[{"year":"2012","type":"conference","status":"public","date_created":"2018-06-05T07:41:14Z","publisher":"ACM","date_updated":"2022-01-06T06:58:50Z","_id":"2982","volume":17,"place":"New York, NY, USA","intvolume":"        17","doi":"10.1145/2133803.2184450","title":"StreamKM++: A clustering algorithm for data streams","author":[{"first_name":"Marcel Rudolf","full_name":"Ackermann, Marcel Rudolf","last_name":"Ackermann"},{"last_name":"Märtens","first_name":"Marcus","full_name":"Märtens, Marcus"},{"last_name":"Raupach","full_name":"Raupach, Christoph","first_name":"Christoph"},{"first_name":"Kamil","full_name":"Swierkot, Kamil","last_name":"Swierkot"},{"last_name":"Lammersen","first_name":"Christiane","full_name":"Lammersen, Christiane"},{"last_name":"Sohler","full_name":"Sohler, Christian","first_name":"Christian"}],"department":[{"_id":"64"}],"series_title":"ACM Journal of Experimental Algorithmics","citation":{"ieee":"M. R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, and C. Sohler, “StreamKM++: A clustering algorithm for data streams,” vol. 17. ACM, New York, NY, USA, 2012.","chicago":"Ackermann, Marcel Rudolf, Marcus Märtens, Christoph Raupach, Kamil Swierkot, Christiane Lammersen, and Christian Sohler. “StreamKM++: A Clustering Algorithm for Data Streams.” ACM Journal of Experimental Algorithmics. New York, NY, USA: ACM, 2012. <a href=\"https://doi.org/10.1145/2133803.2184450\">https://doi.org/10.1145/2133803.2184450</a>.","apa":"Ackermann, M. R., Märtens, M., Raupach, C., Swierkot, K., Lammersen, C., &#38; Sohler, C. (2012). StreamKM++: A clustering algorithm for data streams. New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/2133803.2184450\">https://doi.org/10.1145/2133803.2184450</a>","ama":"Ackermann MR, Märtens M, Raupach C, Swierkot K, Lammersen C, Sohler C. StreamKM++: A clustering algorithm for data streams. 2012;17. doi:<a href=\"https://doi.org/10.1145/2133803.2184450\">10.1145/2133803.2184450</a>","short":"M.R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, C. Sohler, 17 (2012).","bibtex":"@article{Ackermann_Märtens_Raupach_Swierkot_Lammersen_Sohler_2012, place={New York, NY, USA}, series={ACM Journal of Experimental Algorithmics}, title={StreamKM++: A clustering algorithm for data streams}, volume={17}, DOI={<a href=\"https://doi.org/10.1145/2133803.2184450\">10.1145/2133803.2184450</a>}, publisher={ACM}, author={Ackermann, Marcel Rudolf and Märtens, Marcus and Raupach, Christoph and Swierkot, Kamil and Lammersen, Christiane and Sohler, Christian}, year={2012}, collection={ACM Journal of Experimental Algorithmics} }","mla":"Ackermann, Marcel Rudolf, et al. <i>StreamKM++: A Clustering Algorithm for Data Streams</i>. Vol. 17, ACM, 2012, doi:<a href=\"https://doi.org/10.1145/2133803.2184450\">10.1145/2133803.2184450</a>."},"user_id":"25078","publication_status":"published"},{"user_id":"25078","publication_status":"published","citation":{"ieee":"J. Blömer, “Turing und Kryptografie,” <i>Informatik-Spektrum</i>, vol. 35, no. 4, 2012.","chicago":"Blömer, Johannes. “Turing Und Kryptografie.” <i>Informatik-Spektrum</i> 35, no. 4 (2012). <a href=\"https://doi.org/10.1007/s00287-012-0622-7\">https://doi.org/10.1007/s00287-012-0622-7</a>.","apa":"Blömer, J. (2012). Turing und Kryptografie. <i>Informatik-Spektrum</i>, <i>35</i>(4). <a href=\"https://doi.org/10.1007/s00287-012-0622-7\">https://doi.org/10.1007/s00287-012-0622-7</a>","ama":"Blömer J. Turing und Kryptografie. <i>Informatik-Spektrum</i>. 2012;35(4). doi:<a href=\"https://doi.org/10.1007/s00287-012-0622-7\">10.1007/s00287-012-0622-7</a>","short":"J. Blömer, Informatik-Spektrum 35 (2012).","bibtex":"@article{Blömer_2012, title={Turing und Kryptografie}, volume={35}, DOI={<a href=\"https://doi.org/10.1007/s00287-012-0622-7\">10.1007/s00287-012-0622-7</a>}, number={4}, journal={Informatik-Spektrum}, author={Blömer, Johannes}, year={2012} }","mla":"Blömer, Johannes. “Turing Und Kryptografie.” <i>Informatik-Spektrum</i>, vol. 35, no. 4, 2012, doi:<a href=\"https://doi.org/10.1007/s00287-012-0622-7\">10.1007/s00287-012-0622-7</a>."},"department":[{"_id":"64"}],"author":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"title":"Turing und Kryptografie","intvolume":"        35","doi":"10.1007/s00287-012-0622-7","abstract":[{"text":"Ich beschreibe die deutsche Enigma-VerschlÃ¼sselungsmaschine und skizziere, wie sie von den Codebrechern von Bletchely Park um Alan Turing gebrochen wurde. Besonderes Augenmerk lege ich auf die BeitrÃ¤ge Alan Turings und die Bedeutung seiner Leistung fÃ¼r die Entwicklung moderner Kryptografie. ","lang":"eng"}],"volume":35,"_id":"2984","date_updated":"2022-01-06T06:58:50Z","issue":"4","publication":"Informatik-Spektrum","quality_controlled":"1","date_created":"2018-06-05T07:42:38Z","status":"public","type":"journal_article","publication_identifier":{"issn":["1432-122X"]},"year":"2012","language":[{"iso":"eng"}]},{"citation":{"mla":"Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum, 2012.","bibtex":"@book{Jager_2012, title={On black-box models of computation in cryptology}, publisher={Ruhr University Bochum}, author={Jager, Tibor}, year={2012} }","short":"T. Jager, On Black-Box Models of Computation in Cryptology, Ruhr University Bochum, 2012.","apa":"Jager, T. (2012). <i>On black-box models of computation in cryptology</i>. Ruhr University Bochum.","ama":"Jager T. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum; 2012.","chicago":"Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum, 2012.","ieee":"T. Jager, <i>On black-box models of computation in cryptology</i>. Ruhr University Bochum, 2012."},"user_id":"38235","department":[{"_id":"558"}],"title":"On black-box models of computation in cryptology","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"}],"extern":"1","_id":"3132","date_updated":"2022-01-06T06:58:58Z","date_created":"2018-06-07T09:25:35Z","publisher":"Ruhr University Bochum","year":"2012","type":"dissertation","publication_identifier":{"isbn":["978-3-8348-1989-5"]},"status":"public"},{"date_created":"2018-06-07T09:25:56Z","publication":"Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings","type":"conference","year":"2012","status":"public","page":"273--293","_id":"3133","date_updated":"2022-01-06T06:58:58Z","title":"On the Security of TLS-DHE in the Standard Model","extern":"1","author":[{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"last_name":"Kohlar","first_name":"Florian","full_name":"Kohlar, Florian"},{"first_name":"Sven","full_name":"Schäge, Sven","last_name":"Schäge"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"doi":"10.1007/978-3-642-32009-5_17","citation":{"bibtex":"@inproceedings{Jager_Kohlar_Schäge_Schwenk_2012, title={On the Security of TLS-DHE in the Standard Model}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">10.1007/978-3-642-32009-5_17</a>}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2012}, pages={273--293} }","mla":"Jager, Tibor, et al. “On the Security of TLS-DHE in the Standard Model.” <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 273--293, doi:<a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">10.1007/978-3-642-32009-5_17</a>.","short":"T. Jager, F. Kohlar, S. Schäge, J. Schwenk, in: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293.","apa":"Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2012). On the Security of TLS-DHE in the Standard Model. In <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i> (pp. 273--293). <a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">https://doi.org/10.1007/978-3-642-32009-5_17</a>","ama":"Jager T, Kohlar F, Schäge S, Schwenk J. On the Security of TLS-DHE in the Standard Model. In: <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>. ; 2012:273--293. doi:<a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">10.1007/978-3-642-32009-5_17</a>","ieee":"T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “On the Security of TLS-DHE in the Standard Model,” in <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 273--293.","chicago":"Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “On the Security of TLS-DHE in the Standard Model.” In <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 273--293, 2012. <a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">https://doi.org/10.1007/978-3-642-32009-5_17</a>."},"user_id":"38235","department":[{"_id":"558"}]},{"user_id":"38235","citation":{"ama":"Hofheinz D, Jager T. Tightly Secure Signatures and Public-Key Encryption. In: <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>. ; 2012:590--607. doi:<a href=\"https://doi.org/10.1007/978-3-642-32009-5_35\">10.1007/978-3-642-32009-5_35</a>","apa":"Hofheinz, D., &#38; Jager, T. (2012). Tightly Secure Signatures and Public-Key Encryption. In <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i> (pp. 590--607). <a href=\"https://doi.org/10.1007/978-3-642-32009-5_35\">https://doi.org/10.1007/978-3-642-32009-5_35</a>","chicago":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” In <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 590--607, 2012. <a href=\"https://doi.org/10.1007/978-3-642-32009-5_35\">https://doi.org/10.1007/978-3-642-32009-5_35</a>.","ieee":"D. Hofheinz and T. Jager, “Tightly Secure Signatures and Public-Key Encryption,” in <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 590--607.","mla":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 590--607, doi:<a href=\"https://doi.org/10.1007/978-3-642-32009-5_35\">10.1007/978-3-642-32009-5_35</a>.","bibtex":"@inproceedings{Hofheinz_Jager_2012, title={Tightly Secure Signatures and Public-Key Encryption}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-32009-5_35\">10.1007/978-3-642-32009-5_35</a>}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor}, year={2012}, pages={590--607} }","short":"D. Hofheinz, T. Jager, in: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 590--607."},"department":[{"_id":"558"}],"extern":"1","author":[{"full_name":"Hofheinz, Dennis","first_name":"Dennis","last_name":"Hofheinz"},{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"}],"title":"Tightly Secure Signatures and Public-Key Encryption","doi":"10.1007/978-3-642-32009-5_35","_id":"3134","page":"590--607","date_updated":"2022-01-06T06:58:58Z","date_created":"2018-06-07T09:26:31Z","publication":"Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings","status":"public","type":"conference","year":"2012"},{"type":"conference","year":"2012","status":"public","publication":"Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings","date_created":"2018-06-07T09:26:54Z","date_updated":"2022-01-06T06:58:58Z","page":"752--769","_id":"3135","doi":"10.1007/978-3-642-33167-1_43","title":"Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption","author":[{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Sebastian","full_name":"Schinzel, Sebastian","last_name":"Schinzel"},{"last_name":"Somorovsky","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"extern":"1","department":[{"_id":"558"}],"citation":{"mla":"Jager, Tibor, et al. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” <i>Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings</i>, 2012, pp. 752--769, doi:<a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">10.1007/978-3-642-33167-1_43</a>.","bibtex":"@inproceedings{Jager_Schinzel_Somorovsky_2012, title={Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">10.1007/978-3-642-33167-1_43</a>}, booktitle={Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, author={Jager, Tibor and Schinzel, Sebastian and Somorovsky, Juraj}, year={2012}, pages={752--769} }","short":"T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012, pp. 752--769.","ama":"Jager T, Schinzel S, Somorovsky J. Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In: <i>Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings</i>. ; 2012:752--769. doi:<a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">10.1007/978-3-642-33167-1_43</a>","apa":"Jager, T., Schinzel, S., &#38; Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In <i>Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings</i> (pp. 752--769). <a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">https://doi.org/10.1007/978-3-642-33167-1_43</a>","chicago":"Jager, Tibor, Sebastian Schinzel, and Juraj Somorovsky. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” In <i>Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings</i>, 752--769, 2012. <a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">https://doi.org/10.1007/978-3-642-33167-1_43</a>.","ieee":"T. Jager, S. Schinzel, and J. Somorovsky, “Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption,” in <i>Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings</i>, 2012, pp. 752--769."},"user_id":"38235"},{"_id":"3136","page":"66--83","date_updated":"2022-01-06T06:58:58Z","publication":"Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings","date_created":"2018-06-07T09:27:25Z","status":"public","year":"2012","type":"conference","user_id":"38235","citation":{"short":"D. Hofheinz, T. Jager, E. Knapp, in: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83.","bibtex":"@inproceedings{Hofheinz_Jager_Knapp_2012, title={Waters Signatures with Optimal Security Reduction}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-30057-8_5\">10.1007/978-3-642-30057-8_5</a>}, booktitle={Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor and Knapp, Edward}, year={2012}, pages={66--83} }","mla":"Hofheinz, Dennis, et al. “Waters Signatures with Optimal Security Reduction.” <i>Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings</i>, 2012, pp. 66--83, doi:<a href=\"https://doi.org/10.1007/978-3-642-30057-8_5\">10.1007/978-3-642-30057-8_5</a>.","ieee":"D. Hofheinz, T. Jager, and E. Knapp, “Waters Signatures with Optimal Security Reduction,” in <i>Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings</i>, 2012, pp. 66--83.","chicago":"Hofheinz, Dennis, Tibor Jager, and Edward Knapp. “Waters Signatures with Optimal Security Reduction.” In <i>Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings</i>, 66--83, 2012. <a href=\"https://doi.org/10.1007/978-3-642-30057-8_5\">https://doi.org/10.1007/978-3-642-30057-8_5</a>.","apa":"Hofheinz, D., Jager, T., &#38; Knapp, E. (2012). Waters Signatures with Optimal Security Reduction. In <i>Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings</i> (pp. 66--83). <a href=\"https://doi.org/10.1007/978-3-642-30057-8_5\">https://doi.org/10.1007/978-3-642-30057-8_5</a>","ama":"Hofheinz D, Jager T, Knapp E. Waters Signatures with Optimal Security Reduction. In: <i>Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings</i>. ; 2012:66--83. doi:<a href=\"https://doi.org/10.1007/978-3-642-30057-8_5\">10.1007/978-3-642-30057-8_5</a>"},"department":[{"_id":"558"}],"author":[{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"full_name":"Jager, Tibor","first_name":"Tibor","last_name":"Jager","id":"64669"},{"full_name":"Knapp, Edward","first_name":"Edward","last_name":"Knapp"}],"extern":"1","title":"Waters Signatures with Optimal Security Reduction","doi":"10.1007/978-3-642-30057-8_5"},{"title":"Proving Linearizability of Multiset with Local Proof Obligations","author":[{"last_name":"Travkin","first_name":"Oleg","full_name":"Travkin, Oleg"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"},{"full_name":"Schellhorn, Gerhard","first_name":"Gerhard","last_name":"Schellhorn"}],"citation":{"mla":"Travkin, Oleg, et al. “Proving Linearizability of Multiset with Local Proof Obligations.” <i>{ECEASST}</i>, 2012.","bibtex":"@article{Travkin_Wehrheim_Schellhorn_2012, title={Proving Linearizability of Multiset with Local Proof Obligations}, journal={{ECEASST}}, author={Travkin, Oleg and Wehrheim, Heike and Schellhorn, Gerhard}, year={2012} }","short":"O. Travkin, H. Wehrheim, G. Schellhorn, {ECEASST} (2012).","apa":"Travkin, O., Wehrheim, H., &#38; Schellhorn, G. (2012). Proving Linearizability of Multiset with Local Proof Obligations. <i>{ECEASST}</i>.","ama":"Travkin O, Wehrheim H, Schellhorn G. Proving Linearizability of Multiset with Local Proof Obligations. <i>{ECEASST}</i>. 2012.","chicago":"Travkin, Oleg, Heike Wehrheim, and Gerhard Schellhorn. “Proving Linearizability of Multiset with Local Proof Obligations.” <i>{ECEASST}</i>, 2012.","ieee":"O. Travkin, H. Wehrheim, and G. Schellhorn, “Proving Linearizability of Multiset with Local Proof Obligations,” <i>{ECEASST}</i>, 2012."},"user_id":"29719","department":[{"_id":"77"}],"publication":"{ECEASST}","date_created":"2018-06-13T08:16:49Z","year":"2012","type":"journal_article","status":"public","_id":"3180","date_updated":"2022-01-06T06:59:03Z"},{"publication":"Sci. Comput. Program.","date_created":"2018-06-13T08:17:58Z","year":"2012","type":"journal_article","status":"public","page":"270--289","_id":"3181","date_updated":"2022-01-06T06:59:03Z","issue":"3","title":"Model evolution and refinement","author":[{"first_name":"Thomas","full_name":"Ruhroth, Thomas","last_name":"Ruhroth"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"doi":"10.1016/j.scico.2011.04.007","citation":{"ieee":"T. Ruhroth and H. Wehrheim, “Model evolution and refinement,” <i>Sci. Comput. Program.</i>, no. 3, pp. 270--289, 2012.","chicago":"Ruhroth, Thomas, and Heike Wehrheim. “Model Evolution and Refinement.” <i>Sci. Comput. Program.</i>, no. 3 (2012): 270--289. <a href=\"https://doi.org/10.1016/j.scico.2011.04.007\">https://doi.org/10.1016/j.scico.2011.04.007</a>.","ama":"Ruhroth T, Wehrheim H. Model evolution and refinement. <i>Sci Comput Program</i>. 2012;(3):270--289. doi:<a href=\"https://doi.org/10.1016/j.scico.2011.04.007\">10.1016/j.scico.2011.04.007</a>","apa":"Ruhroth, T., &#38; Wehrheim, H. (2012). Model evolution and refinement. <i>Sci. Comput. Program.</i>, (3), 270--289. <a href=\"https://doi.org/10.1016/j.scico.2011.04.007\">https://doi.org/10.1016/j.scico.2011.04.007</a>","short":"T. Ruhroth, H. Wehrheim, Sci. Comput. Program. (2012) 270--289.","bibtex":"@article{Ruhroth_Wehrheim_2012, title={Model evolution and refinement}, DOI={<a href=\"https://doi.org/10.1016/j.scico.2011.04.007\">10.1016/j.scico.2011.04.007</a>}, number={3}, journal={Sci. Comput. Program.}, author={Ruhroth, Thomas and Wehrheim, Heike}, year={2012}, pages={270--289} }","mla":"Ruhroth, Thomas, and Heike Wehrheim. “Model Evolution and Refinement.” <i>Sci. Comput. Program.</i>, no. 3, 2012, pp. 270--289, doi:<a href=\"https://doi.org/10.1016/j.scico.2011.04.007\">10.1016/j.scico.2011.04.007</a>."},"user_id":"29719","department":[{"_id":"77"}]},{"_id":"3182","page":"243--259","date_updated":"2022-01-06T06:59:03Z","publication":"Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings","date_created":"2018-06-13T08:19:33Z","status":"public","type":"conference","year":"2012","user_id":"29719","series_title":"Lecture Notes in Computer Science","citation":{"chicago":"Schellhorn, Gerhard, Heike Wehrheim, and John Derrick. “How to Prove Algorithms Linearisable.” In <i>Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings</i>, edited by P. Madhusudan and Sanjit A. Seshia, 243--259. Lecture Notes in Computer Science, 2012. <a href=\"https://doi.org/10.1007/978-3-642-31424-7_21\">https://doi.org/10.1007/978-3-642-31424-7_21</a>.","ieee":"G. Schellhorn, H. Wehrheim, and J. Derrick, “How to Prove Algorithms Linearisable,” in <i>Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings</i>, 2012, pp. 243--259.","ama":"Schellhorn G, Wehrheim H, Derrick J. How to Prove Algorithms Linearisable. In: Madhusudan P, A. Seshia S, eds. <i>Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings</i>. Lecture Notes in Computer Science. ; 2012:243--259. doi:<a href=\"https://doi.org/10.1007/978-3-642-31424-7_21\">10.1007/978-3-642-31424-7_21</a>","apa":"Schellhorn, G., Wehrheim, H., &#38; Derrick, J. (2012). How to Prove Algorithms Linearisable. In P. Madhusudan &#38; S. A. Seshia (Eds.), <i>Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings</i> (pp. 243--259). <a href=\"https://doi.org/10.1007/978-3-642-31424-7_21\">https://doi.org/10.1007/978-3-642-31424-7_21</a>","short":"G. Schellhorn, H. Wehrheim, J. Derrick, in: P. Madhusudan, S. A. Seshia (Eds.), Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, 2012, pp. 243--259.","mla":"Schellhorn, Gerhard, et al. “How to Prove Algorithms Linearisable.” <i>Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings</i>, edited by P. Madhusudan and Sanjit A. Seshia, 2012, pp. 243--259, doi:<a href=\"https://doi.org/10.1007/978-3-642-31424-7_21\">10.1007/978-3-642-31424-7_21</a>.","bibtex":"@inproceedings{Schellhorn_Wehrheim_Derrick_2012, series={Lecture Notes in Computer Science}, title={How to Prove Algorithms Linearisable}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-31424-7_21\">10.1007/978-3-642-31424-7_21</a>}, booktitle={Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings}, author={Schellhorn, Gerhard and Wehrheim, Heike and Derrick, John}, editor={Madhusudan, P. and A. Seshia, SanjitEditors}, year={2012}, pages={243--259}, collection={Lecture Notes in Computer Science} }"},"department":[{"_id":"77"}],"author":[{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"full_name":"Wehrheim, Heike","first_name":"Heike","last_name":"Wehrheim","id":"573"},{"last_name":"Derrick","first_name":"John","full_name":"Derrick, John"}],"editor":[{"first_name":"P.","full_name":"Madhusudan, P.","last_name":"Madhusudan"},{"last_name":"A. Seshia","first_name":"Sanjit","full_name":"A. Seshia, Sanjit"}],"title":"How to Prove Algorithms Linearisable","doi":"10.1007/978-3-642-31424-7_21"},{"title":"Computer science and society as a field of computer science","abstract":[{"lang":"eng","text":"In this article we report on the experiences of a redesigned teaching in the field of computer science and society (IuG). The reasons for the redesign and the concept are outlined. We have condensed our experiences into theses: 1. Computer science and society should be a compulsory course in the bachelor's degree, in which students get an overview of which social framework conditions are relevant for them and how they can be incorporated into practice. 2. Historical contents of computer science are to be processed here by considering current developments in the context of their genesis.\r\n"}],"user_id":"71124","type":"conference","volume":5,"page":"111-116","author":[{"last_name":"Engbring","full_name":"Engbring, Dieter","first_name":"Dieter"},{"full_name":"Selke, Harald","first_name":"Harald","id":"497","last_name":"Selke"}],"editor":[{"full_name":"Forbrig, Peter","first_name":"Peter","last_name":"Forbrig"},{"first_name":"Detlef","full_name":" Rick, Detlef","last_name":" Rick"},{"last_name":" Schmolitzky","full_name":" Schmolitzky, Axel","first_name":"Axel"}],"conference":{"end_date":"2012-11-07","start_date":"2012-11-06","name":"HDI 2012 - Computer Science for a Sustainable Future: 5th Conference on University Didactics of Computer Science"},"intvolume":"         5","publication_status":"published","citation":{"bibtex":"@article{Engbring_Selke_2012, series={Commentarii informaticae didacticae}, title={Computer science and society as a field of computer science}, volume={5}, publisher={Universit { \\ \"a} tsverlag Potsda}, author={Engbring, Dieter and Selke, Harald}, editor={Forbrig, Peter and  Rick, Detlef and  Schmolitzky, Axel}, year={2012}, pages={111–116}, collection={Commentarii informaticae didacticae} }","mla":"Engbring, Dieter, and Harald Selke. <i>Computer Science and Society as a Field of Computer Science</i>. Edited by Peter Forbrig et al., vol. 5, Universit { \\ \"a} tsverlag Potsda, 2012, pp. 111–16.","short":"D. Engbring, H. Selke, 5 (2012) 111–116.","apa":"Engbring, D., &#38; Selke, H. (2012). <i>Computer science and society as a field of computer science</i> (P. Forbrig, D.  Rick, &#38; A.  Schmolitzky, Eds.; Vol. 5, pp. 111–116). Universit { \\ \"a} tsverlag Potsda.","ama":"Engbring D, Selke H. Computer science and society as a field of computer science. Forbrig P,  Rick D,  Schmolitzky A, eds. 2012;5:111-116.","ieee":"D. Engbring and H. Selke, “Computer science and society as a field of computer science,” vol. 5. Universit { \\ \"a} tsverlag Potsda, pp. 111–116, 2012.","chicago":"Engbring, Dieter, and Harald Selke. “Computer Science and Society as a Field of Computer Science.” Edited by Peter Forbrig, Detlef  Rick, and Axel  Schmolitzky. Commentarii Informaticae Didacticae. Universit { \\ \"a} tsverlag Potsda, 2012."},"series_title":"Commentarii informaticae didacticae","department":[{"_id":"71"}],"publisher":"Universit { \\ \"a} tsverlag Potsda","date_created":"2021-11-06T00:45:36Z","status":"public","language":[{"iso":"eng"}],"year":"2012","_id":"27176","date_updated":"2022-01-06T06:57:35Z"},{"conference":{"name":"3rd International Conference on Wireless Mobile Communication and Healthcare"},"title":"User Centered Design of an Interactive Mobile Assistance and Supervision System for Rehabilitation Purposes","author":[{"last_name":"Klompmaker","first_name":"Florian","full_name":"Klompmaker, Florian"},{"first_name":" Anke ","full_name":" Workowski,  Anke ","last_name":" Workowski"},{"first_name":"Wolfgang ","full_name":"Thronicke, Wolfgang ","last_name":"Thronicke"},{"last_name":"Ostermair","first_name":"Florian","full_name":"Ostermair, Florian"},{"last_name":"Willemsen","first_name":"Detlev","full_name":"Willemsen, Detlev"},{"first_name":"D","full_name":"Hoffmann, D","last_name":"Hoffmann"}],"department":[{"_id":"71"}],"citation":{"mla":"Klompmaker, Florian, et al. <i>User Centered Design of an Interactive Mobile Assistance and Supervision System for Rehabilitation Purposes</i>. 2012.","bibtex":"@inproceedings{Klompmaker_ Workowski_Thronicke_Ostermair_Willemsen_Hoffmann_2012, title={User Centered Design of an Interactive Mobile Assistance and Supervision System for Rehabilitation Purposes}, author={Klompmaker, Florian and  Workowski,  Anke  and Thronicke, Wolfgang  and Ostermair, Florian and Willemsen, Detlev and Hoffmann, D}, year={2012} }","short":"F. Klompmaker,  Anke   Workowski, W. Thronicke, F. Ostermair, D. Willemsen, D. Hoffmann, in: 2012.","ama":"Klompmaker F,  Workowski  Anke , Thronicke W, Ostermair F, Willemsen D, Hoffmann D. User Centered Design of an Interactive Mobile Assistance and Supervision System for Rehabilitation Purposes. In: ; 2012.","apa":"Klompmaker, F.,  Workowski,  Anke , Thronicke, W., Ostermair, F., Willemsen, D., &#38; Hoffmann, D. (2012). <i>User Centered Design of an Interactive Mobile Assistance and Supervision System for Rehabilitation Purposes</i>. 3rd International Conference on Wireless Mobile Communication and Healthcare.","chicago":"Klompmaker, Florian,  Anke   Workowski, Wolfgang  Thronicke, Florian Ostermair, Detlev Willemsen, and D Hoffmann. “User Centered Design of an Interactive Mobile Assistance and Supervision System for Rehabilitation Purposes,” 2012.","ieee":"F. Klompmaker,  Anke   Workowski, W. Thronicke, F. Ostermair, D. Willemsen, and D. Hoffmann, “User Centered Design of an Interactive Mobile Assistance and Supervision System for Rehabilitation Purposes,” presented at the 3rd International Conference on Wireless Mobile Communication and Healthcare, 2012."},"user_id":"71124","publication_status":"published","year":"2012","type":"conference","language":[{"iso":"eng"}],"status":"public","date_created":"2021-11-06T00:50:27Z","date_updated":"2022-01-06T06:57:35Z","_id":"27177"},{"author":[{"last_name":"Klompmaker","first_name":"Florian","full_name":"Klompmaker, Florian"},{"last_name":" Nebe","full_name":" Nebe, Karsten","first_name":"Karsten"},{"first_name":"Julien","full_name":"Eschenlohr, Julien","last_name":"Eschenlohr"}],"conference":{"end_date":"2012-10-12","name":"Fourth International Conference on Mobile Computing, Applications and Services","start_date":"2012-10-11"},"title":"Towards Multimodal 3D Tabletop Interaction using Sensor Equipped Mobile Devices ","user_id":"71124","publication_status":"published","citation":{"chicago":"Klompmaker, Florian, Karsten  Nebe, and Julien Eschenlohr. “Towards Multimodal 3D Tabletop Interaction Using Sensor Equipped Mobile Devices .” Springer, 2012.","ieee":"F. Klompmaker, K.  Nebe, and J. Eschenlohr, “Towards Multimodal 3D Tabletop Interaction using Sensor Equipped Mobile Devices ,” presented at the Fourth International Conference on Mobile Computing, Applications and Services, 2012.","ama":"Klompmaker F,  Nebe K, Eschenlohr J. Towards Multimodal 3D Tabletop Interaction using Sensor Equipped Mobile Devices . In: Springer; 2012.","apa":"Klompmaker, F.,  Nebe, K., &#38; Eschenlohr, J. (2012). <i>Towards Multimodal 3D Tabletop Interaction using Sensor Equipped Mobile Devices </i>. Fourth International Conference on Mobile Computing, Applications and Services.","short":"F. Klompmaker, K.  Nebe, J. Eschenlohr, in: Springer, 2012.","mla":"Klompmaker, Florian, et al. <i>Towards Multimodal 3D Tabletop Interaction Using Sensor Equipped Mobile Devices </i>. Springer, 2012.","bibtex":"@inproceedings{Klompmaker_ Nebe_Eschenlohr_2012, title={Towards Multimodal 3D Tabletop Interaction using Sensor Equipped Mobile Devices }, publisher={Springer}, author={Klompmaker, Florian and  Nebe, Karsten and Eschenlohr, Julien}, year={2012} }"},"department":[{"_id":"71"}],"publisher":"Springer","date_created":"2021-11-06T00:53:24Z","status":"public","year":"2012","type":"conference","language":[{"iso":"eng"}],"_id":"27179","date_updated":"2022-01-06T06:57:35Z"},{"date_created":"2021-11-06T00:58:58Z","type":"conference","year":"2012","language":[{"iso":"eng"}],"status":"public","page":"171-182","_id":"27180","date_updated":"2022-01-06T06:57:35Z","conference":{"start_date":"2012-09-24","name":"DeLFI 2012 - The 10th e-Learning Computer Science Conference of the Society for Computer Science eV","end_date":"2012-09-26"},"title":"The technical potential of digital boards","editor":[{"full_name":"Desel, J {\\ \"o} rg","first_name":"J {\\ \"o} rg","last_name":"Desel"},{"first_name":" J {\\\" o} rg","full_name":"Haake,  J {\\\" o} rg","last_name":"Haake"},{"last_name":"Spannagel","first_name":"Christian","full_name":"Spannagel, Christian"}],"author":[{"last_name":"Selke","id":"497","first_name":"Harald","full_name":"Selke, Harald"},{"id":"3117","last_name":"Winkelnkemper","full_name":"Winkelnkemper, Felix","first_name":"Felix"}],"abstract":[{"text":"This article explains the technical potential of digital boards with which more and more schools are being equipped. A consideration of current usage scenarios of these interactive whiteboards shows that a large part of this potential is still unused and the deficits of the software often have to be circumvented with tricks, especially for use in demanding, student-oriented lessons. Finally, the further development of existing teaching scenarios using this technical potential shows that considering the technical possibilities of digital boards can motivate new didactic scenarios.\r\n","lang":"eng"}],"citation":{"short":"H. Selke, F. Winkelnkemper, in: J.{\\ \"o} rg Desel,  J {\\\" o} rg Haake, C. Spannagel (Eds.), 2012, pp. 171–182.","mla":"Selke, Harald, and Felix Winkelnkemper. <i>The Technical Potential of Digital Boards</i>. Edited by J {\\ \"o} rg Desel et al., 2012, pp. 171–82.","bibtex":"@inproceedings{Selke_Winkelnkemper_2012, title={The technical potential of digital boards}, author={Selke, Harald and Winkelnkemper, Felix}, editor={Desel, J {\\ \"o} rg and Haake,  J {\\\" o} rg and Spannagel, Christian}, year={2012}, pages={171–182} }","chicago":"Selke, Harald, and Felix Winkelnkemper. “The Technical Potential of Digital Boards.” edited by J {\\ \"o} rg Desel,  J {\\\" o} rg Haake, and Christian Spannagel, 171–82, 2012.","ieee":"H. Selke and F. Winkelnkemper, “The technical potential of digital boards,” 2012, pp. 171–182.","ama":"Selke H, Winkelnkemper F. The technical potential of digital boards. In: Desel J{\\ \"o} rg, Haake  J {\\\" o} rg, Spannagel C, eds. ; 2012:171-182.","apa":"Selke, H., &#38; Winkelnkemper, F. (2012). <i>The technical potential of digital boards</i> (J. {\\ \"o} rg Desel,  J {\\\" o} rg Haake, &#38; C. Spannagel, Eds.; pp. 171–182)."},"user_id":"71124","publication_status":"published","department":[{"_id":"71"}]},{"citation":{"ama":"Fischer HG, Geis T, Kluge O, Bogner C,  Polkehn  Knut. Der Qualit{\\\"a}tsstandard f{\\\"u}r Usability Engineering der German UPA - Aktueller Stand der Arbeiten. In: German UPA; 2012.","apa":"Fischer, H. G., Geis, T., Kluge, O., Bogner, C., &#38;  Polkehn,  Knut. (2012). <i>Der Qualit{\\\"a}tsstandard f{\\\"u}r Usability Engineering der German UPA - Aktueller Stand der Arbeiten</i>. Brau, H. et al. (Hrsg.): Jahresband Usability Professionals 2012.","ieee":"H. G. Fischer, T. Geis, O. Kluge, C. Bogner, and  Knut  Polkehn, “Der Qualit{\\\"a}tsstandard f{\\\"u}r Usability Engineering der German UPA - Aktueller Stand der Arbeiten,” presented at the Brau, H. et al. (Hrsg.): Jahresband Usability Professionals 2012, 2012.","chicago":"Fischer, Holger Gerhard, Thomas  Geis, Oliver Kluge, Christian Bogner, and  Knut  Polkehn. “Der Qualit{\\\"a}tsstandard F{\\\"u}r Usability Engineering Der German UPA - Aktueller Stand Der Arbeiten.” German UPA, 2012.","bibtex":"@inproceedings{Fischer_Geis_Kluge_Bogner_ Polkehn_2012, title={Der Qualit{\\\"a}tsstandard f{\\\"u}r Usability Engineering der German UPA - Aktueller Stand der Arbeiten}, publisher={German UPA}, author={Fischer, Holger Gerhard and Geis, Thomas  and Kluge, Oliver and Bogner, Christian and  Polkehn,  Knut}, year={2012} }","mla":"Fischer, Holger Gerhard, et al. <i>Der Qualit{\\\"a}tsstandard F{\\\"u}r Usability Engineering Der German UPA - Aktueller Stand Der Arbeiten</i>. German UPA, 2012.","short":"H.G. Fischer, T. Geis, O. Kluge, C. Bogner,  Knut  Polkehn, in: German UPA, 2012."},"publication_status":"published","user_id":"71124","department":[{"_id":"71"}],"title":"Der Qualit{\\\"a}tsstandard f{\\\"u}r Usability Engineering der German UPA - Aktueller Stand der Arbeiten","conference":{"end_date":"2012-09-12","start_date":"2012-09-09","name":"Brau, H. et al. (Hrsg.): Jahresband Usability Professionals 2012"},"author":[{"first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","id":"30457"},{"last_name":"Geis","full_name":"Geis, Thomas ","first_name":"Thomas "},{"last_name":"Kluge","first_name":"Oliver","full_name":"Kluge, Oliver"},{"full_name":"Bogner, Christian","first_name":"Christian","last_name":"Bogner"},{"full_name":" Polkehn,  Knut","first_name":" Knut","last_name":" Polkehn"}],"_id":"27181","date_updated":"2022-01-06T06:57:35Z","date_created":"2021-11-06T01:56:44Z","publisher":"German UPA","language":[{"iso":"eng"}],"year":"2012","type":"conference","status":"public"},{"conference":{"end_date":"2012-09-12","start_date":"2012-09-09","name":"Kollaboratives Arbeiten an interaktiven Displays, Workshop im Rahmen der Mensch und Computer 2012"},"title":"Base Requirements for Virtual Tabletop Groupware Artifacts","author":[{"last_name":"Tobias","full_name":"Tobias, M{\\\"u}ller","first_name":"M{\\\"u}ller"},{"last_name":"Nebe","first_name":"Karsten","full_name":"Nebe, Karsten"},{"last_name":" Klompmaker","first_name":"Florian","full_name":" Klompmaker, Florian"}],"department":[{"_id":"71"}],"citation":{"short":"M. Tobias, K. Nebe, F.  Klompmaker, in: 2012.","mla":"Tobias, M{\\\"u}ller, et al. <i>Base Requirements for Virtual Tabletop Groupware Artifacts</i>. 2012.","bibtex":"@inproceedings{Tobias_Nebe_ Klompmaker_2012, title={Base Requirements for Virtual Tabletop Groupware Artifacts}, author={Tobias, M{\\\"u}ller and Nebe, Karsten and  Klompmaker, Florian}, year={2012} }","chicago":"Tobias, M{\\\"u}ller, Karsten Nebe, and Florian  Klompmaker. “Base Requirements for Virtual Tabletop Groupware Artifacts,” 2012.","ieee":"M. Tobias, K. Nebe, and F.  Klompmaker, “Base Requirements for Virtual Tabletop Groupware Artifacts,” presented at the Kollaboratives Arbeiten an interaktiven Displays, Workshop im Rahmen der Mensch und Computer 2012, 2012.","apa":"Tobias, M., Nebe, K., &#38;  Klompmaker, F. (2012). <i>Base Requirements for Virtual Tabletop Groupware Artifacts</i>. Kollaboratives Arbeiten an interaktiven Displays, Workshop im Rahmen der Mensch und Computer 2012.","ama":"Tobias M, Nebe K,  Klompmaker F. Base Requirements for Virtual Tabletop Groupware Artifacts. In: ; 2012."},"user_id":"71124","publication_status":"published","year":"2012","type":"conference","language":[{"iso":"eng"}],"status":"public","date_created":"2021-11-06T01:59:28Z","date_updated":"2022-01-06T06:57:35Z","_id":"27182"},{"year":"2012","type":"journal_article","language":[{"iso":"eng"}],"status":"public","publication":"M & C, humans and computers","date_created":"2021-11-06T02:03:45Z","date_updated":"2022-01-06T06:57:35Z","_id":"27183","title":"Collaborative work on interactive displays - design, operation and fields of application","author":[{"last_name":"Fischer","id":"30457","first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard"},{"last_name":"Klompmaker","full_name":"Klompmaker,  Florian","first_name":" Florian"}],"department":[{"_id":"71"}],"citation":{"short":"H.G. Fischer,  Florian Klompmaker, M &#38; C, Humans and Computers (2012).","mla":"Fischer, Holger Gerhard, and  Florian Klompmaker. “Collaborative Work on Interactive Displays - Design, Operation and Fields of Application.” <i>M &#38; C, Humans and Computers</i>, 2012.","bibtex":"@article{Fischer_Klompmaker_2012, title={Collaborative work on interactive displays - design, operation and fields of application}, journal={M &#38; C, humans and computers}, author={Fischer, Holger Gerhard and Klompmaker,  Florian}, year={2012} }","chicago":"Fischer, Holger Gerhard, and  Florian Klompmaker. “Collaborative Work on Interactive Displays - Design, Operation and Fields of Application.” <i>M &#38; C, Humans and Computers</i>, 2012.","ieee":"H. G. Fischer and  Florian Klompmaker, “Collaborative work on interactive displays - design, operation and fields of application,” <i>M &#38; C, humans and computers</i>, 2012.","ama":"Fischer HG, Klompmaker  Florian. Collaborative work on interactive displays - design, operation and fields of application. <i>M &#38; C, humans and computers</i>. Published online 2012.","apa":"Fischer, H. G., &#38; Klompmaker,  Florian. (2012). Collaborative work on interactive displays - design, operation and fields of application. <i>M &#38; C, Humans and Computers</i>."},"user_id":"71124","publication_status":"published"},{"department":[{"_id":"71"}],"user_id":"71124","citation":{"short":"R. Keil, in: Universit{\\\"a}t Paderborn, Paderborn, 2012, pp. 270–277.","bibtex":"@inproceedings{Keil_2012, place={Paderborn}, title={Das Heinz Nixdorf Institut: {\\\"U}ber 25 Jahre interdisziplin{\\\"a}r erfolgreich}, publisher={Universit{\\\"a}t Paderborn}, author={Keil, Reinhard}, year={2012}, pages={270–277} }","mla":"Keil, Reinhard. <i>Das Heinz Nixdorf Institut: {\\\"U}ber 25 Jahre Interdisziplin{\\\"a}r Erfolgreich</i>. Universit{\\\"a}t Paderborn, 2012, pp. 270–77.","ieee":"R. Keil, “Das Heinz Nixdorf Institut: {\\\"U}ber 25 Jahre interdisziplin{\\\"a}r erfolgreich,” 2012, pp. 270–277.","chicago":"Keil, Reinhard. “Das Heinz Nixdorf Institut: {\\\"U}ber 25 Jahre Interdisziplin{\\\"a}r Erfolgreich,” 270–77. Paderborn: Universit{\\\"a}t Paderborn, 2012.","ama":"Keil R. Das Heinz Nixdorf Institut: {\\\"U}ber 25 Jahre interdisziplin{\\\"a}r erfolgreich. In: Universit{\\\"a}t Paderborn; 2012:270-277.","apa":"Keil, R. (2012). <i>Das Heinz Nixdorf Institut: {\\\"U}ber 25 Jahre interdisziplin{\\\"a}r erfolgreich</i>. 270–277."},"place":"Paderborn","author":[{"first_name":"Reinhard","full_name":"Keil, Reinhard","last_name":"Keil"}],"title":"Das Heinz Nixdorf Institut: {\\\"U}ber 25 Jahre interdisziplin{\\\"a}r erfolgreich","date_updated":"2022-01-06T06:57:35Z","page":"270-277","_id":"27184","status":"public","year":"2012","type":"conference","language":[{"iso":"eng"}],"publisher":"Universit{\\\"a}t Paderborn","date_created":"2021-11-06T02:05:29Z"},{"conference":{"start_date":"2012-08-12","end_date":"2012-08-15"},"title":"EVALUATION OF WHOLE-BODY NAVIGATION AND SELECTION TECHNIQUES IN IMMERSIVE 3D ENVIRONMENTS","author":[{"last_name":"Klompmaker","full_name":"Klompmaker, Florian","first_name":"Florian"},{"last_name":"Dridger","first_name":" Alexander ","full_name":"Dridger,  Alexander "},{"full_name":"Nebe, Karsten","first_name":"Karsten","last_name":"Nebe"}],"abstract":[{"text":"Since 2010 when the Microsoft Kinect with its integrated depth-sensing camera appeared on the market, completely new kinds of interaction techniques have been integrated into console games. They don’t require any instrumentalization and no complicated calibration or time-consuming setup anymore. But even having these benefits, some drawbacks exist. Most games only enable the user to fulfill very simple gestures like waving, jumping or stooping, which is not the natural behavior of a user. In addition the depth-sensing technology lacks of haptic feedback. Of course we cannot solve the lack of haptic feedback, but we want to improve the whole-body interaction. Our goal is to develop 3D interaction techniques that give a maximum of freedom to the user and enable her to perform precise and immersive interactions. This work focuses on whole-body interaction in immersive virtual environments. We present 3D interaction techniques that provide the user with a maximum of freedom and enables her to operate precisely and immersive in virtual environments. Furthermore we present a user study, in which we analyzed how Navigation and Manipulation techniques can be performed by users’ body-interaction using a depth-sensing camera and a huge projection screen. Therefore three alternative approaches have been developed and tested: classical gamepad interaction, an indirect pointer-based interaction and a more direct whole- body interaction technique. We compared their effectiveness and preciseness. It turned out that users act faster, while using the gamepad, but generate significantly more errors at the same time. Using depth-sensing based whole-body interaction techniques it became apparent, that the interaction is much more immersive, natural and intuitive, even if slower. We will show the advantages of our approach and how it can be used in various domains, more effectively and efficiently for their users.","lang":"eng"}],"citation":{"ieee":"F. Klompmaker,  Alexander  Dridger, and K. Nebe, “EVALUATION OF WHOLE-BODY NAVIGATION AND SELECTION TECHNIQUES IN IMMERSIVE 3D ENVIRONMENTS,” 2012.","chicago":"Klompmaker, Florian,  Alexander  Dridger, and Karsten Nebe. “EVALUATION OF WHOLE-BODY NAVIGATION AND SELECTION TECHNIQUES IN IMMERSIVE 3D ENVIRONMENTS.” In <i>Proceedings of the ASME 2012 International Design Engineering Technical Conferences &#38; Computers and Information in Engineering Conference</i>. ASME, 2012.","apa":"Klompmaker, F., Dridger,  Alexander , &#38; Nebe, K. (2012). EVALUATION OF WHOLE-BODY NAVIGATION AND SELECTION TECHNIQUES IN IMMERSIVE 3D ENVIRONMENTS. <i>Proceedings of the ASME 2012 International Design Engineering Technical Conferences &#38; Computers and Information in Engineering Conference</i>.","ama":"Klompmaker F, Dridger  Alexander , Nebe K. EVALUATION OF WHOLE-BODY NAVIGATION AND SELECTION TECHNIQUES IN IMMERSIVE 3D ENVIRONMENTS. In: <i>Proceedings of the ASME 2012 International Design Engineering Technical Conferences &#38; Computers and Information in Engineering Conference</i>. ASME; 2012.","short":"F. Klompmaker,  Alexander  Dridger, K. Nebe, in: Proceedings of the ASME 2012 International Design Engineering Technical Conferences &#38; Computers and Information in Engineering Conference, ASME, 2012.","bibtex":"@inproceedings{Klompmaker_Dridger_Nebe_2012, title={EVALUATION OF WHOLE-BODY NAVIGATION AND SELECTION TECHNIQUES IN IMMERSIVE 3D ENVIRONMENTS}, booktitle={Proceedings of the ASME 2012 International Design Engineering Technical Conferences &#38; Computers and Information in Engineering Conference}, publisher={ASME}, author={Klompmaker, Florian and Dridger,  Alexander  and Nebe, Karsten}, year={2012} }","mla":"Klompmaker, Florian, et al. “EVALUATION OF WHOLE-BODY NAVIGATION AND SELECTION TECHNIQUES IN IMMERSIVE 3D ENVIRONMENTS.” <i>Proceedings of the ASME 2012 International Design Engineering Technical Conferences &#38; Computers and Information in Engineering Conference</i>, ASME, 2012."},"user_id":"71124","publication_status":"published","department":[{"_id":"71"}],"publication":"Proceedings of the ASME 2012 International Design Engineering Technical Conferences & Computers and Information in Engineering Conference","date_created":"2021-11-06T02:08:53Z","publisher":"ASME","type":"conference","year":"2012","language":[{"iso":"eng"}],"status":"public","_id":"27185","date_updated":"2022-01-06T06:57:35Z"},{"date_created":"2021-11-08T06:17:08Z","publication":"Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Copenhagen, Denmark","status":"public","language":[{"iso":"eng"}],"type":"conference","year":"2012","page":"321-324","_id":"27187","date_updated":"2022-01-06T06:57:35Z","author":[{"full_name":"Fischer, Holger Gerhard","first_name":"Holger Gerhard","last_name":"Fischer","id":"30457"}],"title":"Integrating Usability Engineering in the Software Development Lifecycle Based on International Standards","publication_status":"published","user_id":"71124","citation":{"short":"H.G. Fischer, in: Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Copenhagen, Denmark, 2012, pp. 321–324.","mla":"Fischer, Holger Gerhard. “Integrating Usability Engineering in the Software Development Lifecycle Based on International Standards.” <i>Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Copenhagen, Denmark</i>, 2012, pp. 321–24.","bibtex":"@inproceedings{Fischer_2012, title={Integrating Usability Engineering in the Software Development Lifecycle Based on International Standards}, booktitle={Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Copenhagen, Denmark}, author={Fischer, Holger Gerhard}, year={2012}, pages={321–324} }","chicago":"Fischer, Holger Gerhard. “Integrating Usability Engineering in the Software Development Lifecycle Based on International Standards.” In <i>Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Copenhagen, Denmark</i>, 321–24, 2012.","ieee":"H. G. Fischer, “Integrating Usability Engineering in the Software Development Lifecycle Based on International Standards,” in <i>Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Copenhagen, Denmark</i>, 2012, pp. 321–324.","ama":"Fischer HG. Integrating Usability Engineering in the Software Development Lifecycle Based on International Standards. In: <i>Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Copenhagen, Denmark</i>. ; 2012:321-324.","apa":"Fischer, H. G. (2012). Integrating Usability Engineering in the Software Development Lifecycle Based on International Standards. <i>Proceedings of the 4th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), Copenhagen, Denmark</i>, 321–324."},"department":[{"_id":"71"}]}]
