doi:<a href=\"https://doi.org/10.1145/100216.100229\">10.1145/100216.100229</a>"},"year":"1990","publication_status":"published","publication_identifier":{"isbn":["0897913612"]},"doi":"10.1145/100216.100229","title":"How to distribute a dictionary in a complete network","author":[{"full_name":"Dietzfelbinger, M.","last_name":"Dietzfelbinger","first_name":"M."},{"last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"}],"date_created":"2020-04-20T11:41:08Z","date_updated":"2022-01-06T06:52:55Z"},{"author":[{"first_name":"J.","last_name":"Gil","full_name":"Gil, J."},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"},{"full_name":"Wigderson, A.","last_name":"Wigderson","first_name":"A."}],"date_created":"2020-04-20T11:41:55Z","date_updated":"2022-01-06T06:52:55Z","doi":"10.1145/100216.100247","title":"Not all keys can be hashed in constant time","publication_status":"published","publication_identifier":{"isbn":["0897913612"]},"citation":{"chicago":"Gil, J., Friedhelm Meyer auf der Heide, and A. Wigderson. “Not All Keys Can Be Hashed in Constant Time.” In <i>Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing  - STOC ’90</i>, 1990. <a href=\"https://doi.org/10.1145/100216.100247\">https://doi.org/10.1145/100216.100247</a>.","ieee":"J. Gil, F. Meyer auf der Heide, and A. Wigderson, “Not all keys can be hashed in constant time,” in <i>Proceedings of the twenty-second annual ACM symposium on Theory of computing  - STOC ’90</i>, 1990.","ama":"Gil J, Meyer auf der Heide F, Wigderson A. Not all keys can be hashed in constant time. In: <i>Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing  - STOC ’90</i>. ; 1990. doi:<a href=\"https://doi.org/10.1145/100216.100247\">10.1145/100216.100247</a>","short":"J. Gil, F. Meyer auf der Heide, A. Wigderson, in: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing  - STOC ’90, 1990.","bibtex":"@inproceedings{Gil_Meyer auf der Heide_Wigderson_1990, title={Not all keys can be hashed in constant time}, DOI={<a href=\"https://doi.org/10.1145/100216.100247\">10.1145/100216.100247</a>}, booktitle={Proceedings of the twenty-second annual ACM symposium on Theory of computing  - STOC ’90}, author={Gil, J. and Meyer auf der Heide, Friedhelm and Wigderson, A.}, year={1990} }","mla":"Gil, J., et al. “Not All Keys Can Be Hashed in Constant Time.” <i>Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing  - STOC ’90</i>, 1990, doi:<a href=\"https://doi.org/10.1145/100216.100247\">10.1145/100216.100247</a>.","apa":"Gil, J., Meyer auf der Heide, F., &#38; Wigderson, A. (1990). Not all keys can be hashed in constant time. In <i>Proceedings of the twenty-second annual ACM symposium on Theory of computing  - STOC ’90</i>. <a href=\"https://doi.org/10.1145/100216.100247\">https://doi.org/10.1145/100216.100247</a>"},"year":"1990","user_id":"15415","department":[{"_id":"63"}],"_id":"16742","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the twenty-second annual ACM symposium on Theory of computing  - STOC '90","status":"public"},{"language":[{"iso":"eng"}],"_id":"16824","department":[{"_id":"63"}],"user_id":"15415","status":"public","publication":"Informatik Spektrum","type":"journal_article","title":"Das Heinz Nixdorf-Institut der Universität-GH Paderborn","date_updated":"2022-01-06T06:52:56Z","volume":13,"author":[{"first_name":"Friedhelm","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"}],"date_created":"2020-04-22T10:28:27Z","year":"1990","intvolume":"        13","page":"231-232","citation":{"short":"F. Meyer auf der Heide, Informatik Spektrum 13 (1990) 231–232.","bibtex":"@article{Meyer auf der Heide_1990, title={Das Heinz Nixdorf-Institut der Universität-GH Paderborn}, volume={13}, number={4}, journal={Informatik Spektrum}, author={Meyer auf der Heide, Friedhelm}, year={1990}, pages={231–232} }","mla":"Meyer auf der Heide, Friedhelm. “Das Heinz Nixdorf-Institut Der Universität-GH Paderborn.” <i>Informatik Spektrum</i>, vol. 13, no. 4, 1990, pp. 231–32.","apa":"Meyer auf der Heide, F. (1990). Das Heinz Nixdorf-Institut der Universität-GH Paderborn. <i>Informatik Spektrum</i>, <i>13</i>(4), 231–232.","ama":"Meyer auf der Heide F. Das Heinz Nixdorf-Institut der Universität-GH Paderborn. <i>Informatik Spektrum</i>. 1990;13(4):231-232.","chicago":"Meyer auf der Heide, Friedhelm. “Das Heinz Nixdorf-Institut Der Universität-GH Paderborn.” <i>Informatik Spektrum</i> 13, no. 4 (1990): 231–32.","ieee":"F. Meyer auf der Heide, “Das Heinz Nixdorf-Institut der Universität-GH Paderborn,” <i>Informatik Spektrum</i>, vol. 13, no. 4, pp. 231–232, 1990."},"issue":"4"},{"department":[{"_id":"63"}],"user_id":"15415","_id":"16743","language":[{"iso":"eng"}],"publication":"RAIRO - Theoretical Informatics and Applications","type":"journal_article","status":"public","date_created":"2020-04-20T11:49:38Z","author":[{"first_name":"Bettina","full_name":"Just, Bettina","last_name":"Just"},{"first_name":"Friedhelm","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"},{"first_name":"Avi","last_name":"Wigderson","full_name":"Wigderson, Avi"}],"date_updated":"2022-01-06T06:52:55Z","doi":"10.1051/ita/1989230101011","title":"On computations with integer division","publication_identifier":{"issn":["0988-3754","1290-385X"]},"publication_status":"published","page":"101-111","citation":{"apa":"Just, B., Meyer auf der Heide, F., &#38; Wigderson, A. (1989). On computations with integer division. <i>RAIRO - Theoretical Informatics and Applications</i>, 101–111. <a href=\"https://doi.org/10.1051/ita/1989230101011\">https://doi.org/10.1051/ita/1989230101011</a>","bibtex":"@article{Just_Meyer auf der Heide_Wigderson_1989, title={On computations with integer division}, DOI={<a href=\"https://doi.org/10.1051/ita/1989230101011\">10.1051/ita/1989230101011</a>}, journal={RAIRO - Theoretical Informatics and Applications}, author={Just, Bettina and Meyer auf der Heide, Friedhelm and Wigderson, Avi}, year={1989}, pages={101–111} }","mla":"Just, Bettina, et al. “On Computations with Integer Division.” <i>RAIRO - Theoretical Informatics and Applications</i>, 1989, pp. 101–11, doi:<a href=\"https://doi.org/10.1051/ita/1989230101011\">10.1051/ita/1989230101011</a>.","short":"B. Just, F. Meyer auf der Heide, A. Wigderson, RAIRO - Theoretical Informatics and Applications (1989) 101–111.","ama":"Just B, Meyer auf der Heide F, Wigderson A. On computations with integer division. <i>RAIRO - Theoretical Informatics and Applications</i>. 1989:101-111. doi:<a href=\"https://doi.org/10.1051/ita/1989230101011\">10.1051/ita/1989230101011</a>","chicago":"Just, Bettina, Friedhelm Meyer auf der Heide, and Avi Wigderson. “On Computations with Integer Division.” <i>RAIRO - Theoretical Informatics and Applications</i>, 1989, 101–11. <a href=\"https://doi.org/10.1051/ita/1989230101011\">https://doi.org/10.1051/ita/1989230101011</a>.","ieee":"B. Just, F. Meyer auf der Heide, and A. Wigderson, “On computations with integer division,” <i>RAIRO - Theoretical Informatics and Applications</i>, pp. 101–111, 1989."},"year":"1989"},{"status":"public","publication":"Proceedings of the first annual ACM symposium on Parallel algorithms and architectures  - SPAA '89","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"63"}],"user_id":"15415","_id":"16744","citation":{"apa":"Dietzfelbinger, M., &#38; Meyer auf der Heide, F. (1989). An optimal parallel dictionary. In <i>Proceedings of the first annual ACM symposium on Parallel algorithms and architectures  - SPAA ’89</i>. <a href=\"https://doi.org/10.1145/72935.72974\">https://doi.org/10.1145/72935.72974</a>","mla":"Dietzfelbinger, M., and Friedhelm Meyer auf der Heide. “An Optimal Parallel Dictionary.” <i>Proceedings of the First Annual ACM Symposium on Parallel Algorithms and Architectures  - SPAA ’89</i>, 1989, doi:<a href=\"https://doi.org/10.1145/72935.72974\">10.1145/72935.72974</a>.","bibtex":"@inproceedings{Dietzfelbinger_Meyer auf der Heide_1989, title={An optimal parallel dictionary}, DOI={<a href=\"https://doi.org/10.1145/72935.72974\">10.1145/72935.72974</a>}, booktitle={Proceedings of the first annual ACM symposium on Parallel algorithms and architectures  - SPAA ’89}, author={Dietzfelbinger, M. and Meyer auf der Heide, Friedhelm}, year={1989} }","short":"M. Dietzfelbinger, F. Meyer auf der Heide, in: Proceedings of the First Annual ACM Symposium on Parallel Algorithms and Architectures  - SPAA ’89, 1989.","ama":"Dietzfelbinger M, Meyer auf der Heide F. An optimal parallel dictionary. In: <i>Proceedings of the First Annual ACM Symposium on Parallel Algorithms and Architectures  - SPAA ’89</i>. ; 1989. doi:<a href=\"https://doi.org/10.1145/72935.72974\">10.1145/72935.72974</a>","chicago":"Dietzfelbinger, M., and Friedhelm Meyer auf der Heide. “An Optimal Parallel Dictionary.” In <i>Proceedings of the First Annual ACM Symposium on Parallel Algorithms and Architectures  - SPAA ’89</i>, 1989. <a href=\"https://doi.org/10.1145/72935.72974\">https://doi.org/10.1145/72935.72974</a>.","ieee":"M. Dietzfelbinger and F. Meyer auf der Heide, “An optimal parallel dictionary,” in <i>Proceedings of the first annual ACM symposium on Parallel algorithms and architectures  - SPAA ’89</i>, 1989."},"year":"1989","publication_identifier":{"isbn":["089791323X"]},"publication_status":"published","doi":"10.1145/72935.72974","title":"An optimal parallel dictionary","date_created":"2020-04-20T11:51:01Z","author":[{"first_name":"M.","full_name":"Dietzfelbinger, M.","last_name":"Dietzfelbinger"},{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","first_name":"Friedhelm"}],"date_updated":"2022-01-06T06:52:55Z"},{"citation":{"apa":"Meyer auf der Heide, F. (1989). On genuinely time bounded computations. In <i>STACS 89</i>. Berlin/Heidelberg. <a href=\"https://doi.org/10.1007/bfb0028969\">https://doi.org/10.1007/bfb0028969</a>","mla":"Meyer auf der Heide, Friedhelm. “On Genuinely Time Bounded Computations.” <i>STACS 89</i>, 1989, doi:<a href=\"https://doi.org/10.1007/bfb0028969\">10.1007/bfb0028969</a>.","bibtex":"@inbook{Meyer auf der Heide_1989, place={Berlin/Heidelberg}, title={On genuinely time bounded computations}, DOI={<a href=\"https://doi.org/10.1007/bfb0028969\">10.1007/bfb0028969</a>}, booktitle={STACS 89}, author={Meyer auf der Heide, Friedhelm}, year={1989} }","short":"F. Meyer auf der Heide, in: STACS 89, Berlin/Heidelberg, 1989.","ama":"Meyer auf der Heide F. On genuinely time bounded computations. In: <i>STACS 89</i>. Berlin/Heidelberg; 1989. doi:<a href=\"https://doi.org/10.1007/bfb0028969\">10.1007/bfb0028969</a>","ieee":"F. Meyer auf der Heide, “On genuinely time bounded computations,” in <i>STACS 89</i>, Berlin/Heidelberg, 1989.","chicago":"Meyer auf der Heide, Friedhelm. “On Genuinely Time Bounded Computations.” In <i>STACS 89</i>. Berlin/Heidelberg, 1989. <a href=\"https://doi.org/10.1007/bfb0028969\">https://doi.org/10.1007/bfb0028969</a>."},"place":"Berlin/Heidelberg","year":"1989","publication_status":"published","publication_identifier":{"isbn":["3540508406"]},"doi":"10.1007/bfb0028969","title":"On genuinely time bounded computations","date_created":"2020-04-20T11:51:54Z","author":[{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523"}],"date_updated":"2022-01-06T06:52:55Z","status":"public","type":"book_chapter","publication":"STACS 89","language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"}],"_id":"16745"},{"publication_identifier":{"isbn":["3540508406"]},"publication_status":"published","citation":{"bibtex":"@inbook{Meyer auf der Heide_Wanka_1989, place={Berlin/Heidelberg}, title={Time-optimal simulations of networks by universal parallel computers}, DOI={<a href=\"https://doi.org/10.1007/bfb0028978\">10.1007/bfb0028978</a>}, booktitle={STACS 89}, author={Meyer auf der Heide, Friedhelm and Wanka, Rolf}, year={1989} }","short":"F. Meyer auf der Heide, R. Wanka, in: STACS 89, Berlin/Heidelberg, 1989.","mla":"Meyer auf der Heide, Friedhelm, and Rolf Wanka. “Time-Optimal Simulations of Networks by Universal Parallel Computers.” <i>STACS 89</i>, 1989, doi:<a href=\"https://doi.org/10.1007/bfb0028978\">10.1007/bfb0028978</a>.","apa":"Meyer auf der Heide, F., &#38; Wanka, R. (1989). Time-optimal simulations of networks by universal parallel computers. In <i>STACS 89</i>. Berlin/Heidelberg. <a href=\"https://doi.org/10.1007/bfb0028978\">https://doi.org/10.1007/bfb0028978</a>","chicago":"Meyer auf der Heide, Friedhelm, and Rolf Wanka. “Time-Optimal Simulations of Networks by Universal Parallel Computers.” In <i>STACS 89</i>. Berlin/Heidelberg, 1989. <a href=\"https://doi.org/10.1007/bfb0028978\">https://doi.org/10.1007/bfb0028978</a>.","ieee":"F. Meyer auf der Heide and R. Wanka, “Time-optimal simulations of networks by universal parallel computers,” in <i>STACS 89</i>, Berlin/Heidelberg, 1989.","ama":"Meyer auf der Heide F, Wanka R. Time-optimal simulations of networks by universal parallel computers. In: <i>STACS 89</i>. Berlin/Heidelberg; 1989. doi:<a href=\"https://doi.org/10.1007/bfb0028978\">10.1007/bfb0028978</a>"},"place":"Berlin/Heidelberg","year":"1989","author":[{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","first_name":"Friedhelm"},{"first_name":"Rolf","last_name":"Wanka","full_name":"Wanka, Rolf"}],"date_created":"2020-04-20T11:52:46Z","date_updated":"2022-01-06T06:52:55Z","doi":"10.1007/bfb0028978","title":"Time-optimal simulations of networks by universal parallel computers","publication":"STACS 89","type":"book_chapter","status":"public","department":[{"_id":"63"}],"user_id":"15415","_id":"16746","language":[{"iso":"eng"}]},{"_id":"16789","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"type":"book_chapter","publication":"STACS 89","status":"public","date_updated":"2022-01-06T06:52:56Z","date_created":"2020-04-21T11:37:58Z","author":[{"last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"}],"title":"Computing minimum spanning forests on 1- and 2-dimensional processor arrays","doi":"10.1007/bfb0028983","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540508403","9783540460985"]},"year":"1989","place":"Berlin, Heidelberg","citation":{"mla":"Meyer auf der Heide, Friedhelm. “Computing Minimum Spanning Forests on 1- and 2-Dimensional Processor Arrays.” <i>STACS 89</i>, 1989, doi:<a href=\"https://doi.org/10.1007/bfb0028983\">10.1007/bfb0028983</a>.","short":"F. Meyer auf der Heide, in: STACS 89, Berlin, Heidelberg, 1989.","bibtex":"@inbook{Meyer auf der Heide_1989, place={Berlin, Heidelberg}, title={Computing minimum spanning forests on 1- and 2-dimensional processor arrays}, DOI={<a href=\"https://doi.org/10.1007/bfb0028983\">10.1007/bfb0028983</a>}, booktitle={STACS 89}, author={Meyer auf der Heide, Friedhelm}, year={1989} }","apa":"Meyer auf der Heide, F. (1989). Computing minimum spanning forests on 1- and 2-dimensional processor arrays. In <i>STACS 89</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/bfb0028983\">https://doi.org/10.1007/bfb0028983</a>","ama":"Meyer auf der Heide F. Computing minimum spanning forests on 1- and 2-dimensional processor arrays. In: <i>STACS 89</i>. Berlin, Heidelberg; 1989. doi:<a href=\"https://doi.org/10.1007/bfb0028983\">10.1007/bfb0028983</a>","chicago":"Meyer auf der Heide, Friedhelm. “Computing Minimum Spanning Forests on 1- and 2-Dimensional Processor Arrays.” In <i>STACS 89</i>. Berlin, Heidelberg, 1989. <a href=\"https://doi.org/10.1007/bfb0028983\">https://doi.org/10.1007/bfb0028983</a>.","ieee":"F. Meyer auf der Heide, “Computing minimum spanning forests on 1- and 2-dimensional processor arrays,” in <i>STACS 89</i>, Berlin, Heidelberg, 1989."}},{"department":[{"_id":"63"}],"user_id":"15415","_id":"16763","language":[{"iso":"eng"}],"publication":"Information and Computation","type":"journal_article","status":"public","date_created":"2020-04-21T08:50:17Z","author":[{"first_name":"László","last_name":"Babai","full_name":"Babai, László"},{"first_name":"Bettina","full_name":"Just, Bettina","last_name":"Just"},{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_updated":"2022-01-06T06:52:55Z","doi":"10.1016/0890-5401(88)90031-4","title":"On the limits of computations with the floor function","publication_identifier":{"issn":["0890-5401"]},"publication_status":"published","page":"99-107","citation":{"ama":"Babai L, Just B, Meyer auf der Heide F. On the limits of computations with the floor function. <i>Information and Computation</i>. 1988:99-107. doi:<a href=\"https://doi.org/10.1016/0890-5401(88)90031-4\">10.1016/0890-5401(88)90031-4</a>","chicago":"Babai, László, Bettina Just, and Friedhelm Meyer auf der Heide. “On the Limits of Computations with the Floor Function.” <i>Information and Computation</i>, 1988, 99–107. <a href=\"https://doi.org/10.1016/0890-5401(88)90031-4\">https://doi.org/10.1016/0890-5401(88)90031-4</a>.","ieee":"L. Babai, B. Just, and F. Meyer auf der Heide, “On the limits of computations with the floor function,” <i>Information and Computation</i>, pp. 99–107, 1988.","apa":"Babai, L., Just, B., &#38; Meyer auf der Heide, F. (1988). On the limits of computations with the floor function. <i>Information and Computation</i>, 99–107. <a href=\"https://doi.org/10.1016/0890-5401(88)90031-4\">https://doi.org/10.1016/0890-5401(88)90031-4</a>","bibtex":"@article{Babai_Just_Meyer auf der Heide_1988, title={On the limits of computations with the floor function}, DOI={<a href=\"https://doi.org/10.1016/0890-5401(88)90031-4\">10.1016/0890-5401(88)90031-4</a>}, journal={Information and Computation}, author={Babai, László and Just, Bettina and Meyer auf der Heide, Friedhelm}, year={1988}, pages={99–107} }","mla":"Babai, László, et al. “On the Limits of Computations with the Floor Function.” <i>Information and Computation</i>, 1988, pp. 99–107, doi:<a href=\"https://doi.org/10.1016/0890-5401(88)90031-4\">10.1016/0890-5401(88)90031-4</a>.","short":"L. Babai, B. Just, F. Meyer auf der Heide, Information and Computation (1988) 99–107."},"year":"1988"}]
