[{"citation":{"chicago":"Hamann, Heiko. “Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance.” <i>Swarm Intelligence</i> 7, no. 3 (2013): 145–72. <a href=\"https://doi.org/10.1007/s11721-013-0080-0\">https://doi.org/10.1007/s11721-013-0080-0</a>.","ieee":"H. Hamann, “Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance,” <i>Swarm Intelligence</i>, vol. 7, no. 3, pp. 145–172, 2013.","ama":"Hamann H. Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance. <i>Swarm Intelligence</i>. 2013;7(3):145-172. doi:<a href=\"https://doi.org/10.1007/s11721-013-0080-0\">10.1007/s11721-013-0080-0</a>","apa":"Hamann, H. (2013). Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance. <i>Swarm Intelligence</i>, <i>7</i>(3), 145–172. <a href=\"https://doi.org/10.1007/s11721-013-0080-0\">https://doi.org/10.1007/s11721-013-0080-0</a>","bibtex":"@article{Hamann_2013, title={Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance}, volume={7}, DOI={<a href=\"https://doi.org/10.1007/s11721-013-0080-0\">10.1007/s11721-013-0080-0</a>}, number={3}, journal={Swarm Intelligence}, author={Hamann, Heiko}, year={2013}, pages={145–172} }","short":"H. Hamann, Swarm Intelligence 7 (2013) 145–172.","mla":"Hamann, Heiko. “Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance.” <i>Swarm Intelligence</i>, vol. 7, no. 3, 2013, pp. 145–72, doi:<a href=\"https://doi.org/10.1007/s11721-013-0080-0\">10.1007/s11721-013-0080-0</a>."},"intvolume":"         7","page":"145-172","year":"2013","issue":"3","doi":"10.1007/s11721-013-0080-0","title":"Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance","date_created":"2020-10-21T13:57:36Z","author":[{"last_name":"Hamann","full_name":"Hamann, Heiko","first_name":"Heiko"}],"volume":7,"date_updated":"2022-01-06T06:54:20Z","status":"public","type":"journal_article","publication":"Swarm Intelligence","language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"},{"_id":"238"}],"_id":"20162"},{"_id":"2868","user_id":"25078","department":[{"_id":"64"}],"status":"public","type":"bachelorsthesis","title":"Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten","date_updated":"2022-01-06T06:58:17Z","author":[{"full_name":"Laudemann, Stefan","last_name":"Laudemann","first_name":"Stefan"}],"supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2018-05-24T13:16:41Z","year":"2013","citation":{"chicago":"Laudemann, Stefan. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>, 2013.","ieee":"S. Laudemann, <i>Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten</i>. 2013.","ama":"Laudemann S. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>.; 2013.","apa":"Laudemann, S. (2013). <i>Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten</i>.","mla":"Laudemann, Stefan. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>. 2013.","short":"S. Laudemann, Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten, 2013.","bibtex":"@book{Laudemann_2013, title={Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten}, author={Laudemann, Stefan}, year={2013} }"}},{"year":"2013","citation":{"chicago":"Leder, Lennart. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>, 2013.","ieee":"L. Leder, <i>Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken</i>. 2013.","ama":"Leder L. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>.; 2013.","apa":"Leder, L. (2013). <i>Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken</i>.","mla":"Leder, Lennart. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>. 2013.","bibtex":"@book{Leder_2013, title={Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken}, author={Leder, Lennart}, year={2013} }","short":"L. Leder, Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken, 2013."},"date_updated":"2022-01-06T06:58:17Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"first_name":"Lennart","full_name":"Leder, Lennart","last_name":"Leder"}],"date_created":"2018-05-24T13:17:53Z","title":"Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken","type":"bachelorsthesis","status":"public","_id":"2869","department":[{"_id":"64"}],"user_id":"25078"},{"date_updated":"2022-01-06T06:57:12Z","date_created":"2021-10-07T09:49:15Z","author":[{"first_name":"Da","full_name":"He, Da","last_name":"He"},{"first_name":"Wolfgang","last_name":"Müller","full_name":"Müller, Wolfgang","id":"16243"}],"title":" A heuristic energy-aware approach for hard real-time systems on multi-core platforms","year":"2013","page":"845-857","citation":{"mla":"He, Da, and Wolfgang Müller. “ A Heuristic Energy-Aware Approach for Hard Real-Time Systems on Multi-Core Platforms.” <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>, 2013, pp. 845–57.","short":"D. He, W. Müller, Microprocessors and Microsystems - Embedded Hardware Design 37(6-7) (2013) 845–857.","bibtex":"@article{He_Müller_2013, title={ A heuristic energy-aware approach for hard real-time systems on multi-core platforms}, journal={Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)}, author={He, Da and Müller, Wolfgang}, year={2013}, pages={845–857} }","apa":"He, D., &#38; Müller, W. (2013).  A heuristic energy-aware approach for hard real-time systems on multi-core platforms. <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>, 845–857.","ama":"He D, Müller W.  A heuristic energy-aware approach for hard real-time systems on multi-core platforms. <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>. Published online 2013:845-857.","chicago":"He, Da, and Wolfgang Müller. “ A Heuristic Energy-Aware Approach for Hard Real-Time Systems on Multi-Core Platforms.” <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>, 2013, 845–57.","ieee":"D. He and W. Müller, “ A heuristic energy-aware approach for hard real-time systems on multi-core platforms,” <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>, pp. 845–857, 2013."},"_id":"25740","department":[{"_id":"672"}],"user_id":"21240","language":[{"iso":"eng"}],"publication":"Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)","type":"journal_article","status":"public"},{"status":"public","editor":[{"first_name":"Gunar","full_name":"Schirner, Gunar","last_name":"Schirner"},{"full_name":"Götz, Marcelo","last_name":"Götz","first_name":"Marcelo"},{"last_name":"Rettberg","full_name":"Rettberg, Achim","first_name":"Achim"},{"full_name":"Zanella, Mauro C.","last_name":"Zanella","first_name":"Mauro C."},{"full_name":"Rammig, Franz-Josef","last_name":"Rammig","first_name":"Franz-Josef"}],"type":"book_editor","language":[{"iso":"eng"}],"department":[{"_id":"672"}],"user_id":"21240","series_title":"Band IFIP AICT 403 ","_id":"25741","citation":{"apa":"Schirner, G., Götz, M., Rettberg, A., Zanella, M. C., &#38; Rammig, F.-J. (Eds.). (2013). <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer.","mla":"Schirner, Gunar, et al., editors. <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer, 2013.","short":"G. Schirner, M. Götz, A. Rettberg, M.C. Zanella, F.-J. Rammig, eds., Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013, Springer, 2013.","bibtex":"@book{Schirner_Götz_Rettberg_Zanella_Rammig_2013, series={Band IFIP AICT 403 }, title={Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013}, publisher={Springer}, year={2013}, collection={Band IFIP AICT 403 } }","ama":"Schirner G, Götz M, Rettberg A, Zanella MC, Rammig F-J, eds. <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer; 2013.","chicago":"Schirner, Gunar, Marcelo Götz, Achim Rettberg, Mauro C. Zanella, and Franz-Josef Rammig, eds. <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Band IFIP AICT 403 . Springer, 2013.","ieee":"G. Schirner, M. Götz, A. Rettberg, M. C. Zanella, and F.-J. Rammig, Eds., <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer, 2013."},"year":"2013","title":"Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013","date_created":"2021-10-07T09:54:44Z","date_updated":"2022-01-06T06:57:12Z","publisher":"Springer"},{"department":[{"_id":"672"}],"user_id":"21240","_id":"25742","language":[{"iso":"eng"}],"publication":"The Ninth International Conference on Autonomic and Autonomous Systems","type":"conference","status":"public","date_created":"2021-10-07T09:56:53Z","author":[{"last_name":"Khaluf","full_name":"Khaluf, Lial","first_name":"Lial"},{"first_name":"Franz-Josef","last_name":"Rammig","full_name":"Rammig, Franz-Josef"}],"date_updated":"2022-01-06T06:57:12Z","title":"Organic Programming of Real-Time Operating Systems","citation":{"ama":"Khaluf L, Rammig F-J. Organic Programming of Real-Time Operating Systems. In: <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>. ; 2013.","ieee":"L. Khaluf and F.-J. Rammig, “Organic Programming of Real-Time Operating Systems,” 2013.","chicago":"Khaluf, Lial, and Franz-Josef Rammig. “Organic Programming of Real-Time Operating Systems.” In <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>, 2013.","apa":"Khaluf, L., &#38; Rammig, F.-J. (2013). Organic Programming of Real-Time Operating Systems. <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>.","bibtex":"@inproceedings{Khaluf_Rammig_2013, title={Organic Programming of Real-Time Operating Systems}, booktitle={The Ninth International Conference on Autonomic and Autonomous Systems}, author={Khaluf, Lial and Rammig, Franz-Josef}, year={2013} }","short":"L. Khaluf, F.-J. Rammig, in: The Ninth International Conference on Autonomic and Autonomous Systems, 2013.","mla":"Khaluf, Lial, and Franz-Josef Rammig. “Organic Programming of Real-Time Operating Systems.” <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>, 2013."},"year":"2013"},{"page":"187-356","citation":{"ama":"Anacker H, Dellnitz M, Flaßkamp K, et al. Methods for the Design and Development. In: <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i>. Springer-Verlag; 2013:187-356.","chicago":"Anacker, Harald, Michael Dellnitz, Kathrin Flaßkamp, Stefan Grösbrink, Philip Hartmann, Christian Heinzemann, Christian Horenkamp, et al. “Methods for the Design and Development.” In <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i>, 187–356. Heidelberg: Springer-Verlag, 2013.","ieee":"H. Anacker <i>et al.</i>, “Methods for the Design and Development,” in <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i>, Heidelberg: Springer-Verlag, 2013, pp. 187–356.","apa":"Anacker, H., Dellnitz, M., Flaßkamp, K., Grösbrink, S., Hartmann, P., Heinzemann, C., Horenkamp, C., Kleinjohann, L., Kleinjohann, B., Korf, S., Krüger, M., Müller, W., Ober-Blöbaum, S., Oberthür, S., Porrmann, M., Priesterjahn, C., Radkowski, W., Rasche, C., Rieke, J., … Ziegert, S. (2013). Methods for the Design and Development. In <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i> (pp. 187–356). Springer-Verlag.","bibtex":"@inbook{Anacker_Dellnitz_Flaßkamp_Grösbrink_Hartmann_Heinzemann_Horenkamp_Kleinjohann_Kleinjohann_Korf_et al._2013, place={Heidelberg}, title={Methods for the Design and Development}, booktitle={Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future}, publisher={Springer-Verlag}, author={Anacker, Harald and Dellnitz, Michael and Flaßkamp, Kathrin and Grösbrink, Stefan and Hartmann, Philip and Heinzemann, Christian and Horenkamp, Christian and Kleinjohann, Lisa and Kleinjohann, Bernd and Korf, Sebastian and et al.}, year={2013}, pages={187–356} }","short":"H. Anacker, M. Dellnitz, K. Flaßkamp, S. Grösbrink, P. Hartmann, C. Heinzemann, C. Horenkamp, L. Kleinjohann, B. Kleinjohann, S. Korf, M. Krüger, W. Müller, S. Ober-Blöbaum, S. Oberthür, M. Porrmann, C. Priesterjahn, W. Radkowski, C. Rasche, J. Rieke, M. Ringkamp, K. Stahl, D. Steenken, J. Stöcklein, R. Timmermann, A. Trächtler, K. Witting, T. Xie, S. Ziegert, in: Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future, Springer-Verlag, Heidelberg, 2013, pp. 187–356.","mla":"Anacker, Harald, et al. “Methods for the Design and Development.” <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i>, Springer-Verlag, 2013, pp. 187–356."},"year":"2013","place":"Heidelberg","author":[{"first_name":"Harald","full_name":"Anacker, Harald","last_name":"Anacker"},{"last_name":"Dellnitz","full_name":"Dellnitz, Michael","first_name":"Michael"},{"full_name":"Flaßkamp, Kathrin","last_name":"Flaßkamp","first_name":"Kathrin"},{"last_name":"Grösbrink","full_name":"Grösbrink, Stefan","first_name":"Stefan"},{"first_name":"Philip","last_name":"Hartmann","full_name":"Hartmann, Philip"},{"full_name":"Heinzemann, Christian","last_name":"Heinzemann","first_name":"Christian"},{"full_name":"Horenkamp, Christian","last_name":"Horenkamp","first_name":"Christian"},{"id":"15588","full_name":"Kleinjohann, Lisa","last_name":"Kleinjohann","first_name":"Lisa"},{"full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann","first_name":"Bernd"},{"first_name":"Sebastian","full_name":"Korf, Sebastian","last_name":"Korf"},{"first_name":"Martin","last_name":"Krüger","full_name":"Krüger, Martin"},{"full_name":"Müller, Wolfgang","id":"16243","last_name":"Müller","first_name":"Wolfgang"},{"last_name":"Ober-Blöbaum","id":"16494","full_name":"Ober-Blöbaum, Sina","first_name":"Sina"},{"last_name":"Oberthür","full_name":"Oberthür, Simon","id":"383","first_name":"Simon"},{"first_name":"Mario","full_name":"Porrmann, Mario","last_name":"Porrmann"},{"first_name":"Claudia","last_name":"Priesterjahn","full_name":"Priesterjahn, Claudia"},{"first_name":"W.","last_name":"Radkowski","full_name":"Radkowski, W."},{"first_name":"Christoph","last_name":"Rasche","full_name":"Rasche, Christoph"},{"first_name":"Jan","last_name":"Rieke","full_name":"Rieke, Jan"},{"first_name":"Maik","full_name":"Ringkamp, Maik","last_name":"Ringkamp"},{"last_name":"Stahl","full_name":"Stahl, Katharina","first_name":"Katharina"},{"first_name":"Dominik","full_name":"Steenken, Dominik","last_name":"Steenken"},{"first_name":"Jörg","last_name":"Stöcklein","full_name":"Stöcklein, Jörg"},{"last_name":"Timmermann","full_name":"Timmermann, Robert","first_name":"Robert"},{"last_name":"Trächtler","id":"552","full_name":"Trächtler, Ansgar","first_name":"Ansgar"},{"first_name":"Katrin","last_name":"Witting","full_name":"Witting, Katrin"},{"full_name":"Xie, Tao","last_name":"Xie","first_name":"Tao"},{"first_name":"Steffen","full_name":"Ziegert, Steffen","last_name":"Ziegert"}],"date_created":"2021-10-07T10:07:43Z","date_updated":"2022-01-06T06:57:12Z","publisher":"Springer-Verlag","title":"Methods for the Design and Development","publication":"Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future","type":"book_chapter","status":"public","department":[{"_id":"672"}],"user_id":"21240","_id":"25743","language":[{"iso":"eng"}]},{"date_created":"2018-08-02T13:38:39Z","author":[{"last_name":"Wachsmuth","full_name":"Wachsmuth, Henning","id":"3900","first_name":"Henning"},{"last_name":"Stein","full_name":"Stein, Benno","first_name":"Benno"},{"first_name":"Gregor","last_name":"Engels","full_name":"Engels, Gregor"}],"date_updated":"2022-01-06T06:59:37Z","main_file_link":[{"url":"https://www.aclweb.org/anthology/I13-1061.pdf"}],"title":"Learning Efficient Information Extraction on Heterogeneous Texts","citation":{"mla":"Wachsmuth, Henning, et al. “Learning Efficient Information Extraction on Heterogeneous Texts.” <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, edited by Alexander Gelbukh, 2013, pp. 534–42.","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2013, series={Lecture Notes in Computer Science}, title={Learning Efficient Information Extraction on Heterogeneous Texts}, booktitle={Proceedings of the Sixth International Joint Conference on Natural Language Processing}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={534–542}, collection={Lecture Notes in Computer Science} }","short":"H. Wachsmuth, B. Stein, G. Engels, in: A. Gelbukh (Ed.), Proceedings of the Sixth International Joint Conference on Natural Language Processing, 2013, pp. 534–542.","apa":"Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Learning Efficient Information Extraction on Heterogeneous Texts. In A. Gelbukh (Ed.), <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i> (pp. 534–542).","ama":"Wachsmuth H, Stein B, Engels G. Learning Efficient Information Extraction on Heterogeneous Texts. In: Gelbukh A, ed. <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>. Lecture Notes in Computer Science. ; 2013:534-542.","ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Learning Efficient Information Extraction on Heterogeneous Texts,” in <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, 2013, pp. 534–542.","chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Learning Efficient Information Extraction on Heterogeneous Texts.” In <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, edited by Alexander Gelbukh, 534–42. Lecture Notes in Computer Science, 2013."},"page":"534-542","year":"2013","user_id":"82920","series_title":"Lecture Notes in Computer Science","department":[{"_id":"600"}],"_id":"3813","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the Sixth International Joint Conference on Natural Language Processing","status":"public","editor":[{"first_name":"Alexander","last_name":"Gelbukh","full_name":"Gelbukh, Alexander"}]},{"date_created":"2018-08-02T13:38:40Z","author":[{"first_name":"Henning","last_name":"Wachsmuth","id":"3900","full_name":"Wachsmuth, Henning"},{"first_name":"Benno","full_name":"Stein, Benno","last_name":"Stein"},{"last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"}],"date_updated":"2022-01-06T06:59:37Z","main_file_link":[{"url":"https://dl.acm.org/doi/pdf/10.1145/2505515.2505557"}],"title":"Information Extraction as a Filtering Task","publication_identifier":{"isbn":["978-1-4503-2263-8"]},"page":"2049-2058","citation":{"ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Information Extraction as a Filtering Task,” in <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2013, pp. 2049–2058.","chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Information Extraction as a Filtering Task.” In <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2049–58, 2013.","ama":"Wachsmuth H, Stein B, Engels G. Information Extraction as a Filtering Task. In: <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>. ; 2013:2049-2058.","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2013, title={Information Extraction as a Filtering Task}, booktitle={Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, year={2013}, pages={2049–2058} }","short":"H. Wachsmuth, B. Stein, G. Engels, in: Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management, 2013, pp. 2049–2058.","mla":"Wachsmuth, Henning, et al. “Information Extraction as a Filtering Task.” <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2013, pp. 2049–58.","apa":"Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Information Extraction as a Filtering Task. In <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i> (pp. 2049–2058)."},"year":"2013","department":[{"_id":"600"}],"user_id":"82920","_id":"3814","language":[{"iso":"eng"}],"publication":"Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management","type":"conference","status":"public"},{"language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","user_id":"82920","department":[{"_id":"600"}],"_id":"3876","status":"public","editor":[{"last_name":"Gelbukh","full_name":"Gelbukh, Alexander","first_name":"Alexander"}],"type":"conference","publication":"14th International Conference on Intelligent Text Processing and Computational Linguistics","main_file_link":[{"url":"https://webis.de/downloads/publications/papers/wachsmuth_2013.pdf"}],"title":"Automatic Pipeline Construction for Real-Time Annotation","date_created":"2018-08-11T16:12:29Z","author":[{"last_name":"Wachsmuth","id":"3900","full_name":"Wachsmuth, Henning","first_name":"Henning"},{"first_name":"Mirko","full_name":"Rose, Mirko","last_name":"Rose"},{"first_name":"Gregor","last_name":"Engels","full_name":"Engels, Gregor"}],"date_updated":"2022-01-06T06:59:47Z","citation":{"ama":"Wachsmuth H, Rose M, Engels G. Automatic Pipeline Construction for Real-Time Annotation. In: Gelbukh A, ed. <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>. Lecture Notes in Computer Science. ; 2013:38-49.","ieee":"H. Wachsmuth, M. Rose, and G. Engels, “Automatic Pipeline Construction for Real-Time Annotation,” in <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, 2013, pp. 38–49.","chicago":"Wachsmuth, Henning, Mirko Rose, and Gregor Engels. “Automatic Pipeline Construction for Real-Time Annotation.” In <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, edited by Alexander Gelbukh, 38–49. Lecture Notes in Computer Science, 2013.","apa":"Wachsmuth, H., Rose, M., &#38; Engels, G. (2013). Automatic Pipeline Construction for Real-Time Annotation. In A. Gelbukh (Ed.), <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i> (pp. 38–49).","short":"H. Wachsmuth, M. Rose, G. Engels, in: A. Gelbukh (Ed.), 14th International Conference on Intelligent Text Processing and Computational Linguistics, 2013, pp. 38–49.","mla":"Wachsmuth, Henning, et al. “Automatic Pipeline Construction for Real-Time Annotation.” <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, edited by Alexander Gelbukh, 2013, pp. 38–49.","bibtex":"@inproceedings{Wachsmuth_Rose_Engels_2013, series={Lecture Notes in Computer Science}, title={Automatic Pipeline Construction for Real-Time Annotation}, booktitle={14th International Conference on Intelligent Text Processing and Computational Linguistics}, author={Wachsmuth, Henning and Rose, Mirko and Engels, Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={38–49}, collection={Lecture Notes in Computer Science} }"},"page":"38-49","year":"2013"},{"department":[{"_id":"64"}],"user_id":"25078","_id":"2909","status":"public","type":"dissertation","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12721"}],"title":"Practical algorithms for clustering and modeling large data sets - Analysis and improvements","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2018-05-25T10:07:42Z","author":[{"full_name":"Kuntze, Daniel","last_name":"Kuntze","first_name":"Daniel"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","citation":{"chicago":"Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.","ieee":"D. Kuntze, <i>Practical algorithms for clustering and modeling large data sets - Analysis and improvements</i>. Universität Paderborn, 2013.","ama":"Kuntze D. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn; 2013.","apa":"Kuntze, D. (2013). <i>Practical algorithms for clustering and modeling large data sets - Analysis and improvements</i>. Universität Paderborn.","short":"D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.","mla":"Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.","bibtex":"@book{Kuntze_2013, title={Practical algorithms for clustering and modeling large data sets - Analysis and improvements}, publisher={Universität Paderborn}, author={Kuntze, Daniel}, year={2013} }"},"year":"2013"},{"year":"2013","citation":{"apa":"Juhnke, J., Lefmann, H., &#38; Strehl, V. (2013). <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI.","short":"J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography, Fortschritt-Berichte VDI, 2013.","mla":"Juhnke, Jakob, et al. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","bibtex":"@book{Juhnke_Lefmann_Strehl_2013, title={An Approach for Determining Optimal Contrast in Visual Cryptography}, publisher={Fortschritt-Berichte VDI}, author={Juhnke, Jakob and Lefmann, Hanno and Strehl, Volker}, year={2013} }","ieee":"J. Juhnke, H. Lefmann, and V. Strehl, <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","chicago":"Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","ama":"Juhnke J, Lefmann H, Strehl V. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI; 2013."},"publisher":"Fortschritt-Berichte VDI","date_updated":"2022-01-06T06:58:47Z","date_created":"2018-05-25T11:42:38Z","author":[{"first_name":"Jakob","full_name":"Juhnke, Jakob","id":"48090","last_name":"Juhnke"},{"last_name":"Lefmann","full_name":"Lefmann, Hanno","first_name":"Hanno"},{"first_name":"Volker","full_name":"Strehl, Volker","last_name":"Strehl"}],"title":"An Approach for Determining Optimal Contrast in Visual Cryptography","type":"report","status":"public","_id":"2917","department":[{"_id":"64"}],"user_id":"48090","extern":"1"},{"publication":"Constructive Side-Channel Analysis and Secure Design","type":"book_chapter","status":"public","department":[{"_id":"64"}],"user_id":"25078","_id":"2979","publication_identifier":{"isbn":["9783642400254","9783642400261"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"154-168","citation":{"apa":"Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>","mla":"Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.” <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg, 2013, pp. 154–68, doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>.","short":"J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.","bibtex":"@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>}, booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2013}, pages={154–168} }","ama":"Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>","ieee":"J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>."},"year":"2013","place":"Berlin, Heidelberg","date_created":"2018-06-05T07:33:22Z","author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"last_name":"Günther","full_name":"Günther, Peter","first_name":"Peter"},{"first_name":"Gennadij","last_name":"Liske","full_name":"Liske, Gennadij"}],"date_updated":"2022-01-06T06:58:49Z","publisher":"Springer Berlin Heidelberg","doi":"10.1007/978-3-642-40026-1_10","title":"Improved Side Channel Attacks on Pairing Based Cryptography"},{"issue":"2","citation":{"ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>.","ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>","apa":"Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>.","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245."},"page":"225--245","year":"2013","author":[{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_created":"2018-06-07T09:22:18Z","date_updated":"2022-01-06T06:58:57Z","doi":"10.1007/s00145-012-9120-y","title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","type":"journal_article","publication":"J. Cryptology","status":"public","user_id":"38235","department":[{"_id":"558"}],"_id":"3129","extern":"1"},{"page":"461--485","citation":{"ama":"Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485. doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>","chicago":"Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 461--485, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>.","ieee":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.","short":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.","bibtex":"@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical Signatures from Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}, year={2013}, pages={461--485} }","mla":"Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485, doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>.","apa":"Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks, C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i> (pp. 461--485). <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>"},"year":"2013","doi":"10.1007/978-3-642-38348-9_28","title":"Practical Signatures from Standard Assumptions","date_created":"2018-06-07T09:22:39Z","author":[{"last_name":"Böhl","full_name":"Böhl, Florian","first_name":"Florian"},{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"last_name":"Koch","full_name":"Koch, Jessica","first_name":"Jessica"},{"full_name":"Hong Seo, Jae","last_name":"Hong Seo","first_name":"Jae"},{"last_name":"Striecks","full_name":"Striecks, Christoph","first_name":"Christoph"}],"date_updated":"2022-01-06T06:58:58Z","status":"public","publication":"Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings","type":"conference","extern":"1","department":[{"_id":"558"}],"user_id":"38235","_id":"3130"},{"author":[{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"last_name":"Paterson","full_name":"Paterson, Kenneth G.","first_name":"Kenneth G."},{"last_name":"Somorovsky","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"date_created":"2018-06-07T09:23:49Z","date_updated":"2022-01-06T06:58:58Z","title":"One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography","citation":{"ieee":"T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography,” in <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","chicago":"Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","ama":"Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>. ; 2013.","apa":"Jager, T., Paterson, K. G., &#38; Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>.","bibtex":"@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2013} }","mla":"Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","short":"T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013."},"year":"2013","user_id":"38235","department":[{"_id":"558"}],"_id":"3131","extern":"1","type":"conference","publication":"20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013","status":"public"},{"type":"conference","publication":"Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings","status":"public","editor":[{"first_name":"Dirk","full_name":"Beyer, Dirk","last_name":"Beyer"},{"first_name":"Michele","full_name":"Boreale, Michele","last_name":"Boreale"}],"user_id":"29719","series_title":"Lecture Notes in Computer Science","department":[{"_id":"77"}],"_id":"3176","citation":{"ieee":"T. Isenberg, D. Steenken, and H. Wehrheim, “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving,” in <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, 2013, pp. 178--192.","chicago":"Isenberg, Tobias, Dominik Steenken, and Heike Wehrheim. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” In <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and Michele Boreale, 178--192. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">https://doi.org/10.1007/978-3-642-38592-6_13</a>.","ama":"Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>. Lecture Notes in Computer Science. ; 2013:178--192. doi:<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>","short":"T. Isenberg, D. Steenken, H. Wehrheim, in: D. Beyer, M. Boreale (Eds.), Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, 2013, pp. 178--192.","mla":"Isenberg, Tobias, et al. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and Michele Boreale, 2013, pp. 178--192, doi:<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>.","bibtex":"@inproceedings{Isenberg_Steenken_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={Bounded Model Checking of Graph Transformation Systems via {SMT} Solving}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>}, booktitle={Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings}, author={Isenberg, Tobias and Steenken, Dominik and Wehrheim, Heike}, editor={Beyer, Dirk and Boreale, MicheleEditors}, year={2013}, pages={178--192}, collection={Lecture Notes in Computer Science} }","apa":"Isenberg, T., Steenken, D., &#38; Wehrheim, H. (2013). Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In D. Beyer &#38; M. Boreale (Eds.), <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i> (pp. 178--192). <a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">https://doi.org/10.1007/978-3-642-38592-6_13</a>"},"page":"178--192","year":"2013","author":[{"first_name":"Tobias","last_name":"Isenberg","full_name":"Isenberg, Tobias"},{"full_name":"Steenken, Dominik","last_name":"Steenken","first_name":"Dominik"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2018-06-13T08:08:39Z","date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-642-38592-6_13","title":"Bounded Model Checking of Graph Transformation Systems via {SMT} Solving"},{"title":"{SPIN} as a Linearizability Checker under Weak Memory Models","doi":"10.1007/978-3-319-03077-7_21","date_updated":"2022-01-06T06:59:02Z","date_created":"2018-06-13T08:09:44Z","author":[{"full_name":"Travkin, Oleg","last_name":"Travkin","first_name":"Oleg"},{"first_name":"Annika","last_name":"Mütze","full_name":"Mütze, Annika"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"year":"2013","page":"311--326","citation":{"bibtex":"@inproceedings{Travkin_Mütze_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={{SPIN} as a Linearizability Checker under Weak Memory Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>}, booktitle={Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings}, author={Travkin, Oleg and Mütze, Annika and Wehrheim, Heike}, editor={Bertacco, Valeria and Legay, AxelEditors}, year={2013}, pages={311--326}, collection={Lecture Notes in Computer Science} }","short":"O. Travkin, A. Mütze, H. Wehrheim, in: V. Bertacco, A. Legay (Eds.), Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013, pp. 311--326.","mla":"Travkin, Oleg, et al. “{SPIN} as a Linearizability Checker under Weak Memory Models.” <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 2013, pp. 311--326, doi:<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>.","apa":"Travkin, O., Mütze, A., &#38; Wehrheim, H. (2013). {SPIN} as a Linearizability Checker under Weak Memory Models. In V. Bertacco &#38; A. Legay (Eds.), <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i> (pp. 311--326). <a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">https://doi.org/10.1007/978-3-319-03077-7_21</a>","ama":"Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under Weak Memory Models. In: Bertacco V, Legay A, eds. <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>. Lecture Notes in Computer Science. ; 2013:311--326. doi:<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>","chicago":"Travkin, Oleg, Annika Mütze, and Heike Wehrheim. “{SPIN} as a Linearizability Checker under Weak Memory Models.” In <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 311--326. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">https://doi.org/10.1007/978-3-319-03077-7_21</a>.","ieee":"O. Travkin, A. Mütze, and H. Wehrheim, “{SPIN} as a Linearizability Checker under Weak Memory Models,” in <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, 2013, pp. 311--326."},"_id":"3177","department":[{"_id":"77"}],"series_title":"Lecture Notes in Computer Science","user_id":"29719","editor":[{"full_name":"Bertacco, Valeria","last_name":"Bertacco","first_name":"Valeria"},{"last_name":"Legay","full_name":"Legay, Axel","first_name":"Axel"}],"status":"public","publication":"Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings","type":"conference"},{"department":[{"_id":"77"}],"user_id":"29719","series_title":"Lecture Notes in Computer Science","_id":"3178","publication":"Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings","type":"conference","status":"public","editor":[{"first_name":"Zhiming","last_name":"Liu","full_name":"Liu, Zhiming"},{"first_name":"Jim","last_name":"Woodcock","full_name":"Woodcock, Jim"},{"first_name":"Huibiao","last_name":"Zhu","full_name":"Zhu, Huibiao"}],"author":[{"full_name":"Dongol, Brijesh","last_name":"Dongol","first_name":"Brijesh"},{"first_name":"Oleg","last_name":"Travkin","full_name":"Travkin, Oleg"},{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"date_created":"2018-06-13T08:13:31Z","date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-642-39718-9_11","title":"A High-Level Semantics for Program Execution under Total Store Order Memory","page":"177--194","citation":{"ama":"Dongol B, Travkin O, Derrick J, Wehrheim H. A High-Level Semantics for Program Execution under Total Store Order Memory. In: Liu Z, Woodcock J, Zhu H, eds. <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>. Lecture Notes in Computer Science. ; 2013:177--194. doi:<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>","chicago":"Dongol, Brijesh, Oleg Travkin, John Derrick, and Heike Wehrheim. “A High-Level Semantics for Program Execution under Total Store Order Memory.” In <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu, Jim Woodcock, and Huibiao Zhu, 177--194. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">https://doi.org/10.1007/978-3-642-39718-9_11</a>.","ieee":"B. Dongol, O. Travkin, J. Derrick, and H. Wehrheim, “A High-Level Semantics for Program Execution under Total Store Order Memory,” in <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, 2013, pp. 177--194.","apa":"Dongol, B., Travkin, O., Derrick, J., &#38; Wehrheim, H. (2013). A High-Level Semantics for Program Execution under Total Store Order Memory. In Z. Liu, J. Woodcock, &#38; H. Zhu (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i> (pp. 177--194). <a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">https://doi.org/10.1007/978-3-642-39718-9_11</a>","bibtex":"@inproceedings{Dongol_Travkin_Derrick_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={A High-Level Semantics for Program Execution under Total Store Order Memory}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, author={Dongol, Brijesh and Travkin, Oleg and Derrick, John and Wehrheim, Heike}, editor={Liu, Zhiming and Woodcock, Jim and Zhu, HuibiaoEditors}, year={2013}, pages={177--194}, collection={Lecture Notes in Computer Science} }","mla":"Dongol, Brijesh, et al. “A High-Level Semantics for Program Execution under Total Store Order Memory.” <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu et al., 2013, pp. 177--194, doi:<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>.","short":"B. Dongol, O. Travkin, J. Derrick, H. Wehrheim, in: Z. Liu, J. Woodcock, H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194."},"year":"2013"},{"author":[{"full_name":"Ziegert, Steffen","last_name":"Ziegert","first_name":"Steffen"},{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2018-06-13T08:15:08Z","date_updated":"2022-01-06T06:59:02Z","title":"Temporal Reconfiguration Plans for Self-Adaptive Systems","page":"271--284","citation":{"chicago":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for Self-Adaptive Systems.” In <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, edited by Stefan Kowalewski and Bernhard Rumpe, 271--284. {LNI}, 2013.","ieee":"S. Ziegert and H. Wehrheim, “Temporal Reconfiguration Plans for Self-Adaptive Systems,” in <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, 2013, pp. 271--284.","ama":"Ziegert S, Wehrheim H. Temporal Reconfiguration Plans for Self-Adaptive Systems. In: Kowalewski S, Rumpe B, eds. <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>. {LNI}. ; 2013:271--284.","apa":"Ziegert, S., &#38; Wehrheim, H. (2013). Temporal Reconfiguration Plans for Self-Adaptive Systems. In S. Kowalewski &#38; B. Rumpe (Eds.), <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i> (pp. 271--284).","bibtex":"@inproceedings{Ziegert_Wehrheim_2013, series={{LNI}}, title={Temporal Reconfiguration Plans for Self-Adaptive Systems}, booktitle={Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen}, author={Ziegert, Steffen and Wehrheim, Heike}, editor={Kowalewski, Stefan and Rumpe, BernhardEditors}, year={2013}, pages={271--284}, collection={{LNI}} }","mla":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for Self-Adaptive Systems.” <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, edited by Stefan Kowalewski and Bernhard Rumpe, 2013, pp. 271--284.","short":"S. Ziegert, H. Wehrheim, in: S. Kowalewski, B. Rumpe (Eds.), Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen, 2013, pp. 271--284."},"year":"2013","department":[{"_id":"77"}],"user_id":"29719","series_title":"{LNI}","_id":"3179","publication":"Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen","type":"conference","status":"public","editor":[{"last_name":"Kowalewski","full_name":"Kowalewski, Stefan","first_name":"Stefan"},{"last_name":"Rumpe","full_name":"Rumpe, Bernhard","first_name":"Bernhard"}]}]
