[{"date_created":"2018-05-25T11:42:38Z","author":[{"first_name":"Jakob","last_name":"Juhnke","id":"48090","full_name":"Juhnke, Jakob"},{"last_name":"Lefmann","full_name":"Lefmann, Hanno","first_name":"Hanno"},{"last_name":"Strehl","full_name":"Strehl, Volker","first_name":"Volker"}],"date_updated":"2022-01-06T06:58:47Z","publisher":"Fortschritt-Berichte VDI","title":"An Approach for Determining Optimal Contrast in Visual Cryptography","citation":{"apa":"Juhnke, J., Lefmann, H., &#38; Strehl, V. (2013). <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI.","bibtex":"@book{Juhnke_Lefmann_Strehl_2013, title={An Approach for Determining Optimal Contrast in Visual Cryptography}, publisher={Fortschritt-Berichte VDI}, author={Juhnke, Jakob and Lefmann, Hanno and Strehl, Volker}, year={2013} }","mla":"Juhnke, Jakob, et al. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","short":"J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography, Fortschritt-Berichte VDI, 2013.","ieee":"J. Juhnke, H. Lefmann, and V. Strehl, <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","chicago":"Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","ama":"Juhnke J, Lefmann H, Strehl V. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI; 2013."},"year":"2013","department":[{"_id":"64"}],"user_id":"48090","_id":"2917","extern":"1","type":"report","status":"public"},{"citation":{"mla":"Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.” <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg, 2013, pp. 154–68, doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>.","bibtex":"@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>}, booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2013}, pages={154–168} }","short":"J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.","apa":"Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>.","ieee":"J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.","ama":"Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>"},"page":"154-168","place":"Berlin, Heidelberg","year":"2013","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642400254","9783642400261"]},"doi":"10.1007/978-3-642-40026-1_10","title":"Improved Side Channel Attacks on Pairing Based Cryptography","date_created":"2018-06-05T07:33:22Z","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"last_name":"Liske","full_name":"Liske, Gennadij","first_name":"Gennadij"}],"date_updated":"2022-01-06T06:58:49Z","publisher":"Springer Berlin Heidelberg","status":"public","type":"book_chapter","publication":"Constructive Side-Channel Analysis and Secure Design","user_id":"25078","department":[{"_id":"64"}],"_id":"2979"},{"date_created":"2018-06-07T09:22:18Z","author":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_updated":"2022-01-06T06:58:57Z","doi":"10.1007/s00145-012-9120-y","title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","issue":"2","page":"225--245","citation":{"ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>.","ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>.","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.","apa":"Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>"},"year":"2013","department":[{"_id":"558"}],"user_id":"38235","_id":"3129","extern":"1","publication":"J. Cryptology","type":"journal_article","status":"public"},{"page":"461--485","citation":{"ama":"Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485. doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>","chicago":"Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 461--485, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>.","ieee":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.","apa":"Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks, C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i> (pp. 461--485). <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>","bibtex":"@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical Signatures from Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}, year={2013}, pages={461--485} }","short":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.","mla":"Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485, doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>."},"year":"2013","doi":"10.1007/978-3-642-38348-9_28","title":"Practical Signatures from Standard Assumptions","author":[{"last_name":"Böhl","full_name":"Böhl, Florian","first_name":"Florian"},{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Jessica","full_name":"Koch, Jessica","last_name":"Koch"},{"last_name":"Hong Seo","full_name":"Hong Seo, Jae","first_name":"Jae"},{"first_name":"Christoph","last_name":"Striecks","full_name":"Striecks, Christoph"}],"date_created":"2018-06-07T09:22:39Z","date_updated":"2022-01-06T06:58:58Z","status":"public","publication":"Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings","type":"conference","extern":"1","department":[{"_id":"558"}],"user_id":"38235","_id":"3130"},{"extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3131","status":"public","type":"conference","publication":"20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013","title":"One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography","date_created":"2018-06-07T09:23:49Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"first_name":"Kenneth G.","full_name":"Paterson, Kenneth G.","last_name":"Paterson"},{"first_name":"Juraj","full_name":"Somorovsky, Juraj","last_name":"Somorovsky"}],"date_updated":"2022-01-06T06:58:58Z","citation":{"ama":"Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>. ; 2013.","chicago":"Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","ieee":"T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography,” in <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","apa":"Jager, T., Paterson, K. G., &#38; Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>.","bibtex":"@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2013} }","mla":"Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","short":"T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013."},"year":"2013"},{"status":"public","editor":[{"full_name":"Beyer, Dirk","last_name":"Beyer","first_name":"Dirk"},{"full_name":"Boreale, Michele","last_name":"Boreale","first_name":"Michele"}],"type":"conference","publication":"Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings","series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3176","citation":{"bibtex":"@inproceedings{Isenberg_Steenken_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={Bounded Model Checking of Graph Transformation Systems via {SMT} Solving}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>}, booktitle={Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings}, author={Isenberg, Tobias and Steenken, Dominik and Wehrheim, Heike}, editor={Beyer, Dirk and Boreale, MicheleEditors}, year={2013}, pages={178--192}, collection={Lecture Notes in Computer Science} }","mla":"Isenberg, Tobias, et al. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and Michele Boreale, 2013, pp. 178--192, doi:<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>.","short":"T. Isenberg, D. Steenken, H. Wehrheim, in: D. Beyer, M. Boreale (Eds.), Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, 2013, pp. 178--192.","apa":"Isenberg, T., Steenken, D., &#38; Wehrheim, H. (2013). Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In D. Beyer &#38; M. Boreale (Eds.), <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i> (pp. 178--192). <a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">https://doi.org/10.1007/978-3-642-38592-6_13</a>","ieee":"T. Isenberg, D. Steenken, and H. Wehrheim, “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving,” in <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, 2013, pp. 178--192.","chicago":"Isenberg, Tobias, Dominik Steenken, and Heike Wehrheim. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” In <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and Michele Boreale, 178--192. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">https://doi.org/10.1007/978-3-642-38592-6_13</a>.","ama":"Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>. Lecture Notes in Computer Science. ; 2013:178--192. doi:<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>"},"page":"178--192","year":"2013","doi":"10.1007/978-3-642-38592-6_13","title":"Bounded Model Checking of Graph Transformation Systems via {SMT} Solving","date_created":"2018-06-13T08:08:39Z","author":[{"first_name":"Tobias","last_name":"Isenberg","full_name":"Isenberg, Tobias"},{"full_name":"Steenken, Dominik","last_name":"Steenken","first_name":"Dominik"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_updated":"2022-01-06T06:59:02Z"},{"_id":"3177","department":[{"_id":"77"}],"series_title":"Lecture Notes in Computer Science","user_id":"29719","editor":[{"full_name":"Bertacco, Valeria","last_name":"Bertacco","first_name":"Valeria"},{"full_name":"Legay, Axel","last_name":"Legay","first_name":"Axel"}],"status":"public","publication":"Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings","type":"conference","title":"{SPIN} as a Linearizability Checker under Weak Memory Models","doi":"10.1007/978-3-319-03077-7_21","date_updated":"2022-01-06T06:59:02Z","date_created":"2018-06-13T08:09:44Z","author":[{"full_name":"Travkin, Oleg","last_name":"Travkin","first_name":"Oleg"},{"full_name":"Mütze, Annika","last_name":"Mütze","first_name":"Annika"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"year":"2013","page":"311--326","citation":{"apa":"Travkin, O., Mütze, A., &#38; Wehrheim, H. (2013). {SPIN} as a Linearizability Checker under Weak Memory Models. In V. Bertacco &#38; A. Legay (Eds.), <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i> (pp. 311--326). <a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">https://doi.org/10.1007/978-3-319-03077-7_21</a>","mla":"Travkin, Oleg, et al. “{SPIN} as a Linearizability Checker under Weak Memory Models.” <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 2013, pp. 311--326, doi:<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>.","bibtex":"@inproceedings{Travkin_Mütze_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={{SPIN} as a Linearizability Checker under Weak Memory Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>}, booktitle={Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings}, author={Travkin, Oleg and Mütze, Annika and Wehrheim, Heike}, editor={Bertacco, Valeria and Legay, AxelEditors}, year={2013}, pages={311--326}, collection={Lecture Notes in Computer Science} }","short":"O. Travkin, A. Mütze, H. Wehrheim, in: V. Bertacco, A. Legay (Eds.), Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013, pp. 311--326.","ama":"Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under Weak Memory Models. In: Bertacco V, Legay A, eds. <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>. Lecture Notes in Computer Science. ; 2013:311--326. doi:<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>","ieee":"O. Travkin, A. Mütze, and H. Wehrheim, “{SPIN} as a Linearizability Checker under Weak Memory Models,” in <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, 2013, pp. 311--326.","chicago":"Travkin, Oleg, Annika Mütze, and Heike Wehrheim. “{SPIN} as a Linearizability Checker under Weak Memory Models.” In <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 311--326. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">https://doi.org/10.1007/978-3-319-03077-7_21</a>."}},{"user_id":"29719","series_title":"Lecture Notes in Computer Science","department":[{"_id":"77"}],"_id":"3178","type":"conference","publication":"Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings","status":"public","editor":[{"full_name":"Liu, Zhiming","last_name":"Liu","first_name":"Zhiming"},{"first_name":"Jim","full_name":"Woodcock, Jim","last_name":"Woodcock"},{"first_name":"Huibiao","full_name":"Zhu, Huibiao","last_name":"Zhu"}],"author":[{"last_name":"Dongol","full_name":"Dongol, Brijesh","first_name":"Brijesh"},{"first_name":"Oleg","full_name":"Travkin, Oleg","last_name":"Travkin"},{"first_name":"John","last_name":"Derrick","full_name":"Derrick, John"},{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2018-06-13T08:13:31Z","date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-642-39718-9_11","title":"A High-Level Semantics for Program Execution under Total Store Order Memory","citation":{"bibtex":"@inproceedings{Dongol_Travkin_Derrick_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={A High-Level Semantics for Program Execution under Total Store Order Memory}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, author={Dongol, Brijesh and Travkin, Oleg and Derrick, John and Wehrheim, Heike}, editor={Liu, Zhiming and Woodcock, Jim and Zhu, HuibiaoEditors}, year={2013}, pages={177--194}, collection={Lecture Notes in Computer Science} }","mla":"Dongol, Brijesh, et al. “A High-Level Semantics for Program Execution under Total Store Order Memory.” <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu et al., 2013, pp. 177--194, doi:<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>.","short":"B. Dongol, O. Travkin, J. Derrick, H. Wehrheim, in: Z. Liu, J. Woodcock, H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194.","apa":"Dongol, B., Travkin, O., Derrick, J., &#38; Wehrheim, H. (2013). A High-Level Semantics for Program Execution under Total Store Order Memory. In Z. Liu, J. Woodcock, &#38; H. Zhu (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i> (pp. 177--194). <a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">https://doi.org/10.1007/978-3-642-39718-9_11</a>","ieee":"B. Dongol, O. Travkin, J. Derrick, and H. Wehrheim, “A High-Level Semantics for Program Execution under Total Store Order Memory,” in <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, 2013, pp. 177--194.","chicago":"Dongol, Brijesh, Oleg Travkin, John Derrick, and Heike Wehrheim. “A High-Level Semantics for Program Execution under Total Store Order Memory.” In <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu, Jim Woodcock, and Huibiao Zhu, 177--194. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">https://doi.org/10.1007/978-3-642-39718-9_11</a>.","ama":"Dongol B, Travkin O, Derrick J, Wehrheim H. A High-Level Semantics for Program Execution under Total Store Order Memory. In: Liu Z, Woodcock J, Zhu H, eds. <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>. Lecture Notes in Computer Science. ; 2013:177--194. doi:<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>"},"page":"177--194","year":"2013"},{"title":"Temporal Reconfiguration Plans for Self-Adaptive Systems","author":[{"first_name":"Steffen","full_name":"Ziegert, Steffen","last_name":"Ziegert"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2018-06-13T08:15:08Z","date_updated":"2022-01-06T06:59:02Z","page":"271--284","citation":{"short":"S. Ziegert, H. Wehrheim, in: S. Kowalewski, B. Rumpe (Eds.), Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen, 2013, pp. 271--284.","bibtex":"@inproceedings{Ziegert_Wehrheim_2013, series={{LNI}}, title={Temporal Reconfiguration Plans for Self-Adaptive Systems}, booktitle={Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen}, author={Ziegert, Steffen and Wehrheim, Heike}, editor={Kowalewski, Stefan and Rumpe, BernhardEditors}, year={2013}, pages={271--284}, collection={{LNI}} }","mla":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for Self-Adaptive Systems.” <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, edited by Stefan Kowalewski and Bernhard Rumpe, 2013, pp. 271--284.","apa":"Ziegert, S., &#38; Wehrheim, H. (2013). Temporal Reconfiguration Plans for Self-Adaptive Systems. In S. Kowalewski &#38; B. Rumpe (Eds.), <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i> (pp. 271--284).","ieee":"S. Ziegert and H. Wehrheim, “Temporal Reconfiguration Plans for Self-Adaptive Systems,” in <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, 2013, pp. 271--284.","chicago":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for Self-Adaptive Systems.” In <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, edited by Stefan Kowalewski and Bernhard Rumpe, 271--284. {LNI}, 2013.","ama":"Ziegert S, Wehrheim H. Temporal Reconfiguration Plans for Self-Adaptive Systems. In: Kowalewski S, Rumpe B, eds. <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>. {LNI}. ; 2013:271--284."},"year":"2013","department":[{"_id":"77"}],"series_title":"{LNI}","user_id":"29719","_id":"3179","status":"public","editor":[{"full_name":"Kowalewski, Stefan","last_name":"Kowalewski","first_name":"Stefan"},{"first_name":"Bernhard","last_name":"Rumpe","full_name":"Rumpe, Bernhard"}],"publication":"Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen","type":"conference"},{"department":[{"_id":"672"}],"user_id":"21240","_id":"27054","language":[{"iso":"eng"}],"type":"conference","status":"public","volume":311,"date_created":"2021-11-02T10:53:04Z","author":[{"first_name":"Jürgen","full_name":"Gausemeier, Jürgen","last_name":"Gausemeier"},{"full_name":"Grafe, Michael","last_name":"Grafe","first_name":"Michael"},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"publisher":"Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 ","date_updated":"2022-01-06T06:57:33Z","conference":{"name":"18. - 19. Apr. 2013, Heinz Nixdorf Institut"},"title":"11. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung","intvolume":"       311","citation":{"ama":"Gausemeier J, Grafe M, Meyer auf der Heide F. 11. Paderborner Workshop Augmented &#38; Virtual Reality in der Produktentstehung. In: Vol 311. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 ; 2013.","chicago":"Gausemeier, Jürgen, Michael Grafe, and Friedhelm Meyer auf der Heide. “11. Paderborner Workshop Augmented &#38; Virtual Reality in Der Produktentstehung,” Vol. 311. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 , 2013.","ieee":"J. Gausemeier, M. Grafe, and F. Meyer auf der Heide, “11. Paderborner Workshop Augmented &#38; Virtual Reality in der Produktentstehung,” 2013, vol. 311.","short":"J. Gausemeier, M. Grafe, F. Meyer auf der Heide, in: Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 , 2013.","bibtex":"@inproceedings{Gausemeier_Grafe_Meyer auf der Heide_2013, title={11. Paderborner Workshop Augmented &#38; Virtual Reality in der Produktentstehung}, volume={311}, publisher={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 }, author={Gausemeier, Jürgen and Grafe, Michael and Meyer auf der Heide, Friedhelm}, year={2013} }","mla":"Gausemeier, Jürgen, et al. <i>11. Paderborner Workshop Augmented &#38; Virtual Reality in Der Produktentstehung</i>. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 , 2013.","apa":"Gausemeier, J., Grafe, M., &#38; Meyer auf der Heide, F. (2013). <i>11. Paderborner Workshop Augmented &#38; Virtual Reality in der Produktentstehung</i>. <i>311</i>."},"year":"2013"},{"type":"conference","status":"public","user_id":"71124","department":[{"_id":"71"}],"_id":"27168","language":[{"iso":"eng"}],"publication_status":"published","citation":{"ieee":"R. Keil and F. Winkelnkemper, “Approaches for an informational separation of powers in learning platforms,” 2013, pp. 131–142.","chicago":"Keil, Reinhard, and Felix Winkelnkemper. “Approaches for an Informational Separation of Powers in Learning Platforms,” 131–42. Society for Informatics, 2013.","ama":"Keil R, Winkelnkemper F. Approaches for an informational separation of powers in learning platforms. In: Society for Informatics; 2013:131-142.","apa":"Keil, R., &#38; Winkelnkemper, F. (2013). <i>Approaches for an informational separation of powers in learning platforms</i>. 131–142.","bibtex":"@inproceedings{Keil_Winkelnkemper_2013, title={Approaches for an informational separation of powers in learning platforms}, publisher={Society for Informatics}, author={Keil, Reinhard and Winkelnkemper, Felix}, year={2013}, pages={131–142} }","mla":"Keil, Reinhard, and Felix Winkelnkemper. <i>Approaches for an Informational Separation of Powers in Learning Platforms</i>. Society for Informatics, 2013, pp. 131–42.","short":"R. Keil, F. Winkelnkemper, in: Society for Informatics, 2013, pp. 131–142."},"page":"131-142","year":"2013","date_created":"2021-11-05T23:26:32Z","author":[{"first_name":"Reinhard","last_name":"Keil","full_name":"Keil, Reinhard"},{"first_name":"Felix","last_name":"Winkelnkemper","full_name":"Winkelnkemper, Felix","id":"3117"}],"date_updated":"2022-01-06T06:57:35Z","publisher":"Society for Informatics","conference":{"name":" DeLFI 2013 - The 11th e-Learning Conference Computer Science,","start_date":"2013-09-08","end_date":"2013-09-11"},"title":"Approaches for an informational separation of powers in learning platforms"},{"title":"„Do You Speak Usability?“ – Aktueller Stand des Glossars und des Curriculums f{\\\"u}r den „Certified Professional for Usability and User Experience (CPUX)“ der German UPA","date_created":"2021-11-05T23:34:47Z","author":[{"full_name":"Fischer, Holger Gerhard","id":"30457","last_name":"Fischer","first_name":"Holger Gerhard"},{"first_name":"Thomas","last_name":"Geis","full_name":"Geis, Thomas"},{"full_name":" Molich, Rolf","last_name":" Molich","first_name":"Rolf"},{"full_name":"Kluge, Oliver ","last_name":"Kluge","first_name":"Oliver "},{"first_name":" R{\\\"u}diger","full_name":"Heimg{\\\"a}rtner,  R{\\\"u}diger","last_name":"Heimg{\\\"a}rtner"},{"first_name":" Peter ","last_name":"Hunkirchen","full_name":"Hunkirchen,  Peter "},{"first_name":"Knut","full_name":"Polkehn, Knut","last_name":"Polkehn"}],"date_updated":"2022-01-06T06:57:35Z","publisher":"German UPA","citation":{"ieee":"H. G. Fischer <i>et al.</i>, “„Do You Speak Usability?“ – Aktueller Stand des Glossars und des Curriculums f{\\\"u}r den „Certified Professional for Usability and User Experience (CPUX)“ der German UPA,” 2013, pp. 28–34.","chicago":"Fischer, Holger Gerhard, Thomas Geis, Rolf  Molich, Oliver  Kluge,  R{\\\"u}diger Heimg{\\\"a}rtner,  Peter  Hunkirchen, and Knut Polkehn. “„Do You Speak Usability?“ – Aktueller Stand Des Glossars Und Des Curriculums F{\\\"u}r Den „Certified Professional for Usability and User Experience (CPUX)“ Der German UPA,” 28–34. German UPA, 2013.","ama":"Fischer HG, Geis T,  Molich R, et al. „Do You Speak Usability?“ – Aktueller Stand des Glossars und des Curriculums f{\\\"u}r den „Certified Professional for Usability and User Experience (CPUX)“ der German UPA. In: German UPA; 2013:28-34.","apa":"Fischer, H. G., Geis, T.,  Molich, R., Kluge, O., Heimg{\\\"a}rtner,  R{\\\"u}diger, Hunkirchen,  Peter , &#38; Polkehn, K. (2013). <i>„Do You Speak Usability?“ – Aktueller Stand des Glossars und des Curriculums f{\\\"u}r den „Certified Professional for Usability and User Experience (CPUX)“ der German UPA</i>. 28–34.","short":"H.G. Fischer, T. Geis, R.  Molich, O. Kluge,  R{\\\"u}diger Heimg{\\\"a}rtner,  Peter  Hunkirchen, K. Polkehn, in: German UPA, 2013, pp. 28–34.","mla":"Fischer, Holger Gerhard, et al. <i>„Do You Speak Usability?“ – Aktueller Stand Des Glossars Und Des Curriculums F{\\\"u}r Den „Certified Professional for Usability and User Experience (CPUX)“ Der German UPA</i>. German UPA, 2013, pp. 28–34.","bibtex":"@inproceedings{Fischer_Geis_ Molich_Kluge_Heimg{\\\"a}rtner_Hunkirchen_Polkehn_2013, title={„Do You Speak Usability?“ – Aktueller Stand des Glossars und des Curriculums f{\\\"u}r den „Certified Professional for Usability and User Experience (CPUX)“ der German UPA}, publisher={German UPA}, author={Fischer, Holger Gerhard and Geis, Thomas and  Molich, Rolf and Kluge, Oliver  and Heimg{\\\"a}rtner,  R{\\\"u}diger and Hunkirchen,  Peter  and Polkehn, Knut}, year={2013}, pages={28–34} }"},"page":"28-34","year":"2013","publication_status":"published","language":[{"iso":"eng"}],"user_id":"71124","department":[{"_id":"71"}],"_id":"27169","status":"public","type":"conference"},{"citation":{"apa":"K {\\ \"u} hnel, B. (2013). <i>Contextual tagging in the coactive knowledge organization</i>. Heinz Nixdorf Institute, Universit {\\ \"a} t Paderborn.","mla":"K {\\ \"u} hnel, Birger. <i>Contextual Tagging in the Coactive Knowledge Organization</i>. Heinz Nixdorf Institute, Universit {\\ \"a} t Paderborn, 2013.","short":"B. K {\\ \"u} hnel, Contextual Tagging in the Coactive Knowledge Organization, Heinz Nixdorf Institute, Universit {\\ \"a} t Paderborn, Universit {\\\" a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science, 2013.","bibtex":"@book{K {\\ \"u} hnel_2013, place={Universit {\\\" a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science}, title={Contextual tagging in the coactive knowledge organization}, publisher={Heinz Nixdorf Institute, Universit {\\ \"a} t Paderborn}, author={K {\\ \"u} hnel, Birger}, year={2013} }","ieee":"B. K {\\ \"u} hnel, <i>Contextual tagging in the coactive knowledge organization</i>. Universit {\\\" a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science: Heinz Nixdorf Institute, Universit {\\ \"a} t Paderborn, 2013.","chicago":"K {\\ \"u} hnel, Birger. <i>Contextual Tagging in the Coactive Knowledge Organization</i>. Universit {\\\" a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science: Heinz Nixdorf Institute, Universit {\\ \"a} t Paderborn, 2013.","ama":"K {\\ \"u} hnel B. <i>Contextual Tagging in the Coactive Knowledge Organization</i>. Heinz Nixdorf Institute, Universit {\\ \"a} t Paderborn; 2013."},"place":"Universit {\\\" a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science","year":"2013","publication_status":"published","title":"Contextual tagging in the coactive knowledge organization","author":[{"last_name":"K {\\ \"u} hnel","full_name":"K {\\ \"u} hnel, Birger","first_name":"Birger"}],"date_created":"2021-11-05T23:37:26Z","publisher":"Heinz Nixdorf Institute, Universit {\\ \"a} t Paderborn","date_updated":"2022-01-06T06:57:35Z","status":"public","type":"dissertation","language":[{"iso":"eng"}],"user_id":"71124","department":[{"_id":"71"}],"_id":"27171"},{"title":"Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design","date_created":"2021-11-05T23:42:55Z","author":[{"first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard","id":"30457","last_name":"Fischer"},{"full_name":"Strenge, Benjamin","last_name":"Strenge","first_name":"Benjamin"},{"first_name":" Karsten","full_name":"Nebe,  Karsten","last_name":"Nebe"}],"publisher":"Springer Verlag","date_updated":"2022-01-06T06:57:35Z","page":"252-261","citation":{"short":"H.G. Fischer, B. Strenge,  Karsten Nebe, (2013) 252–261.","bibtex":"@article{Fischer_Strenge_Nebe_2013, series={LNCS 8012}, title={Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design}, publisher={Springer Verlag}, author={Fischer, Holger Gerhard and Strenge, Benjamin and Nebe,  Karsten}, year={2013}, pages={252–261}, collection={LNCS 8012} }","mla":"Fischer, Holger Gerhard, et al. <i>Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design</i>. Springer Verlag, 2013, pp. 252–61.","apa":"Fischer, H. G., Strenge, B., &#38; Nebe,  Karsten. (2013). <i>Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design</i> (pp. 252–261). Springer Verlag.","ama":"Fischer HG, Strenge B, Nebe  Karsten. Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. Published online 2013:252-261.","ieee":"H. G. Fischer, B. Strenge, and  Karsten Nebe, “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design.” Springer Verlag, pp. 252–261, 2013.","chicago":"Fischer, Holger Gerhard, Benjamin Strenge, and  Karsten Nebe. “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design.” LNCS 8012. Springer Verlag, 2013."},"year":"2013","publication_status":"published","language":[{"iso":"eng"}],"department":[{"_id":"71"}],"series_title":"LNCS 8012","user_id":"71124","_id":"27172","status":"public","type":"conference"},{"department":[{"_id":"71"}],"user_id":"71124","_id":"27173","language":[{"iso":"eng"}],"publication":"FIfF-Kommunikation","type":"journal_article","status":"public","author":[{"full_name":"Keil,  Reinhard","last_name":"Keil","first_name":" Reinhard"},{"id":"497","full_name":"Selke, Harald","last_name":"Selke","first_name":"Harald"},{"full_name":"Winkelnkemper, Felix","id":"3117","last_name":"Winkelnkemper","first_name":"Felix"}],"date_created":"2021-11-05T23:47:18Z","date_updated":"2022-01-06T06:57:35Z","title":"Computer science and education - A struggle for creative sovereignty in society?","page":"61-65","citation":{"chicago":"Keil,  Reinhard, Harald Selke, and Felix Winkelnkemper. “Computer Science and Education - A Struggle for Creative Sovereignty in Society?” <i>FIfF-Kommunikation</i>, 2013, 61–65.","ieee":"Reinhard Keil, H. Selke, and F. Winkelnkemper, “Computer science and education - A struggle for creative sovereignty in society?,” <i>FIfF-Kommunikation</i>, pp. 61–65, 2013.","ama":"Keil  Reinhard, Selke H, Winkelnkemper F. Computer science and education - A struggle for creative sovereignty in society? <i>FIfF-Kommunikation</i>. Published online 2013:61-65.","apa":"Keil,  Reinhard, Selke, H., &#38; Winkelnkemper, F. (2013). Computer science and education - A struggle for creative sovereignty in society? <i>FIfF-Kommunikation</i>, 61–65.","short":"Reinhard Keil, H. Selke, F. Winkelnkemper, FIfF-Kommunikation (2013) 61–65.","bibtex":"@article{Keil_Selke_Winkelnkemper_2013, title={Computer science and education - A struggle for creative sovereignty in society?}, journal={FIfF-Kommunikation}, author={Keil,  Reinhard and Selke, Harald and Winkelnkemper, Felix}, year={2013}, pages={61–65} }","mla":"Keil,  Reinhard, et al. “Computer Science and Education - A Struggle for Creative Sovereignty in Society?” <i>FIfF-Kommunikation</i>, 2013, pp. 61–65."},"year":"2013"},{"language":[{"iso":"eng"}],"department":[{"_id":"71"}],"user_id":"71124","_id":"27174","status":"public","type":"conference","title":"Media contexts - context media","date_created":"2021-11-05T23:49:41Z","author":[{"last_name":"Keil","full_name":"Keil, Reinhard","first_name":"Reinhard"}],"publisher":"Verbrecher Verlag","date_updated":"2022-01-06T06:57:35Z","page":"217-226","citation":{"ieee":"R. Keil, “Media contexts - context media,” 2013, pp. 217–226.","chicago":"Keil, Reinhard. “Media Contexts - Context Media,” 217–26. Berlin: Verbrecher Verlag, 2013.","ama":"Keil R. Media contexts - context media. In: Verbrecher Verlag; 2013:217-226.","apa":"Keil, R. (2013). <i>Media contexts - context media</i>. 217–226.","short":"R. Keil, in: Verbrecher Verlag, Berlin, 2013, pp. 217–226.","bibtex":"@inproceedings{Keil_2013, place={Berlin}, title={Media contexts - context media}, publisher={Verbrecher Verlag}, author={Keil, Reinhard}, year={2013}, pages={217–226} }","mla":"Keil, Reinhard. <i>Media Contexts - Context Media</i>. Verbrecher Verlag, 2013, pp. 217–26."},"place":"Berlin","year":"2013","publication_status":"published"},{"type":"conference","status":"public","department":[{"_id":"71"}],"user_id":"71124","series_title":"LNCS 8028","_id":"27175","language":[{"iso":"eng"}],"publication_status":"published","page":"32-41","citation":{"apa":"Klompmaker, F., Paelke, V., &#38; Fischer, H. G. (2013). <i>A Taxonomy-Based Approach Towards NUI Interaction Design</i> (pp. 32–41). Springer Verlag.","short":"F. Klompmaker, V. Paelke, H.G. Fischer, (2013) 32–41.","bibtex":"@article{Klompmaker_Paelke_Fischer_2013, series={LNCS 8028}, title={A Taxonomy-Based Approach Towards NUI Interaction Design}, publisher={Springer Verlag}, author={Klompmaker, Florian and Paelke, Volker and Fischer, Holger Gerhard}, year={2013}, pages={32–41}, collection={LNCS 8028} }","mla":"Klompmaker, Florian, et al. <i>A Taxonomy-Based Approach Towards NUI Interaction Design</i>. Springer Verlag, 2013, pp. 32–41.","ama":"Klompmaker F, Paelke V, Fischer HG. A Taxonomy-Based Approach Towards NUI Interaction Design. Published online 2013:32-41.","chicago":"Klompmaker, Florian, Volker Paelke, and Holger Gerhard Fischer. “A Taxonomy-Based Approach Towards NUI Interaction Design.” LNCS 8028. Springer Verlag, 2013.","ieee":"F. Klompmaker, V. Paelke, and H. G. Fischer, “A Taxonomy-Based Approach Towards NUI Interaction Design.” Springer Verlag, pp. 32–41, 2013."},"year":"2013","date_created":"2021-11-05T23:52:16Z","author":[{"first_name":"Florian","last_name":"Klompmaker","full_name":"Klompmaker, Florian"},{"first_name":"Volker","full_name":"Paelke, Volker","last_name":"Paelke"},{"id":"30457","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","first_name":"Holger Gerhard"}],"publisher":"Springer Verlag","date_updated":"2022-01-06T06:57:35Z","title":"A Taxonomy-Based Approach Towards NUI Interaction Design"},{"language":[{"iso":"eng"}],"_id":"11619","department":[{"_id":"78"}],"user_id":"3118","abstract":[{"lang":"eng","text":"Reconfigurable circuit devices have opened up a fundamentally new way of creating adaptable systems. Combined with artificial evolution, reconfigurable circuits allow an elegant adaptation approach to compensating for changes in the distribution of input data, computational resource errors, and variations in resource requirements. Referred to as ``Evolvable Hardware'' (EHW), this paradigm has yielded astonishing results for traditional engineering challenges and has discovered intriguing design principles, which have not yet been seen in conventional engineering.\r\n\r\nIn this thesis, we present new and fundamental work on Evolvable Hardware motivated by the insight that Evolvable Hardware needs to compensate for events with different change rates. To solve the challenge of different adaptation speeds, we propose a unified adaptation approach based on multi-objective evolution, evolving and propagating candidate solutions that are diverse in objectives that may experience radical changes.\r\n\r\nFocusing on algorithmic aspects, we enable Cartesian Genetic Programming (CGP) model, which we are using to encode Boolean circuits, for multi-objective optimization by introducing a meaningful recombination operator. We improve the scalability of CGP by objectives scaling, periodization of local- and global-search algorithms, and the automatic acquisition and reuse of subfunctions using age- and cone-based techniques. We validate our methods on the applications of adaptation of hardware classifiers to resource changes, recognition of muscular signals for prosthesis control and optimization of processor caches."}],"status":"public","type":"dissertation","title":"Adapting Hardware Systems by Means of Multi-Objective Evolution","publisher":"Logos Verlag Berlin GmbH","date_updated":"2022-01-06T06:51:04Z","author":[{"last_name":"Kaufmann","full_name":"Kaufmann, Paul","first_name":"Paul"}],"supervisor":[{"first_name":"Marco","full_name":"Platzner, Marco","id":"398","last_name":"Platzner"}],"date_created":"2019-07-11T11:51:51Z","place":"Berlin","year":"2013","page":"249","citation":{"ama":"Kaufmann P. <i>Adapting Hardware Systems by Means of Multi-Objective Evolution</i>. Berlin: Logos Verlag Berlin GmbH; 2013.","ieee":"P. Kaufmann, <i>Adapting Hardware Systems by Means of Multi-Objective Evolution</i>. Berlin: Logos Verlag Berlin GmbH, 2013.","chicago":"Kaufmann, Paul. <i>Adapting Hardware Systems by Means of Multi-Objective Evolution</i>. Berlin: Logos Verlag Berlin GmbH, 2013.","short":"P. Kaufmann, Adapting Hardware Systems by Means of Multi-Objective Evolution, Logos Verlag Berlin GmbH, Berlin, 2013.","bibtex":"@book{Kaufmann_2013, place={Berlin}, title={Adapting Hardware Systems by Means of Multi-Objective Evolution}, publisher={Logos Verlag Berlin GmbH}, author={Kaufmann, Paul}, year={2013} }","mla":"Kaufmann, Paul. <i>Adapting Hardware Systems by Means of Multi-Objective Evolution</i>. Logos Verlag Berlin GmbH, 2013.","apa":"Kaufmann, P. (2013). <i>Adapting Hardware Systems by Means of Multi-Objective Evolution</i>. Berlin: Logos Verlag Berlin GmbH."},"publication_identifier":{"isbn":["978-3-8325-3530-8"]},"publication_status":"published"},{"author":[{"last_name":"Hüwe","id":"13606","full_name":"Hüwe, Marcus","first_name":"Marcus"}],"date_created":"2021-01-13T13:23:53Z","date_updated":"2022-01-06T06:54:42Z","publisher":"Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik","title":"Das Verteilungsproblem für mechatronische Systeme","citation":{"ama":"Hüwe M. <i>Das Verteilungsproblem Für Mechatronische Systeme</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik; 2013.","ieee":"M. Hüwe, <i>Das Verteilungsproblem für mechatronische Systeme</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2013.","chicago":"Hüwe, Marcus. <i>Das Verteilungsproblem Für Mechatronische Systeme</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2013.","apa":"Hüwe, M. (2013). <i>Das Verteilungsproblem für mechatronische Systeme</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik.","mla":"Hüwe, Marcus. <i>Das Verteilungsproblem Für Mechatronische Systeme</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2013.","short":"M. Hüwe, Das Verteilungsproblem Für Mechatronische Systeme, Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2013.","bibtex":"@book{Hüwe_2013, title={Das Verteilungsproblem für mechatronische Systeme}, publisher={Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik}, author={Hüwe, Marcus}, year={2013} }"},"year":"2013","department":[{"_id":"76"}],"user_id":"5786","_id":"20978","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"abstract":[{"lang":"ger","text":"Das Thema Elektromobilität hat in der Fahrzeugindustrie in den letzten Jahren viel Aufmerksamkeit erhalten. Gerade im Bereich der Entwicklung von Steuergeräte-Software ist der Bedarf an frühzeitiger Absicherung hoch. Nur so können Produkteinführungszeiten minimiert und effektiv Entwicklungskosten eingespart werden. Komplexe Werkzeugketten und die verteilte Entwicklung erschweren den Prozess und verlängern die Entwicklungszeit. Das Förderprojekt „Simulationsgestützter Entwurf für Elektrofahrzeuge“, kurz „E-Mobil“, nimmt sich der Herausforderungen einer verteilten Entwicklung von Steuergeräte-Software an. Vier Projektpartner aus Industrie und Forschung untersuchen die Besonderheiten sowohl bzgl. des Entwurfsprozesses, als auch der beteiligten Entwurfswerkzeuge im Vergleich zur konventionellen Fahrzeugentwicklung. Im Fokus stehen die Modellierung und die simulationsgestützte Absicherung in frühen Entwurfsstadien. Die Modellierung umfasst Regelungssoftware sowie die für die Simulation nötigen elektrischen und mechatronischen Komponenten. Die vorliegende Arbeit stellt die Kernthemen sowie aktuelle Ergebnisse aus dem Projekt vor."}],"status":"public","type":"conference","publication":"8. Dortmunder Autotag","language":[{"iso":"eng"}],"_id":"20980","user_id":"5786","department":[{"_id":"76"}],"year":"2013","citation":{"ama":"Farshizadeh E, Briese H, Steinmann D, et al. Simulationsgestützter Entwurf für Elektrofahrzeuge. In: <i>8. Dortmunder Autotag</i>. ; 2013.","chicago":"Farshizadeh, Emad, Hermann Briese, David Steinmann, Lars Stockmann, Steffen Beringer, Dominik Holler, Kay Klobedanz, Christian Heinzemann, Klaus Peter, and Michael Leuer. “Simulationsgestützter Entwurf Für Elektrofahrzeuge.” In <i>8. Dortmunder Autotag</i>, 2013.","ieee":"E. Farshizadeh <i>et al.</i>, “Simulationsgestützter Entwurf für Elektrofahrzeuge,” 2013.","apa":"Farshizadeh, E., Briese, H., Steinmann, D., Stockmann, L., Beringer, S., Holler, D., Klobedanz, K., Heinzemann, C., Peter, K., &#38; Leuer, M. (2013). Simulationsgestützter Entwurf für Elektrofahrzeuge. <i>8. Dortmunder Autotag</i>.","mla":"Farshizadeh, Emad, et al. “Simulationsgestützter Entwurf Für Elektrofahrzeuge.” <i>8. Dortmunder Autotag</i>, 2013.","bibtex":"@inproceedings{Farshizadeh_Briese_Steinmann_Stockmann_Beringer_Holler_Klobedanz_Heinzemann_Peter_Leuer_2013, title={Simulationsgestützter Entwurf für Elektrofahrzeuge}, booktitle={8. Dortmunder Autotag}, author={Farshizadeh, Emad and Briese, Hermann and Steinmann, David and Stockmann, Lars and Beringer, Steffen and Holler, Dominik and Klobedanz, Kay and Heinzemann, Christian and Peter, Klaus and Leuer, Michael}, year={2013} }","short":"E. Farshizadeh, H. Briese, D. Steinmann, L. Stockmann, S. Beringer, D. Holler, K. Klobedanz, C. Heinzemann, K. Peter, M. Leuer, in: 8. Dortmunder Autotag, 2013."},"title":"Simulationsgestützter Entwurf für Elektrofahrzeuge","date_updated":"2022-01-06T06:54:42Z","author":[{"first_name":"Emad","last_name":"Farshizadeh","full_name":"Farshizadeh, Emad"},{"first_name":"Hermann","full_name":"Briese, Hermann","last_name":"Briese"},{"first_name":"David","full_name":"Steinmann, David","last_name":"Steinmann"},{"first_name":"Lars","last_name":"Stockmann","id":"48144","full_name":"Stockmann, Lars"},{"last_name":"Beringer","full_name":"Beringer, Steffen","first_name":"Steffen"},{"last_name":"Holler","full_name":"Holler, Dominik","first_name":"Dominik"},{"first_name":"Kay","last_name":"Klobedanz","full_name":"Klobedanz, Kay"},{"last_name":"Heinzemann","full_name":"Heinzemann, Christian","first_name":"Christian"},{"last_name":"Peter","full_name":"Peter, Klaus","first_name":"Klaus"},{"first_name":"Michael","full_name":"Leuer, Michael","last_name":"Leuer"}],"date_created":"2021-01-13T13:28:47Z"}]
