[{"year":"2013","citation":{"ama":"Hamann H, Karsai I, Schmickl T. Time delay implies cost on task switching: A model to investigate the efficiency of task partitioning. <i>Bulletin of Mathematical Biology</i>. 2013;75(7):1181-1206. doi:<a href=\"https://doi.org/10.1007/s11538-013-9851-4 \">10.1007/s11538-013-9851-4 </a>","ieee":"H. Hamann, I. Karsai, and T. Schmickl, “Time delay implies cost on task switching: A model to investigate the efficiency of task partitioning,” <i>Bulletin of Mathematical Biology</i>, vol. 75, no. 7, pp. 1181–1206, 2013.","chicago":"Hamann, Heiko, Istvan Karsai, and Thomas Schmickl. “Time Delay Implies Cost on Task Switching: A Model to Investigate the Efficiency of Task Partitioning.” <i>Bulletin of Mathematical Biology</i> 75, no. 7 (2013): 1181–1206. <a href=\"https://doi.org/10.1007/s11538-013-9851-4 \">https://doi.org/10.1007/s11538-013-9851-4 </a>.","apa":"Hamann, H., Karsai, I., &#38; Schmickl, T. (2013). Time delay implies cost on task switching: A model to investigate the efficiency of task partitioning. <i>Bulletin of Mathematical Biology</i>, <i>75</i>(7), 1181–1206. <a href=\"https://doi.org/10.1007/s11538-013-9851-4 \">https://doi.org/10.1007/s11538-013-9851-4 </a>","bibtex":"@article{Hamann_Karsai_Schmickl_2013, title={Time delay implies cost on task switching: A model to investigate the efficiency of task partitioning}, volume={75}, DOI={<a href=\"https://doi.org/10.1007/s11538-013-9851-4 \">10.1007/s11538-013-9851-4 </a>}, number={7}, journal={Bulletin of Mathematical Biology}, author={Hamann, Heiko and Karsai, Istvan and Schmickl, Thomas}, year={2013}, pages={1181–1206} }","short":"H. Hamann, I. Karsai, T. Schmickl, Bulletin of Mathematical Biology 75 (2013) 1181–1206.","mla":"Hamann, Heiko, et al. “Time Delay Implies Cost on Task Switching: A Model to Investigate the Efficiency of Task Partitioning.” <i>Bulletin of Mathematical Biology</i>, vol. 75, no. 7, 2013, pp. 1181–206, doi:<a href=\"https://doi.org/10.1007/s11538-013-9851-4 \">10.1007/s11538-013-9851-4 </a>."},"intvolume":"        75","page":"1181-1206","issue":"7","title":"Time delay implies cost on task switching: A model to investigate the efficiency of task partitioning","doi":"10.1007/s11538-013-9851-4 ","date_updated":"2022-01-06T06:54:20Z","author":[{"first_name":"Heiko","last_name":"Hamann","full_name":"Hamann, Heiko"},{"first_name":"Istvan","last_name":"Karsai","full_name":"Karsai, Istvan"},{"first_name":"Thomas","last_name":"Schmickl","full_name":"Schmickl, Thomas"}],"date_created":"2020-10-21T08:41:17Z","volume":75,"status":"public","type":"journal_article","publication":"Bulletin of Mathematical Biology","language":[{"iso":"eng"}],"_id":"20148","user_id":"15415","department":[{"_id":"63"},{"_id":"238"}]},{"department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","_id":"20150","language":[{"iso":"eng"}],"publication":"Chaos, Solitons & Fractals","type":"journal_article","status":"public","volume":50,"author":[{"last_name":"Hamann","full_name":"Hamann, Heiko","first_name":"Heiko"},{"first_name":"Thomas","full_name":"Schmickl, Thomas","last_name":"Schmickl"},{"first_name":"Jürgen","last_name":"Stradner","full_name":"Stradner, Jürgen"},{"last_name":"Crailsheim","full_name":"Crailsheim, Karl","first_name":"Karl"},{"first_name":"Ronald","last_name":"Thenius","full_name":"Thenius, Ronald"},{"full_name":"Zahadat, Payam","last_name":"Zahadat","first_name":"Payam"}],"date_created":"2020-10-21T08:46:02Z","date_updated":"2022-01-06T06:54:20Z","doi":"10.1016/j.chaos.2013.01.011","title":"Algorithmic Requirements for Swarm Intelligence in Differently Coupled Collective Systems","intvolume":"        50","page":"100-114","citation":{"apa":"Hamann, H., Schmickl, T., Stradner, J., Crailsheim, K., Thenius, R., &#38; Zahadat, P. (2013). Algorithmic Requirements for Swarm Intelligence in Differently Coupled Collective Systems. <i>Chaos, Solitons &#38; Fractals</i>, <i>50</i>, 100–114. <a href=\"https://doi.org/10.1016/j.chaos.2013.01.011\">https://doi.org/10.1016/j.chaos.2013.01.011</a>","mla":"Hamann, Heiko, et al. “Algorithmic Requirements for Swarm Intelligence in Differently Coupled Collective Systems.” <i>Chaos, Solitons &#38; Fractals</i>, vol. 50, 2013, pp. 100–14, doi:<a href=\"https://doi.org/10.1016/j.chaos.2013.01.011\">10.1016/j.chaos.2013.01.011</a>.","short":"H. Hamann, T. Schmickl, J. Stradner, K. Crailsheim, R. Thenius, P. Zahadat, Chaos, Solitons &#38; Fractals 50 (2013) 100–114.","bibtex":"@article{Hamann_Schmickl_Stradner_Crailsheim_Thenius_Zahadat_2013, title={Algorithmic Requirements for Swarm Intelligence in Differently Coupled Collective Systems}, volume={50}, DOI={<a href=\"https://doi.org/10.1016/j.chaos.2013.01.011\">10.1016/j.chaos.2013.01.011</a>}, journal={Chaos, Solitons &#38; Fractals}, author={Hamann, Heiko and Schmickl, Thomas and Stradner, Jürgen and Crailsheim, Karl and Thenius, Ronald and Zahadat, Payam}, year={2013}, pages={100–114} }","ama":"Hamann H, Schmickl T, Stradner J, Crailsheim K, Thenius R, Zahadat P. Algorithmic Requirements for Swarm Intelligence in Differently Coupled Collective Systems. <i>Chaos, Solitons &#38; Fractals</i>. 2013;50:100-114. doi:<a href=\"https://doi.org/10.1016/j.chaos.2013.01.011\">10.1016/j.chaos.2013.01.011</a>","chicago":"Hamann, Heiko, Thomas Schmickl, Jürgen Stradner, Karl Crailsheim, Ronald Thenius, and Payam Zahadat. “Algorithmic Requirements for Swarm Intelligence in Differently Coupled Collective Systems.” <i>Chaos, Solitons &#38; Fractals</i> 50 (2013): 100–114. <a href=\"https://doi.org/10.1016/j.chaos.2013.01.011\">https://doi.org/10.1016/j.chaos.2013.01.011</a>.","ieee":"H. Hamann, T. Schmickl, J. Stradner, K. Crailsheim, R. Thenius, and P. Zahadat, “Algorithmic Requirements for Swarm Intelligence in Differently Coupled Collective Systems,” <i>Chaos, Solitons &#38; Fractals</i>, vol. 50, pp. 100–114, 2013."},"year":"2013"},{"year":"2013","intvolume":"      7835","page":"579-588","citation":{"chicago":"Hamann, Heiko, Thomas Schmickl, Jürgen Stradner, Christopher Schwarzer, Nico K. Michiels, and Anna Isabel Esparcia-Alcazar. “Virtual Spatiality in Agent Controllers: Encoding Compartmentalization.” In <i>Applications of Evolutionary Computation - 16th European Conference (EvoApplications 2013)</i>, 7835:579–88, 2013. <a href=\"https://doi.org/10.1007/978-3-642-37192-9_58\">https://doi.org/10.1007/978-3-642-37192-9_58</a>.","ieee":"H. Hamann, T. Schmickl, J. Stradner, C. Schwarzer, N. K. Michiels, and A. I. Esparcia-Alcazar, “Virtual Spatiality in Agent Controllers: Encoding Compartmentalization,” in <i>Applications of Evolutionary Computation - 16th European Conference (EvoApplications 2013)</i>, 2013, vol. 7835, pp. 579–588.","ama":"Hamann H, Schmickl T, Stradner J, Schwarzer C, Michiels NK, Esparcia-Alcazar AI. Virtual Spatiality in Agent Controllers: Encoding Compartmentalization. In: <i>Applications of Evolutionary Computation - 16th European Conference (EvoApplications 2013)</i>. Vol 7835. ; 2013:579-588. doi:<a href=\"https://doi.org/10.1007/978-3-642-37192-9_58\">10.1007/978-3-642-37192-9_58</a>","apa":"Hamann, H., Schmickl, T., Stradner, J., Schwarzer, C., Michiels, N. K., &#38; Esparcia-Alcazar, A. I. (2013). Virtual Spatiality in Agent Controllers: Encoding Compartmentalization. In <i>Applications of Evolutionary Computation - 16th European Conference (EvoApplications 2013)</i> (Vol. 7835, pp. 579–588). <a href=\"https://doi.org/10.1007/978-3-642-37192-9_58\">https://doi.org/10.1007/978-3-642-37192-9_58</a>","mla":"Hamann, Heiko, et al. “Virtual Spatiality in Agent Controllers: Encoding Compartmentalization.” <i>Applications of Evolutionary Computation - 16th European Conference (EvoApplications 2013)</i>, vol. 7835, 2013, pp. 579–88, doi:<a href=\"https://doi.org/10.1007/978-3-642-37192-9_58\">10.1007/978-3-642-37192-9_58</a>.","bibtex":"@inproceedings{Hamann_Schmickl_Stradner_Schwarzer_Michiels_Esparcia-Alcazar_2013, title={Virtual Spatiality in Agent Controllers: Encoding Compartmentalization}, volume={7835}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-37192-9_58\">10.1007/978-3-642-37192-9_58</a>}, booktitle={Applications of Evolutionary Computation - 16th European Conference (EvoApplications 2013)}, author={Hamann, Heiko and Schmickl, Thomas and Stradner, Jürgen and Schwarzer, Christopher and Michiels, Nico K. and Esparcia-Alcazar, Anna Isabel}, year={2013}, pages={579–588} }","short":"H. Hamann, T. Schmickl, J. Stradner, C. Schwarzer, N.K. Michiels, A.I. Esparcia-Alcazar, in: Applications of Evolutionary Computation - 16th European Conference (EvoApplications 2013), 2013, pp. 579–588."},"date_updated":"2022-01-06T06:54:20Z","volume":7835,"author":[{"first_name":"Heiko","last_name":"Hamann","full_name":"Hamann, Heiko"},{"first_name":"Thomas","full_name":"Schmickl, Thomas","last_name":"Schmickl"},{"first_name":"Jürgen","last_name":"Stradner","full_name":"Stradner, Jürgen"},{"first_name":"Christopher","full_name":"Schwarzer, Christopher","last_name":"Schwarzer"},{"full_name":"Michiels, Nico K.","last_name":"Michiels","first_name":"Nico K."},{"last_name":"Esparcia-Alcazar","full_name":"Esparcia-Alcazar, Anna Isabel","first_name":"Anna Isabel"}],"date_created":"2020-10-21T08:53:30Z","title":"Virtual Spatiality in Agent Controllers: Encoding Compartmentalization","doi":"10.1007/978-3-642-37192-9_58","publication":"Applications of Evolutionary Computation - 16th European Conference (EvoApplications 2013)","type":"conference","status":"public","_id":"20151","department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"20160","user_id":"15415","department":[{"_id":"63"},{"_id":"238"}],"status":"public","type":"conference","publication":"7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013)","title":"A Reductionist Approach to Hypothesis-Catching for the Analysis of Self-Organizing Decision-Making Systems","doi":"10.1109/SASO.2013.10","publisher":"IEEE Press","date_updated":"2022-01-06T06:54:20Z","author":[{"full_name":"Hamann, Heiko","last_name":"Hamann","first_name":"Heiko"}],"date_created":"2020-10-21T13:48:26Z","year":"2013","citation":{"ieee":"H. Hamann, “A Reductionist Approach to Hypothesis-Catching for the Analysis of Self-Organizing Decision-Making Systems,” in <i>7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013)</i>, 2013, pp. 227–236.","chicago":"Hamann, Heiko. “A Reductionist Approach to Hypothesis-Catching for the Analysis of Self-Organizing Decision-Making Systems.” In <i>7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013)</i>, 227–36. IEEE Press, 2013. <a href=\"https://doi.org/10.1109/SASO.2013.10\">https://doi.org/10.1109/SASO.2013.10</a>.","ama":"Hamann H. A Reductionist Approach to Hypothesis-Catching for the Analysis of Self-Organizing Decision-Making Systems. In: <i>7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013)</i>. IEEE Press; 2013:227-236. doi:<a href=\"https://doi.org/10.1109/SASO.2013.10\">10.1109/SASO.2013.10</a>","apa":"Hamann, H. (2013). A Reductionist Approach to Hypothesis-Catching for the Analysis of Self-Organizing Decision-Making Systems. In <i>7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013)</i> (pp. 227–236). IEEE Press. <a href=\"https://doi.org/10.1109/SASO.2013.10\">https://doi.org/10.1109/SASO.2013.10</a>","bibtex":"@inproceedings{Hamann_2013, title={A Reductionist Approach to Hypothesis-Catching for the Analysis of Self-Organizing Decision-Making Systems}, DOI={<a href=\"https://doi.org/10.1109/SASO.2013.10\">10.1109/SASO.2013.10</a>}, booktitle={7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013)}, publisher={IEEE Press}, author={Hamann, Heiko}, year={2013}, pages={227–236} }","short":"H. Hamann, in: 7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013), IEEE Press, 2013, pp. 227–236.","mla":"Hamann, Heiko. “A Reductionist Approach to Hypothesis-Catching for the Analysis of Self-Organizing Decision-Making Systems.” <i>7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013)</i>, IEEE Press, 2013, pp. 227–36, doi:<a href=\"https://doi.org/10.1109/SASO.2013.10\">10.1109/SASO.2013.10</a>."},"page":"227-236"},{"title":"Speciation Dynamics: Generating Selective Pressure Towards Diversity","date_updated":"2022-01-06T06:54:20Z","publisher":"MIT Press","date_created":"2020-10-21T13:53:59Z","author":[{"first_name":"Heiko","full_name":"Hamann, Heiko","last_name":"Hamann"},{"first_name":"Pietro","last_name":"Lio","full_name":"Lio, Pietro"},{"full_name":"Miglino, Orazio","last_name":"Miglino","first_name":"Orazio"},{"first_name":"Giuseppe","full_name":"Nicosia, Giuseppe","last_name":"Nicosia"},{"first_name":"Stefano","full_name":"Nolfi, Stefano","last_name":"Nolfi"},{"last_name":"Pavone","full_name":"Pavone, Mario","first_name":"Mario"}],"year":"2013","citation":{"bibtex":"@inproceedings{Hamann_Lio_Miglino_Nicosia_Nolfi_Pavone_2013, title={Speciation Dynamics: Generating Selective Pressure Towards Diversity}, booktitle={12th European Conference on Artificial Life (ECAL 2013)}, publisher={MIT Press}, author={Hamann, Heiko and Lio, Pietro and Miglino, Orazio and Nicosia, Giuseppe and Nolfi, Stefano and Pavone, Mario}, year={2013} }","short":"H. Hamann, P. Lio, O. Miglino, G. Nicosia, S. Nolfi, M. Pavone, in: 12th European Conference on Artificial Life (ECAL 2013), MIT Press, 2013.","mla":"Hamann, Heiko, et al. “Speciation Dynamics: Generating Selective Pressure Towards Diversity.” <i>12th European Conference on Artificial Life (ECAL 2013)</i>, MIT Press, 2013.","apa":"Hamann, H., Lio, P., Miglino, O., Nicosia, G., Nolfi, S., &#38; Pavone, M. (2013). Speciation Dynamics: Generating Selective Pressure Towards Diversity. In <i>12th European Conference on Artificial Life (ECAL 2013)</i>. MIT Press.","chicago":"Hamann, Heiko, Pietro Lio, Orazio Miglino, Giuseppe Nicosia, Stefano Nolfi, and Mario Pavone. “Speciation Dynamics: Generating Selective Pressure Towards Diversity.” In <i>12th European Conference on Artificial Life (ECAL 2013)</i>. MIT Press, 2013.","ieee":"H. Hamann, P. Lio, O. Miglino, G. Nicosia, S. Nolfi, and M. Pavone, “Speciation Dynamics: Generating Selective Pressure Towards Diversity,” in <i>12th European Conference on Artificial Life (ECAL 2013)</i>, 2013.","ama":"Hamann H, Lio P, Miglino O, Nicosia G, Nolfi S, Pavone M. Speciation Dynamics: Generating Selective Pressure Towards Diversity. In: <i>12th European Conference on Artificial Life (ECAL 2013)</i>. MIT Press; 2013."},"language":[{"iso":"eng"}],"_id":"20161","department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","status":"public","publication":"12th European Conference on Artificial Life (ECAL 2013)","type":"conference"},{"title":"Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance","doi":"10.1007/s11721-013-0080-0","date_updated":"2022-01-06T06:54:20Z","volume":7,"date_created":"2020-10-21T13:57:36Z","author":[{"first_name":"Heiko","last_name":"Hamann","full_name":"Hamann, Heiko"}],"year":"2013","intvolume":"         7","page":"145-172","citation":{"bibtex":"@article{Hamann_2013, title={Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance}, volume={7}, DOI={<a href=\"https://doi.org/10.1007/s11721-013-0080-0\">10.1007/s11721-013-0080-0</a>}, number={3}, journal={Swarm Intelligence}, author={Hamann, Heiko}, year={2013}, pages={145–172} }","short":"H. Hamann, Swarm Intelligence 7 (2013) 145–172.","mla":"Hamann, Heiko. “Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance.” <i>Swarm Intelligence</i>, vol. 7, no. 3, 2013, pp. 145–72, doi:<a href=\"https://doi.org/10.1007/s11721-013-0080-0\">10.1007/s11721-013-0080-0</a>.","apa":"Hamann, H. (2013). Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance. <i>Swarm Intelligence</i>, <i>7</i>(3), 145–172. <a href=\"https://doi.org/10.1007/s11721-013-0080-0\">https://doi.org/10.1007/s11721-013-0080-0</a>","chicago":"Hamann, Heiko. “Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance.” <i>Swarm Intelligence</i> 7, no. 3 (2013): 145–72. <a href=\"https://doi.org/10.1007/s11721-013-0080-0\">https://doi.org/10.1007/s11721-013-0080-0</a>.","ieee":"H. Hamann, “Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance,” <i>Swarm Intelligence</i>, vol. 7, no. 3, pp. 145–172, 2013.","ama":"Hamann H. Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance. <i>Swarm Intelligence</i>. 2013;7(3):145-172. doi:<a href=\"https://doi.org/10.1007/s11721-013-0080-0\">10.1007/s11721-013-0080-0</a>"},"issue":"3","language":[{"iso":"eng"}],"_id":"20162","department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","status":"public","publication":"Swarm Intelligence","type":"journal_article"},{"title":"Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"full_name":"Laudemann, Stefan","last_name":"Laudemann","first_name":"Stefan"}],"date_created":"2018-05-24T13:16:41Z","date_updated":"2022-01-06T06:58:17Z","citation":{"chicago":"Laudemann, Stefan. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>, 2013.","ieee":"S. Laudemann, <i>Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten</i>. 2013.","ama":"Laudemann S. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>.; 2013.","apa":"Laudemann, S. (2013). <i>Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten</i>.","mla":"Laudemann, Stefan. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>. 2013.","bibtex":"@book{Laudemann_2013, title={Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten}, author={Laudemann, Stefan}, year={2013} }","short":"S. Laudemann, Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten, 2013."},"year":"2013","department":[{"_id":"64"}],"user_id":"25078","_id":"2868","status":"public","type":"bachelorsthesis"},{"year":"2013","citation":{"ama":"Leder L. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>.; 2013.","chicago":"Leder, Lennart. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>, 2013.","ieee":"L. Leder, <i>Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken</i>. 2013.","bibtex":"@book{Leder_2013, title={Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken}, author={Leder, Lennart}, year={2013} }","mla":"Leder, Lennart. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>. 2013.","short":"L. Leder, Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken, 2013.","apa":"Leder, L. (2013). <i>Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken</i>."},"date_updated":"2022-01-06T06:58:17Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2018-05-24T13:17:53Z","author":[{"full_name":"Leder, Lennart","last_name":"Leder","first_name":"Lennart"}],"title":"Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken","type":"bachelorsthesis","status":"public","_id":"2869","department":[{"_id":"64"}],"user_id":"25078"},{"language":[{"iso":"eng"}],"user_id":"21240","department":[{"_id":"672"}],"_id":"25740","status":"public","type":"journal_article","publication":"Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)","title":" A heuristic energy-aware approach for hard real-time systems on multi-core platforms","author":[{"first_name":"Da","full_name":"He, Da","last_name":"He"},{"last_name":"Müller","full_name":"Müller, Wolfgang","id":"16243","first_name":"Wolfgang"}],"date_created":"2021-10-07T09:49:15Z","date_updated":"2022-01-06T06:57:12Z","citation":{"ama":"He D, Müller W.  A heuristic energy-aware approach for hard real-time systems on multi-core platforms. <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>. Published online 2013:845-857.","ieee":"D. He and W. Müller, “ A heuristic energy-aware approach for hard real-time systems on multi-core platforms,” <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>, pp. 845–857, 2013.","chicago":"He, Da, and Wolfgang Müller. “ A Heuristic Energy-Aware Approach for Hard Real-Time Systems on Multi-Core Platforms.” <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>, 2013, 845–57.","bibtex":"@article{He_Müller_2013, title={ A heuristic energy-aware approach for hard real-time systems on multi-core platforms}, journal={Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)}, author={He, Da and Müller, Wolfgang}, year={2013}, pages={845–857} }","short":"D. He, W. Müller, Microprocessors and Microsystems - Embedded Hardware Design 37(6-7) (2013) 845–857.","mla":"He, Da, and Wolfgang Müller. “ A Heuristic Energy-Aware Approach for Hard Real-Time Systems on Multi-Core Platforms.” <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>, 2013, pp. 845–57.","apa":"He, D., &#38; Müller, W. (2013).  A heuristic energy-aware approach for hard real-time systems on multi-core platforms. <i>Microprocessors and Microsystems - Embedded Hardware Design 37(6-7)</i>, 845–857."},"page":"845-857","year":"2013"},{"citation":{"ama":"Schirner G, Götz M, Rettberg A, Zanella MC, Rammig F-J, eds. <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer; 2013.","ieee":"G. Schirner, M. Götz, A. Rettberg, M. C. Zanella, and F.-J. Rammig, Eds., <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer, 2013.","chicago":"Schirner, Gunar, Marcelo Götz, Achim Rettberg, Mauro C. Zanella, and Franz-Josef Rammig, eds. <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Band IFIP AICT 403 . Springer, 2013.","mla":"Schirner, Gunar, et al., editors. <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer, 2013.","short":"G. Schirner, M. Götz, A. Rettberg, M.C. Zanella, F.-J. Rammig, eds., Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013, Springer, 2013.","bibtex":"@book{Schirner_Götz_Rettberg_Zanella_Rammig_2013, series={Band IFIP AICT 403 }, title={Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013}, publisher={Springer}, year={2013}, collection={Band IFIP AICT 403 } }","apa":"Schirner, G., Götz, M., Rettberg, A., Zanella, M. C., &#38; Rammig, F.-J. (Eds.). (2013). <i>Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013</i>. Springer."},"year":"2013","title":"Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013","date_created":"2021-10-07T09:54:44Z","date_updated":"2022-01-06T06:57:12Z","publisher":"Springer","status":"public","editor":[{"first_name":"Gunar","last_name":"Schirner","full_name":"Schirner, Gunar"},{"first_name":"Marcelo","full_name":"Götz, Marcelo","last_name":"Götz"},{"last_name":"Rettberg","full_name":"Rettberg, Achim","first_name":"Achim"},{"first_name":"Mauro C.","full_name":"Zanella, Mauro C.","last_name":"Zanella"},{"first_name":"Franz-Josef","last_name":"Rammig","full_name":"Rammig, Franz-Josef"}],"type":"book_editor","language":[{"iso":"eng"}],"department":[{"_id":"672"}],"series_title":"Band IFIP AICT 403 ","user_id":"21240","_id":"25741"},{"title":"Organic Programming of Real-Time Operating Systems","author":[{"full_name":"Khaluf, Lial","last_name":"Khaluf","first_name":"Lial"},{"first_name":"Franz-Josef","full_name":"Rammig, Franz-Josef","last_name":"Rammig"}],"date_created":"2021-10-07T09:56:53Z","date_updated":"2022-01-06T06:57:12Z","citation":{"apa":"Khaluf, L., &#38; Rammig, F.-J. (2013). Organic Programming of Real-Time Operating Systems. <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>.","short":"L. Khaluf, F.-J. Rammig, in: The Ninth International Conference on Autonomic and Autonomous Systems, 2013.","bibtex":"@inproceedings{Khaluf_Rammig_2013, title={Organic Programming of Real-Time Operating Systems}, booktitle={The Ninth International Conference on Autonomic and Autonomous Systems}, author={Khaluf, Lial and Rammig, Franz-Josef}, year={2013} }","mla":"Khaluf, Lial, and Franz-Josef Rammig. “Organic Programming of Real-Time Operating Systems.” <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>, 2013.","ieee":"L. Khaluf and F.-J. Rammig, “Organic Programming of Real-Time Operating Systems,” 2013.","chicago":"Khaluf, Lial, and Franz-Josef Rammig. “Organic Programming of Real-Time Operating Systems.” In <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>, 2013.","ama":"Khaluf L, Rammig F-J. Organic Programming of Real-Time Operating Systems. In: <i>The Ninth International Conference on Autonomic and Autonomous Systems</i>. ; 2013."},"year":"2013","language":[{"iso":"eng"}],"department":[{"_id":"672"}],"user_id":"21240","_id":"25742","status":"public","publication":"The Ninth International Conference on Autonomic and Autonomous Systems","type":"conference"},{"title":"Methods for the Design and Development","date_created":"2021-10-07T10:07:43Z","author":[{"full_name":"Anacker, Harald","last_name":"Anacker","first_name":"Harald"},{"first_name":"Michael","full_name":"Dellnitz, Michael","last_name":"Dellnitz"},{"full_name":"Flaßkamp, Kathrin","last_name":"Flaßkamp","first_name":"Kathrin"},{"last_name":"Grösbrink","full_name":"Grösbrink, Stefan","first_name":"Stefan"},{"last_name":"Hartmann","full_name":"Hartmann, Philip","first_name":"Philip"},{"last_name":"Heinzemann","full_name":"Heinzemann, Christian","first_name":"Christian"},{"full_name":"Horenkamp, Christian","last_name":"Horenkamp","first_name":"Christian"},{"first_name":"Lisa","full_name":"Kleinjohann, Lisa","id":"15588","last_name":"Kleinjohann"},{"first_name":"Bernd","full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann"},{"last_name":"Korf","full_name":"Korf, Sebastian","first_name":"Sebastian"},{"first_name":"Martin","full_name":"Krüger, Martin","last_name":"Krüger"},{"first_name":"Wolfgang","id":"16243","full_name":"Müller, Wolfgang","last_name":"Müller"},{"last_name":"Ober-Blöbaum","id":"16494","full_name":"Ober-Blöbaum, Sina","first_name":"Sina"},{"id":"383","full_name":"Oberthür, Simon","last_name":"Oberthür","first_name":"Simon"},{"first_name":"Mario","last_name":"Porrmann","full_name":"Porrmann, Mario"},{"full_name":"Priesterjahn, Claudia","last_name":"Priesterjahn","first_name":"Claudia"},{"last_name":"Radkowski","full_name":"Radkowski, W.","first_name":"W."},{"first_name":"Christoph","full_name":"Rasche, Christoph","last_name":"Rasche"},{"first_name":"Jan","last_name":"Rieke","full_name":"Rieke, Jan"},{"first_name":"Maik","last_name":"Ringkamp","full_name":"Ringkamp, Maik"},{"last_name":"Stahl","full_name":"Stahl, Katharina","first_name":"Katharina"},{"last_name":"Steenken","full_name":"Steenken, Dominik","first_name":"Dominik"},{"last_name":"Stöcklein","full_name":"Stöcklein, Jörg","first_name":"Jörg"},{"first_name":"Robert","full_name":"Timmermann, Robert","last_name":"Timmermann"},{"last_name":"Trächtler","full_name":"Trächtler, Ansgar","id":"552","first_name":"Ansgar"},{"first_name":"Katrin","last_name":"Witting","full_name":"Witting, Katrin"},{"full_name":"Xie, Tao","last_name":"Xie","first_name":"Tao"},{"full_name":"Ziegert, Steffen","last_name":"Ziegert","first_name":"Steffen"}],"publisher":"Springer-Verlag","date_updated":"2022-01-06T06:57:12Z","citation":{"chicago":"Anacker, Harald, Michael Dellnitz, Kathrin Flaßkamp, Stefan Grösbrink, Philip Hartmann, Christian Heinzemann, Christian Horenkamp, et al. “Methods for the Design and Development.” In <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i>, 187–356. Heidelberg: Springer-Verlag, 2013.","ieee":"H. Anacker <i>et al.</i>, “Methods for the Design and Development,” in <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i>, Heidelberg: Springer-Verlag, 2013, pp. 187–356.","ama":"Anacker H, Dellnitz M, Flaßkamp K, et al. Methods for the Design and Development. In: <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i>. Springer-Verlag; 2013:187-356.","mla":"Anacker, Harald, et al. “Methods for the Design and Development.” <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i>, Springer-Verlag, 2013, pp. 187–356.","bibtex":"@inbook{Anacker_Dellnitz_Flaßkamp_Grösbrink_Hartmann_Heinzemann_Horenkamp_Kleinjohann_Kleinjohann_Korf_et al._2013, place={Heidelberg}, title={Methods for the Design and Development}, booktitle={Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future}, publisher={Springer-Verlag}, author={Anacker, Harald and Dellnitz, Michael and Flaßkamp, Kathrin and Grösbrink, Stefan and Hartmann, Philip and Heinzemann, Christian and Horenkamp, Christian and Kleinjohann, Lisa and Kleinjohann, Bernd and Korf, Sebastian and et al.}, year={2013}, pages={187–356} }","short":"H. Anacker, M. Dellnitz, K. Flaßkamp, S. Grösbrink, P. Hartmann, C. Heinzemann, C. Horenkamp, L. Kleinjohann, B. Kleinjohann, S. Korf, M. Krüger, W. Müller, S. Ober-Blöbaum, S. Oberthür, M. Porrmann, C. Priesterjahn, W. Radkowski, C. Rasche, J. Rieke, M. Ringkamp, K. Stahl, D. Steenken, J. Stöcklein, R. Timmermann, A. Trächtler, K. Witting, T. Xie, S. Ziegert, in: Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future, Springer-Verlag, Heidelberg, 2013, pp. 187–356.","apa":"Anacker, H., Dellnitz, M., Flaßkamp, K., Grösbrink, S., Hartmann, P., Heinzemann, C., Horenkamp, C., Kleinjohann, L., Kleinjohann, B., Korf, S., Krüger, M., Müller, W., Ober-Blöbaum, S., Oberthür, S., Porrmann, M., Priesterjahn, C., Radkowski, W., Rasche, C., Rieke, J., … Ziegert, S. (2013). Methods for the Design and Development. In <i>Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future</i> (pp. 187–356). Springer-Verlag."},"page":"187-356","place":"Heidelberg","year":"2013","language":[{"iso":"eng"}],"user_id":"21240","department":[{"_id":"672"}],"_id":"25743","status":"public","type":"book_chapter","publication":"Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future"},{"series_title":"Lecture Notes in Computer Science","user_id":"82920","department":[{"_id":"600"}],"_id":"3813","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the Sixth International Joint Conference on Natural Language Processing","status":"public","editor":[{"full_name":"Gelbukh, Alexander","last_name":"Gelbukh","first_name":"Alexander"}],"date_created":"2018-08-02T13:38:39Z","author":[{"first_name":"Henning","full_name":"Wachsmuth, Henning","id":"3900","last_name":"Wachsmuth"},{"first_name":"Benno","last_name":"Stein","full_name":"Stein, Benno"},{"first_name":"Gregor","full_name":"Engels, Gregor","last_name":"Engels"}],"date_updated":"2022-01-06T06:59:37Z","main_file_link":[{"url":"https://www.aclweb.org/anthology/I13-1061.pdf"}],"title":"Learning Efficient Information Extraction on Heterogeneous Texts","citation":{"ama":"Wachsmuth H, Stein B, Engels G. Learning Efficient Information Extraction on Heterogeneous Texts. In: Gelbukh A, ed. <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>. Lecture Notes in Computer Science. ; 2013:534-542.","chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Learning Efficient Information Extraction on Heterogeneous Texts.” In <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, edited by Alexander Gelbukh, 534–42. Lecture Notes in Computer Science, 2013.","ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Learning Efficient Information Extraction on Heterogeneous Texts,” in <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, 2013, pp. 534–542.","short":"H. Wachsmuth, B. Stein, G. Engels, in: A. Gelbukh (Ed.), Proceedings of the Sixth International Joint Conference on Natural Language Processing, 2013, pp. 534–542.","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2013, series={Lecture Notes in Computer Science}, title={Learning Efficient Information Extraction on Heterogeneous Texts}, booktitle={Proceedings of the Sixth International Joint Conference on Natural Language Processing}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={534–542}, collection={Lecture Notes in Computer Science} }","mla":"Wachsmuth, Henning, et al. “Learning Efficient Information Extraction on Heterogeneous Texts.” <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, edited by Alexander Gelbukh, 2013, pp. 534–42.","apa":"Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Learning Efficient Information Extraction on Heterogeneous Texts. In A. Gelbukh (Ed.), <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i> (pp. 534–542)."},"page":"534-542","year":"2013"},{"status":"public","publication":"Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management","type":"conference","language":[{"iso":"eng"}],"_id":"3814","department":[{"_id":"600"}],"user_id":"82920","year":"2013","page":"2049-2058","citation":{"ama":"Wachsmuth H, Stein B, Engels G. Information Extraction as a Filtering Task. In: <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>. ; 2013:2049-2058.","ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Information Extraction as a Filtering Task,” in <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2013, pp. 2049–2058.","chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Information Extraction as a Filtering Task.” In <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2049–58, 2013.","apa":"Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Information Extraction as a Filtering Task. In <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i> (pp. 2049–2058).","short":"H. Wachsmuth, B. Stein, G. Engels, in: Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management, 2013, pp. 2049–2058.","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2013, title={Information Extraction as a Filtering Task}, booktitle={Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, year={2013}, pages={2049–2058} }","mla":"Wachsmuth, Henning, et al. “Information Extraction as a Filtering Task.” <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2013, pp. 2049–58."},"publication_identifier":{"isbn":["978-1-4503-2263-8"]},"title":"Information Extraction as a Filtering Task","main_file_link":[{"url":"https://dl.acm.org/doi/pdf/10.1145/2505515.2505557"}],"date_updated":"2022-01-06T06:59:37Z","date_created":"2018-08-02T13:38:40Z","author":[{"full_name":"Wachsmuth, Henning","id":"3900","last_name":"Wachsmuth","first_name":"Henning"},{"first_name":"Benno","last_name":"Stein","full_name":"Stein, Benno"},{"full_name":"Engels, Gregor","last_name":"Engels","first_name":"Gregor"}]},{"type":"conference","publication":"14th International Conference on Intelligent Text Processing and Computational Linguistics","status":"public","editor":[{"first_name":"Alexander","last_name":"Gelbukh","full_name":"Gelbukh, Alexander"}],"series_title":"Lecture Notes in Computer Science","user_id":"82920","department":[{"_id":"600"}],"_id":"3876","language":[{"iso":"eng"}],"citation":{"apa":"Wachsmuth, H., Rose, M., &#38; Engels, G. (2013). Automatic Pipeline Construction for Real-Time Annotation. In A. Gelbukh (Ed.), <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i> (pp. 38–49).","short":"H. Wachsmuth, M. Rose, G. Engels, in: A. Gelbukh (Ed.), 14th International Conference on Intelligent Text Processing and Computational Linguistics, 2013, pp. 38–49.","mla":"Wachsmuth, Henning, et al. “Automatic Pipeline Construction for Real-Time Annotation.” <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, edited by Alexander Gelbukh, 2013, pp. 38–49.","bibtex":"@inproceedings{Wachsmuth_Rose_Engels_2013, series={Lecture Notes in Computer Science}, title={Automatic Pipeline Construction for Real-Time Annotation}, booktitle={14th International Conference on Intelligent Text Processing and Computational Linguistics}, author={Wachsmuth, Henning and Rose, Mirko and Engels, Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={38–49}, collection={Lecture Notes in Computer Science} }","chicago":"Wachsmuth, Henning, Mirko Rose, and Gregor Engels. “Automatic Pipeline Construction for Real-Time Annotation.” In <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, edited by Alexander Gelbukh, 38–49. Lecture Notes in Computer Science, 2013.","ieee":"H. Wachsmuth, M. Rose, and G. Engels, “Automatic Pipeline Construction for Real-Time Annotation,” in <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, 2013, pp. 38–49.","ama":"Wachsmuth H, Rose M, Engels G. Automatic Pipeline Construction for Real-Time Annotation. In: Gelbukh A, ed. <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>. Lecture Notes in Computer Science. ; 2013:38-49."},"page":"38-49","year":"2013","author":[{"last_name":"Wachsmuth","id":"3900","full_name":"Wachsmuth, Henning","first_name":"Henning"},{"first_name":"Mirko","last_name":"Rose","full_name":"Rose, Mirko"},{"full_name":"Engels, Gregor","last_name":"Engels","first_name":"Gregor"}],"date_created":"2018-08-11T16:12:29Z","date_updated":"2022-01-06T06:59:47Z","main_file_link":[{"url":"https://webis.de/downloads/publications/papers/wachsmuth_2013.pdf"}],"title":"Automatic Pipeline Construction for Real-Time Annotation"},{"_id":"2909","user_id":"25078","department":[{"_id":"64"}],"type":"dissertation","status":"public","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","author":[{"first_name":"Daniel","last_name":"Kuntze","full_name":"Kuntze, Daniel"}],"date_created":"2018-05-25T10:07:42Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"title":"Practical algorithms for clustering and modeling large data sets - Analysis and improvements","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12721"}],"year":"2013","citation":{"apa":"Kuntze, D. (2013). <i>Practical algorithms for clustering and modeling large data sets - Analysis and improvements</i>. Universität Paderborn.","short":"D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.","mla":"Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.","bibtex":"@book{Kuntze_2013, title={Practical algorithms for clustering and modeling large data sets - Analysis and improvements}, publisher={Universität Paderborn}, author={Kuntze, Daniel}, year={2013} }","chicago":"Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.","ieee":"D. Kuntze, <i>Practical algorithms for clustering and modeling large data sets - Analysis and improvements</i>. Universität Paderborn, 2013.","ama":"Kuntze D. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn; 2013."}},{"status":"public","type":"report","extern":"1","_id":"2917","department":[{"_id":"64"}],"user_id":"48090","year":"2013","citation":{"apa":"Juhnke, J., Lefmann, H., &#38; Strehl, V. (2013). <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI.","mla":"Juhnke, Jakob, et al. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","bibtex":"@book{Juhnke_Lefmann_Strehl_2013, title={An Approach for Determining Optimal Contrast in Visual Cryptography}, publisher={Fortschritt-Berichte VDI}, author={Juhnke, Jakob and Lefmann, Hanno and Strehl, Volker}, year={2013} }","short":"J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography, Fortschritt-Berichte VDI, 2013.","ieee":"J. Juhnke, H. Lefmann, and V. Strehl, <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","chicago":"Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","ama":"Juhnke J, Lefmann H, Strehl V. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI; 2013."},"title":"An Approach for Determining Optimal Contrast in Visual Cryptography","publisher":"Fortschritt-Berichte VDI","date_updated":"2022-01-06T06:58:47Z","date_created":"2018-05-25T11:42:38Z","author":[{"first_name":"Jakob","last_name":"Juhnke","id":"48090","full_name":"Juhnke, Jakob"},{"last_name":"Lefmann","full_name":"Lefmann, Hanno","first_name":"Hanno"},{"first_name":"Volker","last_name":"Strehl","full_name":"Strehl, Volker"}]},{"doi":"10.1007/978-3-642-40026-1_10","title":"Improved Side Channel Attacks on Pairing Based Cryptography","date_created":"2018-06-05T07:33:22Z","author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:49Z","citation":{"apa":"Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>","mla":"Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.” <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg, 2013, pp. 154–68, doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>.","bibtex":"@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>}, booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2013}, pages={154–168} }","short":"J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.","ama":"Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>","ieee":"J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>."},"page":"154-168","year":"2013","place":"Berlin, Heidelberg","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642400254","9783642400261"]},"user_id":"25078","department":[{"_id":"64"}],"_id":"2979","status":"public","type":"book_chapter","publication":"Constructive Side-Channel Analysis and Secure Design"},{"date_updated":"2022-01-06T06:58:57Z","author":[{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"full_name":"Schwenk, Jörg","last_name":"Schwenk","first_name":"Jörg"}],"date_created":"2018-06-07T09:22:18Z","title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","doi":"10.1007/s00145-012-9120-y","issue":"2","year":"2013","page":"225--245","citation":{"apa":"Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>.","ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.","ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>"},"_id":"3129","department":[{"_id":"558"}],"user_id":"38235","extern":"1","publication":"J. Cryptology","type":"journal_article","status":"public"},{"type":"conference","publication":"Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings","status":"public","_id":"3130","user_id":"38235","department":[{"_id":"558"}],"extern":"1","year":"2013","citation":{"bibtex":"@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical Signatures from Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}, year={2013}, pages={461--485} }","short":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.","mla":"Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485, doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>.","apa":"Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks, C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i> (pp. 461--485). <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>","ieee":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.","chicago":"Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 461--485, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>.","ama":"Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485. doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>"},"page":"461--485","date_updated":"2022-01-06T06:58:58Z","date_created":"2018-06-07T09:22:39Z","author":[{"last_name":"Böhl","full_name":"Böhl, Florian","first_name":"Florian"},{"last_name":"Hofheinz","full_name":"Hofheinz, Dennis","first_name":"Dennis"},{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"full_name":"Koch, Jessica","last_name":"Koch","first_name":"Jessica"},{"last_name":"Hong Seo","full_name":"Hong Seo, Jae","first_name":"Jae"},{"first_name":"Christoph","full_name":"Striecks, Christoph","last_name":"Striecks"}],"title":"Practical Signatures from Standard Assumptions","doi":"10.1007/978-3-642-38348-9_28"}]
