[{"user_id":"25078","department":[{"_id":"64"}],"_id":"2914","type":"dissertation","status":"public","author":[{"first_name":"Alexander","full_name":"May, Alexander","last_name":"May"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_created":"2018-05-25T10:51:42Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466-20030101205"}],"title":"New RSA Vulnerabilities Using Lattice Reduction Methods","citation":{"ieee":"A. May, <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn, 2003.","chicago":"May, Alexander. <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn, 2003.","ama":"May A. <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn; 2003.","apa":"May, A. (2003). <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn.","short":"A. May, New RSA Vulnerabilities Using Lattice Reduction Methods, Universität Paderborn, 2003.","bibtex":"@book{May_2003, title={New RSA Vulnerabilities Using Lattice Reduction Methods}, publisher={Universität Paderborn}, author={May, Alexander}, year={2003} }","mla":"May, Alexander. <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn, 2003."},"year":"2003"},{"status":"public","publication":"Advances in Cryptology - CRYPTO 2003","type":"book_chapter","_id":"3016","department":[{"_id":"64"}],"user_id":"25078","year":"2003","place":"Berlin, Heidelberg","page":"27-43","citation":{"ama":"Blömer J, May A. New Partial Key Exposure Attacks on RSA. In: <i>Advances in Cryptology - CRYPTO 2003</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2003:27-43. doi:<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>","ieee":"J. Blömer and A. May, “New Partial Key Exposure Attacks on RSA,” in <i>Advances in Cryptology - CRYPTO 2003</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, pp. 27–43.","chicago":"Blömer, Johannes, and Alexander May. “New Partial Key Exposure Attacks on RSA.” In <i>Advances in Cryptology - CRYPTO 2003</i>, 27–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. <a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">https://doi.org/10.1007/978-3-540-45146-4_2</a>.","mla":"Blömer, Johannes, and Alexander May. “New Partial Key Exposure Attacks on RSA.” <i>Advances in Cryptology - CRYPTO 2003</i>, Springer Berlin Heidelberg, 2003, pp. 27–43, doi:<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>.","bibtex":"@inbook{Blömer_May_2003, place={Berlin, Heidelberg}, title={New Partial Key Exposure Attacks on RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>}, booktitle={Advances in Cryptology - CRYPTO 2003}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2003}, pages={27–43} }","short":"J. Blömer, A. May, in: Advances in Cryptology - CRYPTO 2003, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003, pp. 27–43.","apa":"Blömer, J., &#38; May, A. (2003). New Partial Key Exposure Attacks on RSA. In <i>Advances in Cryptology - CRYPTO 2003</i> (pp. 27–43). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">https://doi.org/10.1007/978-3-540-45146-4_2</a>"},"publication_identifier":{"isbn":["9783540406747","9783540451464"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","title":"New Partial Key Exposure Attacks on RSA","doi":"10.1007/978-3-540-45146-4_2","publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:51Z","date_created":"2018-06-05T08:24:11Z","author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"first_name":"Alexander","full_name":"May, Alexander","last_name":"May"}]},{"status":"public","publication":"Financial Cryptography","type":"book_chapter","department":[{"_id":"64"}],"user_id":"25078","_id":"3018","page":"162-181","citation":{"apa":"Blömer, J., &#38; Seifert, J.-P. (2003). Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In <i>Financial Cryptography</i> (pp. 162–181). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">https://doi.org/10.1007/978-3-540-45126-6_12</a>","mla":"Blömer, Johannes, and Jean-Pierre Seifert. “Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).” <i>Financial Cryptography</i>, Springer Berlin Heidelberg, 2003, pp. 162–81, doi:<a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">10.1007/978-3-540-45126-6_12</a>.","bibtex":"@inbook{Blömer_Seifert_2003, place={Berlin, Heidelberg}, title={Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">10.1007/978-3-540-45126-6_12</a>}, booktitle={Financial Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Seifert, Jean-Pierre}, year={2003}, pages={162–181} }","short":"J. Blömer, J.-P. Seifert, in: Financial Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003, pp. 162–181.","ama":"Blömer J, Seifert J-P. Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In: <i>Financial Cryptography</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2003:162-181. doi:<a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">10.1007/978-3-540-45126-6_12</a>","chicago":"Blömer, Johannes, and Jean-Pierre Seifert. “Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).” In <i>Financial Cryptography</i>, 162–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. <a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">https://doi.org/10.1007/978-3-540-45126-6_12</a>.","ieee":"J. Blömer and J.-P. Seifert, “Fault Based Cryptanalysis of the Advanced Encryption Standard (AES),” in <i>Financial Cryptography</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, pp. 162–181."},"place":"Berlin, Heidelberg","year":"2003","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540406631","9783540451266"]},"publication_status":"published","doi":"10.1007/978-3-540-45126-6_12","title":"Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)","author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"first_name":"Jean-Pierre","full_name":"Seifert, Jean-Pierre","last_name":"Seifert"}],"date_created":"2018-06-05T08:25:18Z","publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:51Z"},{"volume":2832,"author":[{"last_name":"Damerow","full_name":"Damerow, Valentina","first_name":"Valentina"},{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","first_name":"Friedhelm"},{"full_name":"Räcke, Harald","last_name":"Räcke","first_name":"Harald"},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"},{"first_name":"Christian","full_name":"Sohler, Christian","last_name":"Sohler"}],"date_created":"2018-04-03T05:37:10Z","publisher":"Springer","date_updated":"2022-01-06T06:54:52Z","doi":"10.1007/978-3-540-39658-1_17","title":"Smoothed Motion Complexity","page":"161--171","intvolume":"      2832","citation":{"ama":"Damerow V, Meyer auf der Heide F, Räcke H, Scheideler C, Sohler C. Smoothed Motion Complexity. In: <i>ESA</i>. Vol 2832. Lecture Notes in Computer Science. Springer; 2003:161--171. doi:<a href=\"https://doi.org/10.1007/978-3-540-39658-1_17\">10.1007/978-3-540-39658-1_17</a>","chicago":"Damerow, Valentina, Friedhelm Meyer auf der Heide, Harald Räcke, Christian Scheideler, and Christian Sohler. “Smoothed Motion Complexity.” In <i>ESA</i>, 2832:161--171. Lecture Notes in Computer Science. Springer, 2003. <a href=\"https://doi.org/10.1007/978-3-540-39658-1_17\">https://doi.org/10.1007/978-3-540-39658-1_17</a>.","ieee":"V. Damerow, F. Meyer auf der Heide, H. Räcke, C. Scheideler, and C. Sohler, “Smoothed Motion Complexity,” in <i>ESA</i>, 2003, vol. 2832, pp. 161--171.","apa":"Damerow, V., Meyer auf der Heide, F., Räcke, H., Scheideler, C., &#38; Sohler, C. (2003). Smoothed Motion Complexity. In <i>ESA</i> (Vol. 2832, pp. 161--171). Springer. <a href=\"https://doi.org/10.1007/978-3-540-39658-1_17\">https://doi.org/10.1007/978-3-540-39658-1_17</a>","mla":"Damerow, Valentina, et al. “Smoothed Motion Complexity.” <i>ESA</i>, vol. 2832, Springer, 2003, pp. 161--171, doi:<a href=\"https://doi.org/10.1007/978-3-540-39658-1_17\">10.1007/978-3-540-39658-1_17</a>.","short":"V. Damerow, F. Meyer auf der Heide, H. Räcke, C. Scheideler, C. Sohler, in: ESA, Springer, 2003, pp. 161--171.","bibtex":"@inproceedings{Damerow_Meyer auf der Heide_Räcke_Scheideler_Sohler_2003, series={Lecture Notes in Computer Science}, title={Smoothed Motion Complexity}, volume={2832}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-39658-1_17\">10.1007/978-3-540-39658-1_17</a>}, booktitle={ESA}, publisher={Springer}, author={Damerow, Valentina and Meyer auf der Heide, Friedhelm and Räcke, Harald and Scheideler, Christian and Sohler, Christian}, year={2003}, pages={161--171}, collection={Lecture Notes in Computer Science} }"},"year":"2003","department":[{"_id":"79"},{"_id":"63"}],"series_title":"Lecture Notes in Computer Science","user_id":"14955","_id":"2128","language":[{"iso":"eng"}],"publication":"ESA","type":"conference","status":"public"},{"ddc":["040"],"language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-04-12T09:04:48Z","creator":"florida","date_created":"2018-04-12T09:04:48Z","file_size":154427,"access_level":"open_access","file_id":"2307","file_name":"ICALP-03.pdf"}],"publication":"ICALP","title":"Anycasting in Adversarial Systems: Routing and Admission Control","publisher":"Springer","date_created":"2018-04-03T05:38:36Z","year":"2003","file_date_updated":"2018-04-12T09:04:48Z","_id":"2129","series_title":"Lecture Notes in Computer Science","user_id":"14955","department":[{"_id":"79"},{"_id":"63"}],"urn":"21297","status":"public","type":"conference","oa":"1","date_updated":"2022-01-06T06:54:53Z","author":[{"first_name":"Baruch","last_name":"Awerbuch","full_name":"Awerbuch, Baruch"},{"first_name":"André","full_name":"Brinkmann, André","last_name":"Brinkmann"},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"}],"volume":2719,"citation":{"apa":"Awerbuch, B., Brinkmann, A., &#38; Scheideler, C. (2003). Anycasting in Adversarial Systems: Routing and Admission Control. In <i>ICALP</i> (Vol. 2719, pp. 1153--1168). Springer.","mla":"Awerbuch, Baruch, et al. “Anycasting in Adversarial Systems: Routing and Admission Control.” <i>ICALP</i>, vol. 2719, Springer, 2003, pp. 1153--1168.","bibtex":"@inproceedings{Awerbuch_Brinkmann_Scheideler_2003, series={Lecture Notes in Computer Science}, title={Anycasting in Adversarial Systems: Routing and Admission Control}, volume={2719}, booktitle={ICALP}, publisher={Springer}, author={Awerbuch, Baruch and Brinkmann, André and Scheideler, Christian}, year={2003}, pages={1153--1168}, collection={Lecture Notes in Computer Science} }","short":"B. Awerbuch, A. Brinkmann, C. Scheideler, in: ICALP, Springer, 2003, pp. 1153--1168.","ama":"Awerbuch B, Brinkmann A, Scheideler C. Anycasting in Adversarial Systems: Routing and Admission Control. In: <i>ICALP</i>. Vol 2719. Lecture Notes in Computer Science. Springer; 2003:1153--1168.","ieee":"B. Awerbuch, A. Brinkmann, and C. Scheideler, “Anycasting in Adversarial Systems: Routing and Admission Control,” in <i>ICALP</i>, 2003, vol. 2719, pp. 1153--1168.","chicago":"Awerbuch, Baruch, André Brinkmann, and Christian Scheideler. “Anycasting in Adversarial Systems: Routing and Admission Control.” In <i>ICALP</i>, 2719:1153--1168. Lecture Notes in Computer Science. Springer, 2003."},"intvolume":"      2719","page":"1153--1168","has_accepted_license":"1"},{"file_date_updated":"2018-04-12T09:10:10Z","ddc":["040"],"user_id":"15504","department":[{"_id":"79"}],"_id":"2130","file":[{"file_size":127013,"access_level":"open_access","file_name":"PODC-03.pdf","file_id":"2308","date_updated":"2018-04-12T09:10:10Z","creator":"florida","date_created":"2018-04-12T09:10:10Z","relation":"main_file","content_type":"application/pdf"}],"status":"public","urn":"21303","type":"conference","publication":"PODC","title":"Peer-to-peer systems for prefix search","date_created":"2018-04-03T05:39:48Z","author":[{"last_name":"Awerbuch","full_name":"Awerbuch, Baruch","first_name":"Baruch"},{"full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler","first_name":"Christian"}],"date_updated":"2022-01-06T06:54:53Z","oa":"1","publisher":"ACM","citation":{"ama":"Awerbuch B, Scheideler C. Peer-to-peer systems for prefix search. In: <i>PODC</i>. ACM; 2003:123--132.","ieee":"B. Awerbuch and C. Scheideler, “Peer-to-peer systems for prefix search,” in <i>PODC</i>, 2003, pp. 123--132.","chicago":"Awerbuch, Baruch, and Christian Scheideler. “Peer-to-Peer Systems for Prefix Search.” In <i>PODC</i>, 123--132. ACM, 2003.","apa":"Awerbuch, B., &#38; Scheideler, C. (2003). Peer-to-peer systems for prefix search. In <i>PODC</i> (pp. 123--132). ACM.","bibtex":"@inproceedings{Awerbuch_Scheideler_2003, title={Peer-to-peer systems for prefix search}, booktitle={PODC}, publisher={ACM}, author={Awerbuch, Baruch and Scheideler, Christian}, year={2003}, pages={123--132} }","short":"B. Awerbuch, C. Scheideler, in: PODC, ACM, 2003, pp. 123--132.","mla":"Awerbuch, Baruch, and Christian Scheideler. “Peer-to-Peer Systems for Prefix Search.” <i>PODC</i>, ACM, 2003, pp. 123--132."},"page":"123--132","year":"2003","has_accepted_license":"1"},{"oa":"1","publisher":"Springer","date_updated":"2022-01-06T06:54:54Z","volume":2764,"date_created":"2018-04-03T05:41:01Z","author":[{"full_name":"Czumaj, Artur","last_name":"Czumaj","first_name":"Artur"},{"first_name":"Chris","full_name":"Riley, Chris","last_name":"Riley"},{"full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler","first_name":"Christian"}],"title":"Perfectly Balanced Allocation","has_accepted_license":"1","year":"2003","intvolume":"      2764","page":"240--251","citation":{"ieee":"A. Czumaj, C. Riley, and C. Scheideler, “Perfectly Balanced Allocation,” in <i>RANDOM-APPROX</i>, 2003, vol. 2764, pp. 240--251.","chicago":"Czumaj, Artur, Chris Riley, and Christian Scheideler. “Perfectly Balanced Allocation.” In <i>RANDOM-APPROX</i>, 2764:240--251. Lecture Notes in Computer Science. Springer, 2003.","ama":"Czumaj A, Riley C, Scheideler C. Perfectly Balanced Allocation. In: <i>RANDOM-APPROX</i>. Vol 2764. Lecture Notes in Computer Science. Springer; 2003:240--251.","apa":"Czumaj, A., Riley, C., &#38; Scheideler, C. (2003). Perfectly Balanced Allocation. In <i>RANDOM-APPROX</i> (Vol. 2764, pp. 240--251). Springer.","bibtex":"@inproceedings{Czumaj_Riley_Scheideler_2003, series={Lecture Notes in Computer Science}, title={Perfectly Balanced Allocation}, volume={2764}, booktitle={RANDOM-APPROX}, publisher={Springer}, author={Czumaj, Artur and Riley, Chris and Scheideler, Christian}, year={2003}, pages={240--251}, collection={Lecture Notes in Computer Science} }","short":"A. Czumaj, C. Riley, C. Scheideler, in: RANDOM-APPROX, Springer, 2003, pp. 240--251.","mla":"Czumaj, Artur, et al. “Perfectly Balanced Allocation.” <i>RANDOM-APPROX</i>, vol. 2764, Springer, 2003, pp. 240--251."},"_id":"2131","department":[{"_id":"79"}],"series_title":"Lecture Notes in Computer Science","user_id":"15504","ddc":["040"],"file_date_updated":"2018-04-12T09:16:17Z","publication":"RANDOM-APPROX","type":"conference","urn":"21313","status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_size":112587,"file_name":"RANDOM-03.pdf","file_id":"2310","access_level":"open_access","date_updated":"2018-04-12T09:16:17Z","date_created":"2018-04-12T09:16:17Z","creator":"florida"}]},{"title":"On local algorithms for topology control and routing in ad hoc networks","publisher":"ACM","oa":"1","date_updated":"2022-01-06T06:54:54Z","author":[{"first_name":"Lujun","last_name":"Jia","full_name":"Jia, Lujun"},{"last_name":"Rajaraman","full_name":"Rajaraman, Rajmohan","first_name":"Rajmohan"},{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}],"date_created":"2018-04-03T05:41:53Z","year":"2003","citation":{"ama":"Jia L, Rajaraman R, Scheideler C. On local algorithms for topology control and routing in ad hoc networks. In: <i>SPAA</i>. ACM; 2003:220--229.","chicago":"Jia, Lujun, Rajmohan Rajaraman, and Christian Scheideler. “On Local Algorithms for Topology Control and Routing in Ad Hoc Networks.” In <i>SPAA</i>, 220--229. ACM, 2003.","ieee":"L. Jia, R. Rajaraman, and C. Scheideler, “On local algorithms for topology control and routing in ad hoc networks,” in <i>SPAA</i>, 2003, pp. 220--229.","bibtex":"@inproceedings{Jia_Rajaraman_Scheideler_2003, title={On local algorithms for topology control and routing in ad hoc networks}, booktitle={SPAA}, publisher={ACM}, author={Jia, Lujun and Rajaraman, Rajmohan and Scheideler, Christian}, year={2003}, pages={220--229} }","mla":"Jia, Lujun, et al. “On Local Algorithms for Topology Control and Routing in Ad Hoc Networks.” <i>SPAA</i>, ACM, 2003, pp. 220--229.","short":"L. Jia, R. Rajaraman, C. Scheideler, in: SPAA, ACM, 2003, pp. 220--229.","apa":"Jia, L., Rajaraman, R., &#38; Scheideler, C. (2003). On local algorithms for topology control and routing in ad hoc networks. In <i>SPAA</i> (pp. 220--229). ACM."},"page":"220--229","has_accepted_license":"1","ddc":["040"],"file_date_updated":"2018-04-12T09:18:55Z","_id":"2132","user_id":"15504","department":[{"_id":"79"}],"urn":"21320","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-04-12T09:18:55Z","creator":"florida","date_created":"2018-04-12T09:18:55Z","file_size":224200,"access_level":"open_access","file_id":"2311","file_name":"JRS-SPAA-03.pdf"}],"status":"public","type":"conference","publication":"SPAA"},{"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-04-12T09:15:24Z","date_created":"2018-04-12T09:13:43Z","creator":"florida","file_size":121448,"file_name":"KS-SPAA-03.pdf","access_level":"open_access","file_id":"2309"}],"urn":"21338","publication":"SPAA","type":"conference","file_date_updated":"2018-04-12T09:15:24Z","ddc":["040"],"department":[{"_id":"79"}],"user_id":"15504","_id":"2133","page":"333--342","citation":{"ieee":"K. Kothapalli and C. Scheideler, “Information gathering in adversarial systems: lines and cycles,” in <i>SPAA</i>, 2003, pp. 333--342.","chicago":"Kothapalli, Kishore, and Christian Scheideler. “Information Gathering in Adversarial Systems: Lines and Cycles.” In <i>SPAA</i>, 333--342. ACM, 2003.","ama":"Kothapalli K, Scheideler C. Information gathering in adversarial systems: lines and cycles. In: <i>SPAA</i>. ACM; 2003:333--342.","bibtex":"@inproceedings{Kothapalli_Scheideler_2003, title={Information gathering in adversarial systems: lines and cycles}, booktitle={SPAA}, publisher={ACM}, author={Kothapalli, Kishore and Scheideler, Christian}, year={2003}, pages={333--342} }","mla":"Kothapalli, Kishore, and Christian Scheideler. “Information Gathering in Adversarial Systems: Lines and Cycles.” <i>SPAA</i>, ACM, 2003, pp. 333--342.","short":"K. Kothapalli, C. Scheideler, in: SPAA, ACM, 2003, pp. 333--342.","apa":"Kothapalli, K., &#38; Scheideler, C. (2003). Information gathering in adversarial systems: lines and cycles. In <i>SPAA</i> (pp. 333--342). ACM."},"year":"2003","has_accepted_license":"1","title":"Information gathering in adversarial systems: lines and cycles","date_created":"2018-04-03T05:42:48Z","author":[{"first_name":"Kishore","last_name":"Kothapalli","full_name":"Kothapalli, Kishore"},{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}],"publisher":"ACM","date_updated":"2022-01-06T06:54:55Z","oa":"1"},{"status":"public","publication":"15th European Simulation Symposium (ESS 2003)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"63"}],"user_id":"15415","_id":"17423","page":"367-371","citation":{"ieee":"B. Mueck, W. Dangelmaier, and M. Fischer, “Components for the Active Support of the Analysis of Material Flow Simulations in a Virtual Environment,” in <i>15th European Simulation Symposium (ESS 2003)</i>, 2003, pp. 367–371.","chicago":"Mueck, Bengt, Wilhelm Dangelmaier, and Matthias Fischer. “Components for the Active Support of the Analysis of Material Flow Simulations in a Virtual Environment.” In <i>15th European Simulation Symposium (ESS 2003)</i>, 367–71. SCS - Europe, 2003.","ama":"Mueck B, Dangelmaier W, Fischer M. Components for the Active Support of the Analysis of Material Flow Simulations in a Virtual Environment. In: <i>15th European Simulation Symposium (ESS 2003)</i>. SCS - Europe; 2003:367-371.","mla":"Mueck, Bengt, et al. “Components for the Active Support of the Analysis of Material Flow Simulations in a Virtual Environment.” <i>15th European Simulation Symposium (ESS 2003)</i>, SCS - Europe, 2003, pp. 367–71.","bibtex":"@inproceedings{Mueck_Dangelmaier_Fischer_2003, title={Components for the Active Support of the Analysis of Material Flow Simulations in a Virtual Environment}, booktitle={15th European Simulation Symposium (ESS 2003)}, publisher={SCS - Europe}, author={Mueck, Bengt and Dangelmaier, Wilhelm and Fischer, Matthias}, year={2003}, pages={367–371} }","short":"B. Mueck, W. Dangelmaier, M. Fischer, in: 15th European Simulation Symposium (ESS 2003), SCS - Europe, 2003, pp. 367–371.","apa":"Mueck, B., Dangelmaier, W., &#38; Fischer, M. (2003). Components for the Active Support of the Analysis of Material Flow Simulations in a Virtual Environment. In <i>15th European Simulation Symposium (ESS 2003)</i> (pp. 367–371). SCS - Europe."},"year":"2003","title":"Components for the Active Support of the Analysis of Material Flow Simulations in a Virtual Environment","date_created":"2020-07-28T08:05:14Z","author":[{"first_name":"Bengt","last_name":"Mueck","full_name":"Mueck, Bengt"},{"first_name":"Wilhelm","last_name":"Dangelmaier","full_name":"Dangelmaier, Wilhelm"},{"id":"146","full_name":"Fischer, Matthias","last_name":"Fischer","first_name":"Matthias"}],"publisher":"SCS - Europe","date_updated":"2022-01-06T06:53:11Z"},{"date_updated":"2022-01-06T06:53:52Z","author":[{"first_name":"Avner","last_name":"Magen","full_name":"Magen, Avner"},{"first_name":"Funda","last_name":"Ergun","full_name":"Ergun, Funda"},{"full_name":"Sohler, Christian","last_name":"Sohler","first_name":"Christian"},{"last_name":"Rubinfeld","full_name":"Rubinfeld, Ronitt","first_name":"Ronitt"},{"first_name":"Artur","full_name":"Czumaj, Artur","last_name":"Czumaj"},{"full_name":"Newman, Ilan","last_name":"Newman","first_name":"Ilan"},{"last_name":"Fortnow","full_name":"Fortnow, Lance","first_name":"Lance"}],"date_created":"2020-09-01T14:15:33Z","title":"Sublinear Approximation of Euclidean Minimum Spanning Tree","publication_identifier":{"isbn":["0898715385"]},"year":"2003","citation":{"ieee":"A. Magen <i>et al.</i>, “Sublinear Approximation of Euclidean Minimum Spanning Tree,” in <i>Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)</i>, 2003, pp. 813–822.","chicago":"Magen, Avner, Funda Ergun, Christian Sohler, Ronitt Rubinfeld, Artur Czumaj, Ilan Newman, and Lance Fortnow. “Sublinear Approximation of Euclidean Minimum Spanning Tree.” In <i>Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)</i>, 813–822, 2003.","ama":"Magen A, Ergun F, Sohler C, et al. Sublinear Approximation of Euclidean Minimum Spanning Tree. In: <i>Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)</i>. ; 2003:813–822.","apa":"Magen, A., Ergun, F., Sohler, C., Rubinfeld, R., Czumaj, A., Newman, I., &#38; Fortnow, L. (2003). Sublinear Approximation of Euclidean Minimum Spanning Tree. In <i>Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)</i> (pp. 813–822).","short":"A. Magen, F. Ergun, C. Sohler, R. Rubinfeld, A. Czumaj, I. Newman, L. Fortnow, in: Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003), 2003, pp. 813–822.","bibtex":"@inproceedings{Magen_Ergun_Sohler_Rubinfeld_Czumaj_Newman_Fortnow_2003, title={Sublinear Approximation of Euclidean Minimum Spanning Tree}, booktitle={Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)}, author={Magen, Avner and Ergun, Funda and Sohler, Christian and Rubinfeld, Ronitt and Czumaj, Artur and Newman, Ilan and Fortnow, Lance}, year={2003}, pages={813–822} }","mla":"Magen, Avner, et al. “Sublinear Approximation of Euclidean Minimum Spanning Tree.” <i>Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)</i>, 2003, pp. 813–822."},"page":"813–822","_id":"18791","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)","abstract":[{"text":"We consider the problem of finding the weight of a Euclidean minimum spanning tree for a set of n points in ℝd. We focus on the situation when the input point set is supported by certain basic (and commonly used) geometric data structures that can provide efficient access to the input in a structured way. We present an algorithm that estimates with high probability the weight of a Euclidean minimum spanning tree of a set of points to within 1 + ε using only \\~{O}(√ poly(1/ε)) queries for constant d. The algorithm assumes that the input is supported by a minimal bounding cube enclosing it, by orthogonal range queries, and by cone approximate nearest neighbors queries.","lang":"eng"}],"status":"public"},{"abstract":[{"text":"In a (randomized) oblivious routing scheme the path chosen for a request <br>between a source $s$ and a target $t$ is independent from the current traffic <br>in the network. Hence, such a scheme consists of probability distributions<br>over $s-t$ paths for every source-target pair $s,t$ in the network.<br><br>In a recent result citeR02 it was shown that for any undirected network <br>there is an oblivious routing scheme that achieves a polylogarithmic<br>competitive ratio with respect to congestion. Subsequently, Azar et <br>al. citeACF+03 gave a polynomial time algorithm that for a given network <br>constructs the best oblivious routing scheme, i.e. the scheme that guarantees<br>the best possible competitive ratio.  <br>Unfortunately, the latter result is based on the Ellipsoid algorithm; hence <br>it is unpractical for large networks. <br><br>In this paper we present a combinatorial algorithm for constructing an<br>oblivious routing scheme that guarantees a competitive ratio of $O(log^4n)$<br>for undirected networks. Furthermore, our approach yields a proof <br>for the existence of an oblivious routing scheme with competitive ratio<br>$O(log^3n)$, which is much simpler than the original proof from citeR02.","lang":"eng"}],"status":"public","type":"conference","publication":"Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures  - SPAA '03","language":[{"iso":"eng"}],"_id":"18907","user_id":"15415","department":[{"_id":"63"}],"year":"2003","citation":{"chicago":"Bienkowski, Marcin, Miroslaw Korzeniowski, and Harald Räcke. “A Practical Algorithm for Constructing Oblivious Routing Schemes.” In <i>Proceedings of the Fifteenth Annual ACM Symposium on Parallel Algorithms and Architectures  - SPAA ’03</i>, 2003. <a href=\"https://doi.org/10.1145/777412.777418\">https://doi.org/10.1145/777412.777418</a>.","ieee":"M. Bienkowski, M. Korzeniowski, and H. Räcke, “A practical algorithm for constructing oblivious routing schemes,” in <i>Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures  - SPAA ’03</i>, 2003.","ama":"Bienkowski M, Korzeniowski M, Räcke H. A practical algorithm for constructing oblivious routing schemes. In: <i>Proceedings of the Fifteenth Annual ACM Symposium on Parallel Algorithms and Architectures  - SPAA ’03</i>. ; 2003. doi:<a href=\"https://doi.org/10.1145/777412.777418\">10.1145/777412.777418</a>","apa":"Bienkowski, M., Korzeniowski, M., &#38; Räcke, H. (2003). A practical algorithm for constructing oblivious routing schemes. In <i>Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures  - SPAA ’03</i>. <a href=\"https://doi.org/10.1145/777412.777418\">https://doi.org/10.1145/777412.777418</a>","mla":"Bienkowski, Marcin, et al. “A Practical Algorithm for Constructing Oblivious Routing Schemes.” <i>Proceedings of the Fifteenth Annual ACM Symposium on Parallel Algorithms and Architectures  - SPAA ’03</i>, 2003, doi:<a href=\"https://doi.org/10.1145/777412.777418\">10.1145/777412.777418</a>.","short":"M. Bienkowski, M. Korzeniowski, H. Räcke, in: Proceedings of the Fifteenth Annual ACM Symposium on Parallel Algorithms and Architectures  - SPAA ’03, 2003.","bibtex":"@inproceedings{Bienkowski_Korzeniowski_Räcke_2003, title={A practical algorithm for constructing oblivious routing schemes}, DOI={<a href=\"https://doi.org/10.1145/777412.777418\">10.1145/777412.777418</a>}, booktitle={Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures  - SPAA ’03}, author={Bienkowski, Marcin and Korzeniowski, Miroslaw and Räcke, Harald}, year={2003} }"},"publication_status":"published","publication_identifier":{"isbn":["1581136617"]},"title":"A practical algorithm for constructing oblivious routing schemes","doi":"10.1145/777412.777418","date_updated":"2022-01-06T06:53:54Z","author":[{"last_name":"Bienkowski","full_name":"Bienkowski, Marcin","first_name":"Marcin"},{"first_name":"Miroslaw","last_name":"Korzeniowski","full_name":"Korzeniowski, Miroslaw"},{"first_name":"Harald","full_name":"Räcke, Harald","last_name":"Räcke"}],"date_created":"2020-09-03T07:44:01Z"},{"year":"2003","citation":{"bibtex":"@inproceedings{Rust_Stappert_Lukovszki_2003, title={A Petri Net Model for the Network Layer of a Mobile Ad Hoc Network Architecture}, booktitle={7th World Multiconference on Systemics, Cybernetics and Informatics}, author={Rust, Carsten and Stappert, Friedhelm and Lukovszki, Tamás}, year={2003} }","mla":"Rust, Carsten, et al. “A Petri Net Model for the Network Layer of a Mobile Ad Hoc Network Architecture.” <i>7th World Multiconference on Systemics, Cybernetics and Informatics</i>, 2003.","short":"C. Rust, F. Stappert, T. Lukovszki, in: 7th World Multiconference on Systemics, Cybernetics and Informatics, 2003.","apa":"Rust, C., Stappert, F., &#38; Lukovszki, T. (2003). A Petri Net Model for the Network Layer of a Mobile Ad Hoc Network Architecture. In <i>7th World Multiconference on Systemics, Cybernetics and Informatics</i>.","ama":"Rust C, Stappert F, Lukovszki T. A Petri Net Model for the Network Layer of a Mobile Ad Hoc Network Architecture. In: <i>7th World Multiconference on Systemics, Cybernetics and Informatics</i>. ; 2003.","ieee":"C. Rust, F. Stappert, and T. Lukovszki, “A Petri Net Model for the Network Layer of a Mobile Ad Hoc Network Architecture,” in <i>7th World Multiconference on Systemics, Cybernetics and Informatics</i>, 2003.","chicago":"Rust, Carsten, Friedhelm Stappert, and Tamás Lukovszki. “A Petri Net Model for the Network Layer of a Mobile Ad Hoc Network Architecture.” In <i>7th World Multiconference on Systemics, Cybernetics and Informatics</i>, 2003."},"date_updated":"2022-01-06T06:53:55Z","author":[{"first_name":"Carsten","last_name":"Rust","full_name":"Rust, Carsten"},{"full_name":"Stappert, Friedhelm","last_name":"Stappert","first_name":"Friedhelm"},{"first_name":"Tamás","last_name":"Lukovszki","full_name":"Lukovszki, Tamás"}],"date_created":"2020-09-03T11:50:06Z","title":"A Petri Net Model for the Network Layer of a Mobile Ad Hoc Network Architecture","type":"conference","publication":"7th World Multiconference on Systemics, Cybernetics and Informatics","abstract":[{"text":"In this paper, we define a Petri net model for the network or routing layer of a mobile ad hoc network. Such networks require routing strategies substantially different from those used in static communication networks. The model pre- sented consists of two layers, a location service and a po- sition based routing. Both are described in detail. Our ap- proach considers a very strong definition of fault tolerance thereby improving state-of-the-art ad hoc routing protocols in several respects. Modeling of the communication archi- tecture for mobile ad hoc networks is part of our overall effort towards a design methodology for distributed embed- ded real-time systems including dynamically evolving com- ponents.","lang":"eng"}],"status":"public","_id":"18947","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}]},{"publication_status":"published","publication_identifier":{"isbn":["1581136617"]},"citation":{"apa":"Schindelhauer, C., Lukovszki, T., Rührup, S., &#38; Volbert, K. (2003). Worst case mobility in ad hoc networks. In <i>Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03)</i>. <a href=\"https://doi.org/10.1145/777412.777448\">https://doi.org/10.1145/777412.777448</a>","bibtex":"@inproceedings{Schindelhauer_Lukovszki_Rührup_Volbert_2003, title={Worst case mobility in ad hoc networks}, DOI={<a href=\"https://doi.org/10.1145/777412.777448\">10.1145/777412.777448</a>}, booktitle={Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03)}, author={Schindelhauer, Christian and Lukovszki, Tamás and Rührup, Stefan and Volbert, Klaus}, year={2003} }","short":"C. Schindelhauer, T. Lukovszki, S. Rührup, K. Volbert, in: Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03), 2003.","mla":"Schindelhauer, Christian, et al. “Worst Case Mobility in Ad Hoc Networks.” <i>Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03)</i>, 2003, doi:<a href=\"https://doi.org/10.1145/777412.777448\">10.1145/777412.777448</a>.","ama":"Schindelhauer C, Lukovszki T, Rührup S, Volbert K. Worst case mobility in ad hoc networks. In: <i>Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03)</i>. ; 2003. doi:<a href=\"https://doi.org/10.1145/777412.777448\">10.1145/777412.777448</a>","ieee":"C. Schindelhauer, T. Lukovszki, S. Rührup, and K. Volbert, “Worst case mobility in ad hoc networks,” in <i>Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03)</i>, 2003.","chicago":"Schindelhauer, Christian, Tamás Lukovszki, Stefan Rührup, and Klaus Volbert. “Worst Case Mobility in Ad Hoc Networks.” In <i>Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03)</i>, 2003. <a href=\"https://doi.org/10.1145/777412.777448\">https://doi.org/10.1145/777412.777448</a>."},"year":"2003","date_created":"2020-09-03T13:10:50Z","author":[{"full_name":"Schindelhauer, Christian","last_name":"Schindelhauer","first_name":"Christian"},{"first_name":"Tamás","full_name":"Lukovszki, Tamás","last_name":"Lukovszki"},{"first_name":"Stefan","last_name":"Rührup","full_name":"Rührup, Stefan"},{"first_name":"Klaus","full_name":"Volbert, Klaus","last_name":"Volbert"}],"date_updated":"2022-01-06T06:53:55Z","doi":"10.1145/777412.777448","title":"Worst case mobility in ad hoc networks","type":"conference","publication":"Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03)","status":"public","abstract":[{"lang":"eng","text":"We investigate distributed algorithms for mobile ad hoc networks for   moving radio stations with adjustable transmission power in a worst   case scenario. We consider two models to find a reasonable   restriction on the worst-case mobility. In the pedestrian model we   assume a maximum speed $v_max$ of the radio stations, while in   the vehicular model we assume a maximum acceleration $a_max$ of   the points.      Our goal is to maintain persistent routes with nice communication   network properties like hop-distance, energy-consumption, congestion   and number of interferences. A route is persistent, if we can   guarantee that all edges of this route can be uphold for a given   time span $Delta$, which is a parameter denoting the minimum time   the mobile network needs to adopt changes, i.e. update routing   tables, change directory entries, etc. This $Delta$ can be used as   the length of an update interval for a proactive routing scheme.      We extend some known notions such as transmission range,   interferences, spanner, power spanner and congestion to both   mobility models and introduce a new parameter called crowdedness   that states a lower bound on the number of radio interferences. Then   we prove that a mobile spanner hosts a path system that   polylogarithmically approximates the optimal congestion.    We present distributed algorithms based on a grid clustering   technique and a high-dimensional representation of the dynamical   start situation which construct mobile spanners with low congestion,   low interference number, low energy-consumption, and low degree.  We   measure the optimality of the output of our algorithm by comparing   it with the optimal choice of persistent routes under the same   circumstances with respect to pedestrian or vehicular worst-case   movements. Finally, we present solutions for dynamic position   information management under our mobility models."}],"user_id":"15415","department":[{"_id":"63"}],"_id":"18960","language":[{"iso":"eng"}]},{"date_created":"2020-09-03T14:34:33Z","author":[{"first_name":"Yossi","last_name":"Azar","full_name":"Azar, Yossi"},{"first_name":"Edith","last_name":"Cohen","full_name":"Cohen, Edith"},{"first_name":"Amos","full_name":"Fiat, Amos","last_name":"Fiat"},{"last_name":"Kaplan","full_name":"Kaplan, Haim","first_name":"Haim"},{"first_name":"Harald","last_name":"Racke","full_name":"Racke, Harald"}],"date_updated":"2022-01-06T06:53:56Z","doi":"10.1145/780542.780599","title":"Optimal oblivious routing in polynomial time","publication_identifier":{"isbn":["1581136749"]},"publication_status":"published","citation":{"apa":"Azar, Y., Cohen, E., Fiat, A., Kaplan, H., &#38; Racke, H. (2003). Optimal oblivious routing in polynomial time. In <i>Proceedings of the thirty-fifth ACM symposium on Theory of computing  - STOC ’03</i>. <a href=\"https://doi.org/10.1145/780542.780599\">https://doi.org/10.1145/780542.780599</a>","short":"Y. Azar, E. Cohen, A. Fiat, H. Kaplan, H. Racke, in: Proceedings of the Thirty-Fifth ACM Symposium on Theory of Computing  - STOC ’03, 2003.","mla":"Azar, Yossi, et al. “Optimal Oblivious Routing in Polynomial Time.” <i>Proceedings of the Thirty-Fifth ACM Symposium on Theory of Computing  - STOC ’03</i>, 2003, doi:<a href=\"https://doi.org/10.1145/780542.780599\">10.1145/780542.780599</a>.","bibtex":"@inproceedings{Azar_Cohen_Fiat_Kaplan_Racke_2003, title={Optimal oblivious routing in polynomial time}, DOI={<a href=\"https://doi.org/10.1145/780542.780599\">10.1145/780542.780599</a>}, booktitle={Proceedings of the thirty-fifth ACM symposium on Theory of computing  - STOC ’03}, author={Azar, Yossi and Cohen, Edith and Fiat, Amos and Kaplan, Haim and Racke, Harald}, year={2003} }","chicago":"Azar, Yossi, Edith Cohen, Amos Fiat, Haim Kaplan, and Harald Racke. “Optimal Oblivious Routing in Polynomial Time.” In <i>Proceedings of the Thirty-Fifth ACM Symposium on Theory of Computing  - STOC ’03</i>, 2003. <a href=\"https://doi.org/10.1145/780542.780599\">https://doi.org/10.1145/780542.780599</a>.","ieee":"Y. Azar, E. Cohen, A. Fiat, H. Kaplan, and H. Racke, “Optimal oblivious routing in polynomial time,” in <i>Proceedings of the thirty-fifth ACM symposium on Theory of computing  - STOC ’03</i>, 2003.","ama":"Azar Y, Cohen E, Fiat A, Kaplan H, Racke H. Optimal oblivious routing in polynomial time. In: <i>Proceedings of the Thirty-Fifth ACM Symposium on Theory of Computing  - STOC ’03</i>. ; 2003. doi:<a href=\"https://doi.org/10.1145/780542.780599\">10.1145/780542.780599</a>"},"year":"2003","department":[{"_id":"63"}],"user_id":"15415","_id":"18966","language":[{"iso":"eng"}],"publication":"Proceedings of the thirty-fifth ACM symposium on Theory of computing  - STOC '03","type":"conference","status":"public","abstract":[{"text":"A recent seminal result of Räcke is that for any undirected network there is an oblivious routing algorithm with a polylogarithmic competitive ratio with respect to congestion. Unfortunately, Räcke's construction is not polynomial time. We give a polynomial time construction that guarantees Räcke's bounds, and more generally gives the true optimal ratio for any (undirected or directed) network.","lang":"eng"}]},{"language":[{"iso":"eng"}],"file_date_updated":"2020-09-04T08:03:11Z","ddc":["004"],"user_id":"15415","department":[{"_id":"63"}],"_id":"18982","file":[{"file_size":703144,"access_level":"closed","file_id":"18985","file_name":"pub-hni-2464.pdf","date_updated":"2020-09-04T08:03:11Z","date_created":"2020-09-04T08:03:11Z","creator":"koala","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","abstract":[{"lang":"ger","text":"In dieser Studienarbeit wurde ein System entworfen und implementiert, das der Ausführung paralleler Algorithmen nach dem Bulk-Synchronous Parallel (BSP)-Modell dient. Von der Paderborn University BSP Library (PUB) unterscheidet es sich dadurch, dass es vom Einsatzgebiet her nicht für Parallelrechner konzipiert ist, sondern vielmehr für eine Ansammlung von PCs und Workstations, die über das gesamte Internet verteilt sind.<br>Gegenüber anderen bekannten Web-Computing Projekten wie z.B. SETI@home oder distributed.net zeichnet sich dieses System dadurch aus, dass nicht Clients von einem zentralen Server \"häppchenweise\" unabhängige Teilprobleme anfordern und lösen, sondern dass die Clients gemeinsam an einem Problem arbeiten, indem sie nach dem BSP-Modell miteinander kommunizieren und sich synchronisieren."}],"type":"mastersthesis","title":"Entwurf und Implementierung einer Laufzeitumgebung für parallele Algorithmen in Java","author":[{"first_name":"Joachim","last_name":"Gehweiler","full_name":"Gehweiler, Joachim"}],"date_created":"2020-09-04T08:03:37Z","date_updated":"2022-01-06T06:53:56Z","citation":{"short":"J. Gehweiler, Entwurf Und Implementierung Einer Laufzeitumgebung Für Parallele Algorithmen in Java, Universität Paderborn, 2003.","bibtex":"@book{Gehweiler_2003, place={Universität Paderborn}, title={Entwurf und Implementierung einer Laufzeitumgebung für parallele Algorithmen in Java}, author={Gehweiler, Joachim}, year={2003} }","mla":"Gehweiler, Joachim. <i>Entwurf Und Implementierung Einer Laufzeitumgebung Für Parallele Algorithmen in Java</i>. 2003.","apa":"Gehweiler, J. (2003). <i>Entwurf und Implementierung einer Laufzeitumgebung für parallele Algorithmen in Java</i>. Universität Paderborn.","chicago":"Gehweiler, Joachim. <i>Entwurf Und Implementierung Einer Laufzeitumgebung Für Parallele Algorithmen in Java</i>. Universität Paderborn, 2003.","ieee":"J. Gehweiler, <i>Entwurf und Implementierung einer Laufzeitumgebung für parallele Algorithmen in Java</i>. Universität Paderborn, 2003.","ama":"Gehweiler J. <i>Entwurf Und Implementierung Einer Laufzeitumgebung Für Parallele Algorithmen in Java</i>. Universität Paderborn; 2003."},"year":"2003","place":"Universität Paderborn","has_accepted_license":"1"},{"title":"Secure, QoS-Enabled Mobility Support for IP-based Networks","main_file_link":[{"url":"http://citeseer.ist.psu.edu/viewdoc/download;jsessionid=A970489A85406D205EE59F71B67AB954?doi=10.1.1.10.5592&rep=rep1&type=pdf"}],"date_updated":"2022-01-06T06:53:58Z","author":[{"last_name":"Fu","full_name":"Fu, X.","first_name":"X."},{"full_name":"Chen, T.","last_name":"Chen","first_name":"T."},{"first_name":"A.","full_name":"Festag, A.","last_name":"Festag"},{"first_name":"Holger","id":"126","full_name":"Karl, Holger","last_name":"Karl"},{"last_name":"Schäfer","full_name":"Schäfer, G.","first_name":"G."},{"full_name":"Fan, C.","last_name":"Fan","first_name":"C."}],"date_created":"2018-03-28T10:31:07Z","year":"2003","citation":{"apa":"Fu, X., Chen, T., Festag, A., Karl, H., Schäfer, G., &#38; Fan, C. (2003). Secure, QoS-Enabled Mobility Support for IP-based Networks. In <i>Proceedings IP Based Cellular Network Conference IPCN, Paris / France, Dezember </i>.","short":"X. Fu, T. Chen, A. Festag, H. Karl, G. Schäfer, C. Fan, in: Proceedings IP Based Cellular Network Conference IPCN, Paris / France, Dezember , 2003.","mla":"Fu, X., et al. “Secure, QoS-Enabled Mobility Support for IP-Based Networks.” <i>Proceedings IP Based Cellular Network Conference IPCN, Paris / France, Dezember </i>, 2003.","bibtex":"@inproceedings{Fu_Chen_Festag_Karl_Schäfer_Fan_2003, title={Secure, QoS-Enabled Mobility Support for IP-based Networks}, booktitle={Proceedings IP Based Cellular Network Conference IPCN, Paris / France, Dezember }, author={Fu, X. and Chen, T. and Festag, A. and Karl, Holger and Schäfer, G. and Fan, C.}, year={2003} }","chicago":"Fu, X., T. Chen, A. Festag, Holger Karl, G. Schäfer, and C. Fan. “Secure, QoS-Enabled Mobility Support for IP-Based Networks.” In <i>Proceedings IP Based Cellular Network Conference IPCN, Paris / France, Dezember </i>, 2003.","ieee":"X. Fu, T. Chen, A. Festag, H. Karl, G. Schäfer, and C. Fan, “Secure, QoS-Enabled Mobility Support for IP-based Networks,” in <i>Proceedings IP Based Cellular Network Conference IPCN, Paris / France, Dezember </i>, 2003.","ama":"Fu X, Chen T, Festag A, Karl H, Schäfer G, Fan C. Secure, QoS-Enabled Mobility Support for IP-based Networks. In: <i>Proceedings IP Based Cellular Network Conference IPCN, Paris / France, Dezember </i>. ; 2003."},"_id":"1913","user_id":"15572","department":[{"_id":"75"}],"status":"public","type":"conference","publication":"Proceedings IP Based Cellular Network Conference IPCN, Paris / France, Dezember "},{"_id":"1914","date_updated":"2022-01-06T06:53:58Z","department":[{"_id":"75"}],"date_created":"2018-03-28T10:34:28Z","user_id":"15572","author":[{"full_name":"Geerdes, Hans-Florian","last_name":"Geerdes","first_name":"Hans-Florian"},{"first_name":"Holger","id":"126","full_name":"Karl, Holger","last_name":"Karl"}],"title":"The Potential of Relaying in Cellular Networks ","main_file_link":[{"url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.4875"}],"publication":"Proceedings of INOC 2003, Evry/Paris","type":"conference","year":"2003","status":"public","citation":{"short":"H.-F. Geerdes, H. Karl, in: Proceedings of INOC 2003, Evry/Paris, 2003.","bibtex":"@inproceedings{Geerdes_Karl_2003, title={The Potential of Relaying in Cellular Networks }, booktitle={Proceedings of INOC 2003, Evry/Paris}, author={Geerdes, Hans-Florian and Karl, Holger}, year={2003} }","mla":"Geerdes, Hans-Florian, and Holger Karl. “The Potential of Relaying in Cellular Networks .” <i>Proceedings of INOC 2003, Evry/Paris</i>, 2003.","apa":"Geerdes, H.-F., &#38; Karl, H. (2003). The Potential of Relaying in Cellular Networks . In <i>Proceedings of INOC 2003, Evry/Paris</i>.","ama":"Geerdes H-F, Karl H. The Potential of Relaying in Cellular Networks . In: <i>Proceedings of INOC 2003, Evry/Paris</i>. ; 2003.","ieee":"H.-F. Geerdes and H. Karl, “The Potential of Relaying in Cellular Networks ,” in <i>Proceedings of INOC 2003, Evry/Paris</i>, 2003.","chicago":"Geerdes, Hans-Florian, and Holger Karl. “The Potential of Relaying in Cellular Networks .” In <i>Proceedings of INOC 2003, Evry/Paris</i>, 2003."}},{"date_created":"2018-03-28T10:57:29Z","author":[{"last_name":"Aguiar","full_name":"Aguiar, Ana","first_name":"Ana"},{"first_name":"Christian","last_name":"Hoene","full_name":"Hoene, Christian"},{"first_name":"Jirka","last_name":"Klaue","full_name":"Klaue, Jirka"},{"full_name":"Karl, Holger","id":"126","last_name":"Karl","first_name":"Holger"},{"first_name":"Horst","full_name":"Miesmer, Horst","last_name":"Miesmer"},{"first_name":"Adam","last_name":"Wolisz","full_name":"Wolisz, Adam"}],"date_updated":"2022-01-06T06:53:59Z","main_file_link":[{"url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.7861"}],"title":"Channel-aware Schedulers for VoIP and MPEG4 based on Channel Prediction","citation":{"ieee":"A. Aguiar, C. Hoene, J. Klaue, H. Karl, H. Miesmer, and A. Wolisz, “Channel-aware Schedulers for VoIP and MPEG4 based on Channel Prediction,” in <i>Proc. of 8th Intl. Workshop on Mobile Multimedia Communications (MoMuC’03)</i>, 2003.","chicago":"Aguiar, Ana, Christian Hoene, Jirka Klaue, Holger Karl, Horst Miesmer, and Adam Wolisz. “Channel-Aware Schedulers for VoIP and MPEG4 Based on Channel Prediction.” In <i>Proc. of 8th Intl. Workshop on Mobile Multimedia Communications (MoMuC’03)</i>, 2003.","ama":"Aguiar A, Hoene C, Klaue J, Karl H, Miesmer H, Wolisz A. Channel-aware Schedulers for VoIP and MPEG4 based on Channel Prediction. In: <i>Proc. of 8th Intl. Workshop on Mobile Multimedia Communications (MoMuC’03)</i>. ; 2003.","apa":"Aguiar, A., Hoene, C., Klaue, J., Karl, H., Miesmer, H., &#38; Wolisz, A. (2003). Channel-aware Schedulers for VoIP and MPEG4 based on Channel Prediction. In <i>Proc. of 8th Intl. Workshop on Mobile Multimedia Communications (MoMuC’03)</i>.","bibtex":"@inproceedings{Aguiar_Hoene_Klaue_Karl_Miesmer_Wolisz_2003, title={Channel-aware Schedulers for VoIP and MPEG4 based on Channel Prediction}, booktitle={Proc. of 8th Intl. Workshop on Mobile Multimedia Communications (MoMuC’03)}, author={Aguiar, Ana and Hoene, Christian and Klaue, Jirka and Karl, Holger and Miesmer, Horst and Wolisz, Adam}, year={2003} }","mla":"Aguiar, Ana, et al. “Channel-Aware Schedulers for VoIP and MPEG4 Based on Channel Prediction.” <i>Proc. of 8th Intl. Workshop on Mobile Multimedia Communications (MoMuC’03)</i>, 2003.","short":"A. Aguiar, C. Hoene, J. Klaue, H. Karl, H. Miesmer, A. Wolisz, in: Proc. of 8th Intl. Workshop on Mobile Multimedia Communications (MoMuC’03), 2003."},"year":"2003","user_id":"15572","department":[{"_id":"75"}],"_id":"1917","type":"conference","publication":"Proc. of 8th Intl. Workshop on Mobile Multimedia Communications (MoMuC'03)","status":"public"},{"publication":"Complex Systems","type":"journal_article","status":"public","_id":"20435","department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","language":[{"iso":"eng"}],"issue":"3","year":"2003","page":"263--268","intvolume":"        14","citation":{"bibtex":"@article{Hamann_2003, title={Definition and Behavior of Langton’s Ant in Three Dimensions}, volume={14}, number={3}, journal={Complex Systems}, author={Hamann, Heiko}, year={2003}, pages={263--268} }","short":"H. Hamann, Complex Systems 14 (2003) 263--268.","mla":"Hamann, Heiko. “Definition and Behavior of Langton’s Ant in Three Dimensions.” <i>Complex Systems</i>, vol. 14, no. 3, 2003, pp. 263--268.","apa":"Hamann, H. (2003). Definition and Behavior of Langton’s Ant in Three Dimensions. <i>Complex Systems</i>, <i>14</i>(3), 263--268.","ama":"Hamann H. Definition and Behavior of Langton’s Ant in Three Dimensions. <i>Complex Systems</i>. 2003;14(3):263--268.","ieee":"H. Hamann, “Definition and Behavior of Langton’s Ant in Three Dimensions,” <i>Complex Systems</i>, vol. 14, no. 3, pp. 263--268, 2003.","chicago":"Hamann, Heiko. “Definition and Behavior of Langton’s Ant in Three Dimensions.” <i>Complex Systems</i> 14, no. 3 (2003): 263--268."},"date_updated":"2022-01-06T06:54:27Z","volume":14,"date_created":"2020-11-19T12:15:45Z","author":[{"first_name":"Heiko","full_name":"Hamann, Heiko","last_name":"Hamann"}],"title":"Definition and Behavior of Langton's Ant in Three Dimensions"}]
