[{"year":"2012","citation":{"ama":"Mauerer W, Hillier G, Sawallisch J, Hönick S, Oberthür S. Real-Time Android: Deterministic Ease of use. In: <i>Proceedings of Embedded World Conference</i>. ; 2012.","ieee":"W. Mauerer, G. Hillier, J. Sawallisch, S. Hönick, and S. Oberthür, “Real-Time Android: Deterministic Ease of use,” presented at the 28. Feb. - 1. Mrz. 2012, 2012.","chicago":"Mauerer, Wolfgang, Gernot Hillier, Jan Sawallisch, Stefan Hönick, and Simon Oberthür. “Real-Time Android: Deterministic Ease of Use.” In <i>Proceedings of Embedded World Conference</i>, 2012.","mla":"Mauerer, Wolfgang, et al. “Real-Time Android: Deterministic Ease of Use.” <i>Proceedings of Embedded World Conference</i>, 2012.","bibtex":"@inproceedings{Mauerer_Hillier_Sawallisch_Hönick_Oberthür_2012, title={Real-Time Android: Deterministic Ease of use}, booktitle={Proceedings of Embedded World Conference}, author={Mauerer, Wolfgang and Hillier, Gernot and Sawallisch, Jan and Hönick, Stefan and Oberthür, Simon}, year={2012} }","short":"W. Mauerer, G. Hillier, J. Sawallisch, S. Hönick, S. Oberthür, in: Proceedings of Embedded World Conference, 2012.","apa":"Mauerer, W., Hillier, G., Sawallisch, J., Hönick, S., &#38; Oberthür, S. (2012). Real-Time Android: Deterministic Ease of use. <i>Proceedings of Embedded World Conference</i>. 28. Feb. - 1. Mrz. 2012."},"date_updated":"2022-01-06T06:57:16Z","date_created":"2021-10-12T11:14:50Z","author":[{"full_name":"Mauerer, Wolfgang","last_name":"Mauerer","first_name":"Wolfgang"},{"full_name":"Hillier, Gernot","last_name":"Hillier","first_name":"Gernot"},{"last_name":"Sawallisch","full_name":"Sawallisch, Jan","first_name":"Jan"},{"full_name":"Hönick, Stefan","last_name":"Hönick","first_name":"Stefan"},{"first_name":"Simon","last_name":"Oberthür","id":"383","full_name":"Oberthür, Simon"}],"title":"Real-Time Android: Deterministic Ease of use","conference":{"name":"28. Feb. - 1. Mrz. 2012"},"publication":"Proceedings of Embedded World Conference","type":"conference","status":"public","_id":"26081","department":[{"_id":"672"}],"user_id":"21240","language":[{"iso":"eng"}]},{"conference":{"name":"24. - 26. Feb. 2012 INSTICC, INSTICC PRESS"},"title":"Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot","date_created":"2021-10-12T12:43:25Z","author":[{"last_name":"Jungmann","full_name":"Jungmann, Alexander","first_name":"Alexander"},{"first_name":"Thomas","full_name":"Schierbaum, Thomas","last_name":"Schierbaum"},{"last_name":"Kleinjohann","full_name":"Kleinjohann, Bernd","first_name":"Bernd"}],"date_updated":"2022-01-06T06:57:16Z","publisher":" INSTICC PRESS","page":"441-444","citation":{"bibtex":"@inproceedings{Jungmann_Schierbaum_Kleinjohann_2012, title={Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot}, booktitle={Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP)}, publisher={ INSTICC PRESS}, author={Jungmann, Alexander and Schierbaum, Thomas and Kleinjohann, Bernd}, year={2012}, pages={441–444} }","short":"A. Jungmann, T. Schierbaum, B. Kleinjohann, in: Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP),  INSTICC PRESS, 2012, pp. 441–444.","mla":"Jungmann, Alexander, et al. “Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot.” <i>Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP)</i>,  INSTICC PRESS, 2012, pp. 441–44.","apa":"Jungmann, A., Schierbaum, T., &#38; Kleinjohann, B. (2012). Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot. <i>Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP)</i>, 441–444.","ama":"Jungmann A, Schierbaum T, Kleinjohann B. Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot. In: <i>Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP)</i>.  INSTICC PRESS; 2012:441-444.","ieee":"A. Jungmann, T. Schierbaum, and B. Kleinjohann, “Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot,” in <i>Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP)</i>, 2012, pp. 441–444.","chicago":"Jungmann, Alexander, Thomas Schierbaum, and Bernd Kleinjohann. “Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot.” In <i>Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP)</i>, 441–44.  INSTICC PRESS, 2012."},"year":"2012","language":[{"iso":"eng"}],"department":[{"_id":"672"}],"user_id":"21240","_id":"26086","status":"public","abstract":[{"text":"In this paper, an image segmentation approach for object detection on the miniature robot BeBot - a deeply embedded system - is presented. In order to enable the robot to detect and identify objects in its environment by means of its camera, an efficient image segmentation approach was developed. The fundamental algorithm bases on the region growing and region merging concept and identifies homogeneous regions consisting of adjacent pixels with similar color. By internally representing a contiguous block of pixels in terms of run-lengths, the computational effort of both the region growing and the region merging operation is minimized. Finally, for subsequent object detection processes, a region is efficiently translated into a statistically feature representation based on discretized moments.\r\n","lang":"eng"}],"publication":"Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP)","type":"conference"},{"citation":{"chicago":"Bin Tariq, Fahad. “Deterministic Runtime Adaptation for Hard Real-Time Embedded Systems with Processing Constraints.” In <i>Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems</i>, 2012.","ieee":"F. Bin Tariq, “Deterministic Runtime Adaptation for Hard Real-time Embedded Systems with Processing Constraints,” presented at the 24. - 26. Feb. 2012, 2012.","ama":"Bin Tariq F. Deterministic Runtime Adaptation for Hard Real-time Embedded Systems with Processing Constraints. In: <i>Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems</i>. ; 2012.","apa":"Bin Tariq, F. (2012). Deterministic Runtime Adaptation for Hard Real-time Embedded Systems with Processing Constraints. <i>Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems</i>. 24. - 26. Feb. 2012.","bibtex":"@inproceedings{Bin Tariq_2012, title={Deterministic Runtime Adaptation for Hard Real-time Embedded Systems with Processing Constraints}, booktitle={Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems}, author={Bin Tariq, Fahad}, year={2012} }","short":"F. Bin Tariq, in: Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems, 2012.","mla":"Bin Tariq, Fahad. “Deterministic Runtime Adaptation for Hard Real-Time Embedded Systems with Processing Constraints.” <i>Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems</i>, 2012."},"year":"2012","conference":{"name":"24. - 26. Feb. 2012"},"title":"Deterministic Runtime Adaptation for Hard Real-time Embedded Systems with Processing Constraints","author":[{"first_name":"Fahad","last_name":"Bin Tariq","full_name":"Bin Tariq, Fahad"}],"date_created":"2021-10-13T08:53:43Z","date_updated":"2022-01-06T06:57:16Z","status":"public","publication":"Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"672"}],"user_id":"21240","_id":"26089"},{"status":"public","type":"conference","publication":"13th International Conference On Distributed Computing And Networking (ICDCN)","language":[{"iso":"eng"}],"user_id":"21240","department":[{"_id":"672"}],"_id":"26090","citation":{"ama":"Mathews E, Frey H. A Localized Link Removal and Addition based Planarization Algorithm. In: <i>13th International Conference On Distributed Computing And Networking (ICDCN)</i>. Springer; 2012.","ieee":"E. Mathews and H. Frey, “A Localized Link Removal and Addition based Planarization Algorithm,” 2012.","chicago":"Mathews, Emi, and Hannes Frey. “A Localized Link Removal and Addition Based Planarization Algorithm.” In <i>13th International Conference On Distributed Computing And Networking (ICDCN)</i>. The Hong Kong Polytechnic University, Hong Kong, China: Springer, 2012.","apa":"Mathews, E., &#38; Frey, H. (2012). A Localized Link Removal and Addition based Planarization Algorithm. <i>13th International Conference On Distributed Computing And Networking (ICDCN)</i>.","bibtex":"@inproceedings{Mathews_Frey_2012, place={The Hong Kong Polytechnic University, Hong Kong, China}, title={A Localized Link Removal and Addition based Planarization Algorithm}, booktitle={13th International Conference On Distributed Computing And Networking (ICDCN)}, publisher={Springer}, author={Mathews, Emi and Frey, Hannes}, year={2012} }","mla":"Mathews, Emi, and Hannes Frey. “A Localized Link Removal and Addition Based Planarization Algorithm.” <i>13th International Conference On Distributed Computing And Networking (ICDCN)</i>, Springer, 2012.","short":"E. Mathews, H. Frey, in: 13th International Conference On Distributed Computing And Networking (ICDCN), Springer, The Hong Kong Polytechnic University, Hong Kong, China, 2012."},"place":"The Hong Kong Polytechnic University, Hong Kong, China","year":"2012","title":"A Localized Link Removal and Addition based Planarization Algorithm","author":[{"first_name":"Emi","last_name":"Mathews","full_name":"Mathews, Emi"},{"first_name":"Hannes","full_name":"Frey, Hannes","last_name":"Frey"}],"date_created":"2021-10-13T10:08:05Z","publisher":"Springer","date_updated":"2022-01-06T06:57:16Z"},{"date_created":"2021-10-13T10:17:10Z","author":[{"full_name":"Mathews, Emi","last_name":"Mathews","first_name":"Emi"},{"last_name":"Mathew","full_name":"Mathew, Ciby","first_name":"Ciby"}],"date_updated":"2022-01-06T06:57:16Z","title":"Deployment of mobile routers ensuring coverage and connectivity","page":"175-192","citation":{"ieee":"E. Mathews and C. Mathew, “Deployment of mobile routers ensuring coverage and connectivity,” <i>International Journal of Computer Networks and Communications 4(1)</i>, pp. 175–192, 2012.","chicago":"Mathews, Emi, and Ciby Mathew. “Deployment of Mobile Routers Ensuring Coverage and Connectivity.” <i>International Journal of Computer Networks and Communications 4(1)</i>, 2012, 175–92.","ama":"Mathews E, Mathew C. Deployment of mobile routers ensuring coverage and connectivity. <i>International Journal of Computer Networks and Communications 4(1)</i>. Published online 2012:175-192.","apa":"Mathews, E., &#38; Mathew, C. (2012). Deployment of mobile routers ensuring coverage and connectivity. <i>International Journal of Computer Networks and Communications 4(1)</i>, 175–192.","bibtex":"@article{Mathews_Mathew_2012, title={Deployment of mobile routers ensuring coverage and connectivity}, journal={International Journal of Computer Networks and Communications 4(1)}, author={Mathews, Emi and Mathew, Ciby}, year={2012}, pages={175–192} }","short":"E. Mathews, C. Mathew, International Journal of Computer Networks and Communications 4(1) (2012) 175–192.","mla":"Mathews, Emi, and Ciby Mathew. “Deployment of Mobile Routers Ensuring Coverage and Connectivity.” <i>International Journal of Computer Networks and Communications 4(1)</i>, 2012, pp. 175–92."},"year":"2012","department":[{"_id":"672"}],"user_id":"21240","_id":"26091","language":[{"iso":"eng"}],"publication":"International Journal of Computer Networks and Communications 4(1)","type":"journal_article","status":"public"},{"citation":{"ieee":"W. Müller, M. Becker, H. Zabel, A. Elfeky, and A. DiPasquale, “Virtual Prototyping of Cyber-Physical Systems,” 2012.","chicago":"Müller, Wolfgang, Markus Becker, Henning Zabel, Ahmed Elfeky, and Anthony DiPasquale. “Virtual Prototyping of Cyber-Physical Systems.” In <i>In Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012</i>. Sydney, 2012.","ama":"Müller W, Becker M, Zabel H, Elfeky A, DiPasquale A. Virtual Prototyping of Cyber-Physical Systems. In: <i>In Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012</i>. ; 2012.","bibtex":"@inproceedings{Müller_Becker_Zabel_Elfeky_DiPasquale_2012, place={Sydney}, title={Virtual Prototyping of Cyber-Physical Systems}, booktitle={In Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012}, author={Müller, Wolfgang and Becker, Markus and Zabel, Henning and Elfeky, Ahmed and DiPasquale, Anthony}, year={2012} }","short":"W. Müller, M. Becker, H. Zabel, A. Elfeky, A. DiPasquale, in: In Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012, Sydney, 2012.","mla":"Müller, Wolfgang, et al. “Virtual Prototyping of Cyber-Physical Systems.” <i>In Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012</i>, 2012.","apa":"Müller, W., Becker, M., Zabel, H., Elfeky, A., &#38; DiPasquale, A. (2012). Virtual Prototyping of Cyber-Physical Systems. <i>In Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012</i>."},"year":"2012","place":"Sydney","title":"Virtual Prototyping of Cyber-Physical Systems","date_created":"2021-10-13T10:36:35Z","author":[{"full_name":"Müller, Wolfgang","id":"16243","last_name":"Müller","first_name":"Wolfgang"},{"last_name":"Becker","full_name":"Becker, Markus","first_name":"Markus"},{"first_name":"Henning","full_name":"Zabel, Henning","last_name":"Zabel"},{"full_name":"Elfeky, Ahmed","last_name":"Elfeky","first_name":"Ahmed"},{"first_name":"Anthony","full_name":"DiPasquale, Anthony","last_name":"DiPasquale"}],"date_updated":"2022-01-06T06:57:16Z","status":"public","publication":"In Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"672"}],"user_id":"21240","_id":"26092"},{"_id":"26093","user_id":"21240","department":[{"_id":"672"}],"language":[{"iso":"eng"}],"type":"book_chapter","publication":"Self-Organization in Embedded Real-Time Systems","editor":[{"last_name":"Higuera-Toledano","full_name":"Higuera-Toledano, M. Theresa","first_name":"M. Theresa"},{"first_name":"Uwe","full_name":"Brinkschulte, Uwe","last_name":"Brinkschulte"},{"last_name":"Rettberg","full_name":"Rettberg, Achim","first_name":"Achim"}],"status":"public","publisher":"Springer","date_updated":"2022-01-06T06:57:16Z","author":[{"last_name":"Khaluf","full_name":"Khaluf, Yara","first_name":"Yara"},{"first_name":"Emi","last_name":"Mathews","full_name":"Mathews, Emi"},{"full_name":"Rammig, Franz-Josef","last_name":"Rammig","first_name":"Franz-Josef"}],"date_created":"2021-10-13T11:21:49Z","title":"Swarm Robotic Time Synchronization for Object Tracking","place":"New York, Heidelberg, Dordrecht, London","year":"2012","citation":{"ama":"Khaluf Y, Mathews E, Rammig F-J. Swarm Robotic Time Synchronization for Object Tracking. In: Higuera-Toledano MT, Brinkschulte U, Rettberg A, eds. <i>Self-Organization in Embedded Real-Time Systems</i>. Springer; 2012:75-92.","ieee":"Y. Khaluf, E. Mathews, and F.-J. Rammig, “Swarm Robotic Time Synchronization for Object Tracking,” in <i>Self-Organization in Embedded Real-Time Systems</i>, M. T. Higuera-Toledano, U. Brinkschulte, and A. Rettberg, Eds. New York, Heidelberg, Dordrecht, London: Springer, 2012, pp. 75–92.","chicago":"Khaluf, Yara, Emi Mathews, and Franz-Josef Rammig. “Swarm Robotic Time Synchronization for Object Tracking.” In <i>Self-Organization in Embedded Real-Time Systems</i>, edited by M. Theresa Higuera-Toledano, Uwe Brinkschulte, and Achim Rettberg, 75–92. New York, Heidelberg, Dordrecht, London: Springer, 2012.","apa":"Khaluf, Y., Mathews, E., &#38; Rammig, F.-J. (2012). Swarm Robotic Time Synchronization for Object Tracking. In M. T. Higuera-Toledano, U. Brinkschulte, &#38; A. Rettberg (Eds.), <i>Self-Organization in Embedded Real-Time Systems</i> (pp. 75–92). Springer.","mla":"Khaluf, Yara, et al. “Swarm Robotic Time Synchronization for Object Tracking.” <i>Self-Organization in Embedded Real-Time Systems</i>, edited by M. Theresa Higuera-Toledano et al., Springer, 2012, pp. 75–92.","bibtex":"@inbook{Khaluf_Mathews_Rammig_2012, place={New York, Heidelberg, Dordrecht, London}, title={Swarm Robotic Time Synchronization for Object Tracking}, booktitle={Self-Organization in Embedded Real-Time Systems}, publisher={Springer}, author={Khaluf, Yara and Mathews, Emi and Rammig, Franz-Josef}, editor={Higuera-Toledano, M. Theresa and Brinkschulte, Uwe and Rettberg, Achim}, year={2012}, pages={75–92} }","short":"Y. Khaluf, E. Mathews, F.-J. Rammig, in: M.T. Higuera-Toledano, U. Brinkschulte, A. Rettberg (Eds.), Self-Organization in Embedded Real-Time Systems, Springer, New York, Heidelberg, Dordrecht, London, 2012, pp. 75–92."},"page":"75-92"},{"citation":{"ieee":"F.-J. Rammig, “Biologically Inspired Information Technology: Towards a Cyber Biosphere,” in <i>Schemata und Praktiken</i>, T. Conradi, G. Ecker, N. O. Eke, and F. Muhle, Eds. München: Wilhelm Fink Verlag, 2012, pp. 141–160.","chicago":"Rammig, Franz-Josef. “Biologically Inspired Information Technology: Towards a Cyber Biosphere.” In <i>Schemata Und Praktiken</i>, edited by Tobias Conradi, Gisela Ecker, Norbert Otto Eke, and Florian Muhle, 141–60. München: Wilhelm Fink Verlag, 2012.","ama":"Rammig F-J. Biologically Inspired Information Technology: Towards a Cyber Biosphere. In: Conradi T, Ecker G, Eke NO, Muhle F, eds. <i>Schemata Und Praktiken</i>. Wilhelm Fink Verlag; 2012:141-160.","mla":"Rammig, Franz-Josef. “Biologically Inspired Information Technology: Towards a Cyber Biosphere.” <i>Schemata Und Praktiken</i>, edited by Tobias Conradi et al., Wilhelm Fink Verlag, 2012, pp. 141–60.","bibtex":"@inbook{Rammig_2012, place={München}, title={Biologically Inspired Information Technology: Towards a Cyber Biosphere}, booktitle={Schemata und Praktiken}, publisher={Wilhelm Fink Verlag}, author={Rammig, Franz-Josef}, editor={Conradi, Tobias and Ecker, Gisela and Eke, Norbert Otto and Muhle, Florian}, year={2012}, pages={141–160} }","short":"F.-J. Rammig, in: T. Conradi, G. Ecker, N.O. Eke, F. Muhle (Eds.), Schemata Und Praktiken, Wilhelm Fink Verlag, München, 2012, pp. 141–160.","apa":"Rammig, F.-J. (2012). Biologically Inspired Information Technology: Towards a Cyber Biosphere. In T. Conradi, G. Ecker, N. O. Eke, &#38; F. Muhle (Eds.), <i>Schemata und Praktiken</i> (pp. 141–160). Wilhelm Fink Verlag."},"page":"141-160","year":"2012","place":"München","title":"Biologically Inspired Information Technology: Towards a Cyber Biosphere","author":[{"first_name":"Franz-Josef","last_name":"Rammig","full_name":"Rammig, Franz-Josef"}],"date_created":"2021-10-13T11:53:31Z","date_updated":"2022-01-06T06:57:16Z","publisher":"Wilhelm Fink Verlag","status":"public","editor":[{"first_name":"Tobias","last_name":"Conradi","full_name":"Conradi, Tobias"},{"first_name":"Gisela","last_name":"Ecker","full_name":"Ecker, Gisela"},{"first_name":"Norbert Otto","last_name":"Eke","full_name":"Eke, Norbert Otto"},{"first_name":"Florian","full_name":"Muhle, Florian","last_name":"Muhle"}],"type":"book_chapter","publication":"Schemata und Praktiken","language":[{"iso":"eng"}],"user_id":"21240","department":[{"_id":"672"}],"_id":"26094"},{"type":"book_chapter","publication":"Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems","status":"public","user_id":"21240","department":[{"_id":"672"}],"_id":"26102","language":[{"iso":"eng"}],"citation":{"bibtex":"@inbook{Bin Tariq_Korrapati_2012, title={Adaptive Web Services for Modular and Reusable Software Development}, booktitle={Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems}, publisher={ IGI Global}, author={Bin Tariq, Fahad and Korrapati, Sandeep}, year={2012}, pages={263–276} }","short":"F. Bin Tariq, S. Korrapati, in: Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems,  IGI Global, 2012, pp. 263–276.","mla":"Bin Tariq, Fahad, and Sandeep Korrapati. “Adaptive Web Services for Modular and Reusable Software Development.” <i>Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems</i>,  IGI Global, 2012, pp. 263–76.","apa":"Bin Tariq, F., &#38; Korrapati, S. (2012). Adaptive Web Services for Modular and Reusable Software Development. In <i>Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems</i> (pp. 263–276).  IGI Global.","ama":"Bin Tariq F, Korrapati S. Adaptive Web Services for Modular and Reusable Software Development. In: <i>Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems</i>.  IGI Global; 2012:263-276.","ieee":"F. Bin Tariq and S. Korrapati, “Adaptive Web Services for Modular and Reusable Software Development,” in <i>Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems</i>,  IGI Global, 2012, pp. 263–276.","chicago":"Bin Tariq, Fahad, and Sandeep Korrapati. “Adaptive Web Services for Modular and Reusable Software Development.” In <i>Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems</i>, 263–76.  IGI Global, 2012."},"page":"263-276","year":"2012","author":[{"last_name":"Bin Tariq","full_name":"Bin Tariq, Fahad","first_name":"Fahad"},{"full_name":"Korrapati, Sandeep","last_name":"Korrapati","first_name":"Sandeep"}],"date_created":"2021-10-13T12:48:56Z","date_updated":"2022-01-06T06:57:16Z","publisher":" IGI Global","title":"Adaptive Web Services for Modular and Reusable Software Development"},{"author":[{"full_name":"Jungmann, Alexander","last_name":"Jungmann","first_name":"Alexander"},{"first_name":"Bernd","last_name":"Kleinjohann","full_name":"Kleinjohann, Bernd"}],"date_created":"2021-10-15T07:14:05Z","publisher":"Xpert Publishing Services","date_updated":"2022-01-06T06:57:17Z","title":"Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition","page":"43-47","citation":{"chicago":"Jungmann, Alexander, and Bernd Kleinjohann. “Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition.” In <i>Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, 43–47. Xpert Publishing Services, 2012.","ieee":"A. Jungmann and B. Kleinjohann, “Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition,” in <i>Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, 2012, pp. 43–47.","ama":"Jungmann A, Kleinjohann B. Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition. In: <i>Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>. Xpert Publishing Services; 2012:43-47.","mla":"Jungmann, Alexander, and Bernd Kleinjohann. “Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition.” <i>Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, Xpert Publishing Services, 2012, pp. 43–47.","short":"A. Jungmann, B. Kleinjohann, in: Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION), Xpert Publishing Services, 2012, pp. 43–47.","bibtex":"@inproceedings{Jungmann_Kleinjohann_2012, title={Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition}, booktitle={Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)}, publisher={Xpert Publishing Services}, author={Jungmann, Alexander and Kleinjohann, Bernd}, year={2012}, pages={43–47} }","apa":"Jungmann, A., &#38; Kleinjohann, B. (2012). Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition. <i>Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, 43–47."},"year":"2012","department":[{"_id":"672"}],"user_id":"21240","_id":"26181","language":[{"iso":"eng"}],"publication":"Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)","type":"conference","status":"public","abstract":[{"lang":"eng","text":"The paradigm shift from purchasing monolithic software solutions to a dynamic composition of individual solutions entails many new possibilities yet great challenges, too. In order to satisfy user requirements, complex services have to be automatically composed of elementary services. Multiple possibilities of composing a complex service inevitably emerge. The problem of selecting the most appropriate services has to be solved by comparing the different service candidates with respect to their quality in terms of inherent non-functional properties while simultaneously taking the user requirements into account.We are aiming for an integrated service rating and ranking methodology in order to support the automation of the underlying decision-making process. The main contribution of this paper is a first decomposition of the quality-based service selection process, while emphasizing major issues and challenges, which we are addressing in the On-The-Fly Computing project."}]},{"language":[{"iso":"eng"}],"_id":"26190","department":[{"_id":"672"}],"user_id":"21240","abstract":[{"text":"A major goal of the On-The-Fly Computing project is the automated composition of individual services based on services that are available in dynamic markets. Dependent on the granularity of a market, different alternatives that satisfy the requested functional requirements may emerge. In order to select the best solution, services are usually selected with respect to their quality in terms of inherent non-functional properties. In this paper, we describe our idea of how to model this service selection process as a Markov Decision Process, which we in turn intend to solve by means of Reinforcement Learning techniques in order to control the underlying service composition process. In addition, some initial issues with respect to our approach are addressed.","lang":"eng"}],"status":"public","publication":"Proceedings of the 9th IEEE International Conference on Services Computing (SCC)","type":"conference","title":"Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition","publisher":"IEEE","date_updated":"2022-01-06T06:57:17Z","date_created":"2021-10-15T07:52:47Z","author":[{"full_name":"Jungmann, Alexander","last_name":"Jungmann","first_name":"Alexander"},{"first_name":"Bernd","full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann"}],"year":"2012","citation":{"short":"A. Jungmann, B. Kleinjohann, in: Proceedings of the 9th IEEE International Conference on Services Computing (SCC), IEEE, 2012.","bibtex":"@inproceedings{Jungmann_Kleinjohann_2012, title={Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition}, booktitle={Proceedings of the 9th IEEE International Conference on Services Computing (SCC)}, publisher={IEEE}, author={Jungmann, Alexander and Kleinjohann, Bernd}, year={2012} }","mla":"Jungmann, Alexander, and Bernd Kleinjohann. “Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition.” <i>Proceedings of the 9th IEEE International Conference on Services Computing (SCC)</i>, IEEE, 2012.","apa":"Jungmann, A., &#38; Kleinjohann, B. (2012). Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition. <i>Proceedings of the 9th IEEE International Conference on Services Computing (SCC)</i>.","ama":"Jungmann A, Kleinjohann B. Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition. In: <i>Proceedings of the 9th IEEE International Conference on Services Computing (SCC)</i>. IEEE; 2012.","ieee":"A. Jungmann and B. Kleinjohann, “Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition,” 2012.","chicago":"Jungmann, Alexander, and Bernd Kleinjohann. “Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition.” In <i>Proceedings of the 9th IEEE International Conference on Services Computing (SCC)</i>. IEEE, 2012."}},{"status":"public","type":"conference","publication":"The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications","language":[{"iso":"eng"}],"_id":"26212","user_id":"21240","department":[{"_id":"672"}],"year":"2012","place":" Leganés, Madrid","citation":{"ama":"Khaluf Y, Weiss F, Micus S. Master Election for Time Synchronization in Swarm Robotic Systems. In: <i>The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications</i>. ; 2012.","ieee":"Y. Khaluf, F. Weiss, and S. Micus, “Master Election for Time Synchronization in Swarm Robotic Systems,” 2012.","chicago":"Khaluf, Yara, Fabian Weiss, and Sebastian Micus. “Master Election for Time Synchronization in Swarm Robotic Systems.” In <i>The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications</i>.  Leganés, Madrid, 2012.","mla":"Khaluf, Yara, et al. “Master Election for Time Synchronization in Swarm Robotic Systems.” <i>The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications</i>, 2012.","short":"Y. Khaluf, F. Weiss, S. Micus, in: The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications,  Leganés, Madrid, 2012.","bibtex":"@inproceedings{Khaluf_Weiss_Micus_2012, place={ Leganés, Madrid}, title={Master Election for Time Synchronization in Swarm Robotic Systems}, booktitle={The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications}, author={Khaluf, Yara and Weiss, Fabian and Micus, Sebastian}, year={2012} }","apa":"Khaluf, Y., Weiss, F., &#38; Micus, S. (2012). Master Election for Time Synchronization in Swarm Robotic Systems. <i>The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications</i>."},"title":"Master Election for Time Synchronization in Swarm Robotic Systems","date_updated":"2022-01-06T06:57:18Z","date_created":"2021-10-15T09:16:19Z","author":[{"full_name":"Khaluf, Yara","last_name":"Khaluf","first_name":"Yara"},{"full_name":"Weiss, Fabian","last_name":"Weiss","first_name":"Fabian"},{"full_name":"Micus, Sebastian","last_name":"Micus","first_name":"Sebastian"}]},{"status":"public","type":"conference","publication":"Third International Conference on Networks & Communications, LNICST","language":[{"iso":"eng"}],"_id":"26264","user_id":"21240","department":[{"_id":"672"}],"year":"2012","place":"Bangalore, India","citation":{"apa":"Mathews, E., &#38; Mathew, C. (2012). Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks. <i>Third International Conference on Networks &#38; Communications, LNICST</i>.","bibtex":"@inproceedings{Mathews_Mathew_2012, place={Bangalore, India}, title={Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks}, booktitle={Third International Conference on Networks &#38; Communications, LNICST}, publisher={Springer}, author={Mathews, Emi and Mathew, Ciby}, year={2012} }","short":"E. Mathews, C. Mathew, in: Third International Conference on Networks &#38; Communications, LNICST, Springer, Bangalore, India, 2012.","mla":"Mathews, Emi, and Ciby Mathew. “Connectivity of Autonomous Agents Using Ad-Hoc Mobile Router Networks.” <i>Third International Conference on Networks &#38; Communications, LNICST</i>, Springer, 2012.","ama":"Mathews E, Mathew C. Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks. In: <i>Third International Conference on Networks &#38; Communications, LNICST</i>. Springer; 2012.","ieee":"E. Mathews and C. Mathew, “Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks,” 2012.","chicago":"Mathews, Emi, and Ciby Mathew. “Connectivity of Autonomous Agents Using Ad-Hoc Mobile Router Networks.” In <i>Third International Conference on Networks &#38; Communications, LNICST</i>. Bangalore, India: Springer, 2012."},"title":"Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks","date_updated":"2022-01-06T06:57:18Z","publisher":"Springer","author":[{"full_name":"Mathews, Emi","last_name":"Mathews","first_name":"Emi"},{"last_name":"Mathew","full_name":"Mathew, Ciby","first_name":"Ciby"}],"date_created":"2021-10-15T11:20:32Z"},{"year":"2012","page":"1281-1290","citation":{"short":"H. Wachsmuth, B. Stein, in: Proceedings of COLING 2012: Posters, 2012, pp. 1281–1290.","bibtex":"@inproceedings{Wachsmuth_Stein_2012, title={Optimal Scheduling of Information Extraction Algorithms}, booktitle={Proceedings of COLING 2012: Posters}, author={Wachsmuth, Henning and Stein, Benno}, year={2012}, pages={1281–1290} }","mla":"Wachsmuth, Henning, and Benno Stein. “Optimal Scheduling of Information Extraction Algorithms.” <i>Proceedings of COLING 2012: Posters</i>, 2012, pp. 1281–90.","apa":"Wachsmuth, H., &#38; Stein, B. (2012). Optimal Scheduling of Information Extraction Algorithms. In <i>Proceedings of COLING 2012: Posters</i> (pp. 1281–1290).","chicago":"Wachsmuth, Henning, and Benno Stein. “Optimal Scheduling of Information Extraction Algorithms.” In <i>Proceedings of COLING 2012: Posters</i>, 1281–90, 2012.","ieee":"H. Wachsmuth and B. Stein, “Optimal Scheduling of Information Extraction Algorithms,” in <i>Proceedings of COLING 2012: Posters</i>, 2012, pp. 1281–1290.","ama":"Wachsmuth H, Stein B. Optimal Scheduling of Information Extraction Algorithms. In: <i>Proceedings of COLING 2012: Posters</i>. ; 2012:1281-1290."},"title":"Optimal Scheduling of Information Extraction Algorithms","main_file_link":[{"url":"https://www.aclweb.org/anthology/C12-2125.pdf"}],"date_updated":"2022-01-06T06:59:37Z","author":[{"first_name":"Henning","last_name":"Wachsmuth","id":"3900","full_name":"Wachsmuth, Henning"},{"last_name":"Stein","full_name":"Stein, Benno","first_name":"Benno"}],"date_created":"2018-08-02T13:38:37Z","status":"public","publication":"Proceedings of COLING 2012: Posters","type":"conference","language":[{"iso":"eng"}],"_id":"3812","department":[{"_id":"600"}],"user_id":"82920"},{"publication_identifier":{"isbn":["9783642349607","9783642349614"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","place":"Berlin, Heidelberg","year":"2012","page":"404-414","citation":{"apa":"Kakvi, S., Kiltz, E., &#38; May, A. (2012). Certifying RSA. In <i>Advances in Cryptology – ASIACRYPT 2012</i> (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">https://doi.org/10.1007/978-3-642-34961-4_25</a>","bibtex":"@inbook{Kakvi_Kiltz_May_2012, place={Berlin, Heidelberg}, title={Certifying RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>}, booktitle={Advances in Cryptology – ASIACRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike and May, Alexander}, year={2012}, pages={404–414} }","mla":"Kakvi, Saqib, et al. “Certifying RSA.” <i>Advances in Cryptology – ASIACRYPT 2012</i>, Springer Berlin Heidelberg, 2012, pp. 404–14, doi:<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>.","short":"S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.","ama":"Kakvi S, Kiltz E, May A. Certifying RSA. In: <i>Advances in Cryptology – ASIACRYPT 2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>","ieee":"S. Kakvi, E. Kiltz, and A. May, “Certifying RSA,” in <i>Advances in Cryptology – ASIACRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 404–414.","chicago":"Kakvi, Saqib, Eike Kiltz, and Alexander May. “Certifying RSA.” In <i>Advances in Cryptology – ASIACRYPT 2012</i>, 404–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">https://doi.org/10.1007/978-3-642-34961-4_25</a>."},"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:47Z","author":[{"first_name":"Saqib","full_name":"Kakvi, Saqib","id":"66268","last_name":"Kakvi"},{"first_name":"Eike","full_name":"Kiltz, Eike","last_name":"Kiltz"},{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"date_created":"2018-05-25T12:34:06Z","title":"Certifying RSA","doi":"10.1007/978-3-642-34961-4_25","publication":"Advances in Cryptology – ASIACRYPT 2012","type":"book_chapter","status":"public","_id":"2918","department":[{"_id":"558"}],"user_id":"25078","extern":"1"},{"main_file_link":[{"url":"https://doi.org/10.1007/s00145-017-9257-9"}],"doi":"10.1007/978-3-642-29011-4_32","title":"Optimal Security Proofs for Full Domain Hash, Revisited","date_created":"2018-05-25T12:36:44Z","author":[{"first_name":"Saqib","last_name":"Kakvi","id":"66268","full_name":"Kakvi, Saqib"},{"first_name":"Eike","last_name":"Kiltz","full_name":"Kiltz, Eike"}],"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:47Z","citation":{"ama":"Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: <i>Advances in Cryptology – EUROCRYPT 2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>","ieee":"S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” in <i>Advances in Cryptology – EUROCRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 537–553.","chicago":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” In <i>Advances in Cryptology – EUROCRYPT 2012</i>, 537–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">https://doi.org/10.1007/978-3-642-29011-4_32</a>.","short":"S. Kakvi, E. Kiltz, in: Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 537–553.","bibtex":"@inbook{Kakvi_Kiltz_2012, place={Berlin, Heidelberg}, title={Optimal Security Proofs for Full Domain Hash, Revisited}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>}, booktitle={Advances in Cryptology – EUROCRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike}, year={2012}, pages={537–553} }","mla":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” <i>Advances in Cryptology – EUROCRYPT 2012</i>, Springer Berlin Heidelberg, 2012, pp. 537–53, doi:<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>.","apa":"Kakvi, S., &#38; Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In <i>Advances in Cryptology – EUROCRYPT 2012</i> (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">https://doi.org/10.1007/978-3-642-29011-4_32</a>"},"page":"537-553","year":"2012","place":"Berlin, Heidelberg","publication_status":"published","publication_identifier":{"isbn":["9783642290107","9783642290114"],"issn":["0302-9743","1611-3349"]},"extern":"1","user_id":"66268","department":[{"_id":"558"}],"_id":"2919","status":"public","type":"book_chapter","publication":"Advances in Cryptology – EUROCRYPT 2012"},{"title":"StreamKM++: A clustering algorithm for data streams","doi":"10.1145/2133803.2184450","publisher":"ACM","date_updated":"2022-01-06T06:58:50Z","author":[{"first_name":"Marcel Rudolf","full_name":"Ackermann, Marcel Rudolf","last_name":"Ackermann"},{"first_name":"Marcus","full_name":"Märtens, Marcus","last_name":"Märtens"},{"first_name":"Christoph","last_name":"Raupach","full_name":"Raupach, Christoph"},{"first_name":"Kamil","full_name":"Swierkot, Kamil","last_name":"Swierkot"},{"last_name":"Lammersen","full_name":"Lammersen, Christiane","first_name":"Christiane"},{"first_name":"Christian","last_name":"Sohler","full_name":"Sohler, Christian"}],"date_created":"2018-06-05T07:41:14Z","volume":17,"place":"New York, NY, USA","year":"2012","citation":{"mla":"Ackermann, Marcel Rudolf, et al. <i>StreamKM++: A Clustering Algorithm for Data Streams</i>. Vol. 17, ACM, 2012, doi:<a href=\"https://doi.org/10.1145/2133803.2184450\">10.1145/2133803.2184450</a>.","bibtex":"@article{Ackermann_Märtens_Raupach_Swierkot_Lammersen_Sohler_2012, place={New York, NY, USA}, series={ACM Journal of Experimental Algorithmics}, title={StreamKM++: A clustering algorithm for data streams}, volume={17}, DOI={<a href=\"https://doi.org/10.1145/2133803.2184450\">10.1145/2133803.2184450</a>}, publisher={ACM}, author={Ackermann, Marcel Rudolf and Märtens, Marcus and Raupach, Christoph and Swierkot, Kamil and Lammersen, Christiane and Sohler, Christian}, year={2012}, collection={ACM Journal of Experimental Algorithmics} }","short":"M.R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, C. Sohler, 17 (2012).","apa":"Ackermann, M. R., Märtens, M., Raupach, C., Swierkot, K., Lammersen, C., &#38; Sohler, C. (2012). StreamKM++: A clustering algorithm for data streams. New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/2133803.2184450\">https://doi.org/10.1145/2133803.2184450</a>","ama":"Ackermann MR, Märtens M, Raupach C, Swierkot K, Lammersen C, Sohler C. StreamKM++: A clustering algorithm for data streams. 2012;17. doi:<a href=\"https://doi.org/10.1145/2133803.2184450\">10.1145/2133803.2184450</a>","chicago":"Ackermann, Marcel Rudolf, Marcus Märtens, Christoph Raupach, Kamil Swierkot, Christiane Lammersen, and Christian Sohler. “StreamKM++: A Clustering Algorithm for Data Streams.” ACM Journal of Experimental Algorithmics. New York, NY, USA: ACM, 2012. <a href=\"https://doi.org/10.1145/2133803.2184450\">https://doi.org/10.1145/2133803.2184450</a>.","ieee":"M. R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, and C. Sohler, “StreamKM++: A clustering algorithm for data streams,” vol. 17. ACM, New York, NY, USA, 2012."},"intvolume":"        17","publication_status":"published","_id":"2982","series_title":"ACM Journal of Experimental Algorithmics","user_id":"25078","department":[{"_id":"64"}],"status":"public","type":"conference"},{"_id":"2984","user_id":"25078","department":[{"_id":"64"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"Informatik-Spektrum","abstract":[{"text":"Ich beschreibe die deutsche Enigma-VerschlÃ¼sselungsmaschine und skizziere, wie sie von den Codebrechern von Bletchely Park um Alan Turing gebrochen wurde. Besonderes Augenmerk lege ich auf die BeitrÃ¤ge Alan Turings und die Bedeutung seiner Leistung fÃ¼r die Entwicklung moderner Kryptografie. ","lang":"eng"}],"status":"public","date_updated":"2022-01-06T06:58:50Z","date_created":"2018-06-05T07:42:38Z","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"volume":35,"title":"Turing und Kryptografie","doi":"10.1007/s00287-012-0622-7","publication_status":"published","publication_identifier":{"issn":["1432-122X"]},"quality_controlled":"1","issue":"4","year":"2012","citation":{"mla":"Blömer, Johannes. “Turing Und Kryptografie.” <i>Informatik-Spektrum</i>, vol. 35, no. 4, 2012, doi:<a href=\"https://doi.org/10.1007/s00287-012-0622-7\">10.1007/s00287-012-0622-7</a>.","bibtex":"@article{Blömer_2012, title={Turing und Kryptografie}, volume={35}, DOI={<a href=\"https://doi.org/10.1007/s00287-012-0622-7\">10.1007/s00287-012-0622-7</a>}, number={4}, journal={Informatik-Spektrum}, author={Blömer, Johannes}, year={2012} }","short":"J. Blömer, Informatik-Spektrum 35 (2012).","apa":"Blömer, J. (2012). Turing und Kryptografie. <i>Informatik-Spektrum</i>, <i>35</i>(4). <a href=\"https://doi.org/10.1007/s00287-012-0622-7\">https://doi.org/10.1007/s00287-012-0622-7</a>","ieee":"J. Blömer, “Turing und Kryptografie,” <i>Informatik-Spektrum</i>, vol. 35, no. 4, 2012.","chicago":"Blömer, Johannes. “Turing Und Kryptografie.” <i>Informatik-Spektrum</i> 35, no. 4 (2012). <a href=\"https://doi.org/10.1007/s00287-012-0622-7\">https://doi.org/10.1007/s00287-012-0622-7</a>.","ama":"Blömer J. Turing und Kryptografie. <i>Informatik-Spektrum</i>. 2012;35(4). doi:<a href=\"https://doi.org/10.1007/s00287-012-0622-7\">10.1007/s00287-012-0622-7</a>"},"intvolume":"        35"},{"publication_identifier":{"isbn":["978-3-8348-1989-5"]},"year":"2012","citation":{"apa":"Jager, T. (2012). <i>On black-box models of computation in cryptology</i>. Ruhr University Bochum.","short":"T. Jager, On Black-Box Models of Computation in Cryptology, Ruhr University Bochum, 2012.","bibtex":"@book{Jager_2012, title={On black-box models of computation in cryptology}, publisher={Ruhr University Bochum}, author={Jager, Tibor}, year={2012} }","mla":"Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum, 2012.","ieee":"T. Jager, <i>On black-box models of computation in cryptology</i>. Ruhr University Bochum, 2012.","chicago":"Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum, 2012.","ama":"Jager T. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum; 2012."},"date_updated":"2022-01-06T06:58:58Z","publisher":"Ruhr University Bochum","date_created":"2018-06-07T09:25:35Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"}],"title":"On black-box models of computation in cryptology","type":"dissertation","status":"public","_id":"3132","department":[{"_id":"558"}],"user_id":"38235","extern":"1"},{"department":[{"_id":"558"}],"user_id":"38235","_id":"3133","extern":"1","publication":"Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings","type":"conference","status":"public","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"first_name":"Florian","last_name":"Kohlar","full_name":"Kohlar, Florian"},{"full_name":"Schäge, Sven","last_name":"Schäge","first_name":"Sven"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"}],"date_created":"2018-06-07T09:25:56Z","date_updated":"2022-01-06T06:58:58Z","doi":"10.1007/978-3-642-32009-5_17","title":"On the Security of TLS-DHE in the Standard Model","page":"273--293","citation":{"short":"T. Jager, F. Kohlar, S. Schäge, J. Schwenk, in: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293.","bibtex":"@inproceedings{Jager_Kohlar_Schäge_Schwenk_2012, title={On the Security of TLS-DHE in the Standard Model}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">10.1007/978-3-642-32009-5_17</a>}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2012}, pages={273--293} }","mla":"Jager, Tibor, et al. “On the Security of TLS-DHE in the Standard Model.” <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 273--293, doi:<a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">10.1007/978-3-642-32009-5_17</a>.","apa":"Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2012). On the Security of TLS-DHE in the Standard Model. In <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i> (pp. 273--293). <a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">https://doi.org/10.1007/978-3-642-32009-5_17</a>","ama":"Jager T, Kohlar F, Schäge S, Schwenk J. On the Security of TLS-DHE in the Standard Model. In: <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>. ; 2012:273--293. doi:<a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">10.1007/978-3-642-32009-5_17</a>","chicago":"Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “On the Security of TLS-DHE in the Standard Model.” In <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 273--293, 2012. <a href=\"https://doi.org/10.1007/978-3-642-32009-5_17\">https://doi.org/10.1007/978-3-642-32009-5_17</a>.","ieee":"T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “On the Security of TLS-DHE in the Standard Model,” in <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 273--293."},"year":"2012"}]
