[{"author":[{"first_name":"Henning","last_name":"Wachsmuth","id":"3900","full_name":"Wachsmuth, Henning"},{"first_name":"Kathrin","full_name":"Bujna, Kathrin","last_name":"Bujna"}],"date_created":"2018-08-02T13:38:36Z","date_updated":"2022-01-06T06:59:37Z","main_file_link":[{"url":"https://www.aclweb.org/anthology/I11-1071.pdf"}],"title":"Back to the Roots of Genres: Text Classification by Language Function","publication_identifier":{"isbn":["978-1-4503-0717-8"]},"page":"632-640","citation":{"ieee":"H. Wachsmuth and K. Bujna, “Back to the Roots of Genres: Text Classification by Language Function,” in <i>Proceedings of 5th International Joint Conference on Natural Language Processing</i>, 2011, pp. 632–640.","chicago":"Wachsmuth, Henning, and Kathrin Bujna. “Back to the Roots of Genres: Text Classification by Language Function.” In <i>Proceedings of 5th International Joint Conference on Natural Language Processing</i>, edited by Bettina Berendt, Arjen de Vries, Wenfei Fan, Craig Macdonald, Iadh Ounis, and Ian Ruthven, 632–40, 2011.","ama":"Wachsmuth H, Bujna K. Back to the Roots of Genres: Text Classification by Language Function. In: Berendt B, de Vries A, Fan W, Macdonald C, Ounis I, Ruthven I, eds. <i>Proceedings of 5th International Joint Conference on Natural Language Processing</i>. ; 2011:632-640.","apa":"Wachsmuth, H., &#38; Bujna, K. (2011). Back to the Roots of Genres: Text Classification by Language Function. In B. Berendt, A. de Vries, W. Fan, C. Macdonald, I. Ounis, &#38; I. Ruthven (Eds.), <i>Proceedings of 5th International Joint Conference on Natural Language Processing</i> (pp. 632–640).","short":"H. Wachsmuth, K. Bujna, in: B. Berendt, A. de Vries, W. Fan, C. Macdonald, I. Ounis, I. Ruthven (Eds.), Proceedings of 5th International Joint Conference on Natural Language Processing, 2011, pp. 632–640.","mla":"Wachsmuth, Henning, and Kathrin Bujna. “Back to the Roots of Genres: Text Classification by Language Function.” <i>Proceedings of 5th International Joint Conference on Natural Language Processing</i>, edited by Bettina Berendt et al., 2011, pp. 632–40.","bibtex":"@inproceedings{Wachsmuth_Bujna_2011, title={Back to the Roots of Genres: Text Classification by Language Function}, booktitle={Proceedings of 5th International Joint Conference on Natural Language Processing}, author={Wachsmuth, Henning and Bujna, Kathrin}, editor={Berendt, Bettina and de Vries, Arjen and Fan, Wenfei and Macdonald, Craig and Ounis, Iadh and Ruthven, IanEditors}, year={2011}, pages={632–640} }"},"year":"2011","department":[{"_id":"600"}],"user_id":"82920","_id":"3811","language":[{"iso":"eng"}],"publication":"Proceedings of 5th International Joint Conference on Natural Language Processing","type":"conference","status":"public","editor":[{"first_name":"Bettina","full_name":"Berendt, Bettina","last_name":"Berendt"},{"last_name":"de Vries","full_name":"de Vries, Arjen","first_name":"Arjen"},{"full_name":"Fan, Wenfei","last_name":"Fan","first_name":"Wenfei"},{"first_name":"Craig","full_name":"Macdonald, Craig","last_name":"Macdonald"},{"first_name":"Iadh","full_name":"Ounis, Iadh","last_name":"Ounis"},{"first_name":"Ian","full_name":"Ruthven, Ian","last_name":"Ruthven"}]},{"publication_identifier":{"isbn":["978-1-4503-0717-8"]},"citation":{"apa":"Wachsmuth, H., Stein, B., &#38; Engels, G. (2011). Constructing Efficient Information Extraction Pipelines. In B. Berendt, A. de Vries, W. Fan, C. Macdonald, I. Ounis, &#38; I. Ruthven (Eds.), <i>20th ACM International Conference on Information and Knowledge Management</i> (pp. 2237–2240).","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2011, title={Constructing Efficient Information Extraction Pipelines}, booktitle={20th ACM International Conference on Information and Knowledge Management}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, editor={Berendt, Bettina and de Vries, Arjen and Fan, Wenfei and Macdonald, Craig and Ounis, Iadh and Ruthven, IanEditors}, year={2011}, pages={2237–2240} }","short":"H. Wachsmuth, B. Stein, G. Engels, in: B. Berendt, A. de Vries, W. Fan, C. Macdonald, I. Ounis, I. Ruthven (Eds.), 20th ACM International Conference on Information and Knowledge Management, 2011, pp. 2237–2240.","mla":"Wachsmuth, Henning, et al. “Constructing Efficient Information Extraction Pipelines.” <i>20th ACM International Conference on Information and Knowledge Management</i>, edited by Bettina Berendt et al., 2011, pp. 2237–40.","ama":"Wachsmuth H, Stein B, Engels G. Constructing Efficient Information Extraction Pipelines. In: Berendt B, de Vries A, Fan W, Macdonald C, Ounis I, Ruthven I, eds. <i>20th ACM International Conference on Information and Knowledge Management</i>. ; 2011:2237-2240.","chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Constructing Efficient Information Extraction Pipelines.” In <i>20th ACM International Conference on Information and Knowledge Management</i>, edited by Bettina Berendt, Arjen de Vries, Wenfei Fan, Craig Macdonald, Iadh Ounis, and Ian Ruthven, 2237–40, 2011.","ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Constructing Efficient Information Extraction Pipelines,” in <i>20th ACM International Conference on Information and Knowledge Management</i>, 2011, pp. 2237–2240."},"page":"2237-2240","year":"2011","date_created":"2018-08-11T16:11:20Z","author":[{"first_name":"Henning","full_name":"Wachsmuth, Henning","id":"3900","last_name":"Wachsmuth"},{"first_name":"Benno","last_name":"Stein","full_name":"Stein, Benno"},{"last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"}],"date_updated":"2022-01-06T06:59:47Z","main_file_link":[{"url":"https://webis.de/downloads/publications/papers/stein_2011m.pdf"}],"title":"Constructing Efficient Information Extraction Pipelines","type":"conference","publication":"20th ACM International Conference on Information and Knowledge Management","status":"public","editor":[{"last_name":"Berendt","full_name":"Berendt, Bettina","first_name":"Bettina"},{"first_name":"Arjen","last_name":"de Vries","full_name":"de Vries, Arjen"},{"full_name":"Fan, Wenfei","last_name":"Fan","first_name":"Wenfei"},{"full_name":"Macdonald, Craig","last_name":"Macdonald","first_name":"Craig"},{"full_name":"Ounis, Iadh","last_name":"Ounis","first_name":"Iadh"},{"first_name":"Ian","full_name":"Ruthven, Ian","last_name":"Ruthven"}],"user_id":"82920","department":[{"_id":"600"}],"_id":"3875","language":[{"iso":"eng"}]},{"user_id":"25078","department":[{"_id":"64"}],"_id":"2902","status":"public","type":"mastersthesis","title":"The Monotone Complexity of Computing k-Clique on Random Graphs","date_created":"2018-05-25T09:46:27Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"author":[{"full_name":"Märtens, Marcus","last_name":"Märtens","first_name":"Marcus"}],"date_updated":"2022-01-06T06:58:44Z","citation":{"apa":"Märtens, M. (2011). <i>The Monotone Complexity of Computing k-Clique on Random Graphs</i>.","short":"M. Märtens, The Monotone Complexity of Computing K-Clique on Random Graphs, 2011.","mla":"Märtens, Marcus. <i>The Monotone Complexity of Computing K-Clique on Random Graphs</i>. 2011.","bibtex":"@book{Märtens_2011, title={The Monotone Complexity of Computing k-Clique on Random Graphs}, author={Märtens, Marcus}, year={2011} }","ieee":"M. Märtens, <i>The Monotone Complexity of Computing k-Clique on Random Graphs</i>. 2011.","chicago":"Märtens, Marcus. <i>The Monotone Complexity of Computing K-Clique on Random Graphs</i>, 2011.","ama":"Märtens M. <i>The Monotone Complexity of Computing K-Clique on Random Graphs</i>.; 2011."},"year":"2011"},{"publication_status":"published","citation":{"ama":"Ackermann MR, Blömer J, Scholz C. Hardness and Non-Approximability of Bregman Clustering Problems. 2011.","ieee":"M. R. Ackermann, J. Blömer, and C. Scholz, “Hardness and Non-Approximability of Bregman Clustering Problems.” 2011.","chicago":"Ackermann, Marcel R, Johannes Blömer, and Christoph Scholz. “Hardness and Non-Approximability of Bregman Clustering Problems.” Electronic Colloquium on Computational Complexity (ECCC), 2011.","mla":"Ackermann, Marcel R., et al. <i>Hardness and Non-Approximability of Bregman Clustering Problems.</i> 2011.","bibtex":"@article{Ackermann_Blömer_Scholz_2011, series={Electronic Colloquium on Computational Complexity (ECCC)}, title={Hardness and Non-Approximability of Bregman Clustering Problems.}, author={Ackermann, Marcel R and Blömer, Johannes and Scholz, Christoph}, year={2011}, collection={Electronic Colloquium on Computational Complexity (ECCC)} }","short":"M.R. Ackermann, J. Blömer, C. Scholz, (2011).","apa":"Ackermann, M. R., Blömer, J., &#38; Scholz, C. (2011). Hardness and Non-Approximability of Bregman Clustering Problems."},"year":"2011","author":[{"first_name":"Marcel R","last_name":"Ackermann","full_name":"Ackermann, Marcel R"},{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"last_name":"Scholz","full_name":"Scholz, Christoph","first_name":"Christoph"}],"date_created":"2018-06-05T07:47:21Z","date_updated":"2022-01-06T06:58:50Z","title":"Hardness and Non-Approximability of Bregman Clustering Problems.","type":"conference","status":"public","department":[{"_id":"64"}],"series_title":"Electronic Colloquium on Computational Complexity (ECCC)","user_id":"25078","_id":"2985"},{"publication_status":"published","publication_identifier":{"isbn":["9783642153273","9783642153280"]},"year":"2011","place":"Berlin, Heidelberg","citation":{"chicago":"Blömer, Johannes. “How to Share a Secret.” In <i>Algorithms Unplugged</i>, 159–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. <a href=\"https://doi.org/10.1007/978-3-642-15328-0_17\">https://doi.org/10.1007/978-3-642-15328-0_17</a>.","ieee":"J. Blömer, “How to Share a Secret,” in <i>Algorithms Unplugged</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 159–168.","ama":"Blömer J. How to Share a Secret. In: <i>Algorithms Unplugged</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011:159-168. doi:<a href=\"https://doi.org/10.1007/978-3-642-15328-0_17\">10.1007/978-3-642-15328-0_17</a>","apa":"Blömer, J. (2011). How to Share a Secret. In <i>Algorithms Unplugged</i> (pp. 159–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-15328-0_17\">https://doi.org/10.1007/978-3-642-15328-0_17</a>","bibtex":"@inbook{Blömer_2011, place={Berlin, Heidelberg}, title={How to Share a Secret}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-15328-0_17\">10.1007/978-3-642-15328-0_17</a>}, booktitle={Algorithms Unplugged}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes}, year={2011}, pages={159–168} }","mla":"Blömer, Johannes. “How to Share a Secret.” <i>Algorithms Unplugged</i>, Springer Berlin Heidelberg, 2011, pp. 159–68, doi:<a href=\"https://doi.org/10.1007/978-3-642-15328-0_17\">10.1007/978-3-642-15328-0_17</a>.","short":"J. Blömer, in: Algorithms Unplugged, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 159–168."},"page":"159-168","publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:50Z","date_created":"2018-06-05T07:48:25Z","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"title":"How to Share a Secret","doi":"10.1007/978-3-642-15328-0_17","type":"book_chapter","publication":"Algorithms Unplugged","status":"public","_id":"2986","user_id":"25078","department":[{"_id":"64"}]},{"extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3137","status":"public","type":"conference","publication":"Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings","doi":"10.1007/978-3-642-25385-0_35","title":"Short Signatures from Weaker Assumptions","author":[{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"last_name":"Kiltz","full_name":"Kiltz, Eike","first_name":"Eike"}],"date_created":"2018-06-07T09:27:58Z","date_updated":"2022-01-06T06:58:58Z","citation":{"apa":"Hofheinz, D., Jager, T., &#38; Kiltz, E. (2011). Short Signatures from Weaker Assumptions. In <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings</i> (pp. 647--666). <a href=\"https://doi.org/10.1007/978-3-642-25385-0_35\">https://doi.org/10.1007/978-3-642-25385-0_35</a>","bibtex":"@inproceedings{Hofheinz_Jager_Kiltz_2011, title={Short Signatures from Weaker Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-25385-0_35\">10.1007/978-3-642-25385-0_35</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike}, year={2011}, pages={647--666} }","mla":"Hofheinz, Dennis, et al. “Short Signatures from Weaker Assumptions.” <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings</i>, 2011, pp. 647--666, doi:<a href=\"https://doi.org/10.1007/978-3-642-25385-0_35\">10.1007/978-3-642-25385-0_35</a>.","short":"D. Hofheinz, T. Jager, E. Kiltz, in: Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, 2011, pp. 647--666.","ama":"Hofheinz D, Jager T, Kiltz E. Short Signatures from Weaker Assumptions. In: <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings</i>. ; 2011:647--666. doi:<a href=\"https://doi.org/10.1007/978-3-642-25385-0_35\">10.1007/978-3-642-25385-0_35</a>","chicago":"Hofheinz, Dennis, Tibor Jager, and Eike Kiltz. “Short Signatures from Weaker Assumptions.” In <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings</i>, 647--666, 2011. <a href=\"https://doi.org/10.1007/978-3-642-25385-0_35\">https://doi.org/10.1007/978-3-642-25385-0_35</a>.","ieee":"D. Hofheinz, T. Jager, and E. Kiltz, “Short Signatures from Weaker Assumptions,” in <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings</i>, 2011, pp. 647--666."},"page":"647--666","year":"2011"},{"doi":"10.1145/2046707.2046756","title":"How to break XML encryption","author":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"},{"last_name":"Somorovsky","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"date_created":"2018-06-07T09:28:23Z","date_updated":"2022-01-06T06:58:58Z","citation":{"short":"T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, 2011, pp. 413--422.","bibtex":"@inproceedings{Jager_Somorovsky_2011, title={How to break XML encryption}, DOI={<a href=\"https://doi.org/10.1145/2046707.2046756\">10.1145/2046707.2046756</a>}, booktitle={Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011}, author={Jager, Tibor and Somorovsky, Juraj}, year={2011}, pages={413--422} }","mla":"Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” <i>Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011</i>, 2011, pp. 413--422, doi:<a href=\"https://doi.org/10.1145/2046707.2046756\">10.1145/2046707.2046756</a>.","apa":"Jager, T., &#38; Somorovsky, J. (2011). How to break XML encryption. In <i>Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011</i> (pp. 413--422). <a href=\"https://doi.org/10.1145/2046707.2046756\">https://doi.org/10.1145/2046707.2046756</a>","ieee":"T. Jager and J. Somorovsky, “How to break XML encryption,” in <i>Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011</i>, 2011, pp. 413--422.","chicago":"Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In <i>Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011</i>, 413--422, 2011. <a href=\"https://doi.org/10.1145/2046707.2046756\">https://doi.org/10.1145/2046707.2046756</a>.","ama":"Jager T, Somorovsky J. How to break XML encryption. In: <i>Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011</i>. ; 2011:413--422. doi:<a href=\"https://doi.org/10.1145/2046707.2046756\">10.1145/2046707.2046756</a>"},"page":"413--422","year":"2011","extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3138","status":"public","type":"conference","publication":"Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011"},{"status":"public","publication":"Electr. Notes Theor. Comput. Sci.","type":"journal_article","_id":"3183","department":[{"_id":"77"}],"user_id":"29719","year":"2011","page":"69--80","citation":{"apa":"Schneider, S., Treharne, H., &#38; Wehrheim, H. (2011). Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study. <i>Electr. Notes Theor. Comput. Sci.</i>, 69--80. <a href=\"https://doi.org/10.1016/j.entcs.2011.11.019\">https://doi.org/10.1016/j.entcs.2011.11.019</a>","bibtex":"@article{Schneider_Treharne_Wehrheim_2011, title={Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study}, DOI={<a href=\"https://doi.org/10.1016/j.entcs.2011.11.019\">10.1016/j.entcs.2011.11.019</a>}, journal={Electr. Notes Theor. Comput. Sci.}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike}, year={2011}, pages={69--80} }","short":"S. Schneider, H. Treharne, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2011) 69--80.","mla":"Schneider, Steve, et al. “Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: A Case Study.” <i>Electr. Notes Theor. Comput. Sci.</i>, 2011, pp. 69--80, doi:<a href=\"https://doi.org/10.1016/j.entcs.2011.11.019\">10.1016/j.entcs.2011.11.019</a>.","ama":"Schneider S, Treharne H, Wehrheim H. Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study. <i>Electr Notes Theor Comput Sci</i>. 2011:69--80. doi:<a href=\"https://doi.org/10.1016/j.entcs.2011.11.019\">10.1016/j.entcs.2011.11.019</a>","chicago":"Schneider, Steve, Helen Treharne, and Heike Wehrheim. “Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: A Case Study.” <i>Electr. Notes Theor. Comput. Sci.</i>, 2011, 69--80. <a href=\"https://doi.org/10.1016/j.entcs.2011.11.019\">https://doi.org/10.1016/j.entcs.2011.11.019</a>.","ieee":"S. Schneider, H. Treharne, and H. Wehrheim, “Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study,” <i>Electr. Notes Theor. Comput. Sci.</i>, pp. 69--80, 2011."},"title":"Bounded Retransmission in Event-B{\\(\\parallel\\)}CSP: a Case Study","doi":"10.1016/j.entcs.2011.11.019","date_updated":"2022-01-06T06:59:03Z","date_created":"2018-06-13T08:20:47Z","author":[{"first_name":"Steve","full_name":"Schneider, Steve","last_name":"Schneider"},{"first_name":"Helen","last_name":"Treharne","full_name":"Treharne, Helen"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}]},{"status":"public","publication":"{ACM} Trans. Program. Lang. Syst.","type":"journal_article","_id":"3184","department":[{"_id":"77"}],"user_id":"29719","year":"2011","page":"4:1--4:43","citation":{"ama":"Derrick J, Schellhorn G, Wehrheim H. Mechanically verified proof obligations for linearizability. <i>{ACM} Trans Program Lang Syst</i>. 2011;(1):4:1--4:43. doi:<a href=\"https://doi.org/10.1145/1889997.1890001\">10.1145/1889997.1890001</a>","ieee":"J. Derrick, G. Schellhorn, and H. Wehrheim, “Mechanically verified proof obligations for linearizability,” <i>{ACM} Trans. Program. Lang. Syst.</i>, no. 1, pp. 4:1--4:43, 2011.","chicago":"Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Mechanically Verified Proof Obligations for Linearizability.” <i>{ACM} Trans. Program. Lang. Syst.</i>, no. 1 (2011): 4:1--4:43. <a href=\"https://doi.org/10.1145/1889997.1890001\">https://doi.org/10.1145/1889997.1890001</a>.","bibtex":"@article{Derrick_Schellhorn_Wehrheim_2011, title={Mechanically verified proof obligations for linearizability}, DOI={<a href=\"https://doi.org/10.1145/1889997.1890001\">10.1145/1889997.1890001</a>}, number={1}, journal={{ACM} Trans. Program. Lang. Syst.}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}, year={2011}, pages={4:1--4:43} }","mla":"Derrick, John, et al. “Mechanically Verified Proof Obligations for Linearizability.” <i>{ACM} Trans. Program. Lang. Syst.</i>, no. 1, 2011, pp. 4:1--4:43, doi:<a href=\"https://doi.org/10.1145/1889997.1890001\">10.1145/1889997.1890001</a>.","short":"J. Derrick, G. Schellhorn, H. Wehrheim, {ACM} Trans. Program. Lang. Syst. (2011) 4:1--4:43.","apa":"Derrick, J., Schellhorn, G., &#38; Wehrheim, H. (2011). Mechanically verified proof obligations for linearizability. <i>{ACM} Trans. Program. Lang. Syst.</i>, (1), 4:1--4:43. <a href=\"https://doi.org/10.1145/1889997.1890001\">https://doi.org/10.1145/1889997.1890001</a>"},"issue":"1","title":"Mechanically verified proof obligations for linearizability","doi":"10.1145/1889997.1890001","date_updated":"2022-01-06T06:59:03Z","date_created":"2018-06-13T08:22:02Z","author":[{"first_name":"John","last_name":"Derrick","full_name":"Derrick, John"},{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"}]},{"year":"2011","citation":{"mla":"Ruhroth, Thomas, et al. “ReL: {A} Generic Refactoring Language for Specification and Execution.” <i>37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011</i>, 2011, pp. 83--90, doi:<a href=\"https://doi.org/10.1109/SEAA.2011.22\">10.1109/SEAA.2011.22</a>.","bibtex":"@inproceedings{Ruhroth_Wehrheim_Ziegert_2011, title={ReL: {A} Generic Refactoring Language for Specification and Execution}, DOI={<a href=\"https://doi.org/10.1109/SEAA.2011.22\">10.1109/SEAA.2011.22</a>}, booktitle={37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011}, author={Ruhroth, Thomas and Wehrheim, Heike and Ziegert, Steffen}, year={2011}, pages={83--90} }","short":"T. Ruhroth, H. Wehrheim, S. Ziegert, in: 37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011, 2011, pp. 83--90.","apa":"Ruhroth, T., Wehrheim, H., &#38; Ziegert, S. (2011). ReL: {A} Generic Refactoring Language for Specification and Execution. In <i>37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011</i> (pp. 83--90). <a href=\"https://doi.org/10.1109/SEAA.2011.22\">https://doi.org/10.1109/SEAA.2011.22</a>","ama":"Ruhroth T, Wehrheim H, Ziegert S. ReL: {A} Generic Refactoring Language for Specification and Execution. In: <i>37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011</i>. ; 2011:83--90. doi:<a href=\"https://doi.org/10.1109/SEAA.2011.22\">10.1109/SEAA.2011.22</a>","chicago":"Ruhroth, Thomas, Heike Wehrheim, and Steffen Ziegert. “ReL: {A} Generic Refactoring Language for Specification and Execution.” In <i>37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011</i>, 83--90, 2011. <a href=\"https://doi.org/10.1109/SEAA.2011.22\">https://doi.org/10.1109/SEAA.2011.22</a>.","ieee":"T. Ruhroth, H. Wehrheim, and S. Ziegert, “ReL: {A} Generic Refactoring Language for Specification and Execution,” in <i>37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011</i>, 2011, pp. 83--90."},"page":"83--90","title":"ReL: {A} Generic Refactoring Language for Specification and Execution","doi":"10.1109/SEAA.2011.22","date_updated":"2022-01-06T06:59:03Z","date_created":"2018-06-13T08:23:28Z","author":[{"first_name":"Thomas","last_name":"Ruhroth","full_name":"Ruhroth, Thomas"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"},{"first_name":"Steffen","full_name":"Ziegert, Steffen","last_name":"Ziegert"}],"status":"public","type":"conference","publication":"37th {EUROMICRO} Conference on Software Engineering and Advanced Applications, {SEAA} 2011, Oulu, Finland, August 30 - September 2, 2011","_id":"3185","user_id":"29719","department":[{"_id":"77"}]},{"doi":"10.1007/978-3-642-21437-0_25","title":"Verifying Linearisability with Potential Linearisation Points","date_created":"2018-06-13T08:25:07Z","author":[{"first_name":"John","last_name":"Derrick","full_name":"Derrick, John"},{"last_name":"Schellhorn","full_name":"Schellhorn, Gerhard","first_name":"Gerhard"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_updated":"2022-01-06T06:59:03Z","citation":{"apa":"Derrick, J., Schellhorn, G., &#38; Wehrheim, H. (2011). Verifying Linearisability with Potential Linearisation Points. In M. J. Butler &#38; W. Schulte (Eds.), <i>{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings</i> (pp. 323--337). <a href=\"https://doi.org/10.1007/978-3-642-21437-0_25\">https://doi.org/10.1007/978-3-642-21437-0_25</a>","bibtex":"@inproceedings{Derrick_Schellhorn_Wehrheim_2011, series={Lecture Notes in Computer Science}, title={Verifying Linearisability with Potential Linearisation Points}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-21437-0_25\">10.1007/978-3-642-21437-0_25</a>}, booktitle={{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}, editor={J. Butler, Michael and Schulte, WolframEditors}, year={2011}, pages={323--337}, collection={Lecture Notes in Computer Science} }","mla":"Derrick, John, et al. “Verifying Linearisability with Potential Linearisation Points.” <i>{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings</i>, edited by Michael J. Butler and Wolfram Schulte, 2011, pp. 323--337, doi:<a href=\"https://doi.org/10.1007/978-3-642-21437-0_25\">10.1007/978-3-642-21437-0_25</a>.","short":"J. Derrick, G. Schellhorn, H. Wehrheim, in: M. J. Butler, W. Schulte (Eds.), {FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings, 2011, pp. 323--337.","ama":"Derrick J, Schellhorn G, Wehrheim H. Verifying Linearisability with Potential Linearisation Points. In: J. Butler M, Schulte W, eds. <i>{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings</i>. Lecture Notes in Computer Science. ; 2011:323--337. doi:<a href=\"https://doi.org/10.1007/978-3-642-21437-0_25\">10.1007/978-3-642-21437-0_25</a>","chicago":"Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Verifying Linearisability with Potential Linearisation Points.” In <i>{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings</i>, edited by Michael J. Butler and Wolfram Schulte, 323--337. Lecture Notes in Computer Science, 2011. <a href=\"https://doi.org/10.1007/978-3-642-21437-0_25\">https://doi.org/10.1007/978-3-642-21437-0_25</a>.","ieee":"J. Derrick, G. Schellhorn, and H. Wehrheim, “Verifying Linearisability with Potential Linearisation Points,” in <i>{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings</i>, 2011, pp. 323--337."},"page":"323--337","year":"2011","series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3186","status":"public","editor":[{"full_name":"J. Butler, Michael","last_name":"J. Butler","first_name":"Michael"},{"first_name":"Wolfram","full_name":"Schulte, Wolfram","last_name":"Schulte"}],"type":"conference","publication":"{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings"},{"doi":"10.1007/978-3-642-25032-3_7","title":"Sound and Complete Abstract Graph Transformation","date_created":"2018-06-13T08:32:12Z","author":[{"last_name":"Steenken","full_name":"Steenken, Dominik","first_name":"Dominik"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"},{"last_name":"Wonisch","full_name":"Wonisch, Daniel","first_name":"Daniel"}],"date_updated":"2022-01-06T06:59:03Z","citation":{"chicago":"Steenken, Dominik, Heike Wehrheim, and Daniel Wonisch. “Sound and Complete Abstract Graph Transformation.” In <i>Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers</i>, edited by Adenilso da Silva Sim{\\~{a}}o and Carroll Morgan, 92--107. Lecture Notes in Computer Science, 2011. <a href=\"https://doi.org/10.1007/978-3-642-25032-3_7\">https://doi.org/10.1007/978-3-642-25032-3_7</a>.","ieee":"D. Steenken, H. Wehrheim, and D. Wonisch, “Sound and Complete Abstract Graph Transformation,” in <i>Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers</i>, 2011, pp. 92--107.","ama":"Steenken D, Wehrheim H, Wonisch D. Sound and Complete Abstract Graph Transformation. In: da Silva Sim{\\~{a}}o A, Morgan C, eds. <i>Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers</i>. Lecture Notes in Computer Science. ; 2011:92--107. doi:<a href=\"https://doi.org/10.1007/978-3-642-25032-3_7\">10.1007/978-3-642-25032-3_7</a>","mla":"Steenken, Dominik, et al. “Sound and Complete Abstract Graph Transformation.” <i>Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers</i>, edited by Adenilso da Silva Sim{\\~{a}}o and Carroll Morgan, 2011, pp. 92--107, doi:<a href=\"https://doi.org/10.1007/978-3-642-25032-3_7\">10.1007/978-3-642-25032-3_7</a>.","short":"D. Steenken, H. Wehrheim, D. Wonisch, in: A. da Silva Sim{\\~{a}}o, C. Morgan (Eds.), Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers, 2011, pp. 92--107.","bibtex":"@inproceedings{Steenken_Wehrheim_Wonisch_2011, series={Lecture Notes in Computer Science}, title={Sound and Complete Abstract Graph Transformation}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-25032-3_7\">10.1007/978-3-642-25032-3_7</a>}, booktitle={Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers}, author={Steenken, Dominik and Wehrheim, Heike and Wonisch, Daniel}, editor={da Silva Sim{\\~{a}}o, Adenilso and Morgan, CarrollEditors}, year={2011}, pages={92--107}, collection={Lecture Notes in Computer Science} }","apa":"Steenken, D., Wehrheim, H., &#38; Wonisch, D. (2011). Sound and Complete Abstract Graph Transformation. In A. da Silva Sim{\\~{a}}o &#38; C. Morgan (Eds.), <i>Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers</i> (pp. 92--107). <a href=\"https://doi.org/10.1007/978-3-642-25032-3_7\">https://doi.org/10.1007/978-3-642-25032-3_7</a>"},"page":"92--107","year":"2011","series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3187","status":"public","editor":[{"first_name":"Adenilso","full_name":"da Silva Sim{\\~{a}}o, Adenilso","last_name":"da Silva Sim{\\~{a}}o"},{"full_name":"Morgan, Carroll","last_name":"Morgan","first_name":"Carroll"}],"type":"conference","publication":"Formal Methods, Foundations and Applications - 14th Brazilian Symposium, {SBMF} 2011, S{\\~{a}}o Paulo, Brazil, September 26-30, 2011, Revised Selected Papers"},{"_id":"3188","department":[{"_id":"77"}],"series_title":"{EPTCS}","user_id":"29719","publication":"Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.","type":"conference","editor":[{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"first_name":"Eerke","last_name":"A. Boiten","full_name":"A. Boiten, Eerke"},{"first_name":"Steve","full_name":"Reeves, Steve","last_name":"Reeves"}],"status":"public","date_updated":"2022-01-06T06:59:03Z","author":[{"full_name":"Schneider, Steve","last_name":"Schneider","first_name":"Steve"},{"first_name":"Helen","full_name":"Treharne, Helen","last_name":"Treharne"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"date_created":"2018-06-13T08:43:19Z","title":"A {CSP} Account of Event-B Refinement","doi":"10.4204/EPTCS.55.9","year":"2011","page":"139--154","citation":{"chicago":"Schneider, Steve, Helen Treharne, and Heike Wehrheim. “A {CSP} Account of Event-B Refinement.” In <i>Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.</i>, edited by John Derrick, Eerke A. Boiten, and Steve Reeves, 139--154. {EPTCS}, 2011. <a href=\"https://doi.org/10.4204/EPTCS.55.9\">https://doi.org/10.4204/EPTCS.55.9</a>.","ieee":"S. Schneider, H. Treharne, and H. Wehrheim, “A {CSP} Account of Event-B Refinement,” in <i>Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.</i>, 2011, pp. 139--154.","ama":"Schneider S, Treharne H, Wehrheim H. A {CSP} Account of Event-B Refinement. In: Derrick J, A. Boiten E, Reeves S, eds. <i>Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.</i> {EPTCS}. ; 2011:139--154. doi:<a href=\"https://doi.org/10.4204/EPTCS.55.9\">10.4204/EPTCS.55.9</a>","bibtex":"@inproceedings{Schneider_Treharne_Wehrheim_2011, series={{EPTCS}}, title={A {CSP} Account of Event-B Refinement}, DOI={<a href=\"https://doi.org/10.4204/EPTCS.55.9\">10.4204/EPTCS.55.9</a>}, booktitle={Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.}, author={Schneider, Steve and Treharne, Helen and Wehrheim, Heike}, editor={Derrick, John and A. Boiten, Eerke and Reeves, SteveEditors}, year={2011}, pages={139--154}, collection={{EPTCS}} }","short":"S. Schneider, H. Treharne, H. Wehrheim, in: J. Derrick, E. A. Boiten, S. Reeves (Eds.), Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011., 2011, pp. 139--154.","mla":"Schneider, Steve, et al. “A {CSP} Account of Event-B Refinement.” <i>Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.</i>, edited by John Derrick et al., 2011, pp. 139--154, doi:<a href=\"https://doi.org/10.4204/EPTCS.55.9\">10.4204/EPTCS.55.9</a>.","apa":"Schneider, S., Treharne, H., &#38; Wehrheim, H. (2011). A {CSP} Account of Event-B Refinement. In J. Derrick, E. A. Boiten, &#38; S. Reeves (Eds.), <i>Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011.</i> (pp. 139--154). <a href=\"https://doi.org/10.4204/EPTCS.55.9\">https://doi.org/10.4204/EPTCS.55.9</a>"}},{"title":"Multi-touch, tangible and pen-based interaction in incident planning","author":[{"first_name":"Karsten","full_name":"Nebe, Karsten","last_name":"Nebe"},{"last_name":"Fischer","id":"30457","full_name":"Fischer, Holger Gerhard","first_name":"Holger Gerhard"},{"first_name":"Florian ","last_name":"Klompmaker","full_name":"Klompmaker, Florian "},{"last_name":"Jung","full_name":"Jung, Helge","first_name":"Helge"}],"date_created":"2021-11-21T18:35:27Z","publisher":"Oldenbourg Wissenschaftsverlag GmbH, M {\\ \"u} nchen","date_updated":"2022-01-06T06:57:43Z","page":"263-273","citation":{"bibtex":"@inproceedings{Nebe_Fischer_Klompmaker_Jung_2011, title={Multi-touch, tangible and pen-based interaction in incident planning}, publisher={Oldenbourg Wissenschaftsverlag GmbH, M {\\ \"u} nchen}, author={Nebe, Karsten and Fischer, Holger Gerhard and Klompmaker, Florian  and Jung, Helge}, year={2011}, pages={263–273} }","mla":"Nebe, Karsten, et al. <i>Multi-Touch, Tangible and Pen-Based Interaction in Incident Planning</i>. Oldenbourg Wissenschaftsverlag GmbH, M {\\ \"u} nchen, 2011, pp. 263–73.","short":"K. Nebe, H.G. Fischer, F. Klompmaker, H. Jung, in: Oldenbourg Wissenschaftsverlag GmbH, M {\\ \"u} nchen, 2011, pp. 263–273.","apa":"Nebe, K., Fischer, H. G., Klompmaker, F., &#38; Jung, H. (2011). <i>Multi-touch, tangible and pen-based interaction in incident planning</i>. 263–273.","ama":"Nebe K, Fischer HG, Klompmaker F, Jung H. Multi-touch, tangible and pen-based interaction in incident planning. In: Oldenbourg Wissenschaftsverlag GmbH, M {\\ \"u} nchen; 2011:263-273.","chicago":"Nebe, Karsten, Holger Gerhard Fischer, Florian  Klompmaker, and Helge Jung. “Multi-Touch, Tangible and Pen-Based Interaction in Incident Planning,” 263–73. Oldenbourg Wissenschaftsverlag GmbH, M {\\ \"u} nchen, 2011.","ieee":"K. Nebe, H. G. Fischer, F. Klompmaker, and H. Jung, “Multi-touch, tangible and pen-based interaction in incident planning,” 2011, pp. 263–273."},"year":"2011","publication_status":"published","language":[{"iso":"eng"}],"department":[{"_id":"71"}],"user_id":"71124","_id":"27622","status":"public","type":"conference"},{"date_updated":"2022-01-06T06:57:43Z","author":[{"first_name":"Reinhard","full_name":"Keil, Reinhard","last_name":"Keil"},{"last_name":"Selke","id":"497","full_name":"Selke, Harald","first_name":"Harald"}],"date_created":"2021-11-21T19:32:20Z","title":"Virtual Learning Spaces for Co-Active Learning","conference":{"start_date":"2011-07-19","end_date":"2011-07-22"},"publication_status":"published","year":"2011","page":"191-202","citation":{"ieee":"R. Keil and H. Selke, “Virtual Learning Spaces for Co-Active Learning,” in <i>Proc. of Int. Conf. on Improving University Teaching</i>, 2011, pp. 191–202.","chicago":"Keil, Reinhard, and Harald Selke. “Virtual Learning Spaces for Co-Active Learning.” In <i>Proc. of Int. Conf. on Improving University Teaching</i>, 191–202, 2011.","ama":"Keil R, Selke H. Virtual Learning Spaces for Co-Active Learning. In: <i>Proc. of Int. Conf. on Improving University Teaching</i>. ; 2011:191-202.","apa":"Keil, R., &#38; Selke, H. (2011). Virtual Learning Spaces for Co-Active Learning. <i>Proc. of Int. Conf. on Improving University Teaching</i>, 191–202.","mla":"Keil, Reinhard, and Harald Selke. “Virtual Learning Spaces for Co-Active Learning.” <i>Proc. of Int. Conf. on Improving University Teaching</i>, 2011, pp. 191–202.","bibtex":"@inproceedings{Keil_Selke_2011, title={Virtual Learning Spaces for Co-Active Learning}, booktitle={Proc. of Int. Conf. on Improving University Teaching}, author={Keil, Reinhard and Selke, Harald}, year={2011}, pages={191–202} }","short":"R. Keil, H. Selke, in: Proc. of Int. Conf. on Improving University Teaching, 2011, pp. 191–202."},"_id":"27623","department":[{"_id":"71"}],"user_id":"71124","language":[{"iso":"eng"}],"publication":"Proc. of Int. Conf. on Improving University Teaching","type":"conference","abstract":[{"text":"Kollaboratives Lernen kann im Großen und Ganzen durch verteilte, unterbrochene kooperative Prozesse charakterisiert werden, da die Interaktion mit anderen Lernern und Lehrenden zu verschiedenen Zeiten an verschiedenen Orten stattfindet. Um die zeitlich und räumlich verteilten Lernaktivitäten zu integrieren, muss ein virtueller Lernraum bereitgestellt werden der einerseits als Arena kooperativer Interaktionen dient und andererseits gleichzeitig ein verteiltes externes Gedächtnis durch persistente Lernobjekte bietet. Das Konzept des ko-aktiven Lernens umfasst eine Vielzahl von technischen Konzepten und Funktionen, die kollaboratives Lernen in unterschiedlichsten Lernarrangements unterstützen.\r\n","lang":"eng"}],"status":"public"},{"_id":"27624","user_id":"71124","department":[{"_id":"71"}],"language":[{"iso":"eng"}],"type":"conference","status":"public","date_updated":"2022-01-06T06:57:43Z","date_created":"2021-11-21T19:38:09Z","author":[{"full_name":"Paelke, Volker","last_name":"Paelke","first_name":"Volker"},{"full_name":"Nebe, Karsten","last_name":"Nebe","first_name":"Karsten"},{"first_name":"Florian","full_name":"Klompmaker, Florian","last_name":"Klompmaker"},{"first_name":"Helge","full_name":"Jung, Helge","last_name":"Jung"}],"title":"Multi-Touch Interaction for Disaster Management.}","publication_status":"published","year":"2011","citation":{"ama":"Paelke V, Nebe K, Klompmaker F, Jung H. Multi-Touch Interaction for Disaster Management.}. In: ; 2011.","chicago":"Paelke, Volker, Karsten Nebe, Florian Klompmaker, and Helge Jung. “Multi-Touch Interaction for Disaster Management.},” 2011.","ieee":"V. Paelke, K. Nebe, F. Klompmaker, and H. Jung, “Multi-Touch Interaction for Disaster Management.},” 2011.","apa":"Paelke, V., Nebe, K., Klompmaker, F., &#38; Jung, H. (2011). <i>Multi-Touch Interaction for Disaster Management.}</i>.","mla":"Paelke, Volker, et al. <i>Multi-Touch Interaction for Disaster Management.}</i>. 2011.","short":"V. Paelke, K. Nebe, F. Klompmaker, H. Jung, in: 2011.","bibtex":"@inproceedings{Paelke_Nebe_Klompmaker_Jung_2011, title={Multi-Touch Interaction for Disaster Management.}}, author={Paelke, Volker and Nebe, Karsten and Klompmaker, Florian and Jung, Helge}, year={2011} }"}},{"language":[{"iso":"eng"}],"department":[{"_id":"71"}],"user_id":"71124","_id":"27625","status":"public","editor":[{"first_name":"A","last_name":"Breiter","full_name":"Breiter, A"},{"full_name":"Wind, M","last_name":"Wind","first_name":"M"}],"type":"conference","title":"Hypothesis- guided technology design as the basis of contextual computer science","author":[{"first_name":"Reinhard","full_name":"Keil, Reinhard","last_name":"Keil"}],"date_created":"2021-11-21T19:43:58Z","date_updated":"2022-01-06T06:57:43Z","publisher":"Lit Verlag, M {\\\" u} nster","page":"165-184","citation":{"ieee":"R. Keil, “Hypothesis- guided technology design as the basis of contextual computer science,” 2011, pp. 165–184.","chicago":"Keil, Reinhard. “Hypothesis- Guided Technology Design as the Basis of Contextual Computer Science.” edited by A Breiter and M Wind, 165–84. Lit Verlag, M {\\\" u} nster, 2011.","ama":"Keil R. Hypothesis- guided technology design as the basis of contextual computer science. In: Breiter A, Wind M, eds. Lit Verlag, M {\\\" u} nster; 2011:165-184.","apa":"Keil, R. (2011). <i>Hypothesis- guided technology design as the basis of contextual computer science</i> (A. Breiter &#38; M. Wind, Eds.; pp. 165–184). Lit Verlag, M {\\\" u} nster.","bibtex":"@inproceedings{Keil_2011, title={Hypothesis- guided technology design as the basis of contextual computer science}, publisher={Lit Verlag, M {\\\" u} nster}, author={Keil, Reinhard}, editor={Breiter, A and Wind, M}, year={2011}, pages={165–184} }","mla":"Keil, Reinhard. <i>Hypothesis- Guided Technology Design as the Basis of Contextual Computer Science</i>. Edited by A Breiter and M Wind, Lit Verlag, M {\\\" u} nster, 2011, pp. 165–84.","short":"R. Keil, in: A. Breiter, M. Wind (Eds.), Lit Verlag, M {\\\" u} nster, 2011, pp. 165–184."},"year":"2011","publication_status":"published"},{"date_created":"2021-11-21T19:51:23Z","author":[{"full_name":"Klompmaker, Florian","last_name":"Klompmaker","first_name":"Florian"},{"full_name":"Nebe,  Karsten","last_name":"Nebe","first_name":" Karsten"},{"first_name":"H","full_name":"Jung, H","last_name":"Jung"}],"date_updated":"2022-01-06T06:57:43Z","title":"Smart Fiducials: Advanced Tangible Interaction Techniques through Dynamic Visual Paterns","publication_status":"published","citation":{"ieee":"F. Klompmaker,  Karsten Nebe, and H. Jung, “Smart Fiducials: Advanced Tangible Interaction Techniques through Dynamic Visual Paterns,” 2011.","chicago":"Klompmaker, Florian,  Karsten Nebe, and H Jung. “Smart Fiducials: Advanced Tangible Interaction Techniques through Dynamic Visual Paterns,” 2011.","ama":"Klompmaker F, Nebe  Karsten, Jung H. Smart Fiducials: Advanced Tangible Interaction Techniques through Dynamic Visual Paterns. In: ; 2011.","apa":"Klompmaker, F., Nebe,  Karsten, &#38; Jung, H. (2011). <i>Smart Fiducials: Advanced Tangible Interaction Techniques through Dynamic Visual Paterns</i>.","short":"F. Klompmaker,  Karsten Nebe, H. Jung, in: 2011.","mla":"Klompmaker, Florian, et al. <i>Smart Fiducials: Advanced Tangible Interaction Techniques through Dynamic Visual Paterns</i>. 2011.","bibtex":"@inproceedings{Klompmaker_Nebe_Jung_2011, title={Smart Fiducials: Advanced Tangible Interaction Techniques through Dynamic Visual Paterns}, author={Klompmaker, Florian and Nebe,  Karsten and Jung, H}, year={2011} }"},"year":"2011","user_id":"71124","department":[{"_id":"71"}],"_id":"27626","language":[{"iso":"eng"}],"type":"conference","status":"public"},{"publication":"Proceedings of the International Conference on Health Informatics","type":"conference","year":"2011","status":"public","citation":{"apa":"Klompmaker, F., Nebe,  Karsten,  Busch, C., &#38; Willemsen,  Detlev. (2011). User Centered Design Process of OSAMI-D: Developing User Interfaces for a Remote Ergometer Training Application. <i>Proceedings of the International Conference on Health Informatics</i>.","bibtex":"@inproceedings{Klompmaker_Nebe_ Busch_Willemsen_2011, title={User Centered Design Process of OSAMI-D: Developing User Interfaces for a Remote Ergometer Training Application}, booktitle={Proceedings of the International Conference on Health Informatics}, author={Klompmaker, Florian  and Nebe,  Karsten and  Busch, Clemens and Willemsen,  Detlev}, year={2011} }","short":"F. Klompmaker,  Karsten Nebe, C.  Busch,  Detlev Willemsen, in: Proceedings of the International Conference on Health Informatics, 2011.","mla":"Klompmaker, Florian, et al. “User Centered Design Process of OSAMI-D: Developing User Interfaces for a Remote Ergometer Training Application.” <i>Proceedings of the International Conference on Health Informatics</i>, 2011.","ama":"Klompmaker F, Nebe  Karsten,  Busch C, Willemsen  Detlev. User Centered Design Process of OSAMI-D: Developing User Interfaces for a Remote Ergometer Training Application. In: <i>Proceedings of the International Conference on Health Informatics</i>. ; 2011.","chicago":"Klompmaker, Florian ,  Karsten Nebe, Clemens  Busch, and  Detlev Willemsen. “User Centered Design Process of OSAMI-D: Developing User Interfaces for a Remote Ergometer Training Application.” In <i>Proceedings of the International Conference on Health Informatics</i>, 2011.","ieee":"F. Klompmaker,  Karsten Nebe, C.  Busch, and  Detlev Willemsen, “User Centered Design Process of OSAMI-D: Developing User Interfaces for a Remote Ergometer Training Application,” 2011."},"_id":"27627","date_updated":"2022-01-06T06:57:43Z","department":[{"_id":"71"}],"user_id":"71124","author":[{"first_name":"Florian ","last_name":"Klompmaker","full_name":"Klompmaker, Florian "},{"first_name":" Karsten","last_name":"Nebe","full_name":"Nebe,  Karsten"},{"first_name":"Clemens","full_name":" Busch, Clemens","last_name":" Busch"},{"full_name":"Willemsen,  Detlev","last_name":"Willemsen","first_name":" Detlev"}],"date_created":"2021-11-21T19:57:05Z","title":"User Centered Design Process of OSAMI-D: Developing User Interfaces for a Remote Ergometer Training Application","language":[{"iso":"eng"}]},{"status":"public","editor":[{"last_name":"Chinni","full_name":"Chinni, M.I","first_name":"M.I"},{"first_name":"D","full_name":"Weed, D","last_name":"Weed"}],"publication":"Proceedings of the 2011 Spring Simulation Multiconference","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"71"}],"user_id":"71124","_id":"27628","citation":{"ama":"Laroque C, Schulte J. KoProV: A Learning Approach for Coordinated Learning of Modeling and Simulation Based on Knowledge Modules. In: Chinni MI, Weed D, eds. <i>Proceedings of the 2011 Spring Simulation Multiconference</i>. ; 2011.","ieee":"C. Laroque and J. Schulte, “KoProV: A Learning Approach for Coordinated Learning of Modeling and Simulation Based on Knowledge Modules,” in <i>Proceedings of the 2011 Spring Simulation Multiconference</i>, 2011.","chicago":"Laroque, Christoph, and Jonas Schulte. “KoProV: A Learning Approach for Coordinated Learning of Modeling and Simulation Based on Knowledge Modules.” In <i>Proceedings of the 2011 Spring Simulation Multiconference</i>, edited by M.I Chinni and D Weed, 2011.","bibtex":"@inproceedings{Laroque_Schulte_2011, title={KoProV: A Learning Approach for Coordinated Learning of Modeling and Simulation Based on Knowledge Modules}, booktitle={Proceedings of the 2011 Spring Simulation Multiconference}, author={Laroque, Christoph and Schulte, Jonas}, editor={Chinni, M.I and Weed, D}, year={2011} }","short":"C. Laroque, J. Schulte, in: M.I. Chinni, D. Weed (Eds.), Proceedings of the 2011 Spring Simulation Multiconference, 2011.","mla":"Laroque, Christoph, and Jonas Schulte. “KoProV: A Learning Approach for Coordinated Learning of Modeling and Simulation Based on Knowledge Modules.” <i>Proceedings of the 2011 Spring Simulation Multiconference</i>, edited by M.I Chinni and D Weed, 2011.","apa":"Laroque, C., &#38; Schulte, J. (2011). KoProV: A Learning Approach for Coordinated Learning of Modeling and Simulation Based on Knowledge Modules. In M. I. Chinni &#38; D. Weed (Eds.), <i>Proceedings of the 2011 Spring Simulation Multiconference</i>."},"year":"2011","publication_status":"published","title":"KoProV: A Learning Approach for Coordinated Learning of Modeling and Simulation Based on Knowledge Modules","date_created":"2021-11-21T20:10:30Z","author":[{"first_name":"Christoph","last_name":"Laroque","full_name":"Laroque, Christoph"},{"last_name":"Schulte","full_name":"Schulte, Jonas","first_name":"Jonas"}],"date_updated":"2022-01-06T06:57:43Z"}]
