[{"status":"public","publication":"The R Journal","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"819"}],"user_id":"102979","_id":"48865","intvolume":"         9","page":"103–113","citation":{"apa":"Bossek, J. (2017). Smoof: Single- and Multi-Objective Optimization Test Functions. <i>The R Journal</i>, <i>9</i>(1), 103–113.","mla":"Bossek, Jakob. “Smoof: Single- and Multi-Objective Optimization Test Functions.” <i>The R Journal</i>, vol. 9, no. 1, 2017, pp. 103–113.","short":"J. Bossek, The R Journal 9 (2017) 103–113.","bibtex":"@article{Bossek_2017, title={Smoof: Single- and Multi-Objective Optimization Test Functions}, volume={9}, number={1}, journal={The R Journal}, author={Bossek, Jakob}, year={2017}, pages={103–113} }","ieee":"J. Bossek, “Smoof: Single- and Multi-Objective Optimization Test Functions,” <i>The R Journal</i>, vol. 9, no. 1, pp. 103–113, 2017.","chicago":"Bossek, Jakob. “Smoof: Single- and Multi-Objective Optimization Test Functions.” <i>The R Journal</i> 9, no. 1 (2017): 103–113.","ama":"Bossek J. Smoof: Single- and Multi-Objective Optimization Test Functions. <i>The R Journal</i>. 2017;9(1):103–113."},"year":"2017","issue":"1","publication_identifier":{"issn":["2073-4859"]},"title":"Smoof: Single- and Multi-Objective Optimization Test Functions","volume":9,"date_created":"2023-11-14T15:58:56Z","author":[{"first_name":"Jakob","full_name":"Bossek, Jakob","id":"102979","orcid":"0000-0002-4121-4668","last_name":"Bossek"}],"date_updated":"2023-12-13T10:51:57Z"},{"status":"public","publication":"CoRR","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"819"}],"user_id":"102979","_id":"48837","citation":{"ieee":"B. Bischl, J. Richter, J. Bossek, D. Horn, J. Thomas, and M. Lang, “mlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions,” <i>CoRR</i>, 2017.","chicago":"Bischl, Bernd, Jakob Richter, Jakob Bossek, Daniel Horn, Janek Thomas, and Michel Lang. “MlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions.” <i>CoRR</i>, 2017.","ama":"Bischl B, Richter J, Bossek J, Horn D, Thomas J, Lang M. mlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions. <i>CoRR</i>. Published online 2017.","mla":"Bischl, Bernd, et al. “MlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions.” <i>CoRR</i>, 2017.","short":"B. Bischl, J. Richter, J. Bossek, D. Horn, J. Thomas, M. Lang, CoRR (2017).","bibtex":"@article{Bischl_Richter_Bossek_Horn_Thomas_Lang_2017, title={mlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions}, journal={CoRR}, author={Bischl, Bernd and Richter, Jakob and Bossek, Jakob and Horn, Daniel and Thomas, Janek and Lang, Michel}, year={2017} }","apa":"Bischl, B., Richter, J., Bossek, J., Horn, D., Thomas, J., &#38; Lang, M. (2017). mlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions. <i>CoRR</i>."},"year":"2017","title":"mlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions","author":[{"first_name":"Bernd","last_name":"Bischl","full_name":"Bischl, Bernd"},{"first_name":"Jakob","last_name":"Richter","full_name":"Richter, Jakob"},{"id":"102979","full_name":"Bossek, Jakob","orcid":"0000-0002-4121-4668","last_name":"Bossek","first_name":"Jakob"},{"first_name":"Daniel","last_name":"Horn","full_name":"Horn, Daniel"},{"first_name":"Janek","full_name":"Thomas, Janek","last_name":"Thomas"},{"full_name":"Lang, Michel","last_name":"Lang","first_name":"Michel"}],"date_created":"2023-11-14T15:58:51Z","date_updated":"2023-12-13T10:52:31Z"},{"department":[{"_id":"66"}],"user_id":"11871","_id":"6721","language":[{"iso":"eng"}],"publication":"WSDM","type":"conference","status":"public","author":[{"last_name":"Heindorf","orcid":"0000-0002-4525-6865","full_name":"Heindorf, Stefan","id":"11871","first_name":"Stefan"},{"last_name":"Potthast","full_name":"Potthast, Martin","first_name":"Martin"},{"last_name":"Bast","full_name":"Bast, Hannah","first_name":"Hannah"},{"last_name":"Buchhold","full_name":"Buchhold, Björn","first_name":"Björn"},{"last_name":"Haussmann","full_name":"Haussmann, Elmar","first_name":"Elmar"}],"date_created":"2019-01-15T08:54:23Z","date_updated":"2024-05-26T19:15:24Z","publisher":"ACM","oa":"1","doi":"10.1145/3018661.3022762","main_file_link":[{"open_access":"1","url":"https://cs.uni-paderborn.de/fileadmin/informatik/fg/dbis/Publikationen/2017/heindorf2017_WSDM.pdf"}],"title":"WSDM Cup 2017: Vandalism Detection and Triple Scoring","page":"827-828","citation":{"mla":"Heindorf, Stefan, et al. “WSDM Cup 2017: Vandalism Detection and Triple Scoring.” <i>WSDM</i>, ACM, 2017, pp. 827–28, doi:<a href=\"https://doi.org/10.1145/3018661.3022762\">10.1145/3018661.3022762</a>.","short":"S. Heindorf, M. Potthast, H. Bast, B. Buchhold, E. Haussmann, in: WSDM, ACM, 2017, pp. 827–828.","bibtex":"@inproceedings{Heindorf_Potthast_Bast_Buchhold_Haussmann_2017, title={WSDM Cup 2017: Vandalism Detection and Triple Scoring}, DOI={<a href=\"https://doi.org/10.1145/3018661.3022762\">10.1145/3018661.3022762</a>}, booktitle={WSDM}, publisher={ACM}, author={Heindorf, Stefan and Potthast, Martin and Bast, Hannah and Buchhold, Björn and Haussmann, Elmar}, year={2017}, pages={827–828} }","apa":"Heindorf, S., Potthast, M., Bast, H., Buchhold, B., &#38; Haussmann, E. (2017). WSDM Cup 2017: Vandalism Detection and Triple Scoring. <i>WSDM</i>, 827–828. <a href=\"https://doi.org/10.1145/3018661.3022762\">https://doi.org/10.1145/3018661.3022762</a>","ama":"Heindorf S, Potthast M, Bast H, Buchhold B, Haussmann E. WSDM Cup 2017: Vandalism Detection and Triple Scoring. In: <i>WSDM</i>. ACM; 2017:827-828. doi:<a href=\"https://doi.org/10.1145/3018661.3022762\">10.1145/3018661.3022762</a>","ieee":"S. Heindorf, M. Potthast, H. Bast, B. Buchhold, and E. Haussmann, “WSDM Cup 2017: Vandalism Detection and Triple Scoring,” in <i>WSDM</i>, 2017, pp. 827–828, doi: <a href=\"https://doi.org/10.1145/3018661.3022762\">10.1145/3018661.3022762</a>.","chicago":"Heindorf, Stefan, Martin Potthast, Hannah Bast, Björn Buchhold, and Elmar Haussmann. “WSDM Cup 2017: Vandalism Detection and Triple Scoring.” In <i>WSDM</i>, 827–28. ACM, 2017. <a href=\"https://doi.org/10.1145/3018661.3022762\">https://doi.org/10.1145/3018661.3022762</a>."},"year":"2017"},{"language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47249","status":"public","publication":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","doi":"10.1145/3133956.3134059","title":"Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android","author":[{"last_name":"Derr","full_name":"Derr, Erik","first_name":"Erik"},{"first_name":"Sven","last_name":"Bugiel","full_name":"Bugiel, Sven"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"last_name":"Backes","full_name":"Backes, Michael","first_name":"Michael"}],"date_created":"2023-09-22T12:50:32Z","publisher":"ACM","date_updated":"2024-06-05T13:09:19Z","citation":{"ama":"Derr E, Bugiel S, Fahl S, Acar Y, Backes M. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. In: <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>","chicago":"Derr, Erik, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes. “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2017. <a href=\"https://doi.org/10.1145/3133956.3134059\">https://doi.org/10.1145/3133956.3134059</a>.","ieee":"E. Derr, S. Bugiel, S. Fahl, Y. Acar, and M. Backes, “Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android,” 2017, doi: <a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>.","short":"E. Derr, S. Bugiel, S. Fahl, Y. Acar, M. Backes, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.","mla":"Derr, Erik, et al. “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2017, doi:<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>.","bibtex":"@inproceedings{Derr_Bugiel_Fahl_Acar_Backes_2017, title={Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android}, DOI={<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael}, year={2017} }","apa":"Derr, E., Bugiel, S., Fahl, S., Acar, Y., &#38; Backes, M. (2017). Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3133956.3134059\">https://doi.org/10.1145/3133956.3134059</a>"},"year":"2017","publication_status":"published"},{"title":"How Internet Resources Might Be Helping You Develop Faster but Less Securely","doi":"10.1109/MSP.2017.24","date_updated":"2024-06-05T13:09:42Z","volume":15,"author":[{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"full_name":"Kim, Doowon","last_name":"Kim","first_name":"Doowon"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"}],"date_created":"2023-09-22T13:39:01Z","year":"2017","intvolume":"        15","page":"50–60","citation":{"mla":"Acar, Yasemin, et al. “How Internet Resources Might Be Helping You Develop Faster but Less Securely.” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, 2017, pp. 50–60, doi:<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>.","short":"Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, IEEE Secur. Priv. 15 (2017) 50–60.","bibtex":"@article{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2017, title={How Internet Resources Might Be Helping You Develop Faster but Less Securely}, volume={15}, DOI={<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>}, number={2}, journal={IEEE Secur. Priv.}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017}, pages={50–60} }","apa":"Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2017). How Internet Resources Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur. Priv.</i>, <i>15</i>(2), 50–60. <a href=\"https://doi.org/10.1109/MSP.2017.24\">https://doi.org/10.1109/MSP.2017.24</a>","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “How Internet Resources Might Be Helping You Develop Faster but Less Securely.” <i>IEEE Secur. Priv.</i> 15, no. 2 (2017): 50–60. <a href=\"https://doi.org/10.1109/MSP.2017.24\">https://doi.org/10.1109/MSP.2017.24</a>.","ieee":"Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “How Internet Resources Might Be Helping You Develop Faster but Less Securely,” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, pp. 50–60, 2017, doi: <a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>.","ama":"Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. How Internet Resources Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur Priv</i>. 2017;15(2):50–60. doi:<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>"},"issue":"2","language":[{"iso":"eng"}],"extern":"1","_id":"47309","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","status":"public","publication":"IEEE Secur. Priv.","type":"journal_article"},{"title":"Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers","author":[{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"first_name":"Duc Cuong","full_name":"Nguyen, Duc Cuong","last_name":"Nguyen"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Doowon","full_name":"Kim, Doowon","last_name":"Kim"},{"first_name":"Elissa M.","full_name":"Redmiles, Elissa M.","last_name":"Redmiles"},{"first_name":"Michael","last_name":"Backes","full_name":"Backes, Michael"},{"first_name":"Simson L.","last_name":"Garfinkel","full_name":"Garfinkel, Simson L."},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T12:47:30Z","publisher":"USENIX Association","date_updated":"2024-06-05T13:12:04Z","citation":{"apa":"Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M., Backes, M., Garfinkel, S. L., Mazurek, M. L., &#38; Fahl, S. (2017). Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In J. M. Fernandez &#38; M. Payer (Eds.), <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association.","mla":"Stransky, Christian, et al. “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.” <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer, USENIX Association, 2017.","bibtex":"@inproceedings{Stransky_Acar_Nguyen_Wermke_Kim_Redmiles_Backes_Garfinkel_Mazurek_Fahl_2017, title={Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers}, booktitle={10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017}, publisher={USENIX Association}, author={Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek, Michelle L. and Fahl, Sascha}, editor={Fernandez, José M. and Payer, Mathias}, year={2017} }","short":"C. Stransky, Y. Acar, D.C. Nguyen, D. Wermke, D. Kim, E.M. Redmiles, M. Backes, S.L. Garfinkel, M.L. Mazurek, S. Fahl, in: J.M. Fernandez, M. Payer (Eds.), 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017, USENIX Association, 2017.","ama":"Stransky C, Acar Y, Nguyen DC, et al. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In: Fernandez JM, Payer M, eds. <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association; 2017.","chicago":"Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, and Sascha Fahl. “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.” In <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer. USENIX Association, 2017.","ieee":"C. Stransky <i>et al.</i>, “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers,” in <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, 2017."},"year":"2017","extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47245","status":"public","editor":[{"first_name":"José M.","full_name":"Fernandez, José M.","last_name":"Fernandez"},{"first_name":"Mathias","last_name":"Payer","full_name":"Payer, Mathias"}],"publication":"10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017","type":"conference"},{"page":"121–136","citation":{"ama":"Fischer F, Böttinger K, Xiao H, et al. Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security. In: <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>. IEEE Computer Society; 2017:121–136. doi:<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>","chicago":"Fischer, Felix, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security.” In <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. IEEE Computer Society, 2017. <a href=\"https://doi.org/10.1109/SP.2017.31\">https://doi.org/10.1109/SP.2017.31</a>.","ieee":"F. Fischer <i>et al.</i>, “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security,” in <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 2017, pp. 121–136, doi: <a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>.","apa":"Fischer, F., Böttinger, K., Xiao, H., Stransky, C., Acar, Y., Backes, M., &#38; Fahl, S. (2017). Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security. <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. <a href=\"https://doi.org/10.1109/SP.2017.31\">https://doi.org/10.1109/SP.2017.31</a>","mla":"Fischer, Felix, et al. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security.” <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, IEEE Computer Society, 2017, pp. 121–136, doi:<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>.","bibtex":"@inproceedings{Fischer_Böttinger_Xiao_Stransky_Acar_Backes_Fahl_2017, title={Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security}, DOI={<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>}, booktitle={2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017}, publisher={IEEE Computer Society}, author={Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, year={2017}, pages={121–136} }","short":"F. Fischer, K. Böttinger, H. Xiao, C. Stransky, Y. Acar, M. Backes, S. Fahl, in: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, IEEE Computer Society, 2017, pp. 121–136."},"year":"2017","author":[{"first_name":"Felix","last_name":"Fischer","full_name":"Fischer, Felix"},{"first_name":"Konstantin","last_name":"Böttinger","full_name":"Böttinger, Konstantin"},{"first_name":"Huang","full_name":"Xiao, Huang","last_name":"Xiao"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"last_name":"Backes","full_name":"Backes, Michael","first_name":"Michael"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T12:43:27Z","publisher":"IEEE Computer Society","date_updated":"2024-06-05T13:12:27Z","doi":"10.1109/SP.2017.31","title":"Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security","publication":"2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017","type":"conference","status":"public","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47243","extern":"1","language":[{"iso":"eng"}]},{"type":"conference","publication":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","status":"public","_id":"47250","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"extern":"1","language":[{"iso":"eng"}],"publication_status":"published","year":"2017","citation":{"ama":"Nguyen DC, Wermke D, Acar Y, Backes M, Weir C, Fahl S. A Stitch in Time: Supporting Android Developers in Writing Secure Code. In: <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>","ieee":"D. C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, and S. Fahl, “A Stitch in Time: Supporting Android Developers in Writing Secure Code,” 2017, doi: <a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>.","chicago":"Nguyen, Duc Cuong, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, and Sascha Fahl. “A Stitch in Time: Supporting Android Developers in Writing Secure Code.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2017. <a href=\"https://doi.org/10.1145/3133956.3133977\">https://doi.org/10.1145/3133956.3133977</a>.","mla":"Nguyen, Duc Cuong, et al. “A Stitch in Time: Supporting Android Developers in Writing Secure Code.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2017, doi:<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>.","short":"D.C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, S. Fahl, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.","bibtex":"@inproceedings{Nguyen_Wermke_Acar_Backes_Weir_Fahl_2017, title={A Stitch in Time: Supporting Android Developers in Writing Secure Code}, DOI={<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}, year={2017} }","apa":"Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., &#38; Fahl, S. (2017). A Stitch in Time: Supporting Android Developers in Writing Secure Code. <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3133956.3133977\">https://doi.org/10.1145/3133956.3133977</a>"},"date_updated":"2024-06-05T13:12:56Z","publisher":"ACM","author":[{"first_name":"Duc Cuong","last_name":"Nguyen","full_name":"Nguyen, Duc Cuong"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"last_name":"Backes","full_name":"Backes, Michael","first_name":"Michael"},{"last_name":"Weir","full_name":"Weir, Charles","first_name":"Charles"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T12:50:51Z","title":"A Stitch in Time: Supporting Android Developers in Writing Secure Code","doi":"10.1145/3133956.3133977"},{"publisher":"IEEE","date_updated":"2024-06-05T13:11:41Z","author":[{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"full_name":"Weir, Charles","last_name":"Weir","first_name":"Charles"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T12:50:12Z","title":"Developers Need Support, Too: A Survey of Security Advice for Software Developers","doi":"10.1109/secdev.2017.17","publication_status":"published","year":"2017","citation":{"mla":"Acar, Yasemin, et al. “Developers Need Support, Too: A Survey of Security Advice for Software Developers.” <i>2017 IEEE Cybersecurity Development (SecDev)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>.","short":"Y. Acar, C. Stransky, D. Wermke, C. Weir, M.L. Mazurek, S. Fahl, in: 2017 IEEE Cybersecurity Development (SecDev), IEEE, 2017.","bibtex":"@inproceedings{Acar_Stransky_Wermke_Weir_Mazurek_Fahl_2017, title={Developers Need Support, Too: A Survey of Security Advice for Software Developers}, DOI={<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>}, booktitle={2017 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle L. and Fahl, Sascha}, year={2017} }","apa":"Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., &#38; Fahl, S. (2017). Developers Need Support, Too: A Survey of Security Advice for Software Developers. <i>2017 IEEE Cybersecurity Development (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev.2017.17\">https://doi.org/10.1109/secdev.2017.17</a>","ieee":"Y. Acar, C. Stransky, D. Wermke, C. Weir, M. L. Mazurek, and S. Fahl, “Developers Need Support, Too: A Survey of Security Advice for Software Developers,” 2017, doi: <a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>.","chicago":"Acar, Yasemin, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, and Sascha Fahl. “Developers Need Support, Too: A Survey of Security Advice for Software Developers.” In <i>2017 IEEE Cybersecurity Development (SecDev)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/secdev.2017.17\">https://doi.org/10.1109/secdev.2017.17</a>.","ama":"Acar Y, Stransky C, Wermke D, Weir C, Mazurek ML, Fahl S. Developers Need Support, Too: A Survey of Security Advice for Software Developers. In: <i>2017 IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>"},"_id":"47248","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"2017 IEEE Cybersecurity Development (SecDev)","status":"public"},{"publisher":"IEEE","date_updated":"2024-06-05T13:13:34Z","date_created":"2023-09-22T12:42:23Z","author":[{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."}],"title":"You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users","doi":"10.1109/secdev.2016.013","publication_status":"published","year":"2017","citation":{"ama":"Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In: <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>","ieee":"Y. Acar, S. Fahl, and M. L. Mazurek, “You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users,” 2017, doi: <a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>.","chicago":"Acar, Yasemin, Sascha Fahl, and Michelle L. Mazurek. “You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.” In <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/secdev.2016.013\">https://doi.org/10.1109/secdev.2016.013</a>.","apa":"Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. <i>2016 IEEE Cybersecurity Development (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev.2016.013\">https://doi.org/10.1109/secdev.2016.013</a>","bibtex":"@inproceedings{Acar_Fahl_Mazurek_2017, title={You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users}, DOI={<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>}, booktitle={2016 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }","mla":"Acar, Yasemin, et al. “You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.” <i>2016 IEEE Cybersecurity Development (SecDev)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>.","short":"Y. Acar, S. Fahl, M.L. Mazurek, in: 2016 IEEE Cybersecurity Development (SecDev), IEEE, 2017."},"_id":"47242","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"2016 IEEE Cybersecurity Development (SecDev)","status":"public"},{"extern":"1","language":[{"iso":"eng"}],"_id":"47246","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","status":"public","publication":"2017 IEEE Symposium on Security and Privacy (SP)","type":"conference","title":"Comparing the Usability of Cryptographic APIs","doi":"10.1109/sp.2017.52","publisher":"IEEE","date_updated":"2024-06-05T13:14:03Z","author":[{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"full_name":"Backes, Michael","last_name":"Backes","first_name":"Michael"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Simson","last_name":"Garfinkel","full_name":"Garfinkel, Simson"},{"last_name":"Kim","full_name":"Kim, Doowon","first_name":"Doowon"},{"full_name":"Mazurek, Michelle L.","last_name":"Mazurek","first_name":"Michelle L."},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"}],"date_created":"2023-09-22T12:48:37Z","year":"2017","citation":{"short":"Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M.L. Mazurek, C. Stransky, in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.","bibtex":"@inproceedings{Acar_Backes_Fahl_Garfinkel_Kim_Mazurek_Stransky_2017, title={Comparing the Usability of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017} }","mla":"Acar, Yasemin, et al. “Comparing the Usability of Cryptographic APIs.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>.","apa":"Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2017). Comparing the Usability of Cryptographic APIs. <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2017.52\">https://doi.org/10.1109/sp.2017.52</a>","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “Comparing the Usability of Cryptographic APIs.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/sp.2017.52\">https://doi.org/10.1109/sp.2017.52</a>.","ieee":"Y. Acar <i>et al.</i>, “Comparing the Usability of Cryptographic APIs,” 2017, doi: <a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>.","ama":"Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic APIs. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>"},"publication_status":"published"},{"publication":"Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017","type":"conference","status":"public","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47244","extern":"1","language":[{"iso":"eng"}],"page":"81–95","citation":{"ieee":"Y. Acar, C. Stransky, D. Wermke, M. L. Mazurek, and S. Fahl, “Security Developer Studies with GitHub Users: Exploring a Convenience Sample,” in <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 2017, pp. 81–95.","chicago":"Acar, Yasemin, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, and Sascha Fahl. “Security Developer Studies with GitHub Users: Exploring a Convenience Sample.” In <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95. USENIX Association, 2017.","ama":"Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. In: <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>. USENIX Association; 2017:81–95.","bibtex":"@inproceedings{Acar_Stransky_Wermke_Mazurek_Fahl_2017, title={Security Developer Studies with GitHub Users: Exploring a Convenience Sample}, booktitle={Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher={USENIX Association}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}, year={2017}, pages={81–95} }","mla":"Acar, Yasemin, et al. “Security Developer Studies with GitHub Users: Exploring a Convenience Sample.” <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, USENIX Association, 2017, pp. 81–95.","short":"Y. Acar, C. Stransky, D. Wermke, M.L. Mazurek, S. Fahl, in: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017, USENIX Association, 2017, pp. 81–95.","apa":"Acar, Y., Stransky, C., Wermke, D., Mazurek, M. L., &#38; Fahl, S. (2017). Security Developer Studies with GitHub Users: Exploring a Convenience Sample. <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95."},"year":"2017","date_created":"2023-09-22T12:45:33Z","author":[{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"first_name":"Michelle L.","full_name":"Mazurek, Michelle L.","last_name":"Mazurek"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"publisher":"USENIX Association","date_updated":"2024-06-05T13:14:32Z","title":"Security Developer Studies with GitHub Users: Exploring a Convenience Sample"},{"citation":{"ieee":"E. M. Redmiles, Y. Acar, S. Fahl, and M. L. Mazurek, <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017.","chicago":"Redmiles, Elissa M., Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017. <a href=\"https://doi.org/10.13016/M22K2W\">https://doi.org/10.13016/M22K2W</a>.","bibtex":"@book{Redmiles_Acar_Fahl_Mazurek_2017, title={A Summary of Survey Methodology Best Practices for Security and Privacy Researchers}, DOI={<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>}, publisher={University of Maryland Computer Science Department}, author={Redmiles, Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }","short":"E.M. Redmiles, Y. Acar, S. Fahl, M.L. Mazurek, A Summary of Survey Methodology Best Practices for Security and Privacy Researchers, University of Maryland Computer Science Department, 2017.","mla":"Redmiles, Elissa M., et al. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017, doi:<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>.","ama":"Redmiles EM, Acar Y, Fahl S, Mazurek ML. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department; 2017. doi:<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>","apa":"Redmiles, E. M., Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department. <a href=\"https://doi.org/10.13016/M22K2W\">https://doi.org/10.13016/M22K2W</a>"},"year":"2017","doi":"10.13016/M22K2W","title":"A Summary of Survey Methodology Best Practices for Security and Privacy Researchers","author":[{"first_name":"Elissa M.","last_name":"Redmiles","full_name":"Redmiles, Elissa M."},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"full_name":"Mazurek, Michelle L.","last_name":"Mazurek","first_name":"Michelle L."}],"date_created":"2023-10-09T13:16:14Z","publisher":"University of Maryland Computer Science Department","date_updated":"2024-06-05T13:10:02Z","status":"public","type":"report","extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47873"},{"language":[{"iso":"eng"}],"keyword":["coldboot"],"ddc":["000"],"publication":"ACM Transactions on Reconfigurable Technology and Systems (TRETS)","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":2131617,"file_id":"5322","access_level":"closed","file_name":"a24-riebler.pdf","date_updated":"2018-11-02T16:04:14Z","date_created":"2018-11-02T16:04:14Z","creator":"ups"}],"abstract":[{"text":"Branch and bound (B&B) algorithms structure the search space as a tree and eliminate infeasible solutions early by pruning subtrees that cannot lead to a valid or optimal solution. Custom hardware designs significantly accelerate the execution of these algorithms. In this article, we demonstrate a high-performance B&B implementation on FPGAs. First, we identify general elements of B&B algorithms and describe their implementation as a finite state machine. Then, we introduce workers that autonomously cooperate using work stealing to allow parallel execution and full utilization of the target FPGA. Finally, we explore advantages of instance-specific designs that target a specific problem instance to improve performance.\r\n\r\nWe evaluate our concepts by applying them to a branch and bound problem, the reconstruction of corrupted AES keys obtained from cold-boot attacks. The evaluation shows that our work stealing approach is scalable with the available resources and provides speedups proportional to the number of workers. Instance-specific designs allow us to achieve an overall speedup of 47 × compared to the fastest implementation of AES key reconstruction so far. Finally, we demonstrate how instance-specific designs can be generated just-in-time such that the provided speedups outweigh the additional time required for design synthesis.","lang":"eng"}],"date_created":"2017-07-25T14:17:32Z","publisher":"Association for Computing Machinery (ACM)","title":"Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific Designs","issue":"3","quality_controlled":"1","year":"2017","department":[{"_id":"27"},{"_id":"518"}],"user_id":"15278","_id":"18","project":[{"_id":"1","name":"SFB 901","grant_number":"160364472"},{"name":"SFB 901 - Project Area C","_id":"4"},{"grant_number":"160364472","_id":"14","name":"SFB 901 - Subproject C2"},{"grant_number":"610996","_id":"34","name":"Self-Adaptive Virtualisation-Aware High-Performance/Low-Energy Heterogeneous System Architectures"},{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"file_date_updated":"2018-11-02T16:04:14Z","type":"journal_article","status":"public","volume":10,"author":[{"first_name":"Heinrich","full_name":"Riebler, Heinrich","id":"8961","last_name":"Riebler"},{"last_name":"Lass","orcid":"0000-0002-5708-7632","id":"24135","full_name":"Lass, Michael","first_name":"Michael"},{"last_name":"Mittendorf","full_name":"Mittendorf, Robert","first_name":"Robert"},{"first_name":"Thomas","last_name":"Löcke","full_name":"Löcke, Thomas"},{"first_name":"Christian","orcid":"0000-0001-5728-9982","last_name":"Plessl","full_name":"Plessl, Christian","id":"16153"}],"date_updated":"2023-09-26T13:23:58Z","doi":"10.1145/3053687","publication_identifier":{"issn":["1936-7406"]},"has_accepted_license":"1","publication_status":"published","intvolume":"        10","page":"24:1-24:23","citation":{"ieee":"H. Riebler, M. Lass, R. Mittendorf, T. Löcke, and C. Plessl, “Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific Designs,” <i>ACM Transactions on Reconfigurable Technology and Systems (TRETS)</i>, vol. 10, no. 3, p. 24:1-24:23, 2017, doi: <a href=\"https://doi.org/10.1145/3053687\">10.1145/3053687</a>.","chicago":"Riebler, Heinrich, Michael Lass, Robert Mittendorf, Thomas Löcke, and Christian Plessl. “Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific Designs.” <i>ACM Transactions on Reconfigurable Technology and Systems (TRETS)</i> 10, no. 3 (2017): 24:1-24:23. <a href=\"https://doi.org/10.1145/3053687\">https://doi.org/10.1145/3053687</a>.","ama":"Riebler H, Lass M, Mittendorf R, Löcke T, Plessl C. Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific Designs. <i>ACM Transactions on Reconfigurable Technology and Systems (TRETS)</i>. 2017;10(3):24:1-24:23. doi:<a href=\"https://doi.org/10.1145/3053687\">10.1145/3053687</a>","apa":"Riebler, H., Lass, M., Mittendorf, R., Löcke, T., &#38; Plessl, C. (2017). Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific Designs. <i>ACM Transactions on Reconfigurable Technology and Systems (TRETS)</i>, <i>10</i>(3), 24:1-24:23. <a href=\"https://doi.org/10.1145/3053687\">https://doi.org/10.1145/3053687</a>","bibtex":"@article{Riebler_Lass_Mittendorf_Löcke_Plessl_2017, title={Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific Designs}, volume={10}, DOI={<a href=\"https://doi.org/10.1145/3053687\">10.1145/3053687</a>}, number={3}, journal={ACM Transactions on Reconfigurable Technology and Systems (TRETS)}, publisher={Association for Computing Machinery (ACM)}, author={Riebler, Heinrich and Lass, Michael and Mittendorf, Robert and Löcke, Thomas and Plessl, Christian}, year={2017}, pages={24:1-24:23} }","short":"H. Riebler, M. Lass, R. Mittendorf, T. Löcke, C. Plessl, ACM Transactions on Reconfigurable Technology and Systems (TRETS) 10 (2017) 24:1-24:23.","mla":"Riebler, Heinrich, et al. “Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific Designs.” <i>ACM Transactions on Reconfigurable Technology and Systems (TRETS)</i>, vol. 10, no. 3, Association for Computing Machinery (ACM), 2017, p. 24:1-24:23, doi:<a href=\"https://doi.org/10.1145/3053687\">10.1145/3053687</a>."}},{"publication":"Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)","abstract":[{"lang":"eng","text":"Compared to classical HDL designs, generating FPGA with high-level synthesis from an OpenCL specification promises easier exploration of different design alternatives and, through ready-to-use infrastructure and common abstractions for host and memory interfaces, easier portability between different FPGA families. In this work, we evaluate the extent of this promise. To this end, we present a parameterized FDTD implementation for photonic microcavity simulations. Our design can trade-off different forms of parallelism and works for two independent OpenCL-based FPGA design flows. Hence, we can target FPGAs from different vendors and different FPGA families. We describe how we used pre-processor macros to achieve this flexibility and to work around different shortcomings of the current tools. Choosing the right design configurations, we are able to present two extremely competitive solutions for very different FPGA targets, reaching up to 172 GFLOPS sustained performance. With the portability and flexibility demonstrated, code developers not only avoid vendor lock-in, but can even make best use of real trade-offs between different architectures."}],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":230235,"access_level":"closed","file_name":"08056844.pdf","file_id":"5291","date_updated":"2018-11-02T15:02:28Z","creator":"ups","date_created":"2018-11-02T15:02:28Z"}],"keyword":["tet_topic_hpc"],"ddc":["000"],"language":[{"iso":"eng"}],"quality_controlled":"1","year":"2017","publisher":"IEEE","date_created":"2018-03-22T11:10:23Z","title":"Flexible FPGA design for FDTD using OpenCL","type":"conference","status":"public","_id":"1592","project":[{"_id":"1","name":"SFB 901","grant_number":"160364472"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C2","_id":"14","grant_number":"160364472"},{"grant_number":"01|H16005A","name":"HighPerMeshes","_id":"33"},{"_id":"32","name":"Performance and Efficiency in HPC with Custom Computing","grant_number":"PL 595/2-1 / 320898746"},{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"department":[{"_id":"27"},{"_id":"518"},{"_id":"61"}],"user_id":"15278","file_date_updated":"2018-11-02T15:02:28Z","has_accepted_license":"1","citation":{"ama":"Kenter T, Förstner J, Plessl C. Flexible FPGA design for FDTD using OpenCL. In: <i>Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.23919/FPL.2017.8056844\">10.23919/FPL.2017.8056844</a>","ieee":"T. Kenter, J. Förstner, and C. Plessl, “Flexible FPGA design for FDTD using OpenCL,” 2017, doi: <a href=\"https://doi.org/10.23919/FPL.2017.8056844\">10.23919/FPL.2017.8056844</a>.","chicago":"Kenter, Tobias, Jens Förstner, and Christian Plessl. “Flexible FPGA Design for FDTD Using OpenCL.” In <i>Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)</i>. IEEE, 2017. <a href=\"https://doi.org/10.23919/FPL.2017.8056844\">https://doi.org/10.23919/FPL.2017.8056844</a>.","apa":"Kenter, T., Förstner, J., &#38; Plessl, C. (2017). Flexible FPGA design for FDTD using OpenCL. <i>Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)</i>. <a href=\"https://doi.org/10.23919/FPL.2017.8056844\">https://doi.org/10.23919/FPL.2017.8056844</a>","bibtex":"@inproceedings{Kenter_Förstner_Plessl_2017, title={Flexible FPGA design for FDTD using OpenCL}, DOI={<a href=\"https://doi.org/10.23919/FPL.2017.8056844\">10.23919/FPL.2017.8056844</a>}, booktitle={Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)}, publisher={IEEE}, author={Kenter, Tobias and Förstner, Jens and Plessl, Christian}, year={2017} }","short":"T. Kenter, J. Förstner, C. Plessl, in: Proc. Int. Conf. on Field Programmable Logic and Applications (FPL), IEEE, 2017.","mla":"Kenter, Tobias, et al. “Flexible FPGA Design for FDTD Using OpenCL.” <i>Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.23919/FPL.2017.8056844\">10.23919/FPL.2017.8056844</a>."},"date_updated":"2023-09-26T13:24:38Z","author":[{"last_name":"Kenter","id":"3145","full_name":"Kenter, Tobias","first_name":"Tobias"},{"orcid":"0000-0001-7059-9862","last_name":"Förstner","full_name":"Förstner, Jens","id":"158","first_name":"Jens"},{"last_name":"Plessl","orcid":"0000-0001-5728-9982","id":"16153","full_name":"Plessl, Christian","first_name":"Christian"}],"doi":"10.23919/FPL.2017.8056844"},{"article_number":"082003","language":[{"iso":"eng"}],"_id":"1589","department":[{"_id":"27"},{"_id":"518"}],"user_id":"15278","status":"public","publication":"Journal of Physics: Conference Series","type":"journal_article","title":"High-Throughput and Low-Latency Network Communication with NetIO","doi":"10.1088/1742-6596/898/8/082003","date_updated":"2023-09-26T13:24:19Z","publisher":"IOP Publishing","volume":898,"date_created":"2018-03-22T10:51:20Z","author":[{"first_name":"Jörn","full_name":"Schumacher, Jörn","last_name":"Schumacher"},{"first_name":"Christian","last_name":"Plessl","orcid":"0000-0001-5728-9982","full_name":"Plessl, Christian","id":"16153"},{"first_name":"Wainer","full_name":"Vandelli, Wainer","last_name":"Vandelli"}],"year":"2017","intvolume":"       898","citation":{"ama":"Schumacher J, Plessl C, Vandelli W. High-Throughput and Low-Latency Network Communication with NetIO. <i>Journal of Physics: Conference Series</i>. 2017;898. doi:<a href=\"https://doi.org/10.1088/1742-6596/898/8/082003\">10.1088/1742-6596/898/8/082003</a>","chicago":"Schumacher, Jörn, Christian Plessl, and Wainer Vandelli. “High-Throughput and Low-Latency Network Communication with NetIO.” <i>Journal of Physics: Conference Series</i> 898 (2017). <a href=\"https://doi.org/10.1088/1742-6596/898/8/082003\">https://doi.org/10.1088/1742-6596/898/8/082003</a>.","ieee":"J. Schumacher, C. Plessl, and W. Vandelli, “High-Throughput and Low-Latency Network Communication with NetIO,” <i>Journal of Physics: Conference Series</i>, vol. 898, Art. no. 082003, 2017, doi: <a href=\"https://doi.org/10.1088/1742-6596/898/8/082003\">10.1088/1742-6596/898/8/082003</a>.","short":"J. Schumacher, C. Plessl, W. Vandelli, Journal of Physics: Conference Series 898 (2017).","bibtex":"@article{Schumacher_Plessl_Vandelli_2017, title={High-Throughput and Low-Latency Network Communication with NetIO}, volume={898}, DOI={<a href=\"https://doi.org/10.1088/1742-6596/898/8/082003\">10.1088/1742-6596/898/8/082003</a>}, number={082003}, journal={Journal of Physics: Conference Series}, publisher={IOP Publishing}, author={Schumacher, Jörn and Plessl, Christian and Vandelli, Wainer}, year={2017} }","mla":"Schumacher, Jörn, et al. “High-Throughput and Low-Latency Network Communication with NetIO.” <i>Journal of Physics: Conference Series</i>, vol. 898, 082003, IOP Publishing, 2017, doi:<a href=\"https://doi.org/10.1088/1742-6596/898/8/082003\">10.1088/1742-6596/898/8/082003</a>.","apa":"Schumacher, J., Plessl, C., &#38; Vandelli, W. (2017). High-Throughput and Low-Latency Network Communication with NetIO. <i>Journal of Physics: Conference Series</i>, <i>898</i>, Article 082003. <a href=\"https://doi.org/10.1088/1742-6596/898/8/082003\">https://doi.org/10.1088/1742-6596/898/8/082003</a>"},"quality_controlled":"1"},{"author":[{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"}],"date_created":"2020-11-30T10:29:41Z","date_updated":"2026-02-19T14:39:50Z","main_file_link":[{"url":"https://arxiv.org/abs/1710.00564"}],"title":"CrySL: Validating Correct Usage of Cryptographic APIs","citation":{"short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, CrySL: Validating Correct Usage of Cryptographic APIs, 2017.","mla":"Krüger, Stefan, et al. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>. 2017.","bibtex":"@book{Krüger_Späth_Ali_Bodden_Mezini_2017, title={CrySL: Validating Correct Usage of Cryptographic APIs}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2017} }","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2017). <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>.","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>, 2017.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>. 2017.","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>.; 2017."},"year":"2017","department":[{"_id":"76"}],"user_id":"14972","_id":"20555","external_id":{"arxiv":["1710.00564"]},"language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE"],"type":"report","status":"public"},{"citation":{"ama":"Meise B, Schloots FM, Müller-Lietzkow J, Meister DM. Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für Kooperationsverbünde in akademischen Kontexten. In: <i>Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung</i>. Springer Fachmedien Wiesbaden; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-658-20265-1_18\">10.1007/978-3-658-20265-1_18</a>","ieee":"B. Meise, F. M. Schloots, J. Müller-Lietzkow, and D. M. Meister, “Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für Kooperationsverbünde in akademischen Kontexten,” in <i>Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung</i>, Wiesbaden: Springer Fachmedien Wiesbaden, 2017.","chicago":"Meise, Bianca, Franziska Margarete Schloots, Jörg Müller-Lietzkow, and Dorothee M. Meister. “Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für Kooperationsverbünde in akademischen Kontexten.” In <i>Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung</i>. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. <a href=\"https://doi.org/10.1007/978-3-658-20265-1_18\">https://doi.org/10.1007/978-3-658-20265-1_18</a>.","short":"B. Meise, F.M. Schloots, J. Müller-Lietzkow, D.M. Meister, in: Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung, Springer Fachmedien Wiesbaden, Wiesbaden, 2017.","bibtex":"@inbook{Meise_Schloots_Müller-Lietzkow_Meister_2017, place={Wiesbaden}, title={Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für Kooperationsverbünde in akademischen Kontexten}, DOI={<a href=\"https://doi.org/10.1007/978-3-658-20265-1_18\">10.1007/978-3-658-20265-1_18</a>}, booktitle={Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung}, publisher={Springer Fachmedien Wiesbaden}, author={Meise, Bianca and Schloots, Franziska Margarete and Müller-Lietzkow, Jörg and Meister, Dorothee M.}, year={2017} }","mla":"Meise, Bianca, et al. “Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für Kooperationsverbünde in akademischen Kontexten.” <i>Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung</i>, Springer Fachmedien Wiesbaden, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-658-20265-1_18\">10.1007/978-3-658-20265-1_18</a>.","apa":"Meise, B., Schloots, F. M., Müller-Lietzkow, J., &#38; Meister, D. M. (2017). Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für Kooperationsverbünde in akademischen Kontexten. In <i>Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung</i>. Springer Fachmedien Wiesbaden. <a href=\"https://doi.org/10.1007/978-3-658-20265-1_18\">https://doi.org/10.1007/978-3-658-20265-1_18</a>"},"year":"2017","place":"Wiesbaden","publication_identifier":{"isbn":["9783658202644","9783658202651"]},"publication_status":"published","doi":"10.1007/978-3-658-20265-1_18","title":"Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für Kooperationsverbünde in akademischen Kontexten","date_created":"2024-11-19T11:30:16Z","author":[{"first_name":"Bianca","full_name":"Meise, Bianca","last_name":"Meise"},{"full_name":"Schloots, Franziska Margarete","id":"33185","last_name":"Schloots","first_name":"Franziska Margarete"},{"full_name":"Müller-Lietzkow, Jörg","last_name":"Müller-Lietzkow","first_name":"Jörg"},{"last_name":"Meister","full_name":"Meister, Dorothee M.","first_name":"Dorothee M."}],"date_updated":"2024-11-19T11:31:51Z","publisher":"Springer Fachmedien Wiesbaden","status":"public","publication":"Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung","type":"book_chapter","language":[{"iso":"ger"}],"department":[{"_id":"574"}],"user_id":"33185","_id":"57234"},{"status":"public","publication":"Design Automation and Testing in Europe (DATE)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"70"}],"user_id":"5603","_id":"25068","corporate_editor":["University Booth Interactive Presentation"],"citation":{"ama":"Adelt P, Koppelmann B, Müller W, Kleinjohann B, Scheytt JC. ANALISA - A Tool for Static Instruction Set Analysis. In: University Booth Interactive Presentation, ed. <i>Design Automation and Testing in Europe (DATE)</i>. ; 2017.","ieee":"P. Adelt, B. Koppelmann, W. Müller, B. Kleinjohann, and J. C. Scheytt, “ANALISA - A Tool for Static Instruction Set Analysis,” in <i>Design Automation and Testing in Europe (DATE)</i>, Lausanne, CH, Mrz. 2017, 2017.","chicago":"Adelt, Peer, Bastian Koppelmann, Wolfgang Müller, Bernd Kleinjohann, and J. Christoph Scheytt. “ANALISA - A Tool for Static Instruction Set Analysis.” In <i>Design Automation and Testing in Europe (DATE)</i>, edited by University Booth Interactive Presentation, 2017.","short":"P. Adelt, B. Koppelmann, W. Müller, B. Kleinjohann, J.C. Scheytt, in: University Booth Interactive Presentation (Ed.), Design Automation and Testing in Europe (DATE), 2017.","bibtex":"@inproceedings{Adelt_Koppelmann_Müller_Kleinjohann_Scheytt_2017, title={ANALISA - A Tool for Static Instruction Set Analysis}, booktitle={Design Automation and Testing in Europe (DATE)}, author={Adelt, Peer and Koppelmann, Bastian and Müller, Wolfgang and Kleinjohann, Bernd and Scheytt, J. Christoph}, editor={University Booth Interactive Presentation}, year={2017} }","mla":"Adelt, Peer, et al. “ANALISA - A Tool for Static Instruction Set Analysis.” <i>Design Automation and Testing in Europe (DATE)</i>, edited by University Booth Interactive Presentation, 2017.","apa":"Adelt, P., Koppelmann, B., Müller, W., Kleinjohann, B., &#38; Scheytt, J. C. (2017). ANALISA - A Tool for Static Instruction Set Analysis. In University Booth Interactive Presentation (Ed.), <i>Design Automation and Testing in Europe (DATE)</i>."},"year":"2017","conference":{"location":"Lausanne, CH, Mrz. 2017"},"title":"ANALISA - A Tool for Static Instruction Set Analysis","date_created":"2021-09-28T11:08:16Z","author":[{"first_name":"Peer","id":"5603","full_name":"Adelt, Peer","last_name":"Adelt"},{"full_name":"Koppelmann, Bastian","id":"25260","last_name":"Koppelmann","first_name":"Bastian"},{"last_name":"Müller","full_name":"Müller, Wolfgang","id":"16243","first_name":"Wolfgang"},{"last_name":"Kleinjohann","full_name":"Kleinjohann, Bernd","first_name":"Bernd"},{"first_name":"J. Christoph","full_name":"Scheytt, J. Christoph","id":"37144","orcid":"0000-0002-5950-6618 ","last_name":"Scheytt"}],"date_updated":"2025-02-26T14:45:09Z"},{"language":[{"iso":"eng"}],"user_id":"5603","department":[{"_id":"672"}],"_id":"25069","status":"public","type":"conference","publication":"Design Automation and Testing in Europe (DATE)","conference":{"location":"Lausanne, CH, Mrz. 2017"},"title":"ANALISA - A Tool for Static Instruction Set Analysis","author":[{"first_name":"Peer","last_name":"Adelt","id":"5603","full_name":"Adelt, Peer"},{"first_name":"Bastian","last_name":"Koppelmann","full_name":"Koppelmann, Bastian","id":"25260"},{"id":"16243","full_name":"Müller, Wolfgang","last_name":"Müller","first_name":"Wolfgang"},{"first_name":"Bernd","full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann"},{"last_name":"Scheytt","orcid":"0000-0002-5950-6618 ","id":"37144","full_name":"Scheytt, J. Christoph","first_name":"J. Christoph"}],"date_created":"2021-09-28T11:12:00Z","date_updated":"2025-02-26T14:45:23Z","citation":{"ama":"Adelt P, Koppelmann B, Müller W, Kleinjohann B, Scheytt JC. ANALISA - A Tool for Static Instruction Set Analysis. In: University Booth Interactive Presentation, ed. <i>Design Automation and Testing in Europe (DATE)</i>. ; 2017.","ieee":"P. Adelt, B. Koppelmann, W. Müller, B. Kleinjohann, and J. C. Scheytt, “ANALISA - A Tool for Static Instruction Set Analysis,” in <i>Design Automation and Testing in Europe (DATE)</i>, Lausanne, CH, Mrz. 2017, 2017.","chicago":"Adelt, Peer, Bastian Koppelmann, Wolfgang Müller, Bernd Kleinjohann, and J. Christoph Scheytt. “ANALISA - A Tool for Static Instruction Set Analysis.” In <i>Design Automation and Testing in Europe (DATE)</i>, edited by University Booth Interactive Presentation, 2017.","apa":"Adelt, P., Koppelmann, B., Müller, W., Kleinjohann, B., &#38; Scheytt, J. C. (2017). ANALISA - A Tool for Static Instruction Set Analysis. In University Booth Interactive Presentation (Ed.), <i>Design Automation and Testing in Europe (DATE)</i>.","mla":"Adelt, Peer, et al. “ANALISA - A Tool for Static Instruction Set Analysis.” <i>Design Automation and Testing in Europe (DATE)</i>, edited by University Booth Interactive Presentation, 2017.","short":"P. Adelt, B. Koppelmann, W. Müller, B. Kleinjohann, J.C. Scheytt, in: University Booth Interactive Presentation (Ed.), Design Automation and Testing in Europe (DATE), 2017.","bibtex":"@inproceedings{Adelt_Koppelmann_Müller_Kleinjohann_Scheytt_2017, title={ANALISA - A Tool for Static Instruction Set Analysis}, booktitle={Design Automation and Testing in Europe (DATE)}, author={Adelt, Peer and Koppelmann, Bastian and Müller, Wolfgang and Kleinjohann, Bernd and Scheytt, J. Christoph}, editor={University Booth Interactive Presentation}, year={2017} }"},"corporate_editor":["University Booth Interactive Presentation"],"year":"2017"}]
