[{"type":"journal_article","publication":"Distributed Computing","status":"public","abstract":[{"lang":"eng","text":"This paper considers the problem of how to efficiently share a wireless medium which is subject to harsh external interference or even jamming. So far, this problem is understood only in simplistic single-hop or unit disk graph models. We in this paper initiate the study of MAC protocols for the SINR interference model (a.k.a. physical model). This paper makes two contributions. First, we introduce a new adversarial SINR model which captures a wide range of interference phenomena. Concretely, we consider a powerful, adaptive adversary which can jam nodes at arbitrary times and which is only limited by some energy budget. Our second contribution is a distributed MAC protocol called Sade which provably achieves a constant competitive throughput in this environment: we show that, with high probability, the protocol ensures that a constant fraction of the non-blocked time periods is used for successful transmissions."}],"user_id":"15504","department":[{"_id":"79"}],"_id":"3872","issue":"3","publication_status":"published","publication_identifier":{"issn":["0178-2770","1432-0452"]},"citation":{"bibtex":"@article{Ogierman_Richa_Scheideler_Schmid_Zhang_2017, title={Sade: competitive MAC under adversarial SINR}, volume={31}, DOI={<a href=\"https://doi.org/10.1007/s00446-017-0307-1\">10.1007/s00446-017-0307-1</a>}, number={3}, journal={Distributed Computing}, publisher={Springer Nature}, author={Ogierman, Adrian and Richa, Andrea and Scheideler, Christian and Schmid, Stefan and Zhang, Jin}, year={2017}, pages={241–254} }","mla":"Ogierman, Adrian, et al. “Sade: Competitive MAC under Adversarial SINR.” <i>Distributed Computing</i>, vol. 31, no. 3, Springer Nature, 2017, pp. 241–54, doi:<a href=\"https://doi.org/10.1007/s00446-017-0307-1\">10.1007/s00446-017-0307-1</a>.","short":"A. Ogierman, A. Richa, C. Scheideler, S. Schmid, J. Zhang, Distributed Computing 31 (2017) 241–254.","apa":"Ogierman, A., Richa, A., Scheideler, C., Schmid, S., &#38; Zhang, J. (2017). Sade: competitive MAC under adversarial SINR. <i>Distributed Computing</i>, <i>31</i>(3), 241–254. <a href=\"https://doi.org/10.1007/s00446-017-0307-1\">https://doi.org/10.1007/s00446-017-0307-1</a>","ieee":"A. Ogierman, A. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Sade: competitive MAC under adversarial SINR,” <i>Distributed Computing</i>, vol. 31, no. 3, pp. 241–254, 2017.","chicago":"Ogierman, Adrian, Andrea Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. “Sade: Competitive MAC under Adversarial SINR.” <i>Distributed Computing</i> 31, no. 3 (2017): 241–54. <a href=\"https://doi.org/10.1007/s00446-017-0307-1\">https://doi.org/10.1007/s00446-017-0307-1</a>.","ama":"Ogierman A, Richa A, Scheideler C, Schmid S, Zhang J. Sade: competitive MAC under adversarial SINR. <i>Distributed Computing</i>. 2017;31(3):241-254. doi:<a href=\"https://doi.org/10.1007/s00446-017-0307-1\">10.1007/s00446-017-0307-1</a>"},"page":"241-254","intvolume":"        31","year":"2017","date_created":"2018-08-10T07:05:12Z","author":[{"last_name":"Ogierman","full_name":"Ogierman, Adrian","first_name":"Adrian"},{"full_name":"Richa, Andrea","last_name":"Richa","first_name":"Andrea"},{"full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler","first_name":"Christian"},{"first_name":"Stefan","full_name":"Schmid, Stefan","last_name":"Schmid"},{"full_name":"Zhang, Jin","last_name":"Zhang","first_name":"Jin"}],"volume":31,"date_updated":"2022-01-06T06:59:47Z","publisher":"Springer Nature","doi":"10.1007/s00446-017-0307-1","title":"Sade: competitive MAC under adversarial SINR"},{"title":"Computational Argumentation Quality Assessment in Natural Language","main_file_link":[{"url":"https://www.aclweb.org/anthology/E17-1017.pdf"}],"date_updated":"2022-01-06T06:59:47Z","date_created":"2018-08-11T16:17:16Z","author":[{"first_name":"Henning","id":"3900","full_name":"Wachsmuth, Henning","last_name":"Wachsmuth"},{"first_name":"Nona","full_name":"Naderi, Nona","last_name":"Naderi"},{"first_name":"Yufang","last_name":"Hou","full_name":"Hou, Yufang"},{"last_name":"Bilu","full_name":"Bilu, Yonatan","first_name":"Yonatan"},{"first_name":"Vinodkumar","full_name":"Prabhakaran, Vinodkumar","last_name":"Prabhakaran"},{"first_name":"Tim Alberdingk","last_name":"Thijm","full_name":"Thijm, Tim Alberdingk"},{"full_name":"Hirst, Graeme","last_name":"Hirst","first_name":"Graeme"},{"last_name":"Stein","full_name":"Stein, Benno","first_name":"Benno"}],"year":"2017","citation":{"ama":"Wachsmuth H, Naderi N, Hou Y, et al. Computational Argumentation Quality Assessment in Natural Language. In: <i>Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers</i>. ; 2017:176-187.","chicago":"Wachsmuth, Henning, Nona Naderi, Yufang Hou, Yonatan Bilu, Vinodkumar Prabhakaran, Tim Alberdingk Thijm, Graeme Hirst, and Benno Stein. “Computational Argumentation Quality Assessment in Natural Language.” In <i>Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers</i>, 176–87, 2017.","ieee":"H. Wachsmuth <i>et al.</i>, “Computational Argumentation Quality Assessment in Natural Language,” in <i>Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers</i>, 2017, pp. 176–187.","apa":"Wachsmuth, H., Naderi, N., Hou, Y., Bilu, Y., Prabhakaran, V., Thijm, T. A., … Stein, B. (2017). Computational Argumentation Quality Assessment in Natural Language. In <i>Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers</i> (pp. 176–187).","mla":"Wachsmuth, Henning, et al. “Computational Argumentation Quality Assessment in Natural Language.” <i>Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers</i>, 2017, pp. 176–87.","short":"H. Wachsmuth, N. Naderi, Y. Hou, Y. Bilu, V. Prabhakaran, T.A. Thijm, G. Hirst, B. Stein, in: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers, 2017, pp. 176–187.","bibtex":"@inproceedings{Wachsmuth_Naderi_Hou_Bilu_Prabhakaran_Thijm_Hirst_Stein_2017, title={Computational Argumentation Quality Assessment in Natural Language}, booktitle={Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers}, author={Wachsmuth, Henning and Naderi, Nona and Hou, Yufang and Bilu, Yonatan and Prabhakaran, Vinodkumar and Thijm, Tim Alberdingk and Hirst, Graeme and Stein, Benno}, year={2017}, pages={176–187} }"},"page":"176-187","language":[{"iso":"eng"}],"_id":"3881","user_id":"82920","department":[{"_id":"600"},{"_id":"568"}],"status":"public","type":"conference","publication":"Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers"},{"publication":"Special Section of the ACM Transactions on Internet Technology: Argumentation in Social Media","type":"journal_article","status":"public","department":[{"_id":"568"},{"_id":"600"}],"user_id":"82920","_id":"3882","language":[{"iso":"eng"}],"issue":"3","publication_identifier":{"issn":["1533-5399"]},"page":"1-24","citation":{"ama":"Wachsmuth H, Stein B. A Universal Model for Discourse-Level Argumentation Analysis. <i>Special Section of the ACM Transactions on Internet Technology: Argumentation in Social Media</i>. 2017;(3):1-24.","chicago":"Wachsmuth, Henning, and Benno Stein. “A Universal Model for Discourse-Level Argumentation Analysis.” <i>Special Section of the ACM Transactions on Internet Technology: Argumentation in Social Media</i>, no. 3 (2017): 1–24.","ieee":"H. Wachsmuth and B. Stein, “A Universal Model for Discourse-Level Argumentation Analysis,” <i>Special Section of the ACM Transactions on Internet Technology: Argumentation in Social Media</i>, no. 3, pp. 1–24, 2017.","mla":"Wachsmuth, Henning, and Benno Stein. “A Universal Model for Discourse-Level Argumentation Analysis.” <i>Special Section of the ACM Transactions on Internet Technology: Argumentation in Social Media</i>, no. 3, 2017, pp. 1–24.","short":"H. Wachsmuth, B. Stein, Special Section of the ACM Transactions on Internet Technology: Argumentation in Social Media (2017) 1–24.","bibtex":"@article{Wachsmuth_Stein_2017, title={A Universal Model for Discourse-Level Argumentation Analysis}, number={3}, journal={Special Section of the ACM Transactions on Internet Technology: Argumentation in Social Media}, author={Wachsmuth, Henning and Stein, Benno}, year={2017}, pages={1–24} }","apa":"Wachsmuth, H., &#38; Stein, B. (2017). A Universal Model for Discourse-Level Argumentation Analysis. <i>Special Section of the ACM Transactions on Internet Technology: Argumentation in Social Media</i>, (3), 1–24."},"year":"2017","author":[{"first_name":"Henning","id":"3900","full_name":"Wachsmuth, Henning","last_name":"Wachsmuth"},{"first_name":"Benno","full_name":"Stein, Benno","last_name":"Stein"}],"date_created":"2018-08-11T16:18:03Z","date_updated":"2022-01-06T06:59:47Z","main_file_link":[{"url":"https://dl.acm.org/doi/pdf/10.1145/2957757"}],"title":"A Universal Model for Discourse-Level Argumentation Analysis"},{"status":"public","publication":"Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"568"},{"_id":"600"}],"user_id":"82920","_id":"3883","page":"250-255","citation":{"apa":"Wachsmuth, H., Naderi, N., Habernal, I., Hou, Y., Hirst, G., Gurevych, I., &#38; Stein, B. (2017). Argumentation Quality Assessment: Theory vs. Practice. In <i>Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)</i> (pp. 250–255). <a href=\"https://doi.org/10.18653/v1/P17-2039\">https://doi.org/10.18653/v1/P17-2039</a>","short":"H. Wachsmuth, N. Naderi, I. Habernal, Y. Hou, G. Hirst, I. Gurevych, B. Stein, in: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2017, pp. 250–255.","mla":"Wachsmuth, Henning, et al. “Argumentation Quality Assessment: Theory vs. Practice.” <i>Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)</i>, 2017, pp. 250–55, doi:<a href=\"https://doi.org/10.18653/v1/P17-2039\">10.18653/v1/P17-2039</a>.","bibtex":"@inproceedings{Wachsmuth_Naderi_Habernal_Hou_Hirst_Gurevych_Stein_2017, title={Argumentation Quality Assessment: Theory vs. Practice}, DOI={<a href=\"https://doi.org/10.18653/v1/P17-2039\">10.18653/v1/P17-2039</a>}, booktitle={Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)}, author={Wachsmuth, Henning and Naderi, Nona and Habernal, Ivan and Hou, Yufang and Hirst, Graeme and Gurevych, Iryna and Stein, Benno}, year={2017}, pages={250–255} }","chicago":"Wachsmuth, Henning, Nona Naderi, Ivan Habernal, Yufang Hou, Graeme Hirst, Iryna Gurevych, and Benno Stein. “Argumentation Quality Assessment: Theory vs. Practice.” In <i>Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)</i>, 250–55, 2017. <a href=\"https://doi.org/10.18653/v1/P17-2039\">https://doi.org/10.18653/v1/P17-2039</a>.","ieee":"H. Wachsmuth <i>et al.</i>, “Argumentation Quality Assessment: Theory vs. Practice,” in <i>Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)</i>, 2017, pp. 250–255.","ama":"Wachsmuth H, Naderi N, Habernal I, et al. Argumentation Quality Assessment: Theory vs. Practice. In: <i>Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)</i>. ; 2017:250-255. doi:<a href=\"https://doi.org/10.18653/v1/P17-2039\">10.18653/v1/P17-2039</a>"},"year":"2017","doi":"10.18653/v1/P17-2039","main_file_link":[{"url":"https://www.aclweb.org/anthology/P17-2039.pdf"}],"title":"Argumentation Quality Assessment: Theory vs. Practice","date_created":"2018-08-11T16:18:38Z","author":[{"id":"3900","full_name":"Wachsmuth, Henning","last_name":"Wachsmuth","first_name":"Henning"},{"first_name":"Nona","last_name":"Naderi","full_name":"Naderi, Nona"},{"full_name":"Habernal, Ivan","last_name":"Habernal","first_name":"Ivan"},{"full_name":"Hou, Yufang","last_name":"Hou","first_name":"Yufang"},{"full_name":"Hirst, Graeme","last_name":"Hirst","first_name":"Graeme"},{"full_name":"Gurevych, Iryna","last_name":"Gurevych","first_name":"Iryna"},{"first_name":"Benno","last_name":"Stein","full_name":"Stein, Benno"}],"date_updated":"2022-01-06T06:59:47Z"},{"year":"2017","citation":{"short":"M. Hagen, J. Kiesel, M. Alshomary, B. Stein, in: Working Notes of CLEF 2017 - Conference and Labs of the Evaluation Forum, 2017.","bibtex":"@inproceedings{Hagen_Kiesel_Alshomary_Stein_2017, title={Webis at the CLEF 2017 Dynamic Search Lab}, booktitle={Working Notes of CLEF 2017 - Conference and Labs of the Evaluation Forum}, author={Hagen, Matthias and Kiesel, Johannes and Alshomary, Milad and Stein, Benno}, year={2017} }","mla":"Hagen, Matthias, et al. “Webis at the CLEF 2017 Dynamic Search Lab.” <i>Working Notes of CLEF 2017 - Conference and Labs of the Evaluation Forum</i>, 2017.","apa":"Hagen, M., Kiesel, J., Alshomary, M., &#38; Stein, B. (2017). Webis at the CLEF 2017 Dynamic Search Lab. In <i>Working Notes of CLEF 2017 - Conference and Labs of the Evaluation Forum</i>.","ieee":"M. Hagen, J. Kiesel, M. Alshomary, and B. Stein, “Webis at the CLEF 2017 Dynamic Search Lab,” in <i>Working Notes of CLEF 2017 - Conference and Labs of the Evaluation Forum</i>, 2017.","chicago":"Hagen, Matthias, Johannes Kiesel, Milad Alshomary, and Benno Stein. “Webis at the CLEF 2017 Dynamic Search Lab.” In <i>Working Notes of CLEF 2017 - Conference and Labs of the Evaluation Forum</i>, 2017.","ama":"Hagen M, Kiesel J, Alshomary M, Stein B. Webis at the CLEF 2017 Dynamic Search Lab. In: <i>Working Notes of CLEF 2017 - Conference and Labs of the Evaluation Forum</i>. ; 2017."},"title":"Webis at the CLEF 2017 Dynamic Search Lab","main_file_link":[{"url":"http://ceur-ws.org/Vol-1866/paper_198.pdf"}],"date_updated":"2022-01-06T06:59:54Z","date_created":"2018-08-14T13:28:44Z","author":[{"last_name":"Hagen","full_name":"Hagen, Matthias","first_name":"Matthias"},{"full_name":"Kiesel, Johannes","last_name":"Kiesel","first_name":"Johannes"},{"id":"73059","full_name":"Alshomary, Milad","last_name":"Alshomary","first_name":"Milad"},{"first_name":"Benno","last_name":"Stein","full_name":"Stein, Benno"}],"status":"public","publication":"Working Notes of CLEF 2017 - Conference and Labs of the Evaluation Forum","type":"conference","language":[{"iso":"eng"}],"_id":"3904","department":[{"_id":"600"}],"user_id":"73059"},{"citation":{"chicago":"Bujna, Kathrin. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-226\">https://doi.org/10.17619/UNIPB/1-226</a>.","ieee":"K. Bujna, <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017.","ama":"Bujna K. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>","mla":"Bujna, Kathrin. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>.","bibtex":"@book{Bujna_2017, title={Soft Clustering Algorithms - Theoretical and Practical Improvements}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>}, publisher={Universität Paderborn}, author={Bujna, Kathrin}, year={2017} }","short":"K. Bujna, Soft Clustering Algorithms - Theoretical and Practical Improvements, Universität Paderborn, 2017.","apa":"Bujna, K. (2017). <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-226\">https://doi.org/10.17619/UNIPB/1-226</a>"},"year":"2017","doi":"10.17619/UNIPB/1-226","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-29759"}],"title":"Soft Clustering Algorithms - Theoretical and Practical Improvements","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2018-05-25T10:02:30Z","author":[{"first_name":"Kathrin","last_name":"Bujna","full_name":"Bujna, Kathrin"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","status":"public","type":"dissertation","department":[{"_id":"64"}],"user_id":"25078","_id":"2908"},{"ddc":["000"],"language":[{"iso":"eng"}],"publication":"Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"5286","access_level":"closed","file_name":"SubtletiesInSecurityDefinition.pdf","file_size":463904,"creator":"ups","date_created":"2018-11-02T14:52:10Z","date_updated":"2018-11-02T14:52:10Z"}],"publisher":"Springer International Publishing","date_created":"2018-06-04T12:17:48Z","title":"Subtleties in Security Definitions for Predicate Encryption with Public Index","year":"2017","_id":"2967","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"department":[{"_id":"64"}],"series_title":"Lecture Notes in Computer Science","user_id":"477","file_date_updated":"2018-11-02T14:52:10Z","type":"conference","status":"public","date_updated":"2022-01-06T06:58:49Z","oa":"1","volume":10693,"author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"last_name":"Liske","full_name":"Liske, Gennadij","first_name":"Gennadij"}],"doi":"10.1007/978-3-319-72453-9_35","main_file_link":[{"url":"https://eprint.iacr.org/2017/453.pdf","open_access":"1"}],"has_accepted_license":"1","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319724522","9783319724539"]},"publication_status":"published","place":"Cham","intvolume":"     10693","page":"438-453","citation":{"chicago":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>.","ieee":"J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2017, vol. 10693, pp. 438–453.","ama":"Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>","bibtex":"@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }","short":"J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.","mla":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>.","apa":"Blömer, J., &#38; Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>"}},{"department":[{"_id":"558"}],"user_id":"38235","_id":"3108","status":"public","publication":"J. Cryptology","type":"journal_article","doi":"10.1007/s00145-016-9248-2","title":"Authenticated Confidential Channel Establishment and the Security of TLS-DHE","author":[{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"},{"first_name":"Florian","full_name":"Kohlar, Florian","last_name":"Kohlar"},{"first_name":"Sven","full_name":"Schäge, Sven","last_name":"Schäge"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_created":"2018-06-07T08:58:36Z","date_updated":"2022-01-06T06:58:56Z","page":"1276--1324","citation":{"ieee":"T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Authenticated Confidential Channel Establishment and the Security of TLS-DHE,” <i>J. Cryptology</i>, no. 4, pp. 1276--1324, 2017.","chicago":"Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Authenticated Confidential Channel Establishment and the Security of TLS-DHE.” <i>J. Cryptology</i>, no. 4 (2017): 1276--1324. <a href=\"https://doi.org/10.1007/s00145-016-9248-2\">https://doi.org/10.1007/s00145-016-9248-2</a>.","ama":"Jager T, Kohlar F, Schäge S, Schwenk J. Authenticated Confidential Channel Establishment and the Security of TLS-DHE. <i>J Cryptology</i>. 2017;(4):1276--1324. doi:<a href=\"https://doi.org/10.1007/s00145-016-9248-2\">10.1007/s00145-016-9248-2</a>","short":"T. Jager, F. Kohlar, S. Schäge, J. Schwenk, J. Cryptology (2017) 1276--1324.","bibtex":"@article{Jager_Kohlar_Schäge_Schwenk_2017, title={Authenticated Confidential Channel Establishment and the Security of TLS-DHE}, DOI={<a href=\"https://doi.org/10.1007/s00145-016-9248-2\">10.1007/s00145-016-9248-2</a>}, number={4}, journal={J. Cryptology}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2017}, pages={1276--1324} }","mla":"Jager, Tibor, et al. “Authenticated Confidential Channel Establishment and the Security of TLS-DHE.” <i>J. Cryptology</i>, no. 4, 2017, pp. 1276--1324, doi:<a href=\"https://doi.org/10.1007/s00145-016-9248-2\">10.1007/s00145-016-9248-2</a>.","apa":"Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2017). Authenticated Confidential Channel Establishment and the Security of TLS-DHE. <i>J. Cryptology</i>, (4), 1276--1324. <a href=\"https://doi.org/10.1007/s00145-016-9248-2\">https://doi.org/10.1007/s00145-016-9248-2</a>"},"year":"2017","issue":"4"},{"date_created":"2018-06-07T09:07:59Z","author":[{"first_name":"Britta","last_name":"Hale","full_name":"Hale, Britta"},{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"},{"first_name":"Sebastian","last_name":"Lauer","full_name":"Lauer, Sebastian"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_updated":"2022-01-06T06:58:56Z","doi":"10.1007/978-3-319-61204-1_2","title":"Simple Security Definitions for and Constructions of 0-RTT Key Exchange","page":"20--38","citation":{"bibtex":"@inproceedings{Hale_Jager_Lauer_Schwenk_2017, title={Simple Security Definitions for and Constructions of 0-RTT Key Exchange}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>}, booktitle={Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, author={Hale, Britta and Jager, Tibor and Lauer, Sebastian and Schwenk, Jörg}, year={2017}, pages={20--38} }","short":"B. Hale, T. Jager, S. Lauer, J. Schwenk, in: Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38.","mla":"Hale, Britta, et al. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 2017, pp. 20--38, doi:<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>.","apa":"Hale, B., Jager, T., Lauer, S., &#38; Schwenk, J. (2017). Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i> (pp. 20--38). <a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">https://doi.org/10.1007/978-3-319-61204-1_2</a>","ieee":"B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple Security Definitions for and Constructions of 0-RTT Key Exchange,” in <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 2017, pp. 20--38.","chicago":"Hale, Britta, Tibor Jager, Sebastian Lauer, and Jörg Schwenk. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” In <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 20--38, 2017. <a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">https://doi.org/10.1007/978-3-319-61204-1_2</a>.","ama":"Hale B, Jager T, Lauer S, Schwenk J. Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In: <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>. ; 2017:20--38. doi:<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>"},"year":"2017","department":[{"_id":"558"}],"user_id":"38235","_id":"3109","publication":"Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings","type":"conference","status":"public"},{"year":"2017","citation":{"ieee":"F. Günther, B. Hale, T. Jager, and S. Lauer, “0-RTT Key Exchange with Full Forward Secrecy,” in <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 2017, pp. 519--548.","chicago":"Günther, Felix, Britta Hale, Tibor Jager, and Sebastian Lauer. “0-RTT Key Exchange with Full Forward Secrecy.” In <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 519--548, 2017. <a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">https://doi.org/10.1007/978-3-319-56617-7_18</a>.","ama":"Günther F, Hale B, Jager T, Lauer S. 0-RTT Key Exchange with Full Forward Secrecy. In: <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>. ; 2017:519--548. doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>","short":"F. Günther, B. Hale, T. Jager, S. Lauer, in: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548.","mla":"Günther, Felix, et al. “0-RTT Key Exchange with Full Forward Secrecy.” <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 2017, pp. 519--548, doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>.","bibtex":"@inproceedings{Günther_Hale_Jager_Lauer_2017, title={0-RTT Key Exchange with Full Forward Secrecy}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III}, author={Günther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian}, year={2017}, pages={519--548} }","apa":"Günther, F., Hale, B., Jager, T., &#38; Lauer, S. (2017). 0-RTT Key Exchange with Full Forward Secrecy. In <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i> (pp. 519--548). <a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">https://doi.org/10.1007/978-3-319-56617-7_18</a>"},"page":"519--548","date_updated":"2022-01-06T06:58:56Z","date_created":"2018-06-07T09:10:17Z","author":[{"full_name":"Günther, Felix","last_name":"Günther","first_name":"Felix"},{"full_name":"Hale, Britta","last_name":"Hale","first_name":"Britta"},{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"first_name":"Sebastian","full_name":"Lauer, Sebastian","last_name":"Lauer"}],"title":"0-RTT Key Exchange with Full Forward Secrecy","doi":"10.1007/978-3-319-56617-7_18","type":"conference","publication":"Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III","status":"public","_id":"3110","user_id":"38235","department":[{"_id":"558"}]},{"page":"409--441","citation":{"bibtex":"@inproceedings{Jager_Stam_Stanley-Oakes_Warinschi_2017, title={Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>}, booktitle={Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I}, author={Jager, Tibor and Stam, Martijn and Stanley-Oakes, Ryan and Warinschi, Bogdan}, year={2017}, pages={409--441} }","short":"T. Jager, M. Stam, R. Stanley-Oakes, B. Warinschi, in: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441.","mla":"Jager, Tibor, et al. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 2017, pp. 409--441, doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>.","apa":"Jager, T., Stam, M., Stanley-Oakes, R., &#38; Warinschi, B. (2017). Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i> (pp. 409--441). <a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">https://doi.org/10.1007/978-3-319-70500-2_14</a>","ama":"Jager T, Stam M, Stanley-Oakes R, Warinschi B. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In: <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>. ; 2017:409--441. doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>","chicago":"Jager, Tibor, Martijn Stam, Ryan Stanley-Oakes, and Bogdan Warinschi. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” In <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 409--441, 2017. <a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">https://doi.org/10.1007/978-3-319-70500-2_14</a>.","ieee":"T. Jager, M. Stam, R. Stanley-Oakes, and B. Warinschi, “Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy,” in <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 2017, pp. 409--441."},"year":"2017","date_created":"2018-06-07T09:11:07Z","author":[{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"},{"first_name":"Martijn","last_name":"Stam","full_name":"Stam, Martijn"},{"first_name":"Ryan","last_name":"Stanley-Oakes","full_name":"Stanley-Oakes, Ryan"},{"last_name":"Warinschi","full_name":"Warinschi, Bogdan","first_name":"Bogdan"}],"date_updated":"2022-01-06T06:58:56Z","doi":"10.1007/978-3-319-70500-2_14","title":"Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy","publication":"Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I","type":"conference","status":"public","department":[{"_id":"558"}],"user_id":"38235","_id":"3111"},{"year":"2017","page":"362--378","citation":{"ieee":"M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow Analyses,” in <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i>, 2017, pp. 362--378.","chicago":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” In <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i>, edited by Zhenhua Duan and Luke Ong, 362--378. Lecture Notes in Computer Science, 2017. <a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">https://doi.org/10.1007/978-3-319-68690-5_22</a>.","ama":"Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses. In: Duan Z, Ong L, eds. <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i>. Lecture Notes in Computer Science. ; 2017:362--378. doi:<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>","apa":"Töws, M., &#38; Wehrheim, H. (2017). Policy Dependent and Independent Information Flow Analyses. In Z. Duan &#38; L. Ong (Eds.), <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i> (pp. 362--378). <a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">https://doi.org/10.1007/978-3-319-68690-5_22</a>","bibtex":"@inproceedings{Töws_Wehrheim_2017, series={Lecture Notes in Computer Science}, title={Policy Dependent and Independent Information Flow Analyses}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>}, booktitle={Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings}, author={Töws, Manuel and Wehrheim, Heike}, editor={Duan, Zhenhua and Ong, LukeEditors}, year={2017}, pages={362--378}, collection={Lecture Notes in Computer Science} }","short":"M. Töws, H. Wehrheim, in: Z. Duan, L. Ong (Eds.), Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings, 2017, pp. 362--378.","mla":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i>, edited by Zhenhua Duan and Luke Ong, 2017, pp. 362--378, doi:<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>."},"title":"Policy Dependent and Independent Information Flow Analyses","doi":"10.1007/978-3-319-68690-5_22","date_updated":"2022-01-06T06:59:00Z","author":[{"first_name":"Manuel","last_name":"Töws","full_name":"Töws, Manuel"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"date_created":"2018-06-13T07:35:49Z","editor":[{"full_name":"Duan, Zhenhua","last_name":"Duan","first_name":"Zhenhua"},{"first_name":"Luke","full_name":"Ong, Luke","last_name":"Ong"}],"status":"public","publication":"Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi'an, China, November 13-17, 2017, Proceedings","type":"conference","_id":"3155","department":[{"_id":"77"}],"user_id":"29719","series_title":"Lecture Notes in Computer Science"},{"year":"2017","citation":{"mla":"König, Jürgen, and Heike Wehrheim. “Value-Based or Conflict-Based? Opacity Definitions for STMs.” <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i>, edited by Dang Van Hung and Deepak Kapur, 2017, pp. 118--135, doi:<a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">10.1007/978-3-319-67729-3_8</a>.","short":"J. König, H. Wehrheim, in: D. Van Hung, D. Kapur (Eds.), Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings, 2017, pp. 118--135.","bibtex":"@inproceedings{König_Wehrheim_2017, series={Lecture Notes in Computer Science}, title={Value-Based or Conflict-Based? Opacity Definitions for STMs}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">10.1007/978-3-319-67729-3_8</a>}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings}, author={König, Jürgen and Wehrheim, Heike}, editor={Van Hung, Dang and Kapur, DeepakEditors}, year={2017}, pages={118--135}, collection={Lecture Notes in Computer Science} }","apa":"König, J., &#38; Wehrheim, H. (2017). Value-Based or Conflict-Based? Opacity Definitions for STMs. In D. Van Hung &#38; D. Kapur (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i> (pp. 118--135). <a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">https://doi.org/10.1007/978-3-319-67729-3_8</a>","ama":"König J, Wehrheim H. Value-Based or Conflict-Based? Opacity Definitions for STMs. In: Van Hung D, Kapur D, eds. <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i>. Lecture Notes in Computer Science. ; 2017:118--135. doi:<a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">10.1007/978-3-319-67729-3_8</a>","ieee":"J. König and H. Wehrheim, “Value-Based or Conflict-Based? Opacity Definitions for STMs,” in <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i>, 2017, pp. 118--135.","chicago":"König, Jürgen, and Heike Wehrheim. “Value-Based or Conflict-Based? Opacity Definitions for STMs.” In <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i>, edited by Dang Van Hung and Deepak Kapur, 118--135. Lecture Notes in Computer Science, 2017. <a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">https://doi.org/10.1007/978-3-319-67729-3_8</a>."},"page":"118--135","title":"Value-Based or Conflict-Based? Opacity Definitions for STMs","doi":"10.1007/978-3-319-67729-3_8","date_updated":"2022-01-06T06:59:00Z","date_created":"2018-06-13T07:37:18Z","author":[{"first_name":"Jürgen","full_name":"König, Jürgen","last_name":"König"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"editor":[{"full_name":"Van Hung, Dang","last_name":"Van Hung","first_name":"Dang"},{"first_name":"Deepak","full_name":"Kapur, Deepak","last_name":"Kapur"}],"status":"public","type":"conference","publication":"Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings","project":[{"_id":"78","name":"Validation of Software Transactional Memory"}],"_id":"3156","user_id":"29719","series_title":"Lecture Notes in Computer Science","department":[{"_id":"77"}]},{"status":"public","type":"conference","user_id":"15572","department":[{"_id":"75"}],"project":[{"name":"Verbundprojekt: Koordinierte Industriekommunikation - Latenzarme und verlässliche Industriekommunikation  - Teilvorhaben: Verteilte Koordination","_id":"29"}],"_id":"2741","citation":{"ieee":"S. Ali Ashraf <i>et al.</i>, “From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication ,” 2017.","chicago":"Ali Ashraf, Shehzad, Y.-P. Eric Wang, Sameh  Eldessoki, Bernd Holfeld, Donald  Parruca, Martin Serror, and James Gross. “From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication .” Dresden: Proceedings of 23th European Wireless Conference 2017, 17- 19.05.2017, 2017.","ama":"Ali Ashraf S, Wang Y-PE, Eldessoki S, et al. From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication . In: Dresden: Proceedings of 23th European Wireless Conference 2017, 17- 19.05.2017; 2017.","apa":"Ali Ashraf, S., Wang, Y.-P. E., Eldessoki, S., Holfeld, B., Parruca, D., Serror, M., &#38; Gross, J. (2017). From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication . Dresden: Proceedings of 23th European Wireless Conference 2017, 17- 19.05.2017.","mla":"Ali Ashraf, Shehzad, et al. <i>From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication </i>. Proceedings of 23th European Wireless Conference 2017, 17- 19.05.2017, 2017.","bibtex":"@inproceedings{Ali Ashraf_Wang_Eldessoki_Holfeld_Parruca_Serror_Gross_2017, place={Dresden}, title={From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication }, publisher={Proceedings of 23th European Wireless Conference 2017, 17- 19.05.2017}, author={Ali Ashraf, Shehzad and Wang, Y.-P. Eric and Eldessoki, Sameh  and Holfeld, Bernd and Parruca, Donald  and Serror, Martin and Gross, James}, year={2017} }","short":"S. Ali Ashraf, Y.-P.E. Wang, S. Eldessoki, B. Holfeld, D. Parruca, M. Serror, J. Gross, in: Proceedings of 23th European Wireless Conference 2017, 17- 19.05.2017, Dresden, 2017."},"year":"2017","place":"Dresden","main_file_link":[{"url":"https://ieeexplore.ieee.org/document/8011336/"}],"title":"From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication ","author":[{"last_name":"Ali Ashraf","full_name":"Ali Ashraf, Shehzad","first_name":"Shehzad"},{"first_name":"Y.-P. Eric","last_name":"Wang","full_name":"Wang, Y.-P. Eric"},{"first_name":"Sameh ","full_name":"Eldessoki, Sameh ","last_name":"Eldessoki"},{"full_name":"Holfeld, Bernd","last_name":"Holfeld","first_name":"Bernd"},{"first_name":"Donald ","full_name":"Parruca, Donald ","last_name":"Parruca"},{"first_name":"Martin","last_name":"Serror","full_name":"Serror, Martin"},{"first_name":"James","last_name":"Gross","full_name":"Gross, James"}],"date_created":"2018-05-14T10:46:57Z","date_updated":"2022-01-06T06:57:39Z","publisher":"Proceedings of 23th European Wireless Conference 2017, 17- 19.05.2017"},{"doi":"10.1007/978-3-319-57586-5_19","date_updated":"2022-01-06T06:50:58Z","author":[{"id":"14052","full_name":"Feldotto, Matthias","orcid":"0000-0003-1348-6516","last_name":"Feldotto","first_name":"Matthias"},{"last_name":"Leder","full_name":"Leder, Lennart","first_name":"Lennart"},{"first_name":"Alexander","last_name":"Skopalik","id":"40384","full_name":"Skopalik, Alexander"}],"page":"222--233","citation":{"ieee":"M. Feldotto, L. Leder, and A. Skopalik, “Congestion Games with Complementarities,” in <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i>, 2017, pp. 222--233.","chicago":"Feldotto, Matthias, Lennart Leder, and Alexander Skopalik. “Congestion Games with Complementarities.” In <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i>, 222--233. LNCS, 2017. <a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">https://doi.org/10.1007/978-3-319-57586-5_19</a>.","ama":"Feldotto M, Leder L, Skopalik A. Congestion Games with Complementarities. In: <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i>. LNCS. ; 2017:222--233. doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">10.1007/978-3-319-57586-5_19</a>","short":"M. Feldotto, L. Leder, A. Skopalik, in: Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC), 2017, pp. 222--233.","mla":"Feldotto, Matthias, et al. “Congestion Games with Complementarities.” <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i>, 2017, pp. 222--233, doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">10.1007/978-3-319-57586-5_19</a>.","bibtex":"@inproceedings{Feldotto_Leder_Skopalik_2017, series={LNCS}, title={Congestion Games with Complementarities}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">10.1007/978-3-319-57586-5_19</a>}, booktitle={Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)}, author={Feldotto, Matthias and Leder, Lennart and Skopalik, Alexander}, year={2017}, pages={222--233}, collection={LNCS} }","apa":"Feldotto, M., Leder, L., &#38; Skopalik, A. (2017). Congestion Games with Complementarities. In <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i> (pp. 222--233). <a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">https://doi.org/10.1007/978-3-319-57586-5_19</a>"},"has_accepted_license":"1","file_date_updated":"2018-03-21T13:05:37Z","_id":"112","project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"63"},{"_id":"541"}],"user_id":"14052","series_title":"LNCS","status":"public","type":"conference","title":"Congestion Games with Complementarities","date_created":"2017-10-17T12:41:13Z","year":"2017","ddc":["040"],"external_id":{"arxiv":["1701.07304"]},"abstract":[{"text":"We study a model of selfish resource allocation that seeks to incorporate dependencies among resources as they exist in in modern networked environments. Our model is inspired by utility functions with constant elasticity of substitution (CES) which is a well-studied model in economics. We consider congestion games with different aggregation functions. In particular, we study $L_p$ norms and analyze the existence and complexity of (approximate) pure Nash equilibria. Additionally, we give an almost tight characterization based on monotonicity properties to describe the set of aggregation functions that guarantee the existence of pure Nash equilibria.","lang":"eng"}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-21T13:05:37Z","creator":"florida","date_created":"2018-03-21T13:05:37Z","file_size":264089,"file_name":"112-FeldottoLederSkopalik2017.pdf","access_level":"closed","file_id":"1566"}],"publication":"Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)"},{"type":"conference","status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"113","user_id":"14052","department":[{"_id":"63"},{"_id":"541"}],"file_date_updated":"2018-10-31T17:01:32Z","has_accepted_license":"1","citation":{"bibtex":"@inproceedings{Feldotto_Gairing_Kotsialou_Skopalik_2017, title={Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">10.1007/978-3-319-71924-5_14</a>}, booktitle={Proceedings of the 13th International Conference on Web and Internet Economics (WINE)}, author={Feldotto, Matthias and Gairing, Martin and Kotsialou, Grammateia and Skopalik, Alexander}, year={2017} }","short":"M. Feldotto, M. Gairing, G. Kotsialou, A. Skopalik, in: Proceedings of the 13th International Conference on Web and Internet Economics (WINE), 2017.","mla":"Feldotto, Matthias, et al. “Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games.” <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">10.1007/978-3-319-71924-5_14</a>.","apa":"Feldotto, M., Gairing, M., Kotsialou, G., &#38; Skopalik, A. (2017). Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games. In <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>. <a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">https://doi.org/10.1007/978-3-319-71924-5_14</a>","ama":"Feldotto M, Gairing M, Kotsialou G, Skopalik A. Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games. In: <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">10.1007/978-3-319-71924-5_14</a>","ieee":"M. Feldotto, M. Gairing, G. Kotsialou, and A. Skopalik, “Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games,” in <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>, 2017.","chicago":"Feldotto, Matthias, Martin Gairing, Grammateia Kotsialou, and Alexander Skopalik. “Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games.” In <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>, 2017. <a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">https://doi.org/10.1007/978-3-319-71924-5_14</a>."},"date_updated":"2022-01-06T06:50:59Z","author":[{"first_name":"Matthias","id":"14052","full_name":"Feldotto, Matthias","last_name":"Feldotto","orcid":"0000-0003-1348-6516"},{"first_name":"Martin","last_name":"Gairing","full_name":"Gairing, Martin"},{"full_name":"Kotsialou, Grammateia","last_name":"Kotsialou","first_name":"Grammateia"},{"last_name":"Skopalik","id":"40384","full_name":"Skopalik, Alexander","first_name":"Alexander"}],"doi":"10.1007/978-3-319-71924-5_14","publication":"Proceedings of the 13th International Conference on Web and Internet Economics (WINE)","abstract":[{"text":"We study the computation of approximate pure Nash equilibria in Shapley value (SV) weighted congestion games, introduced in [19]. This class of games considers weighted congestion games in which Shapley values are used as an alternative (to proportional shares) for distributing the total cost of each resource among its users. We focus on the interesting subclass of such games with polynomial resource cost functions and present an algorithm that computes approximate pure Nash equilibria with a polynomial number of strategy updates. Since computing a single strategy update is hard, we apply sampling techniques which allow us to achieve polynomial running time. The algorithm builds on the algorithmic ideas of [7], however, to the best of our knowledge, this is the first algorithmic result on computation of approximate equilibria using other than proportional shares as player costs in this setting. We present a novel relation that approximates the Shapley value of a player by her proportional share and vice versa. As side results, we upper bound the approximate price of anarchy of such games and significantly improve the best known factor for computing approximate pure Nash equilibria in weighted congestion games of [7].","lang":"eng"}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_name":"Feldotto2017_Chapter_ComputingApproximatePureNashEq.pdf","file_id":"5231","file_size":279055,"creator":"feldi","date_created":"2018-10-31T17:01:32Z","date_updated":"2018-10-31T17:01:32Z"}],"external_id":{"arxiv":["1710.01634"]},"ddc":["000"],"language":[{"iso":"eng"}],"year":"2017","date_created":"2017-10-17T12:41:13Z","title":"Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games"},{"editor":[{"first_name":"Clark","full_name":"Barrett, Clark","last_name":"Barrett"},{"first_name":"Misty","last_name":"Davies","full_name":"Davies, Misty"},{"last_name":"Kahsai","full_name":"Kahsai, Temesghen","first_name":"Temesghen"}],"status":"public","type":"conference","file_date_updated":"2018-03-21T13:05:02Z","_id":"114","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"series_title":"Lecture Notes in Computer Science","user_id":"477","page":"389-403","citation":{"chicago":"Jakobs, Marie-Christine, and Heike Wehrheim. “Compact Proof Witnesses.” In <i>NASA Formal Methods: 9th International Symposium</i>, edited by Clark Barrett, Misty Davies, and Temesghen Kahsai, 389–403. Lecture Notes in Computer Science, 2017. <a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">https://doi.org/10.1007/978-3-319-57288-8_28</a>.","ieee":"M.-C. Jakobs and H. Wehrheim, “Compact Proof Witnesses,” in <i>NASA Formal Methods: 9th International Symposium</i>, 2017, pp. 389–403.","ama":"Jakobs M-C, Wehrheim H. Compact Proof Witnesses. In: Barrett C, Davies M, Kahsai T, eds. <i>NASA Formal Methods: 9th International Symposium</i>. Lecture Notes in Computer Science. ; 2017:389-403. doi:<a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">10.1007/978-3-319-57288-8_28</a>","mla":"Jakobs, Marie-Christine, and Heike Wehrheim. “Compact Proof Witnesses.” <i>NASA Formal Methods: 9th International Symposium</i>, edited by Clark Barrett et al., 2017, pp. 389–403, doi:<a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">10.1007/978-3-319-57288-8_28</a>.","short":"M.-C. Jakobs, H. Wehrheim, in: C. Barrett, M. Davies, T. Kahsai (Eds.), NASA Formal Methods: 9th International Symposium, 2017, pp. 389–403.","bibtex":"@inproceedings{Jakobs_Wehrheim_2017, series={Lecture Notes in Computer Science}, title={Compact Proof Witnesses}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">10.1007/978-3-319-57288-8_28</a>}, booktitle={NASA Formal Methods: 9th International Symposium}, author={Jakobs, Marie-Christine and Wehrheim, Heike}, editor={Barrett, Clark and Davies, Misty and Kahsai, TemesghenEditors}, year={2017}, pages={389–403}, collection={Lecture Notes in Computer Science} }","apa":"Jakobs, M.-C., &#38; Wehrheim, H. (2017). Compact Proof Witnesses. In C. Barrett, M. Davies, &#38; T. Kahsai (Eds.), <i>NASA Formal Methods: 9th International Symposium</i> (pp. 389–403). <a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">https://doi.org/10.1007/978-3-319-57288-8_28</a>"},"has_accepted_license":"1","doi":"10.1007/978-3-319-57288-8_28","date_updated":"2022-01-06T06:51:00Z","author":[{"first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine","last_name":"Jakobs"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"abstract":[{"text":"Proof witnesses are proof artifacts showing correctness of programs wrt. safety properties. The recent past has seen a rising interest in witnesses as (a) proofs in a proof-carrying-code context, (b) certificates for the correct functioning of verification tools, or simply (c) exchange formats for (partial) verification results. As witnesses in all theses scenarios need to be stored and processed, witnesses are required to be as small as possible. However, software verification tools – the prime suppliers of witnesses – do not necessarily construct small witnesses. In this paper, we present a formal account of proof witnesses. We introduce the concept of weakenings, reducing the complexity of proof witnesses while preserving the ability of witnessing safety. We develop aweakening technique for a specific class of program analyses, and prove it to be sound. Finally, we experimentally demonstrate our weakening technique to indeed achieve a size reduction of proof witnesses.","lang":"eng"}],"file":[{"date_updated":"2018-03-21T13:05:02Z","creator":"florida","date_created":"2018-03-21T13:05:02Z","file_size":492800,"access_level":"closed","file_id":"1565","file_name":"114-chp_3A10.1007_2F978-3-319-57288-8_28.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"NASA Formal Methods: 9th International Symposium","ddc":["040"],"language":[{"iso":"eng"}],"year":"2017","title":"Compact Proof Witnesses","date_created":"2017-10-17T12:41:13Z"},{"has_accepted_license":"1","citation":{"ieee":"M.-C. Jakobs, J. Krämer, D. van Straaten, and T. Lettmann, “Certiﬁcation Matters for Service Markets,” in <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, 2017, pp. 7–12.","chicago":"Jakobs, Marie-Christine, Julia Krämer, Dirk van Straaten, and Theodor Lettmann. “Certiﬁcation Matters for Service Markets.” In <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, edited by Thomas Prinz Marcelo De Barros, Janusz Klink,Tadeus Uhl, 7–12, 2017.","ama":"Jakobs M-C, Krämer J, van Straaten D, Lettmann T. Certiﬁcation Matters for Service Markets. In: Marcelo De Barros, Janusz Klink,Tadeus Uhl TP, ed. <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>. ; 2017:7-12.","short":"M.-C. Jakobs, J. Krämer, D. van Straaten, T. Lettmann, in: T.P. Marcelo De Barros, Janusz Klink,Tadeus Uhl (Ed.), The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2017, pp. 7–12.","mla":"Jakobs, Marie-Christine, et al. “Certiﬁcation Matters for Service Markets.” <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, edited by Thomas Prinz Marcelo De Barros, Janusz Klink,Tadeus Uhl, 2017, pp. 7–12.","bibtex":"@inproceedings{Jakobs_Krämer_van Straaten_Lettmann_2017, title={Certiﬁcation Matters for Service Markets}, booktitle={The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)}, author={Jakobs, Marie-Christine and Krämer, Julia and van Straaten, Dirk and Lettmann, Theodor}, editor={Marcelo De Barros, Janusz Klink,Tadeus Uhl, Thomas PrinzEditor}, year={2017}, pages={7–12} }","apa":"Jakobs, M.-C., Krämer, J., van Straaten, D., &#38; Lettmann, T. (2017). Certiﬁcation Matters for Service Markets. In T. P. Marcelo De Barros, Janusz Klink,Tadeus Uhl (Ed.), <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i> (pp. 7–12)."},"page":"7-12","date_updated":"2022-01-06T06:51:02Z","author":[{"first_name":"Marie-Christine","last_name":"Jakobs","full_name":"Jakobs, Marie-Christine"},{"first_name":"Julia","last_name":"Krämer","full_name":"Krämer, Julia"},{"first_name":"Dirk","last_name":"van Straaten","full_name":"van Straaten, Dirk","id":"10311"},{"orcid":"0000-0001-5859-2457","last_name":"Lettmann","id":"315","full_name":"Lettmann, Theodor","first_name":"Theodor"}],"type":"conference","editor":[{"first_name":"Thomas Prinz","last_name":"Marcelo De Barros, Janusz Klink,Tadeus Uhl","full_name":"Marcelo De Barros, Janusz Klink,Tadeus Uhl, Thomas Prinz"}],"status":"public","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B2","_id":"10"},{"_id":"11","name":"SFB 901 - Subproject B3"},{"_id":"12","name":"SFB 901 - Subproject B4"},{"name":"SFB 901 - Subproject A4","_id":"8"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"115","user_id":"477","department":[{"_id":"77"},{"_id":"355"},{"_id":"179"}],"file_date_updated":"2018-03-21T13:04:12Z","year":"2017","date_created":"2017-10-17T12:41:14Z","title":"Certiﬁcation Matters for Service Markets","publication":"The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)","abstract":[{"lang":"eng","text":"Whenever customers have to decide between different instances of the same product, they are interested in buying the best product. In contrast, companies are interested in reducing the construction effort (and usually as a consequence thereof, the quality) to gain profit. The described setting is widely known as opposed preferences in quality of the product and also applies to the context of service-oriented computing. In general, service-oriented computing emphasizes the construction of large software systems out of existing services, where services are small and self-contained pieces of software that adhere to a specified interface. Several implementations of the same interface are considered as several instances of the same service. Thereby, customers are interested in buying the best service implementation for their service composition wrt. to metrics, such as costs, energy, memory consumption, or execution time. One way to ensure the service quality is to employ certificates, which can come in different kinds: Technical certificates proving correctness can be automatically constructed by the service provider and again be automatically checked by the user. Digital certificates allow proof of the integrity of a product. Other certificates might be rolled out if service providers follow a good software construction principle, which is checked in annual audits. Whereas all of these certificates are handled differently in service markets, what they have in common is that they influence the buying decisions of customers. In this paper, we review state-of-the-art developments in certification with respect to service-oriented computing. We not only discuss how certificates are constructed and handled in service-oriented computing but also review the effects of certificates on the market from an economic perspective."}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-21T13:04:12Z","date_created":"2018-03-21T13:04:12Z","creator":"florida","file_size":133531,"file_id":"1564","file_name":"115-JakobsKraemerVanStraatenLettmann2017.pdf","access_level":"closed"}],"ddc":["040"],"language":[{"iso":"eng"}]},{"type":"mastersthesis","status":"public","department":[{"_id":"78"},{"_id":"7"}],"user_id":"477","_id":"1157","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"},{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"language":[{"iso":"eng"}],"citation":{"mla":"Witschen, Linus Matthias. <i>A Framework for the Synthesis of Approximate Circuits</i>. Universität Paderborn, 2017.","short":"L.M. Witschen, A Framework for the Synthesis of Approximate Circuits, Universität Paderborn, 2017.","bibtex":"@book{Witschen_2017, title={A Framework for the Synthesis of Approximate Circuits}, publisher={Universität Paderborn}, author={Witschen, Linus Matthias}, year={2017} }","apa":"Witschen, L. M. (2017). <i>A Framework for the Synthesis of Approximate Circuits</i>. Universität Paderborn.","ama":"Witschen LM. <i>A Framework for the Synthesis of Approximate Circuits</i>. Universität Paderborn; 2017.","chicago":"Witschen, Linus Matthias. <i>A Framework for the Synthesis of Approximate Circuits</i>. Universität Paderborn, 2017.","ieee":"L. M. Witschen, <i>A Framework for the Synthesis of Approximate Circuits</i>. Universität Paderborn, 2017."},"year":"2017","author":[{"last_name":"Witschen","id":"49051","full_name":"Witschen, Linus Matthias","first_name":"Linus Matthias"}],"date_created":"2018-02-01T14:21:19Z","supervisor":[{"first_name":"Marco","last_name":"Platzner","id":"398","full_name":"Platzner, Marco"},{"first_name":"Tobias","last_name":"Wiersema","id":"3118","full_name":"Wiersema, Tobias"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:51:03Z","title":"A Framework for the Synthesis of Approximate Circuits"},{"abstract":[{"lang":"eng","text":"In this paper, we present the annotation challenges we have encountered when working on a historical language that was undergoing elaboration processes. We especially focus on syntactic ambiguity and gradience in Middle Low German, which causes uncertainty to some extent. Since current annotation tools consider construction contexts and the dynamics of the grammaticalization only partially, we plan to extend CorA – a web-based annotation tool for historical and other non-standard language data – to capture elaboration phenomena and annotator unsureness. Moreover, we seek to interactively learn morphological as well as syntactic annotations."}],"publication":"Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature","language":[{"iso":"eng"}],"year":"2017","quality_controlled":"1","title":"Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German","date_created":"2018-01-31T15:32:33Z","publisher":"Association for Computational Linguistics (ACL)","status":"public","type":"conference","department":[{"_id":"36"},{"_id":"579"},{"_id":"115"},{"_id":"355"},{"_id":"615"}],"user_id":"13929","_id":"1158","project":[{"name":"InterGramm","_id":"39"}],"page":"40-45","citation":{"short":"N. Seemann, M.-L. Merten, M. Geierhos, D. Tophinke, E. Hüllermeier, in: Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature, Association for Computational Linguistics (ACL), Stroudsburg, PA, USA, 2017, pp. 40–45.","bibtex":"@inproceedings{Seemann_Merten_Geierhos_Tophinke_Hüllermeier_2017, place={Stroudsburg, PA, USA}, title={Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German}, DOI={<a href=\"https://doi.org/10.18653/v1/W17-2206\">10.18653/v1/W17-2206</a>}, booktitle={Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature}, publisher={Association for Computational Linguistics (ACL)}, author={Seemann, Nina and Merten, Marie-Luis and Geierhos, Michaela and Tophinke, Doris and Hüllermeier, Eyke}, year={2017}, pages={40–45} }","mla":"Seemann, Nina, et al. “Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German.” <i>Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature</i>, Association for Computational Linguistics (ACL), 2017, pp. 40–45, doi:<a href=\"https://doi.org/10.18653/v1/W17-2206\">10.18653/v1/W17-2206</a>.","apa":"Seemann, N., Merten, M.-L., Geierhos, M., Tophinke, D., &#38; Hüllermeier, E. (2017). Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German. In <i>Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature</i> (pp. 40–45). Stroudsburg, PA, USA: Association for Computational Linguistics (ACL). <a href=\"https://doi.org/10.18653/v1/W17-2206\">https://doi.org/10.18653/v1/W17-2206</a>","ama":"Seemann N, Merten M-L, Geierhos M, Tophinke D, Hüllermeier E. Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German. In: <i>Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature</i>. Stroudsburg, PA, USA: Association for Computational Linguistics (ACL); 2017:40-45. doi:<a href=\"https://doi.org/10.18653/v1/W17-2206\">10.18653/v1/W17-2206</a>","chicago":"Seemann, Nina, Marie-Luis Merten, Michaela Geierhos, Doris Tophinke, and Eyke Hüllermeier. “Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German.” In <i>Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature</i>, 40–45. Stroudsburg, PA, USA: Association for Computational Linguistics (ACL), 2017. <a href=\"https://doi.org/10.18653/v1/W17-2206\">https://doi.org/10.18653/v1/W17-2206</a>.","ieee":"N. Seemann, M.-L. Merten, M. Geierhos, D. Tophinke, and E. Hüllermeier, “Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German,” in <i>Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature</i>, Vancouver, BC, Canada, 2017, pp. 40–45."},"place":"Stroudsburg, PA, USA","publication_status":"published","doi":"10.18653/v1/W17-2206","conference":{"location":"Vancouver, BC, Canada","end_date":"2017-08-04","start_date":"2017-07-31","name":"Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature (LaTeCH-CLfL 2017)"},"author":[{"first_name":"Nina","full_name":"Seemann, Nina","id":"65408","last_name":"Seemann"},{"full_name":"Merten, Marie-Luis","last_name":"Merten","first_name":"Marie-Luis"},{"full_name":"Geierhos, Michaela","id":"42496","last_name":"Geierhos","orcid":"0000-0002-8180-5606","first_name":"Michaela"},{"first_name":"Doris","full_name":"Tophinke, Doris","last_name":"Tophinke"},{"full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","first_name":"Eyke"}],"date_updated":"2022-01-06T06:51:03Z"}]
