[{"title":"Space-Time Continuous Models of Swarm Robotic Systems","doi":"10.1007/978-3-642-13377-0","date_updated":"2022-01-06T06:54:25Z","author":[{"full_name":"Hamann, Heiko","last_name":"Hamann","first_name":"Heiko"}],"date_created":"2020-11-02T14:23:36Z","year":"2008","citation":{"apa":"Hamann, H. (2008). <i>Space-Time Continuous Models of Swarm Robotic Systems</i>. <a href=\"https://doi.org/10.1007/978-3-642-13377-0\">https://doi.org/10.1007/978-3-642-13377-0</a>","short":"H. Hamann, Space-Time Continuous Models of Swarm Robotic Systems, 2008.","bibtex":"@book{Hamann_2008, title={Space-Time Continuous Models of Swarm Robotic Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-13377-0\">10.1007/978-3-642-13377-0</a>}, author={Hamann, Heiko}, year={2008} }","mla":"Hamann, Heiko. <i>Space-Time Continuous Models of Swarm Robotic Systems</i>. 2008, doi:<a href=\"https://doi.org/10.1007/978-3-642-13377-0\">10.1007/978-3-642-13377-0</a>.","chicago":"Hamann, Heiko. <i>Space-Time Continuous Models of Swarm Robotic Systems</i>, 2008. <a href=\"https://doi.org/10.1007/978-3-642-13377-0\">https://doi.org/10.1007/978-3-642-13377-0</a>.","ieee":"H. Hamann, <i>Space-Time Continuous Models of Swarm Robotic Systems</i>. 2008.","ama":"Hamann H. <i>Space-Time Continuous Models of Swarm Robotic Systems</i>.; 2008. doi:<a href=\"https://doi.org/10.1007/978-3-642-13377-0\">10.1007/978-3-642-13377-0</a>"},"publication_status":"published","publication_identifier":{"isbn":["9783642133763","9783642133770"],"issn":["1867-4925","1867-4933"]},"language":[{"iso":"eng"}],"_id":"20262","user_id":"15415","department":[{"_id":"63"},{"_id":"238"}],"status":"public","type":"dissertation"},{"title":"Kolmogorov Complexity Theory over the Reals","date_updated":"2022-01-06T06:57:18Z","date_created":"2021-10-15T09:34:19Z","author":[{"first_name":"Martin","last_name":"Ziegler","full_name":"Ziegler, Martin"},{"last_name":"Koolen","full_name":"Koolen, Wouter M.","first_name":"Wouter M."}],"year":"2008","citation":{"ama":"Ziegler M, Koolen WM. Kolmogorov Complexity Theory over the Reals. <i>arXiv:08022027</i>. Published online 2008.","chicago":"Ziegler, Martin, and Wouter M. Koolen. “Kolmogorov Complexity Theory over the Reals.” <i>ArXiv:0802.2027</i>, 2008.","ieee":"M. Ziegler and W. M. Koolen, “Kolmogorov Complexity Theory over the Reals,” <i>arXiv:0802.2027</i>. 2008.","mla":"Ziegler, Martin, and Wouter M. Koolen. “Kolmogorov Complexity Theory over the Reals.” <i>ArXiv:0802.2027</i>, 2008.","short":"M. Ziegler, W.M. Koolen, ArXiv:0802.2027 (2008).","bibtex":"@article{Ziegler_Koolen_2008, title={Kolmogorov Complexity Theory over the Reals}, journal={arXiv:0802.2027}, author={Ziegler, Martin and Koolen, Wouter M.}, year={2008} }","apa":"Ziegler, M., &#38; Koolen, W. M. (2008). Kolmogorov Complexity Theory over the Reals. In <i>arXiv:0802.2027</i>."},"language":[{"iso":"eng"}],"_id":"26235","department":[{"_id":"63"}],"user_id":"15415","abstract":[{"lang":"eng","text":"Kolmogorov Complexity constitutes an integral part of computability theory,\r\ninformation theory, and computational complexity theory -- in the discrete\r\nsetting of bits and Turing machines. Over real numbers, on the other hand, the\r\nBSS-machine (aka real-RAM) has been established as a major model of\r\ncomputation. This real realm has turned out to exhibit natural counterparts to\r\nmany notions and results in classical complexity and recursion theory; although\r\nusually with considerably different proofs. The present work investigates\r\nsimilarities and differences between discrete and real Kolmogorov Complexity as\r\nintroduced by Montana and Pardo (1998)."}],"status":"public","publication":"arXiv:0802.2027","type":"preprint"},{"language":[{"iso":"eng"}],"_id":"26243","department":[{"_id":"63"}],"user_id":"15415","abstract":[{"text":"Operations on univariate dense polynomials—multiplication, division with remainder, multipoint\r\nevaluation—constitute central primitives entering as build-up blocks into many higher applications and\r\nalgorithms. Fast Fourier Transform permits to accelerate them from naive quadratic to running time\r\nO(n·polylogn), that is softly linear in the degree n of the input. This is routinely employed in complexity\r\ntheoretic considerations and, over integers and finite fields, in practical number theoretic calculations.\r\nThe present work explores the benefit of fast polynomial arithmetic over the field of real numbers\r\nwhere the precision of approximation becomes crucial. To this end, we study the computability of the\r\nabove operations in the sense of Recursive Analysis as an effective refinement of continuity. This theo-\r\nretical worst-case stability analysis is then complemented by an empirical evaluation: We use GMP and\r\nthe iRRAM to find the precision required for the intermediate calculations in order to achieve a desired\r\noutput accuracy.","lang":"eng"}],"status":"public","publication":"Proc. 8th Conference on Real Numbers and Computers","type":"conference","title":"On the Stability of Fast Polynomial Arithmetic","date_updated":"2022-01-06T06:57:18Z","date_created":"2021-10-15T09:57:36Z","author":[{"last_name":"Köhler","full_name":"Köhler, Sven","first_name":"Sven"},{"last_name":"Ziegler","full_name":"Ziegler, Martin","first_name":"Martin"}],"year":"2008","page":"147-156","citation":{"short":"S. Köhler, M. Ziegler, in: Proc. 8th Conference on Real Numbers and Computers, 2008, pp. 147–156.","bibtex":"@inproceedings{Köhler_Ziegler_2008, title={On the Stability of Fast Polynomial Arithmetic}, booktitle={Proc. 8th Conference on Real Numbers and Computers}, author={Köhler, Sven and Ziegler, Martin}, year={2008}, pages={147–156} }","mla":"Köhler, Sven, and Martin Ziegler. “On the Stability of Fast Polynomial Arithmetic.” <i>Proc. 8th Conference on Real Numbers and Computers</i>, 2008, pp. 147–56.","apa":"Köhler, S., &#38; Ziegler, M. (2008). On the Stability of Fast Polynomial Arithmetic. <i>Proc. 8th Conference on Real Numbers and Computers</i>, 147–156.","ieee":"S. Köhler and M. Ziegler, “On the Stability of Fast Polynomial Arithmetic,” in <i>Proc. 8th Conference on Real Numbers and Computers</i>, 2008, pp. 147–156.","chicago":"Köhler, Sven, and Martin Ziegler. “On the Stability of Fast Polynomial Arithmetic.” In <i>Proc. 8th Conference on Real Numbers and Computers</i>, 147–56, 2008.","ama":"Köhler S, Ziegler M. On the Stability of Fast Polynomial Arithmetic. In: <i>Proc. 8th Conference on Real Numbers and Computers</i>. ; 2008:147-156."}},{"date_updated":"2022-01-06T06:57:18Z","author":[{"first_name":"Martin","full_name":"Ziegler, Martin","last_name":"Ziegler"}],"date_created":"2021-10-15T10:10:04Z","title":"Physically-Relativized Church-Turing Hypotheses","year":"2008","citation":{"chicago":"Ziegler, Martin. “Physically-Relativized Church-Turing Hypotheses.” <i>Applied Mathematics and Computation</i>, 2008.","ieee":"M. Ziegler, “Physically-Relativized Church-Turing Hypotheses,” <i>Applied Mathematics and Computation</i>, 2008.","ama":"Ziegler M. Physically-Relativized Church-Turing Hypotheses. <i>Applied Mathematics and Computation</i>. Published online 2008.","apa":"Ziegler, M. (2008). Physically-Relativized Church-Turing Hypotheses. <i>Applied Mathematics and Computation</i>.","short":"M. Ziegler, Applied Mathematics and Computation (2008).","mla":"Ziegler, Martin. “Physically-Relativized Church-Turing Hypotheses.” <i>Applied Mathematics and Computation</i>, 2008.","bibtex":"@article{Ziegler_2008, title={Physically-Relativized Church-Turing Hypotheses}, journal={Applied Mathematics and Computation}, author={Ziegler, Martin}, year={2008} }"},"_id":"26255","external_id":{"arxiv":["0805.1292"]},"department":[{"_id":"63"},{"_id":"26"}],"user_id":"15415","language":[{"iso":"eng"}],"publication":"Applied Mathematics and Computation","type":"journal_article","abstract":[{"text":"We turn the physical Church-Turing Hypothesis from an ambiguous source of sensational\r\nspeculations into a (collection of) sound and well-defined scientific problem(s):\r\nExamining recent controversies and causes for misunderstanding concerning the state of the Church-\r\nTuring Hypothesis (CTH), it is suggested to study the CTH ‘sharpened’ relative to an arbitrary but\r\nspecific physical theory—rather than vaguely referring to “nature” in general. For this purpose we\r\ncombine physical structuralism with computational complexity theory. The benefits of this approach\r\nare illustrated by some exemplary results on computability and complexity in computational physics.","lang":"eng"}],"status":"public"},{"type":"book_chapter","publication":"Verhandlungen der Deutschen Physikalischen Gesellschaft","status":"public","_id":"26262","user_id":"15415","department":[{"_id":"63"},{"_id":"26"}],"language":[{"iso":"eng"}],"year":"2008","citation":{"bibtex":"@inbook{Ziegler_2008, title={A Meta-Theory of Physics and Computation}, booktitle={Verhandlungen der Deutschen Physikalischen Gesellschaft}, publisher={Deutsche Physikalische Gesellschaft (DPG)}, author={Ziegler, Martin}, year={2008}, pages={145} }","short":"M. Ziegler, in: Verhandlungen Der Deutschen Physikalischen Gesellschaft, Deutsche Physikalische Gesellschaft (DPG), 2008, p. 145.","mla":"Ziegler, Martin. “A Meta-Theory of Physics and Computation.” <i>Verhandlungen Der Deutschen Physikalischen Gesellschaft</i>, Deutsche Physikalische Gesellschaft (DPG), 2008, p. 145.","apa":"Ziegler, M. (2008). A Meta-Theory of Physics and Computation. In <i>Verhandlungen der Deutschen Physikalischen Gesellschaft</i> (p. 145). Deutsche Physikalische Gesellschaft (DPG).","ama":"Ziegler M. A Meta-Theory of Physics and Computation. In: <i>Verhandlungen Der Deutschen Physikalischen Gesellschaft</i>. Deutsche Physikalische Gesellschaft (DPG); 2008:145.","ieee":"M. Ziegler, “A Meta-Theory of Physics and Computation,” in <i>Verhandlungen der Deutschen Physikalischen Gesellschaft</i>, Deutsche Physikalische Gesellschaft (DPG), 2008, p. 145.","chicago":"Ziegler, Martin. “A Meta-Theory of Physics and Computation.” In <i>Verhandlungen Der Deutschen Physikalischen Gesellschaft</i>, 145. Deutsche Physikalische Gesellschaft (DPG), 2008."},"page":"145","publisher":"Deutsche Physikalische Gesellschaft (DPG)","date_updated":"2022-01-06T06:57:18Z","author":[{"last_name":"Ziegler","full_name":"Ziegler, Martin","first_name":"Martin"}],"date_created":"2021-10-15T10:35:55Z","title":"A Meta-Theory of Physics and Computation"},{"type":"journal_article","publication":"Journal of Complexity","status":"public","user_id":"15415","department":[{"_id":"63"},{"_id":"26"}],"_id":"26280","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0885-064X"]},"citation":{"ama":"Meer K, Ziegler M. An explicit solution to Post’s Problem over the reals. <i>Journal of Complexity</i>. Published online 2008:3-15. doi:<a href=\"https://doi.org/10.1016/j.jco.2006.09.004\">10.1016/j.jco.2006.09.004</a>","ieee":"K. Meer and M. Ziegler, “An explicit solution to Post’s Problem over the reals,” <i>Journal of Complexity</i>, pp. 3–15, 2008, doi: <a href=\"https://doi.org/10.1016/j.jco.2006.09.004\">10.1016/j.jco.2006.09.004</a>.","chicago":"Meer, Klaus, and Martin Ziegler. “An Explicit Solution to Post’s Problem over the Reals.” <i>Journal of Complexity</i>, 2008, 3–15. <a href=\"https://doi.org/10.1016/j.jco.2006.09.004\">https://doi.org/10.1016/j.jco.2006.09.004</a>.","apa":"Meer, K., &#38; Ziegler, M. (2008). An explicit solution to Post’s Problem over the reals. <i>Journal of Complexity</i>, 3–15. <a href=\"https://doi.org/10.1016/j.jco.2006.09.004\">https://doi.org/10.1016/j.jco.2006.09.004</a>","bibtex":"@article{Meer_Ziegler_2008, title={An explicit solution to Post’s Problem over the reals}, DOI={<a href=\"https://doi.org/10.1016/j.jco.2006.09.004\">10.1016/j.jco.2006.09.004</a>}, journal={Journal of Complexity}, author={Meer, Klaus and Ziegler, Martin}, year={2008}, pages={3–15} }","short":"K. Meer, M. Ziegler, Journal of Complexity (2008) 3–15.","mla":"Meer, Klaus, and Martin Ziegler. “An Explicit Solution to Post’s Problem over the Reals.” <i>Journal of Complexity</i>, 2008, pp. 3–15, doi:<a href=\"https://doi.org/10.1016/j.jco.2006.09.004\">10.1016/j.jco.2006.09.004</a>."},"page":"3-15","year":"2008","date_created":"2021-10-15T12:42:15Z","author":[{"last_name":"Meer","full_name":"Meer, Klaus","first_name":"Klaus"},{"first_name":"Martin","last_name":"Ziegler","full_name":"Ziegler, Martin"}],"date_updated":"2022-01-06T06:57:18Z","doi":"10.1016/j.jco.2006.09.004","title":"An explicit solution to Post's Problem over the reals"},{"date_created":"2018-06-13T09:45:42Z","author":[{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"date_updated":"2022-01-06T06:59:04Z","doi":"10.1016/j.entcs.2008.02.023","title":"Refinement in the Presence of Unknowns","page":"255--264","citation":{"ama":"Wehrheim H. Refinement in the Presence of Unknowns. <i>Electr Notes Theor Comput Sci</i>. 2008:255--264. doi:<a href=\"https://doi.org/10.1016/j.entcs.2008.02.023\">10.1016/j.entcs.2008.02.023</a>","chicago":"Wehrheim, Heike. “Refinement in the Presence of Unknowns.” <i>Electr. Notes Theor. Comput. Sci.</i>, 2008, 255--264. <a href=\"https://doi.org/10.1016/j.entcs.2008.02.023\">https://doi.org/10.1016/j.entcs.2008.02.023</a>.","ieee":"H. Wehrheim, “Refinement in the Presence of Unknowns,” <i>Electr. Notes Theor. Comput. Sci.</i>, pp. 255--264, 2008.","apa":"Wehrheim, H. (2008). Refinement in the Presence of Unknowns. <i>Electr. Notes Theor. Comput. Sci.</i>, 255--264. <a href=\"https://doi.org/10.1016/j.entcs.2008.02.023\">https://doi.org/10.1016/j.entcs.2008.02.023</a>","mla":"Wehrheim, Heike. “Refinement in the Presence of Unknowns.” <i>Electr. Notes Theor. Comput. Sci.</i>, 2008, pp. 255--264, doi:<a href=\"https://doi.org/10.1016/j.entcs.2008.02.023\">10.1016/j.entcs.2008.02.023</a>.","bibtex":"@article{Wehrheim_2008, title={Refinement in the Presence of Unknowns}, DOI={<a href=\"https://doi.org/10.1016/j.entcs.2008.02.023\">10.1016/j.entcs.2008.02.023</a>}, journal={Electr. Notes Theor. Comput. Sci.}, author={Wehrheim, Heike}, year={2008}, pages={255--264} }","short":"H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2008) 255--264."},"year":"2008","department":[{"_id":"77"}],"user_id":"29719","_id":"3203","publication":"Electr. Notes Theor. Comput. Sci.","type":"journal_article","status":"public"},{"doi":"10.1016/j.entcs.2008.06.015","title":"Alloy as a Refactoring Checker?","date_created":"2018-06-13T09:47:06Z","author":[{"first_name":"H.{-}Christian","last_name":"Estler","full_name":"Estler, H.{-}Christian"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"date_updated":"2022-01-06T06:59:04Z","citation":{"apa":"Estler, H. .-}Christian, &#38; Wehrheim, H. (2008). Alloy as a Refactoring Checker? <i>Electr. Notes Theor. Comput. Sci.</i>, 331--357. <a href=\"https://doi.org/10.1016/j.entcs.2008.06.015\">https://doi.org/10.1016/j.entcs.2008.06.015</a>","bibtex":"@article{Estler_Wehrheim_2008, title={Alloy as a Refactoring Checker?}, DOI={<a href=\"https://doi.org/10.1016/j.entcs.2008.06.015\">10.1016/j.entcs.2008.06.015</a>}, journal={Electr. Notes Theor. Comput. Sci.}, author={Estler, H.{-}Christian and Wehrheim, Heike}, year={2008}, pages={331--357} }","mla":"Estler, H. .. }Christian, and Heike Wehrheim. “Alloy as a Refactoring Checker?” <i>Electr. Notes Theor. Comput. Sci.</i>, 2008, pp. 331--357, doi:<a href=\"https://doi.org/10.1016/j.entcs.2008.06.015\">10.1016/j.entcs.2008.06.015</a>.","short":"H..-}Christian Estler, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2008) 331--357.","ama":"Estler H.-}Christian, Wehrheim H. Alloy as a Refactoring Checker? <i>Electr Notes Theor Comput Sci</i>. 2008:331--357. doi:<a href=\"https://doi.org/10.1016/j.entcs.2008.06.015\">10.1016/j.entcs.2008.06.015</a>","ieee":"H. .-}Christian Estler and H. Wehrheim, “Alloy as a Refactoring Checker?,” <i>Electr. Notes Theor. Comput. Sci.</i>, pp. 331--357, 2008.","chicago":"Estler, H.{-}Christian, and Heike Wehrheim. “Alloy as a Refactoring Checker?” <i>Electr. Notes Theor. Comput. Sci.</i>, 2008, 331--357. <a href=\"https://doi.org/10.1016/j.entcs.2008.06.015\">https://doi.org/10.1016/j.entcs.2008.06.015</a>."},"page":"331--357","year":"2008","user_id":"29719","department":[{"_id":"77"}],"_id":"3204","status":"public","type":"journal_article","publication":"Electr. Notes Theor. Comput. Sci."},{"publication":"Formal Asp. Comput.","type":"journal_article","status":"public","_id":"3205","department":[{"_id":"77"}],"user_id":"29719","issue":"2","year":"2008","page":"161--204","citation":{"ama":"Möller M, Olderog E-R, Rasch H, Wehrheim H. Integrating a formal method into a software engineering process with {UML} and Java. <i>Formal Asp Comput</i>. 2008;(2):161--204. doi:<a href=\"https://doi.org/10.1007/s00165-007-0042-7\">10.1007/s00165-007-0042-7</a>","ieee":"M. Möller, E.-R. Olderog, H. Rasch, and H. Wehrheim, “Integrating a formal method into a software engineering process with {UML} and Java,” <i>Formal Asp. Comput.</i>, no. 2, pp. 161--204, 2008.","chicago":"Möller, Michael, Ernst-Rüdiger Olderog, Holger Rasch, and Heike Wehrheim. “Integrating a Formal Method into a Software Engineering Process with {UML} and Java.” <i>Formal Asp. Comput.</i>, no. 2 (2008): 161--204. <a href=\"https://doi.org/10.1007/s00165-007-0042-7\">https://doi.org/10.1007/s00165-007-0042-7</a>.","apa":"Möller, M., Olderog, E.-R., Rasch, H., &#38; Wehrheim, H. (2008). Integrating a formal method into a software engineering process with {UML} and Java. <i>Formal Asp. Comput.</i>, (2), 161--204. <a href=\"https://doi.org/10.1007/s00165-007-0042-7\">https://doi.org/10.1007/s00165-007-0042-7</a>","bibtex":"@article{Möller_Olderog_Rasch_Wehrheim_2008, title={Integrating a formal method into a software engineering process with {UML} and Java}, DOI={<a href=\"https://doi.org/10.1007/s00165-007-0042-7\">10.1007/s00165-007-0042-7</a>}, number={2}, journal={Formal Asp. Comput.}, author={Möller, Michael and Olderog, Ernst-Rüdiger and Rasch, Holger and Wehrheim, Heike}, year={2008}, pages={161--204} }","mla":"Möller, Michael, et al. “Integrating a Formal Method into a Software Engineering Process with {UML} and Java.” <i>Formal Asp. Comput.</i>, no. 2, 2008, pp. 161--204, doi:<a href=\"https://doi.org/10.1007/s00165-007-0042-7\">10.1007/s00165-007-0042-7</a>.","short":"M. Möller, E.-R. Olderog, H. Rasch, H. Wehrheim, Formal Asp. Comput. (2008) 161--204."},"date_updated":"2022-01-06T06:59:04Z","author":[{"last_name":"Möller","full_name":"Möller, Michael","first_name":"Michael"},{"first_name":"Ernst-Rüdiger","full_name":"Olderog, Ernst-Rüdiger","last_name":"Olderog"},{"last_name":"Rasch","full_name":"Rasch, Holger","first_name":"Holger"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"date_created":"2018-06-13T09:48:29Z","title":"Integrating a formal method into a software engineering process with {UML} and Java","doi":"10.1007/s00165-007-0042-7"},{"status":"public","publication":"Fundam. Inform.","type":"journal_article","department":[{"_id":"77"}],"user_id":"29719","_id":"3206","page":"369--392","citation":{"chicago":"Brückner, Ingo, Klaus Dräger, Bernd Finkbeiner, and Heike Wehrheim. “Slicing Abstractions.” <i>Fundam. Inform.</i>, no. 4 (2008): 369--392.","ieee":"I. Brückner, K. Dräger, B. Finkbeiner, and H. Wehrheim, “Slicing Abstractions,” <i>Fundam. Inform.</i>, no. 4, pp. 369--392, 2008.","ama":"Brückner I, Dräger K, Finkbeiner B, Wehrheim H. Slicing Abstractions. <i>Fundam Inform</i>. 2008;(4):369--392.","short":"I. Brückner, K. Dräger, B. Finkbeiner, H. Wehrheim, Fundam. Inform. (2008) 369--392.","bibtex":"@article{Brückner_Dräger_Finkbeiner_Wehrheim_2008, title={Slicing Abstractions}, number={4}, journal={Fundam. Inform.}, author={Brückner, Ingo and Dräger, Klaus and Finkbeiner, Bernd and Wehrheim, Heike}, year={2008}, pages={369--392} }","mla":"Brückner, Ingo, et al. “Slicing Abstractions.” <i>Fundam. Inform.</i>, no. 4, 2008, pp. 369--392.","apa":"Brückner, I., Dräger, K., Finkbeiner, B., &#38; Wehrheim, H. (2008). Slicing Abstractions. <i>Fundam. Inform.</i>, (4), 369--392."},"year":"2008","issue":"4","title":"Slicing Abstractions","author":[{"last_name":"Brückner","full_name":"Brückner, Ingo","first_name":"Ingo"},{"full_name":"Dräger, Klaus","last_name":"Dräger","first_name":"Klaus"},{"first_name":"Bernd","last_name":"Finkbeiner","full_name":"Finkbeiner, Bernd"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_created":"2018-06-13T09:50:07Z","date_updated":"2022-01-06T06:59:04Z"},{"year":"2008","page":"94--109","citation":{"apa":"Engels, G., Kleppe, A., Rensink, A., Semenyak, M., Soltenborn, C., &#38; Wehrheim, H. (2008). From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations. In I. Schieferdecker &#38; A. Hartman (Eds.), <i>Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings</i> (pp. 94--109). <a href=\"https://doi.org/10.1007/978-3-540-69100-6_7\">https://doi.org/10.1007/978-3-540-69100-6_7</a>","bibtex":"@inproceedings{Engels_Kleppe_Rensink_Semenyak_Soltenborn_Wehrheim_2008, series={Lecture Notes in Computer Science}, title={From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-69100-6_7\">10.1007/978-3-540-69100-6_7</a>}, booktitle={Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings}, author={Engels, Gregor and Kleppe, Anneke and Rensink, Arend and Semenyak, Maria and Soltenborn, Christian and Wehrheim, Heike}, editor={Schieferdecker, Ina and Hartman, AlanEditors}, year={2008}, pages={94--109}, collection={Lecture Notes in Computer Science} }","mla":"Engels, Gregor, et al. “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations.” <i>Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings</i>, edited by Ina Schieferdecker and Alan Hartman, 2008, pp. 94--109, doi:<a href=\"https://doi.org/10.1007/978-3-540-69100-6_7\">10.1007/978-3-540-69100-6_7</a>.","short":"G. Engels, A. Kleppe, A. Rensink, M. Semenyak, C. Soltenborn, H. Wehrheim, in: I. Schieferdecker, A. Hartman (Eds.), Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings, 2008, pp. 94--109.","ieee":"G. Engels, A. Kleppe, A. Rensink, M. Semenyak, C. Soltenborn, and H. Wehrheim, “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations,” in <i>Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings</i>, 2008, pp. 94--109.","chicago":"Engels, Gregor, Anneke Kleppe, Arend Rensink, Maria Semenyak, Christian Soltenborn, and Heike Wehrheim. “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations.” In <i>Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings</i>, edited by Ina Schieferdecker and Alan Hartman, 94--109. Lecture Notes in Computer Science, 2008. <a href=\"https://doi.org/10.1007/978-3-540-69100-6_7\">https://doi.org/10.1007/978-3-540-69100-6_7</a>.","ama":"Engels G, Kleppe A, Rensink A, Semenyak M, Soltenborn C, Wehrheim H. From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations. In: Schieferdecker I, Hartman A, eds. <i>Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings</i>. Lecture Notes in Computer Science. ; 2008:94--109. doi:<a href=\"https://doi.org/10.1007/978-3-540-69100-6_7\">10.1007/978-3-540-69100-6_7</a>"},"title":"From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations","doi":"10.1007/978-3-540-69100-6_7","date_updated":"2022-01-06T06:59:04Z","author":[{"first_name":"Gregor","last_name":"Engels","id":"107","full_name":"Engels, Gregor"},{"first_name":"Anneke","full_name":"Kleppe, Anneke","last_name":"Kleppe"},{"first_name":"Arend","full_name":"Rensink, Arend","last_name":"Rensink"},{"first_name":"Maria","last_name":"Semenyak","full_name":"Semenyak, Maria"},{"orcid":"0000-0002-0342-8227","last_name":"Soltenborn","id":"1737","full_name":"Soltenborn, Christian","first_name":"Christian"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"date_created":"2018-06-13T09:51:29Z","editor":[{"first_name":"Ina","full_name":"Schieferdecker, Ina","last_name":"Schieferdecker"},{"first_name":"Alan","last_name":"Hartman","full_name":"Hartman, Alan"}],"status":"public","publication":"Model Driven Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings","type":"conference","language":[{"iso":"eng"}],"_id":"3207","department":[{"_id":"77"}],"user_id":"14955","series_title":"Lecture Notes in Computer Science"},{"doi":"10.1007/978-3-540-68863-1_6","title":"Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack","author":[{"full_name":"Derrick, John","last_name":"Derrick","first_name":"John"},{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_created":"2018-06-13T09:52:29Z","date_updated":"2022-01-06T06:59:04Z","citation":{"ama":"Derrick J, Schellhorn G, Wehrheim H. Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack. In: Barthe G, S. de Boer F, eds. <i>Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings</i>. Lecture Notes in Computer Science. ; 2008:78--95. doi:<a href=\"https://doi.org/10.1007/978-3-540-68863-1_6\">10.1007/978-3-540-68863-1_6</a>","chicago":"Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack.” In <i>Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings</i>, edited by Gilles Barthe and Frank S. de Boer, 78--95. Lecture Notes in Computer Science, 2008. <a href=\"https://doi.org/10.1007/978-3-540-68863-1_6\">https://doi.org/10.1007/978-3-540-68863-1_6</a>.","ieee":"J. Derrick, G. Schellhorn, and H. Wehrheim, “Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack,” in <i>Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings</i>, 2008, pp. 78--95.","apa":"Derrick, J., Schellhorn, G., &#38; Wehrheim, H. (2008). Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack. In G. Barthe &#38; F. S. de Boer (Eds.), <i>Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings</i> (pp. 78--95). <a href=\"https://doi.org/10.1007/978-3-540-68863-1_6\">https://doi.org/10.1007/978-3-540-68863-1_6</a>","short":"J. Derrick, G. Schellhorn, H. Wehrheim, in: G. Barthe, F. S. de Boer (Eds.), Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings, 2008, pp. 78--95.","mla":"Derrick, John, et al. “Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack.” <i>Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings</i>, edited by Gilles Barthe and Frank S. de Boer, 2008, pp. 78--95, doi:<a href=\"https://doi.org/10.1007/978-3-540-68863-1_6\">10.1007/978-3-540-68863-1_6</a>.","bibtex":"@inproceedings{Derrick_Schellhorn_Wehrheim_2008, series={Lecture Notes in Computer Science}, title={Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-68863-1_6\">10.1007/978-3-540-68863-1_6</a>}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}, editor={Barthe, Gilles and S. de Boer, FrankEditors}, year={2008}, pages={78--95}, collection={Lecture Notes in Computer Science} }"},"page":"78--95","year":"2008","series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3208","status":"public","editor":[{"last_name":"Barthe","full_name":"Barthe, Gilles","first_name":"Gilles"},{"last_name":"S. de Boer","full_name":"S. de Boer, Frank","first_name":"Frank"}],"type":"conference","publication":"Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings"},{"editor":[{"last_name":"Liu","full_name":"Liu, Shaoying","first_name":"Shaoying"},{"first_name":"T.","last_name":"S. E. Maibaum","full_name":"S. E. Maibaum, T."},{"first_name":"Keijiro","full_name":"Araki, Keijiro","last_name":"Araki"}],"status":"public","type":"conference","publication":"Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings","_id":"3209","series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"year":"2008","citation":{"apa":"Metzler, B., Wehrheim, H., &#38; Wonisch, D. (2008). Decomposition for Compositional Verification. In S. Liu, T. S. E. Maibaum, &#38; K. Araki (Eds.), <i>Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings</i> (pp. 105--125). <a href=\"https://doi.org/10.1007/978-3-540-88194-0_9\">https://doi.org/10.1007/978-3-540-88194-0_9</a>","short":"B. Metzler, H. Wehrheim, D. Wonisch, in: S. Liu, T. S. E. Maibaum, K. Araki (Eds.), Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings, 2008, pp. 105--125.","bibtex":"@inproceedings{Metzler_Wehrheim_Wonisch_2008, series={Lecture Notes in Computer Science}, title={Decomposition for Compositional Verification}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-88194-0_9\">10.1007/978-3-540-88194-0_9</a>}, booktitle={Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings}, author={Metzler, Björn and Wehrheim, Heike and Wonisch, Daniel}, editor={Liu, Shaoying and S. E. Maibaum, T. and Araki, KeijiroEditors}, year={2008}, pages={105--125}, collection={Lecture Notes in Computer Science} }","mla":"Metzler, Björn, et al. “Decomposition for Compositional Verification.” <i>Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings</i>, edited by Shaoying Liu et al., 2008, pp. 105--125, doi:<a href=\"https://doi.org/10.1007/978-3-540-88194-0_9\">10.1007/978-3-540-88194-0_9</a>.","ama":"Metzler B, Wehrheim H, Wonisch D. Decomposition for Compositional Verification. In: Liu S, S. E. Maibaum T, Araki K, eds. <i>Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings</i>. Lecture Notes in Computer Science. ; 2008:105--125. doi:<a href=\"https://doi.org/10.1007/978-3-540-88194-0_9\">10.1007/978-3-540-88194-0_9</a>","chicago":"Metzler, Björn, Heike Wehrheim, and Daniel Wonisch. “Decomposition for Compositional Verification.” In <i>Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings</i>, edited by Shaoying Liu, T. S. E. Maibaum, and Keijiro Araki, 105--125. Lecture Notes in Computer Science, 2008. <a href=\"https://doi.org/10.1007/978-3-540-88194-0_9\">https://doi.org/10.1007/978-3-540-88194-0_9</a>.","ieee":"B. Metzler, H. Wehrheim, and D. Wonisch, “Decomposition for Compositional Verification,” in <i>Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings</i>, 2008, pp. 105--125."},"page":"105--125","title":"Decomposition for Compositional Verification","doi":"10.1007/978-3-540-88194-0_9","date_updated":"2022-01-06T06:59:04Z","date_created":"2018-06-13T09:53:43Z","author":[{"first_name":"Björn","full_name":"Metzler, Björn","last_name":"Metzler"},{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"},{"first_name":"Daniel","last_name":"Wonisch","full_name":"Wonisch, Daniel"}]},{"editor":[{"full_name":"S. Fitzgerald, John","last_name":"S. Fitzgerald","first_name":"John"},{"full_name":"Elisabeth Haxthausen, Anne","last_name":"Elisabeth Haxthausen","first_name":"Anne"},{"last_name":"Yenig{\\\"{u}}n","full_name":"Yenig{\\\"{u}}n, H{\\\"{u}}sn{\\\"{u}}","first_name":"H{\\\"{u}}sn{\\\"{u}}"}],"status":"public","publication":"Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings","type":"conference","_id":"3210","department":[{"_id":"77"}],"series_title":"Lecture Notes in Computer Science","user_id":"29719","year":"2008","page":"380--394","citation":{"ama":"Wehrheim H. Bounded Model Checking for Partial Kripke Structures. In: S. Fitzgerald J, Elisabeth Haxthausen A, Yenig{\\\"{u}}n H, eds. <i>Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings</i>. Lecture Notes in Computer Science. ; 2008:380--394. doi:<a href=\"https://doi.org/10.1007/978-3-540-85762-4_26\">10.1007/978-3-540-85762-4_26</a>","ieee":"H. Wehrheim, “Bounded Model Checking for Partial Kripke Structures,” in <i>Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings</i>, 2008, pp. 380--394.","chicago":"Wehrheim, Heike. “Bounded Model Checking for Partial Kripke Structures.” In <i>Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings</i>, edited by John S. Fitzgerald, Anne Elisabeth Haxthausen, and H{\\\"{u}}sn{\\\"{u}} Yenig{\\\"{u}}n, 380--394. Lecture Notes in Computer Science, 2008. <a href=\"https://doi.org/10.1007/978-3-540-85762-4_26\">https://doi.org/10.1007/978-3-540-85762-4_26</a>.","apa":"Wehrheim, H. (2008). Bounded Model Checking for Partial Kripke Structures. In J. S. Fitzgerald, A. Elisabeth Haxthausen, &#38; H. Yenig{\\\"{u}}n (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings</i> (pp. 380--394). <a href=\"https://doi.org/10.1007/978-3-540-85762-4_26\">https://doi.org/10.1007/978-3-540-85762-4_26</a>","short":"H. Wehrheim, in: J. S. Fitzgerald, A. Elisabeth Haxthausen, H. Yenig{\\\"{u}}n (Eds.), Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings, 2008, pp. 380--394.","mla":"Wehrheim, Heike. “Bounded Model Checking for Partial Kripke Structures.” <i>Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings</i>, edited by John S. Fitzgerald et al., 2008, pp. 380--394, doi:<a href=\"https://doi.org/10.1007/978-3-540-85762-4_26\">10.1007/978-3-540-85762-4_26</a>.","bibtex":"@inproceedings{Wehrheim_2008, series={Lecture Notes in Computer Science}, title={Bounded Model Checking for Partial Kripke Structures}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-85762-4_26\">10.1007/978-3-540-85762-4_26</a>}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings}, author={Wehrheim, Heike}, editor={S. Fitzgerald, John and Elisabeth Haxthausen, Anne and Yenig{\\\"{u}}n, H{\\\"{u}}sn{\\\"{u}}Editors}, year={2008}, pages={380--394}, collection={Lecture Notes in Computer Science} }"},"title":"Bounded Model Checking for Partial Kripke Structures","doi":"10.1007/978-3-540-85762-4_26","date_updated":"2022-01-06T06:59:05Z","author":[{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"}],"date_created":"2018-06-13T09:54:58Z"},{"year":"2008","citation":{"apa":"Stern, C., Adelt, P., Krummel, V., &#38; Ackermann, M. R. (2008). Reliable Evidence of Data Integrity from an Untrusted Storage Service. In <i>Fourth International Conference on Networking and Services (icns 2008)</i>. IEEE. <a href=\"https://doi.org/10.1109/icns.2008.28\">https://doi.org/10.1109/icns.2008.28</a>","mla":"Stern, Claudius, et al. “Reliable Evidence of Data Integrity from an Untrusted Storage Service.” <i>Fourth International Conference on Networking and Services (Icns 2008)</i>, IEEE, 2008, doi:<a href=\"https://doi.org/10.1109/icns.2008.28\">10.1109/icns.2008.28</a>.","bibtex":"@inproceedings{Stern_Adelt_Krummel_Ackermann_2008, title={Reliable Evidence of Data Integrity from an Untrusted Storage Service}, DOI={<a href=\"https://doi.org/10.1109/icns.2008.28\">10.1109/icns.2008.28</a>}, booktitle={Fourth International Conference on Networking and Services (icns 2008)}, publisher={IEEE}, author={Stern, Claudius and Adelt, Philipp and Krummel, Volker and Ackermann, Marcel Rudolf}, year={2008} }","short":"C. Stern, P. Adelt, V. Krummel, M.R. Ackermann, in: Fourth International Conference on Networking and Services (Icns 2008), IEEE, 2008.","chicago":"Stern, Claudius, Philipp Adelt, Volker Krummel, and Marcel Rudolf Ackermann. “Reliable Evidence of Data Integrity from an Untrusted Storage Service.” In <i>Fourth International Conference on Networking and Services (Icns 2008)</i>. IEEE, 2008. <a href=\"https://doi.org/10.1109/icns.2008.28\">https://doi.org/10.1109/icns.2008.28</a>.","ieee":"C. Stern, P. Adelt, V. Krummel, and M. R. Ackermann, “Reliable Evidence of Data Integrity from an Untrusted Storage Service,” in <i>Fourth International Conference on Networking and Services (icns 2008)</i>, 2008.","ama":"Stern C, Adelt P, Krummel V, Ackermann MR. Reliable Evidence of Data Integrity from an Untrusted Storage Service. In: <i>Fourth International Conference on Networking and Services (Icns 2008)</i>. IEEE; 2008. doi:<a href=\"https://doi.org/10.1109/icns.2008.28\">10.1109/icns.2008.28</a>"},"publication_status":"published","publication_identifier":{"isbn":["9780769530949"]},"title":"Reliable Evidence of Data Integrity from an Untrusted Storage Service","doi":"10.1109/icns.2008.28","publisher":"IEEE","date_updated":"2022-01-06T06:58:50Z","date_created":"2018-06-05T08:10:19Z","author":[{"first_name":"Claudius","last_name":"Stern","full_name":"Stern, Claudius"},{"full_name":"Adelt, Philipp","last_name":"Adelt","first_name":"Philipp"},{"last_name":"Krummel","full_name":"Krummel, Volker","first_name":"Volker"},{"last_name":"Ackermann","full_name":"Ackermann, Marcel Rudolf","first_name":"Marcel Rudolf"}],"status":"public","type":"conference","publication":"Fourth International Conference on Networking and Services (icns 2008)","_id":"3001","user_id":"25078","department":[{"_id":"64"},{"_id":"70"}]},{"status":"public","publication":"Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings","type":"conference","extern":"1","_id":"3143","department":[{"_id":"558"}],"user_id":"38235","year":"2008","page":"115--129","citation":{"ama":"Gajek S, Jager T, Manulis M, Schwenk J. A Browser-Based Kerberos Authentication Scheme. In: <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>. ; 2008:115--129. doi:<a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">10.1007/978-3-540-88313-5_8</a>","ieee":"S. Gajek, T. Jager, M. Manulis, and J. Schwenk, “A Browser-Based Kerberos Authentication Scheme,” in <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>, 2008, pp. 115--129.","chicago":"Gajek, Sebastian, Tibor Jager, Mark Manulis, and Jörg Schwenk. “A Browser-Based Kerberos Authentication Scheme.” In <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>, 115--129, 2008. <a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">https://doi.org/10.1007/978-3-540-88313-5_8</a>.","apa":"Gajek, S., Jager, T., Manulis, M., &#38; Schwenk, J. (2008). A Browser-Based Kerberos Authentication Scheme. In <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i> (pp. 115--129). <a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">https://doi.org/10.1007/978-3-540-88313-5_8</a>","bibtex":"@inproceedings{Gajek_Jager_Manulis_Schwenk_2008, title={A Browser-Based Kerberos Authentication Scheme}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">10.1007/978-3-540-88313-5_8</a>}, booktitle={Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings}, author={Gajek, Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg}, year={2008}, pages={115--129} }","mla":"Gajek, Sebastian, et al. “A Browser-Based Kerberos Authentication Scheme.” <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>, 2008, pp. 115--129, doi:<a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">10.1007/978-3-540-88313-5_8</a>.","short":"S. Gajek, T. Jager, M. Manulis, J. Schwenk, in: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, 2008, pp. 115--129."},"title":"A Browser-Based Kerberos Authentication Scheme","doi":"10.1007/978-3-540-88313-5_8","date_updated":"2022-01-06T06:58:58Z","date_created":"2018-06-07T09:30:48Z","author":[{"first_name":"Sebastian","last_name":"Gajek","full_name":"Gajek, Sebastian"},{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"first_name":"Mark","last_name":"Manulis","full_name":"Manulis, Mark"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}]},{"status":"public","publication":"Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations","type":"conference","extern":"1","department":[{"_id":"558"}],"user_id":"38235","_id":"3144","page":"437--448","citation":{"ieee":"K. Altmann, T. Jager, and A. Rupp, “On Black-Box Ring Extraction and Integer Factorization,” in <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>, 2008, pp. 437--448.","chicago":"Altmann, Kristina, Tibor Jager, and Andy Rupp. “On Black-Box Ring Extraction and Integer Factorization.” In <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>, 437--448, 2008. <a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">https://doi.org/10.1007/978-3-540-70583-3_36</a>.","ama":"Altmann K, Jager T, Rupp A. On Black-Box Ring Extraction and Integer Factorization. In: <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>. ; 2008:437--448. doi:<a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">10.1007/978-3-540-70583-3_36</a>","short":"K. Altmann, T. Jager, A. Rupp, in: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations, 2008, pp. 437--448.","mla":"Altmann, Kristina, et al. “On Black-Box Ring Extraction and Integer Factorization.” <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>, 2008, pp. 437--448, doi:<a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">10.1007/978-3-540-70583-3_36</a>.","bibtex":"@inproceedings{Altmann_Jager_Rupp_2008, title={On Black-Box Ring Extraction and Integer Factorization}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">10.1007/978-3-540-70583-3_36</a>}, booktitle={Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations}, author={Altmann, Kristina and Jager, Tibor and Rupp, Andy}, year={2008}, pages={437--448} }","apa":"Altmann, K., Jager, T., &#38; Rupp, A. (2008). On Black-Box Ring Extraction and Integer Factorization. In <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i> (pp. 437--448). <a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">https://doi.org/10.1007/978-3-540-70583-3_36</a>"},"year":"2008","doi":"10.1007/978-3-540-70583-3_36","title":"On Black-Box Ring Extraction and Integer Factorization","date_created":"2018-06-07T09:32:07Z","author":[{"first_name":"Kristina","last_name":"Altmann","full_name":"Altmann, Kristina"},{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"},{"full_name":"Rupp, Andy","last_name":"Rupp","first_name":"Andy"}],"date_updated":"2022-01-06T06:58:58Z"},{"citation":{"ama":"Jager T, Schwenk J. On the Equivalence of Generic Group Models. In: <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i>. ; 2008:200--209. doi:<a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">10.1007/978-3-540-88733-1_14</a>","ieee":"T. Jager and J. Schwenk, “On the Equivalence of Generic Group Models,” in <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i>, 2008, pp. 200--209.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.” In <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i>, 200--209, 2008. <a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">https://doi.org/10.1007/978-3-540-88733-1_14</a>.","apa":"Jager, T., &#38; Schwenk, J. (2008). On the Equivalence of Generic Group Models. In <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i> (pp. 200--209). <a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">https://doi.org/10.1007/978-3-540-88733-1_14</a>","mla":"Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.” <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i>, 2008, pp. 200--209, doi:<a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">10.1007/978-3-540-88733-1_14</a>.","bibtex":"@inproceedings{Jager_Schwenk_2008, title={On the Equivalence of Generic Group Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">10.1007/978-3-540-88733-1_14</a>}, booktitle={Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, author={Jager, Tibor and Schwenk, Jörg}, year={2008}, pages={200--209} }","short":"T. Jager, J. Schwenk, in: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 2008, pp. 200--209."},"page":"200--209","year":"2008","author":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_created":"2018-06-07T09:32:53Z","date_updated":"2022-01-06T06:58:58Z","doi":"10.1007/978-3-540-88733-1_14","title":"On the Equivalence of Generic Group Models","type":"conference","publication":"Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings","status":"public","user_id":"38235","department":[{"_id":"558"}],"_id":"3145","extern":"1"},{"date_updated":"2022-01-06T06:58:58Z","date_created":"2018-06-07T09:33:24Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"first_name":"Heiko","last_name":"Jäkel","full_name":"Jäkel, Heiko"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"title":"Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS","year":"2008","page":"127--136","citation":{"apa":"Jager, T., Jäkel, H., &#38; Schwenk, J. (2008). Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. In <i>Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.</i> (pp. 127--136).","short":"T. Jager, H. Jäkel, J. Schwenk, in: Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss., 2008, pp. 127--136.","bibtex":"@inproceedings{Jager_Jäkel_Schwenk_2008, title={Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS}, booktitle={Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.}, author={Jager, Tibor and Jäkel, Heiko and Schwenk, Jörg}, year={2008}, pages={127--136} }","mla":"Jager, Tibor, et al. “Nutzung von Selbstsignierten Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” <i>Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i>, 2008, pp. 127--136.","ama":"Jager T, Jäkel H, Schwenk J. Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. In: <i>Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i> ; 2008:127--136.","ieee":"T. Jager, H. Jäkel, and J. Schwenk, “Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS,” in <i>Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.</i>, 2008, pp. 127--136.","chicago":"Jager, Tibor, Heiko Jäkel, and Jörg Schwenk. “Nutzung von Selbstsignierten Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” In <i>Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i>, 127--136, 2008."},"_id":"3146","department":[{"_id":"558"}],"user_id":"38235","extern":"1","publication":"Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.","type":"conference","status":"public"},{"year":"2008","citation":{"ama":"Tichy M, Henkler S, Meyer M, von Detten M. Safety of Component-Based Systems: Analysis and Improvement using Fujaba4Eclipse. In: <i>Companion Proceedings of the 30th International Conference on Software Engineering (ICSE), Leipzig, Germany</i>. ; 2008.","chicago":"Tichy, Matthias, Stefan Henkler, Matthias Meyer, and Markus von Detten. “Safety of Component-Based Systems: Analysis and Improvement Using Fujaba4Eclipse.” In <i>Companion Proceedings of the 30th International Conference on Software Engineering (ICSE), Leipzig, Germany</i>, 2008.","ieee":"M. Tichy, S. Henkler, M. Meyer, and M. von Detten, “Safety of Component-Based Systems: Analysis and Improvement using Fujaba4Eclipse,” 2008.","mla":"Tichy, Matthias, et al. “Safety of Component-Based Systems: Analysis and Improvement Using Fujaba4Eclipse.” <i>Companion Proceedings of the 30th International Conference on Software Engineering (ICSE), Leipzig, Germany</i>, 2008.","short":"M. Tichy, S. Henkler, M. Meyer, M. von Detten, in: Companion Proceedings of the 30th International Conference on Software Engineering (ICSE), Leipzig, Germany, 2008.","bibtex":"@inproceedings{Tichy_Henkler_Meyer_von Detten_2008, title={Safety of Component-Based Systems: Analysis and Improvement using Fujaba4Eclipse}, booktitle={Companion Proceedings of the 30th International Conference on Software Engineering (ICSE), Leipzig, Germany}, author={Tichy, Matthias and Henkler, Stefan and Meyer, Matthias and von Detten, Markus}, year={2008} }","apa":"Tichy, M., Henkler, S., Meyer, M., &#38; von Detten, M. (2008). Safety of Component-Based Systems: Analysis and Improvement using Fujaba4Eclipse. <i>Companion Proceedings of the 30th International Conference on Software Engineering (ICSE), Leipzig, Germany</i>."},"date_updated":"2022-01-06T06:54:41Z","author":[{"first_name":"Matthias","last_name":"Tichy","full_name":"Tichy, Matthias"},{"last_name":"Henkler","full_name":"Henkler, Stefan","first_name":"Stefan"},{"id":"683","full_name":"Meyer, Matthias","last_name":"Meyer","first_name":"Matthias"},{"last_name":"von Detten","full_name":"von Detten, Markus","first_name":"Markus"}],"date_created":"2021-01-13T10:04:58Z","title":"Safety of Component-Based Systems: Analysis and Improvement using Fujaba4Eclipse","publication":"Companion Proceedings of the 30th International Conference on Software Engineering (ICSE), Leipzig, Germany","type":"conference","status":"public","_id":"20938","department":[{"_id":"76"}],"user_id":"5786","language":[{"iso":"eng"}]}]
