---
_id: '20162'
author:
- first_name: Heiko
  full_name: Hamann, Heiko
  last_name: Hamann
citation:
  ama: 'Hamann H. Towards Swarm Calculus: Urn Models of Collective Decisions and Universal
    Properties of Swarm Performance. <i>Swarm Intelligence</i>. 2013;7(3):145-172.
    doi:<a href="https://doi.org/10.1007/s11721-013-0080-0">10.1007/s11721-013-0080-0</a>'
  apa: 'Hamann, H. (2013). Towards Swarm Calculus: Urn Models of Collective Decisions
    and Universal Properties of Swarm Performance. <i>Swarm Intelligence</i>, <i>7</i>(3),
    145–172. <a href="https://doi.org/10.1007/s11721-013-0080-0">https://doi.org/10.1007/s11721-013-0080-0</a>'
  bibtex: '@article{Hamann_2013, title={Towards Swarm Calculus: Urn Models of Collective
    Decisions and Universal Properties of Swarm Performance}, volume={7}, DOI={<a
    href="https://doi.org/10.1007/s11721-013-0080-0">10.1007/s11721-013-0080-0</a>},
    number={3}, journal={Swarm Intelligence}, author={Hamann, Heiko}, year={2013},
    pages={145–172} }'
  chicago: 'Hamann, Heiko. “Towards Swarm Calculus: Urn Models of Collective Decisions
    and Universal Properties of Swarm Performance.” <i>Swarm Intelligence</i> 7, no.
    3 (2013): 145–72. <a href="https://doi.org/10.1007/s11721-013-0080-0">https://doi.org/10.1007/s11721-013-0080-0</a>.'
  ieee: 'H. Hamann, “Towards Swarm Calculus: Urn Models of Collective Decisions and
    Universal Properties of Swarm Performance,” <i>Swarm Intelligence</i>, vol. 7,
    no. 3, pp. 145–172, 2013.'
  mla: 'Hamann, Heiko. “Towards Swarm Calculus: Urn Models of Collective Decisions
    and Universal Properties of Swarm Performance.” <i>Swarm Intelligence</i>, vol.
    7, no. 3, 2013, pp. 145–72, doi:<a href="https://doi.org/10.1007/s11721-013-0080-0">10.1007/s11721-013-0080-0</a>.'
  short: H. Hamann, Swarm Intelligence 7 (2013) 145–172.
date_created: 2020-10-21T13:57:36Z
date_updated: 2022-01-06T06:54:20Z
department:
- _id: '63'
- _id: '238'
doi: 10.1007/s11721-013-0080-0
intvolume: '         7'
issue: '3'
language:
- iso: eng
page: 145-172
publication: Swarm Intelligence
status: public
title: 'Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties
  of Swarm Performance'
type: journal_article
user_id: '15415'
volume: 7
year: '2013'
...
---
_id: '2868'
author:
- first_name: Stefan
  full_name: Laudemann, Stefan
  last_name: Laudemann
citation:
  ama: Laudemann S. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>.;
    2013.
  apa: Laudemann, S. (2013). <i>Themenmodellierung zur Identifikation und Gruppierung
    von Spam-Webseiten</i>.
  bibtex: '@book{Laudemann_2013, title={Themenmodellierung zur Identifikation und
    Gruppierung von Spam-Webseiten}, author={Laudemann, Stefan}, year={2013} }'
  chicago: Laudemann, Stefan. <i>Themenmodellierung Zur Identifikation Und Gruppierung
    von Spam-Webseiten</i>, 2013.
  ieee: S. Laudemann, <i>Themenmodellierung zur Identifikation und Gruppierung von
    Spam-Webseiten</i>. 2013.
  mla: Laudemann, Stefan. <i>Themenmodellierung Zur Identifikation Und Gruppierung
    von Spam-Webseiten</i>. 2013.
  short: S. Laudemann, Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten,
    2013.
date_created: 2018-05-24T13:16:41Z
date_updated: 2022-01-06T06:58:17Z
department:
- _id: '64'
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten
type: bachelorsthesis
user_id: '25078'
year: '2013'
...
---
_id: '2869'
author:
- first_name: Lennart
  full_name: Leder, Lennart
  last_name: Leder
citation:
  ama: Leder L. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering
    Unter Verwendung von L_p-Metriken</i>.; 2013.
  apa: Leder, L. (2013). <i>Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering
    unter Verwendung von L_p-Metriken</i>.
  bibtex: '@book{Leder_2013, title={Nichtapproximierbarkeitsresultate zu Radius- und
    Durchmesserclustering unter Verwendung von L_p-Metriken}, author={Leder, Lennart},
    year={2013} }'
  chicago: Leder, Lennart. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering
    Unter Verwendung von L_p-Metriken</i>, 2013.
  ieee: L. Leder, <i>Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering
    unter Verwendung von L_p-Metriken</i>. 2013.
  mla: Leder, Lennart. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering
    Unter Verwendung von L_p-Metriken</i>. 2013.
  short: L. Leder, Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering
    Unter Verwendung von L_p-Metriken, 2013.
date_created: 2018-05-24T13:17:53Z
date_updated: 2022-01-06T06:58:17Z
department:
- _id: '64'
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter
  Verwendung von L_p-Metriken
type: bachelorsthesis
user_id: '25078'
year: '2013'
...
---
_id: '25740'
author:
- first_name: Da
  full_name: He, Da
  last_name: He
- first_name: Wolfgang
  full_name: Müller, Wolfgang
  id: '16243'
  last_name: Müller
citation:
  ama: He D, Müller W.  A heuristic energy-aware approach for hard real-time systems
    on multi-core platforms. <i>Microprocessors and Microsystems - Embedded Hardware
    Design 37(6-7)</i>. Published online 2013:845-857.
  apa: He, D., &#38; Müller, W. (2013).  A heuristic energy-aware approach for hard
    real-time systems on multi-core platforms. <i>Microprocessors and Microsystems
    - Embedded Hardware Design 37(6-7)</i>, 845–857.
  bibtex: '@article{He_Müller_2013, title={ A heuristic energy-aware approach for
    hard real-time systems on multi-core platforms}, journal={Microprocessors and
    Microsystems - Embedded Hardware Design 37(6-7)}, author={He, Da and Müller, Wolfgang},
    year={2013}, pages={845–857} }'
  chicago: He, Da, and Wolfgang Müller. “ A Heuristic Energy-Aware Approach for Hard
    Real-Time Systems on Multi-Core Platforms.” <i>Microprocessors and Microsystems
    - Embedded Hardware Design 37(6-7)</i>, 2013, 845–57.
  ieee: D. He and W. Müller, “ A heuristic energy-aware approach for hard real-time
    systems on multi-core platforms,” <i>Microprocessors and Microsystems - Embedded
    Hardware Design 37(6-7)</i>, pp. 845–857, 2013.
  mla: He, Da, and Wolfgang Müller. “ A Heuristic Energy-Aware Approach for Hard Real-Time
    Systems on Multi-Core Platforms.” <i>Microprocessors and Microsystems - Embedded
    Hardware Design 37(6-7)</i>, 2013, pp. 845–57.
  short: D. He, W. Müller, Microprocessors and Microsystems - Embedded Hardware Design
    37(6-7) (2013) 845–857.
date_created: 2021-10-07T09:49:15Z
date_updated: 2022-01-06T06:57:12Z
department:
- _id: '672'
language:
- iso: eng
page: 845-857
publication: Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)
status: public
title: ' A heuristic energy-aware approach for hard real-time systems on multi-core
  platforms'
type: journal_article
user_id: '21240'
year: '2013'
...
---
_id: '25741'
citation:
  ama: 'Schirner G, Götz M, Rettberg A, Zanella MC, Rammig F-J, eds. <i>Embedded Systems:
    Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International
    Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer;
    2013.'
  apa: 'Schirner, G., Götz, M., Rettberg, A., Zanella, M. C., &#38; Rammig, F.-J.
    (Eds.). (2013). <i>Embedded Systems: Design, Analysis and Verification. Proceedings
    of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn,
    Germany, June 2013</i>. Springer.'
  bibtex: '@book{Schirner_Götz_Rettberg_Zanella_Rammig_2013, series={Band IFIP AICT
    403 }, title={Embedded Systems: Design, Analysis and Verification. Proceedings
    of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn,
    Germany, June 2013}, publisher={Springer}, year={2013}, collection={Band IFIP
    AICT 403 } }'
  chicago: 'Schirner, Gunar, Marcelo Götz, Achim Rettberg, Mauro C. Zanella, and Franz-Josef
    Rammig, eds. <i>Embedded Systems: Design, Analysis and Verification. Proceedings
    of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn,
    Germany, June 2013</i>. Band IFIP AICT 403 . Springer, 2013.'
  ieee: 'G. Schirner, M. Götz, A. Rettberg, M. C. Zanella, and F.-J. Rammig, Eds.,
    <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th
    IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany,
    June 2013</i>. Springer, 2013.'
  mla: 'Schirner, Gunar, et al., editors. <i>Embedded Systems: Design, Analysis and
    Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems
    Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer, 2013.'
  short: 'G. Schirner, M. Götz, A. Rettberg, M.C. Zanella, F.-J. Rammig, eds., Embedded
    Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International
    Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013, Springer,
    2013.'
date_created: 2021-10-07T09:54:44Z
date_updated: 2022-01-06T06:57:12Z
department:
- _id: '672'
editor:
- first_name: Gunar
  full_name: Schirner, Gunar
  last_name: Schirner
- first_name: Marcelo
  full_name: Götz, Marcelo
  last_name: Götz
- first_name: Achim
  full_name: Rettberg, Achim
  last_name: Rettberg
- first_name: Mauro C.
  full_name: Zanella, Mauro C.
  last_name: Zanella
- first_name: Franz-Josef
  full_name: Rammig, Franz-Josef
  last_name: Rammig
language:
- iso: eng
publisher: Springer
series_title: 'Band IFIP AICT 403 '
status: public
title: 'Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th
  IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany,
  June 2013'
type: book_editor
user_id: '21240'
year: '2013'
...
---
_id: '25742'
author:
- first_name: Lial
  full_name: Khaluf, Lial
  last_name: Khaluf
- first_name: Franz-Josef
  full_name: Rammig, Franz-Josef
  last_name: Rammig
citation:
  ama: 'Khaluf L, Rammig F-J. Organic Programming of Real-Time Operating Systems.
    In: <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>.
    ; 2013.'
  apa: Khaluf, L., &#38; Rammig, F.-J. (2013). Organic Programming of Real-Time Operating
    Systems. <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>.
  bibtex: '@inproceedings{Khaluf_Rammig_2013, title={Organic Programming of Real-Time
    Operating Systems}, booktitle={The Ninth International Conference on Autonomic
    and Autonomous Systems}, author={Khaluf, Lial and Rammig, Franz-Josef}, year={2013}
    }'
  chicago: Khaluf, Lial, and Franz-Josef Rammig. “Organic Programming of Real-Time
    Operating Systems.” In <i>The Ninth International Conference on Autonomic and
    Autonomous Systems</i>, 2013.
  ieee: L. Khaluf and F.-J. Rammig, “Organic Programming of Real-Time Operating Systems,”
    2013.
  mla: Khaluf, Lial, and Franz-Josef Rammig. “Organic Programming of Real-Time Operating
    Systems.” <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>,
    2013.
  short: 'L. Khaluf, F.-J. Rammig, in: The Ninth International Conference on Autonomic
    and Autonomous Systems, 2013.'
date_created: 2021-10-07T09:56:53Z
date_updated: 2022-01-06T06:57:12Z
department:
- _id: '672'
language:
- iso: eng
publication: The Ninth International Conference on Autonomic and Autonomous Systems
status: public
title: Organic Programming of Real-Time Operating Systems
type: conference
user_id: '21240'
year: '2013'
...
---
_id: '25743'
author:
- first_name: Harald
  full_name: Anacker, Harald
  last_name: Anacker
- first_name: Michael
  full_name: Dellnitz, Michael
  last_name: Dellnitz
- first_name: Kathrin
  full_name: Flaßkamp, Kathrin
  last_name: Flaßkamp
- first_name: Stefan
  full_name: Grösbrink, Stefan
  last_name: Grösbrink
- first_name: Philip
  full_name: Hartmann, Philip
  last_name: Hartmann
- first_name: Christian
  full_name: Heinzemann, Christian
  last_name: Heinzemann
- first_name: Christian
  full_name: Horenkamp, Christian
  last_name: Horenkamp
- first_name: Lisa
  full_name: Kleinjohann, Lisa
  id: '15588'
  last_name: Kleinjohann
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
- first_name: Sebastian
  full_name: Korf, Sebastian
  last_name: Korf
- first_name: Martin
  full_name: Krüger, Martin
  last_name: Krüger
- first_name: Wolfgang
  full_name: Müller, Wolfgang
  id: '16243'
  last_name: Müller
- first_name: Sina
  full_name: Ober-Blöbaum, Sina
  id: '16494'
  last_name: Ober-Blöbaum
- first_name: Simon
  full_name: Oberthür, Simon
  id: '383'
  last_name: Oberthür
- first_name: Mario
  full_name: Porrmann, Mario
  last_name: Porrmann
- first_name: Claudia
  full_name: Priesterjahn, Claudia
  last_name: Priesterjahn
- first_name: W.
  full_name: Radkowski, W.
  last_name: Radkowski
- first_name: Christoph
  full_name: Rasche, Christoph
  last_name: Rasche
- first_name: Jan
  full_name: Rieke, Jan
  last_name: Rieke
- first_name: Maik
  full_name: Ringkamp, Maik
  last_name: Ringkamp
- first_name: Katharina
  full_name: Stahl, Katharina
  last_name: Stahl
- first_name: Dominik
  full_name: Steenken, Dominik
  last_name: Steenken
- first_name: Jörg
  full_name: Stöcklein, Jörg
  last_name: Stöcklein
- first_name: Robert
  full_name: Timmermann, Robert
  last_name: Timmermann
- first_name: Ansgar
  full_name: Trächtler, Ansgar
  id: '552'
  last_name: Trächtler
- first_name: Katrin
  full_name: Witting, Katrin
  last_name: Witting
- first_name: Tao
  full_name: Xie, Tao
  last_name: Xie
- first_name: Steffen
  full_name: Ziegert, Steffen
  last_name: Ziegert
citation:
  ama: 'Anacker H, Dellnitz M, Flaßkamp K, et al. Methods for the Design and Development.
    In: <i>Design Methodology for Intelligent Technical Systems Systems – Develop
    Intelligent Technical Systems of the Future</i>. Springer-Verlag; 2013:187-356.'
  apa: Anacker, H., Dellnitz, M., Flaßkamp, K., Grösbrink, S., Hartmann, P., Heinzemann,
    C., Horenkamp, C., Kleinjohann, L., Kleinjohann, B., Korf, S., Krüger, M., Müller,
    W., Ober-Blöbaum, S., Oberthür, S., Porrmann, M., Priesterjahn, C., Radkowski,
    W., Rasche, C., Rieke, J., … Ziegert, S. (2013). Methods for the Design and Development.
    In <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent
    Technical Systems of the Future</i> (pp. 187–356). Springer-Verlag.
  bibtex: '@inbook{Anacker_Dellnitz_Flaßkamp_Grösbrink_Hartmann_Heinzemann_Horenkamp_Kleinjohann_Kleinjohann_Korf_et
    al._2013, place={Heidelberg}, title={Methods for the Design and Development},
    booktitle={Design Methodology for Intelligent Technical Systems Systems – Develop
    Intelligent Technical Systems of the Future}, publisher={Springer-Verlag}, author={Anacker,
    Harald and Dellnitz, Michael and Flaßkamp, Kathrin and Grösbrink, Stefan and Hartmann,
    Philip and Heinzemann, Christian and Horenkamp, Christian and Kleinjohann, Lisa
    and Kleinjohann, Bernd and Korf, Sebastian and et al.}, year={2013}, pages={187–356}
    }'
  chicago: 'Anacker, Harald, Michael Dellnitz, Kathrin Flaßkamp, Stefan Grösbrink,
    Philip Hartmann, Christian Heinzemann, Christian Horenkamp, et al. “Methods for
    the Design and Development.” In <i>Design Methodology for Intelligent Technical
    Systems Systems – Develop Intelligent Technical Systems of the Future</i>, 187–356.
    Heidelberg: Springer-Verlag, 2013.'
  ieee: 'H. Anacker <i>et al.</i>, “Methods for the Design and Development,” in <i>Design
    Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical
    Systems of the Future</i>, Heidelberg: Springer-Verlag, 2013, pp. 187–356.'
  mla: Anacker, Harald, et al. “Methods for the Design and Development.” <i>Design
    Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical
    Systems of the Future</i>, Springer-Verlag, 2013, pp. 187–356.
  short: 'H. Anacker, M. Dellnitz, K. Flaßkamp, S. Grösbrink, P. Hartmann, C. Heinzemann,
    C. Horenkamp, L. Kleinjohann, B. Kleinjohann, S. Korf, M. Krüger, W. Müller, S.
    Ober-Blöbaum, S. Oberthür, M. Porrmann, C. Priesterjahn, W. Radkowski, C. Rasche,
    J. Rieke, M. Ringkamp, K. Stahl, D. Steenken, J. Stöcklein, R. Timmermann, A.
    Trächtler, K. Witting, T. Xie, S. Ziegert, in: Design Methodology for Intelligent
    Technical Systems Systems – Develop Intelligent Technical Systems of the Future,
    Springer-Verlag, Heidelberg, 2013, pp. 187–356.'
date_created: 2021-10-07T10:07:43Z
date_updated: 2022-01-06T06:57:12Z
department:
- _id: '672'
language:
- iso: eng
page: 187-356
place: Heidelberg
publication: Design Methodology for Intelligent Technical Systems Systems – Develop
  Intelligent Technical Systems of the Future
publisher: Springer-Verlag
status: public
title: Methods for the Design and Development
type: book_chapter
user_id: '21240'
year: '2013'
...
---
_id: '3813'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
citation:
  ama: 'Wachsmuth H, Stein B, Engels G. Learning Efficient Information Extraction
    on Heterogeneous Texts. In: Gelbukh A, ed. <i>Proceedings of the Sixth International
    Joint Conference on Natural Language Processing</i>. Lecture Notes in Computer
    Science. ; 2013:534-542.'
  apa: Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Learning Efficient Information
    Extraction on Heterogeneous Texts. In A. Gelbukh (Ed.), <i>Proceedings of the
    Sixth International Joint Conference on Natural Language Processing</i> (pp. 534–542).
  bibtex: '@inproceedings{Wachsmuth_Stein_Engels_2013, series={Lecture Notes in Computer
    Science}, title={Learning Efficient Information Extraction on Heterogeneous Texts},
    booktitle={Proceedings of the Sixth International Joint Conference on Natural
    Language Processing}, author={Wachsmuth, Henning and Stein, Benno and Engels,
    Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={534–542}, collection={Lecture
    Notes in Computer Science} }'
  chicago: Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Learning Efficient
    Information Extraction on Heterogeneous Texts.” In <i>Proceedings of the Sixth
    International Joint Conference on Natural Language Processing</i>, edited by Alexander
    Gelbukh, 534–42. Lecture Notes in Computer Science, 2013.
  ieee: H. Wachsmuth, B. Stein, and G. Engels, “Learning Efficient Information Extraction
    on Heterogeneous Texts,” in <i>Proceedings of the Sixth International Joint Conference
    on Natural Language Processing</i>, 2013, pp. 534–542.
  mla: Wachsmuth, Henning, et al. “Learning Efficient Information Extraction on Heterogeneous
    Texts.” <i>Proceedings of the Sixth International Joint Conference on Natural
    Language Processing</i>, edited by Alexander Gelbukh, 2013, pp. 534–42.
  short: 'H. Wachsmuth, B. Stein, G. Engels, in: A. Gelbukh (Ed.), Proceedings of
    the Sixth International Joint Conference on Natural Language Processing, 2013,
    pp. 534–542.'
date_created: 2018-08-02T13:38:39Z
date_updated: 2022-01-06T06:59:37Z
department:
- _id: '600'
editor:
- first_name: Alexander
  full_name: Gelbukh, Alexander
  last_name: Gelbukh
language:
- iso: eng
main_file_link:
- url: https://www.aclweb.org/anthology/I13-1061.pdf
page: 534-542
publication: Proceedings of the Sixth International Joint Conference on Natural Language
  Processing
series_title: Lecture Notes in Computer Science
status: public
title: Learning Efficient Information Extraction on Heterogeneous Texts
type: conference
user_id: '82920'
year: '2013'
...
---
_id: '3814'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
citation:
  ama: 'Wachsmuth H, Stein B, Engels G. Information Extraction as a Filtering Task.
    In: <i>Proceedings of the 22nd ACM International Conference on Conference on Information
    &#38; Knowledge Management</i>. ; 2013:2049-2058.'
  apa: Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Information Extraction as
    a Filtering Task. In <i>Proceedings of the 22nd ACM International Conference on
    Conference on Information &#38; Knowledge Management</i> (pp. 2049–2058).
  bibtex: '@inproceedings{Wachsmuth_Stein_Engels_2013, title={Information Extraction
    as a Filtering Task}, booktitle={Proceedings of the 22nd ACM International Conference
    on Conference on Information &#38; Knowledge Management}, author={Wachsmuth, Henning
    and Stein, Benno and Engels, Gregor}, year={2013}, pages={2049–2058} }'
  chicago: Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Information Extraction
    as a Filtering Task.” In <i>Proceedings of the 22nd ACM International Conference
    on Conference on Information &#38; Knowledge Management</i>, 2049–58, 2013.
  ieee: H. Wachsmuth, B. Stein, and G. Engels, “Information Extraction as a Filtering
    Task,” in <i>Proceedings of the 22nd ACM International Conference on Conference
    on Information &#38; Knowledge Management</i>, 2013, pp. 2049–2058.
  mla: Wachsmuth, Henning, et al. “Information Extraction as a Filtering Task.” <i>Proceedings
    of the 22nd ACM International Conference on Conference on Information &#38; Knowledge
    Management</i>, 2013, pp. 2049–58.
  short: 'H. Wachsmuth, B. Stein, G. Engels, in: Proceedings of the 22nd ACM International
    Conference on Conference on Information &#38; Knowledge Management, 2013, pp.
    2049–2058.'
date_created: 2018-08-02T13:38:40Z
date_updated: 2022-01-06T06:59:37Z
department:
- _id: '600'
language:
- iso: eng
main_file_link:
- url: https://dl.acm.org/doi/pdf/10.1145/2505515.2505557
page: 2049-2058
publication: Proceedings of the 22nd ACM International Conference on Conference on
  Information & Knowledge Management
publication_identifier:
  isbn:
  - 978-1-4503-2263-8
status: public
title: Information Extraction as a Filtering Task
type: conference
user_id: '82920'
year: '2013'
...
---
_id: '3876'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Mirko
  full_name: Rose, Mirko
  last_name: Rose
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
citation:
  ama: 'Wachsmuth H, Rose M, Engels G. Automatic Pipeline Construction for Real-Time
    Annotation. In: Gelbukh A, ed. <i>14th International Conference on Intelligent
    Text Processing and Computational Linguistics</i>. Lecture Notes in Computer Science.
    ; 2013:38-49.'
  apa: Wachsmuth, H., Rose, M., &#38; Engels, G. (2013). Automatic Pipeline Construction
    for Real-Time Annotation. In A. Gelbukh (Ed.), <i>14th International Conference
    on Intelligent Text Processing and Computational Linguistics</i> (pp. 38–49).
  bibtex: '@inproceedings{Wachsmuth_Rose_Engels_2013, series={Lecture Notes in Computer
    Science}, title={Automatic Pipeline Construction for Real-Time Annotation}, booktitle={14th
    International Conference on Intelligent Text Processing and Computational Linguistics},
    author={Wachsmuth, Henning and Rose, Mirko and Engels, Gregor}, editor={Gelbukh,
    AlexanderEditor}, year={2013}, pages={38–49}, collection={Lecture Notes in Computer
    Science} }'
  chicago: Wachsmuth, Henning, Mirko Rose, and Gregor Engels. “Automatic Pipeline
    Construction for Real-Time Annotation.” In <i>14th International Conference on
    Intelligent Text Processing and Computational Linguistics</i>, edited by Alexander
    Gelbukh, 38–49. Lecture Notes in Computer Science, 2013.
  ieee: H. Wachsmuth, M. Rose, and G. Engels, “Automatic Pipeline Construction for
    Real-Time Annotation,” in <i>14th International Conference on Intelligent Text
    Processing and Computational Linguistics</i>, 2013, pp. 38–49.
  mla: Wachsmuth, Henning, et al. “Automatic Pipeline Construction for Real-Time Annotation.”
    <i>14th International Conference on Intelligent Text Processing and Computational
    Linguistics</i>, edited by Alexander Gelbukh, 2013, pp. 38–49.
  short: 'H. Wachsmuth, M. Rose, G. Engels, in: A. Gelbukh (Ed.), 14th International
    Conference on Intelligent Text Processing and Computational Linguistics, 2013,
    pp. 38–49.'
date_created: 2018-08-11T16:12:29Z
date_updated: 2022-01-06T06:59:47Z
department:
- _id: '600'
editor:
- first_name: Alexander
  full_name: Gelbukh, Alexander
  last_name: Gelbukh
language:
- iso: eng
main_file_link:
- url: https://webis.de/downloads/publications/papers/wachsmuth_2013.pdf
page: 38-49
publication: 14th International Conference on Intelligent Text Processing and Computational
  Linguistics
series_title: Lecture Notes in Computer Science
status: public
title: Automatic Pipeline Construction for Real-Time Annotation
type: conference
user_id: '82920'
year: '2013'
...
---
_id: '2909'
author:
- first_name: Daniel
  full_name: Kuntze, Daniel
  last_name: Kuntze
citation:
  ama: Kuntze D. <i>Practical Algorithms for Clustering and Modeling Large Data Sets
    - Analysis and Improvements</i>. Universität Paderborn; 2013.
  apa: Kuntze, D. (2013). <i>Practical algorithms for clustering and modeling large
    data sets - Analysis and improvements</i>. Universität Paderborn.
  bibtex: '@book{Kuntze_2013, title={Practical algorithms for clustering and modeling
    large data sets - Analysis and improvements}, publisher={Universität Paderborn},
    author={Kuntze, Daniel}, year={2013} }'
  chicago: Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large
    Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.
  ieee: D. Kuntze, <i>Practical algorithms for clustering and modeling large data
    sets - Analysis and improvements</i>. Universität Paderborn, 2013.
  mla: Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data
    Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.
  short: D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets
    - Analysis and Improvements, Universität Paderborn, 2013.
date_created: 2018-05-25T10:07:42Z
date_updated: 2022-01-06T06:58:46Z
department:
- _id: '64'
main_file_link:
- url: http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12721
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Practical algorithms for clustering and modeling large data sets - Analysis
  and improvements
type: dissertation
user_id: '25078'
year: '2013'
...
---
_id: '2917'
author:
- first_name: Jakob
  full_name: Juhnke, Jakob
  id: '48090'
  last_name: Juhnke
- first_name: Hanno
  full_name: Lefmann, Hanno
  last_name: Lefmann
- first_name: Volker
  full_name: Strehl, Volker
  last_name: Strehl
citation:
  ama: Juhnke J, Lefmann H, Strehl V. <i>An Approach for Determining Optimal Contrast
    in Visual Cryptography</i>. Fortschritt-Berichte VDI; 2013.
  apa: Juhnke, J., Lefmann, H., &#38; Strehl, V. (2013). <i>An Approach for Determining
    Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI.
  bibtex: '@book{Juhnke_Lefmann_Strehl_2013, title={An Approach for Determining Optimal
    Contrast in Visual Cryptography}, publisher={Fortschritt-Berichte VDI}, author={Juhnke,
    Jakob and Lefmann, Hanno and Strehl, Volker}, year={2013} }'
  chicago: Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. <i>An Approach for Determining
    Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  ieee: J. Juhnke, H. Lefmann, and V. Strehl, <i>An Approach for Determining Optimal
    Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  mla: Juhnke, Jakob, et al. <i>An Approach for Determining Optimal Contrast in Visual
    Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  short: J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast
    in Visual Cryptography, Fortschritt-Berichte VDI, 2013.
date_created: 2018-05-25T11:42:38Z
date_updated: 2022-01-06T06:58:47Z
department:
- _id: '64'
extern: '1'
publisher: Fortschritt-Berichte VDI
status: public
title: An Approach for Determining Optimal Contrast in Visual Cryptography
type: report
user_id: '48090'
year: '2013'
...
---
_id: '2979'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: 'Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based
    Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>.
    Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>'
  apa: 'Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks
    on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure
    Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-642-40026-1_10">https://doi.org/10.1007/978-3-642-40026-1_10</a>'
  bibtex: '@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved
    Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>},
    booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer
    Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij},
    year={2013}, pages={154–168} }'
  chicago: 'Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel
    Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis
    and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg,
    2013. <a href="https://doi.org/10.1007/978-3-642-40026-1_10">https://doi.org/10.1007/978-3-642-40026-1_10</a>.'
  ieee: 'J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing
    Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>,
    Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.'
  mla: Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.”
    <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg,
    2013, pp. 154–68, doi:<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>.
  short: 'J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis
    and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.'
date_created: 2018-06-05T07:33:22Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-642-40026-1_10
page: 154-168
place: Berlin, Heidelberg
publication: Constructive Side-Channel Analysis and Secure Design
publication_identifier:
  isbn:
  - '9783642400254'
  - '9783642400261'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Improved Side Channel Attacks on Pairing Based Cryptography
type: book_chapter
user_id: '25078'
year: '2013'
...
---
_id: '3129'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic
    Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>
  apa: Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href="https://doi.org/10.1007/s00145-012-9120-y">https://doi.org/10.1007/s00145-012-9120-y</a>
  bibtex: '@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model}, DOI={<a href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>},
    number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg},
    year={2013}, pages={225--245} }'
  chicago: 'Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href="https://doi.org/10.1007/s00145-012-9120-y">https://doi.org/10.1007/s00145-012-9120-y</a>.'
  ieee: T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in
    the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.
  mla: Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a
    href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>.
  short: T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.
date_created: 2018-06-07T09:22:18Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/s00145-012-9120-y
extern: '1'
issue: '2'
page: 225--245
publication: J. Cryptology
status: public
title: On the Analysis of Cryptographic Assumptions in the Generic Ring Model
type: journal_article
user_id: '38235'
year: '2013'
...
---
_id: '3130'
author:
- first_name: Florian
  full_name: Böhl, Florian
  last_name: Böhl
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jessica
  full_name: Koch, Jessica
  last_name: Koch
- first_name: Jae
  full_name: Hong Seo, Jae
  last_name: Hong Seo
- first_name: Christoph
  full_name: Striecks, Christoph
  last_name: Striecks
citation:
  ama: 'Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures
    from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd
    Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485.
    doi:<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>'
  apa: Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks,
    C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology
    - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications
    of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>
    (pp. 461--485). <a href="https://doi.org/10.1007/978-3-642-38348-9_28">https://doi.org/10.1007/978-3-642-38348-9_28</a>
  bibtex: '@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical
    Signatures from Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Athens,
    Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis
    and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph},
    year={2013}, pages={461--485} }'
  chicago: Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo,
    and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings</i>, 461--485, 2013. <a href="https://doi.org/10.1007/978-3-642-38348-9_28">https://doi.org/10.1007/978-3-642-38348-9_28</a>.
  ieee: F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical
    Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT
    2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.
  mla: Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings</i>, 2013, pp. 461--485, doi:<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>.
  short: 'F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings, 2013, pp. 461--485.'
date_created: 2018-06-07T09:22:39Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-38348-9_28
extern: '1'
page: 461--485
publication: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May
  26-30, 2013. Proceedings
status: public
title: Practical Signatures from Standard Assumptions
type: conference
user_id: '38235'
year: '2013'
...
---
_id: '3131'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Kenneth G.
  full_name: Paterson, Kenneth G.
  last_name: Paterson
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility
    Attacks on State-of-the-Art Cryptography. In: <i>20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013</i>. ; 2013.'
  apa: 'Jager, T., Paterson, K. G., &#38; Somorovsky, J. (2013). One Bad Apple: Backwards
    Compatibility Attacks on State-of-the-Art Cryptography. In <i>20th Annual Network
    and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA,
    February 24-27, 2013</i>.'
  bibtex: '@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards
    Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual
    Network and Distributed System Security Symposium, NDSS 2013, San Diego, California,
    USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and
    Somorovsky, Juraj}, year={2013} }'
  chicago: 'Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple:
    Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In <i>20th
    Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego,
    California, USA, February 24-27, 2013</i>, 2013.'
  ieee: 'T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility
    Attacks on State-of-the-Art Cryptography,” in <i>20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013</i>, 2013.'
  mla: 'Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art
    Cryptography.” <i>20th Annual Network and Distributed System Security Symposium,
    NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.'
  short: 'T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013, 2013.'
date_created: 2018-06-07T09:23:49Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
extern: '1'
publication: 20th Annual Network and Distributed System Security Symposium, NDSS 2013,
  San Diego, California, USA, February 24-27, 2013
status: public
title: 'One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography'
type: conference
user_id: '38235'
year: '2013'
...
---
_id: '3176'
author:
- first_name: Tobias
  full_name: Isenberg, Tobias
  last_name: Isenberg
- first_name: Dominik
  full_name: Steenken, Dominik
  last_name: Steenken
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation
    Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. <i>Formal Techniques for
    Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE}
    2013, Held as Part of the 8th International Federated Conference on Distributed
    Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>.
    Lecture Notes in Computer Science. ; 2013:178--192. doi:<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>'
  apa: Isenberg, T., Steenken, D., &#38; Wehrheim, H. (2013). Bounded Model Checking
    of Graph Transformation Systems via {SMT} Solving. In D. Beyer &#38; M. Boreale
    (Eds.), <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings</i> (pp. 178--192). <a href="https://doi.org/10.1007/978-3-642-38592-6_13">https://doi.org/10.1007/978-3-642-38592-6_13</a>
  bibtex: '@inproceedings{Isenberg_Steenken_Wehrheim_2013, series={Lecture Notes in
    Computer Science}, title={Bounded Model Checking of Graph Transformation Systems
    via {SMT} Solving}, DOI={<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>},
    booktitle={Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings}, author={Isenberg, Tobias and Steenken, Dominik and
    Wehrheim, Heike}, editor={Beyer, Dirk and Boreale, MicheleEditors}, year={2013},
    pages={178--192}, collection={Lecture Notes in Computer Science} }'
  chicago: Isenberg, Tobias, Dominik Steenken, and Heike Wehrheim. “Bounded Model
    Checking of Graph Transformation Systems via {SMT} Solving.” In <i>Formal Techniques
    for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE}
    2013, Held as Part of the 8th International Federated Conference on Distributed
    Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>,
    edited by Dirk Beyer and Michele Boreale, 178--192. Lecture Notes in Computer
    Science, 2013. <a href="https://doi.org/10.1007/978-3-642-38592-6_13">https://doi.org/10.1007/978-3-642-38592-6_13</a>.
  ieee: T. Isenberg, D. Steenken, and H. Wehrheim, “Bounded Model Checking of Graph
    Transformation Systems via {SMT} Solving,” in <i>Formal Techniques for Distributed
    Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013,
    Held as Part of the 8th International Federated Conference on Distributed Computing
    Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, 2013,
    pp. 178--192.
  mla: Isenberg, Tobias, et al. “Bounded Model Checking of Graph Transformation Systems
    via {SMT} Solving.” <i>Formal Techniques for Distributed Systems - Joint {IFIP}
    {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th
    International Federated Conference on Distributed Computing Techniques, DisCoTec
    2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and
    Michele Boreale, 2013, pp. 178--192, doi:<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>.
  short: 'T. Isenberg, D. Steenken, H. Wehrheim, in: D. Beyer, M. Boreale (Eds.),
    Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings, 2013, pp. 178--192.'
date_created: 2018-06-13T08:08:39Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-642-38592-6_13
editor:
- first_name: Dirk
  full_name: Beyer, Dirk
  last_name: Beyer
- first_name: Michele
  full_name: Boreale, Michele
  last_name: Boreale
page: 178--192
publication: Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
  Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
  Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
  June 3-5, 2013. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Bounded Model Checking of Graph Transformation Systems via {SMT} Solving
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3177'
author:
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: Annika
  full_name: Mütze, Annika
  last_name: Mütze
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under
    Weak Memory Models. In: Bertacco V, Legay A, eds. <i>Hardware and Software: Verification
    and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa,
    Israel, November 5-7, 2013, Proceedings</i>. Lecture Notes in Computer Science.
    ; 2013:311--326. doi:<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>'
  apa: 'Travkin, O., Mütze, A., &#38; Wehrheim, H. (2013). {SPIN} as a Linearizability
    Checker under Weak Memory Models. In V. Bertacco &#38; A. Legay (Eds.), <i>Hardware
    and Software: Verification and Testing - 9th International Haifa Verification
    Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i> (pp.
    311--326). <a href="https://doi.org/10.1007/978-3-319-03077-7_21">https://doi.org/10.1007/978-3-319-03077-7_21</a>'
  bibtex: '@inproceedings{Travkin_Mütze_Wehrheim_2013, series={Lecture Notes in Computer
    Science}, title={{SPIN} as a Linearizability Checker under Weak Memory Models},
    DOI={<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>},
    booktitle={Hardware and Software: Verification and Testing - 9th International
    Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013,
    Proceedings}, author={Travkin, Oleg and Mütze, Annika and Wehrheim, Heike}, editor={Bertacco,
    Valeria and Legay, AxelEditors}, year={2013}, pages={311--326}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Travkin, Oleg, Annika Mütze, and Heike Wehrheim. “{SPIN} as a Linearizability
    Checker under Weak Memory Models.” In <i>Hardware and Software: Verification and
    Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa,
    Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel
    Legay, 311--326. Lecture Notes in Computer Science, 2013. <a href="https://doi.org/10.1007/978-3-319-03077-7_21">https://doi.org/10.1007/978-3-319-03077-7_21</a>.'
  ieee: 'O. Travkin, A. Mütze, and H. Wehrheim, “{SPIN} as a Linearizability Checker
    under Weak Memory Models,” in <i>Hardware and Software: Verification and Testing
    - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel,
    November 5-7, 2013, Proceedings</i>, 2013, pp. 311--326.'
  mla: 'Travkin, Oleg, et al. “{SPIN} as a Linearizability Checker under Weak Memory
    Models.” <i>Hardware and Software: Verification and Testing - 9th International
    Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013,
    Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 2013, pp. 311--326,
    doi:<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>.'
  short: 'O. Travkin, A. Mütze, H. Wehrheim, in: V. Bertacco, A. Legay (Eds.), Hardware
    and Software: Verification and Testing - 9th International Haifa Verification
    Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013,
    pp. 311--326.'
date_created: 2018-06-13T08:09:44Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-319-03077-7_21
editor:
- first_name: Valeria
  full_name: Bertacco, Valeria
  last_name: Bertacco
- first_name: Axel
  full_name: Legay, Axel
  last_name: Legay
page: 311--326
publication: 'Hardware and Software: Verification and Testing - 9th International
  Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: '{SPIN} as a Linearizability Checker under Weak Memory Models'
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3178'
author:
- first_name: Brijesh
  full_name: Dongol, Brijesh
  last_name: Dongol
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Dongol B, Travkin O, Derrick J, Wehrheim H. A High-Level Semantics for Program
    Execution under Total Store Order Memory. In: Liu Z, Woodcock J, Zhu H, eds. <i>Theoretical
    Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai,
    China, September 4-6, 2013. Proceedings</i>. Lecture Notes in Computer Science.
    ; 2013:177--194. doi:<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>'
  apa: Dongol, B., Travkin, O., Derrick, J., &#38; Wehrheim, H. (2013). A High-Level
    Semantics for Program Execution under Total Store Order Memory. In Z. Liu, J.
    Woodcock, &#38; H. Zhu (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2013
    - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>
    (pp. 177--194). <a href="https://doi.org/10.1007/978-3-642-39718-9_11">https://doi.org/10.1007/978-3-642-39718-9_11</a>
  bibtex: '@inproceedings{Dongol_Travkin_Derrick_Wehrheim_2013, series={Lecture Notes
    in Computer Science}, title={A High-Level Semantics for Program Execution under
    Total Store Order Memory}, DOI={<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>},
    booktitle={Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
    Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, author={Dongol,
    Brijesh and Travkin, Oleg and Derrick, John and Wehrheim, Heike}, editor={Liu,
    Zhiming and Woodcock, Jim and Zhu, HuibiaoEditors}, year={2013}, pages={177--194},
    collection={Lecture Notes in Computer Science} }'
  chicago: Dongol, Brijesh, Oleg Travkin, John Derrick, and Heike Wehrheim. “A High-Level
    Semantics for Program Execution under Total Store Order Memory.” In <i>Theoretical
    Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai,
    China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu, Jim Woodcock,
    and Huibiao Zhu, 177--194. Lecture Notes in Computer Science, 2013. <a href="https://doi.org/10.1007/978-3-642-39718-9_11">https://doi.org/10.1007/978-3-642-39718-9_11</a>.
  ieee: B. Dongol, O. Travkin, J. Derrick, and H. Wehrheim, “A High-Level Semantics
    for Program Execution under Total Store Order Memory,” in <i>Theoretical Aspects
    of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China,
    September 4-6, 2013. Proceedings</i>, 2013, pp. 177--194.
  mla: Dongol, Brijesh, et al. “A High-Level Semantics for Program Execution under
    Total Store Order Memory.” <i>Theoretical Aspects of Computing - {ICTAC} 2013
    - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>,
    edited by Zhiming Liu et al., 2013, pp. 177--194, doi:<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>.
  short: 'B. Dongol, O. Travkin, J. Derrick, H. Wehrheim, in: Z. Liu, J. Woodcock,
    H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
    Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194.'
date_created: 2018-06-13T08:13:31Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-642-39718-9_11
editor:
- first_name: Zhiming
  full_name: Liu, Zhiming
  last_name: Liu
- first_name: Jim
  full_name: Woodcock, Jim
  last_name: Woodcock
- first_name: Huibiao
  full_name: Zhu, Huibiao
  last_name: Zhu
page: 177--194
publication: Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
  Colloquium, Shanghai, China, September 4-6, 2013. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: A High-Level Semantics for Program Execution under Total Store Order Memory
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3179'
author:
- first_name: Steffen
  full_name: Ziegert, Steffen
  last_name: Ziegert
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Ziegert S, Wehrheim H. Temporal Reconfiguration Plans for Self-Adaptive Systems.
    In: Kowalewski S, Rumpe B, eds. <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>. {LNI}. ; 2013:271--284.'
  apa: 'Ziegert, S., &#38; Wehrheim, H. (2013). Temporal Reconfiguration Plans for
    Self-Adaptive Systems. In S. Kowalewski &#38; B. Rumpe (Eds.), <i>Software Engineering
    2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz
    2013 in Aachen</i> (pp. 271--284).'
  bibtex: '@inproceedings{Ziegert_Wehrheim_2013, series={{LNI}}, title={Temporal Reconfiguration
    Plans for Self-Adaptive Systems}, booktitle={Software Engineering 2013: Fachtagung
    des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen},
    author={Ziegert, Steffen and Wehrheim, Heike}, editor={Kowalewski, Stefan and
    Rumpe, BernhardEditors}, year={2013}, pages={271--284}, collection={{LNI}} }'
  chicago: 'Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans
    for Self-Adaptive Systems.” In <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, edited by Stefan
    Kowalewski and Bernhard Rumpe, 271--284. {LNI}, 2013.'
  ieee: 'S. Ziegert and H. Wehrheim, “Temporal Reconfiguration Plans for Self-Adaptive
    Systems,” in <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik,
    26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, 2013, pp. 271--284.'
  mla: 'Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for
    Self-Adaptive Systems.” <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, edited by Stefan
    Kowalewski and Bernhard Rumpe, 2013, pp. 271--284.'
  short: 'S. Ziegert, H. Wehrheim, in: S. Kowalewski, B. Rumpe (Eds.), Software Engineering
    2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz
    2013 in Aachen, 2013, pp. 271--284.'
date_created: 2018-06-13T08:15:08Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
editor:
- first_name: Stefan
  full_name: Kowalewski, Stefan
  last_name: Kowalewski
- first_name: Bernhard
  full_name: Rumpe, Bernhard
  last_name: Rumpe
page: 271--284
publication: 'Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik,
  26. Februar - 2. M{\"{a}}rz 2013 in Aachen'
series_title: '{LNI}'
status: public
title: Temporal Reconfiguration Plans for Self-Adaptive Systems
type: conference
user_id: '29719'
year: '2013'
...
