[{"date_created":"2019-07-10T11:30:22Z","publisher":"Paderborn University","type":"bachelorsthesis","year":"2008","language":[{"iso":"eng"}],"status":"public","_id":"10696","date_updated":"2022-01-06T06:50:49Z","title":"Implementierung und Bewertung des multikriteriellen Optimierungsverfahrens IBEA für den automatisierten Schaltungsentwurf","author":[{"last_name":"Knieper","full_name":"Knieper, Tobias","first_name":"Tobias"}],"alternative_title":["Multi-objective Optimizer IBEA for Digital Logic Design"],"supervisor":[{"full_name":"Kaufmann, Paul","first_name":"Paul","last_name":"Kaufmann"}],"citation":{"ieee":"T. Knieper, <i>Implementierung und Bewertung des multikriteriellen Optimierungsverfahrens IBEA für den automatisierten Schaltungsentwurf</i>. Paderborn University, 2008.","chicago":"Knieper, Tobias. <i>Implementierung Und Bewertung Des Multikriteriellen Optimierungsverfahrens IBEA Für Den Automatisierten Schaltungsentwurf</i>. Paderborn University, 2008.","apa":"Knieper, T. (2008). <i>Implementierung und Bewertung des multikriteriellen Optimierungsverfahrens IBEA für den automatisierten Schaltungsentwurf</i>. Paderborn University.","ama":"Knieper T. <i>Implementierung Und Bewertung Des Multikriteriellen Optimierungsverfahrens IBEA Für Den Automatisierten Schaltungsentwurf</i>. Paderborn University; 2008.","short":"T. Knieper, Implementierung Und Bewertung Des Multikriteriellen Optimierungsverfahrens IBEA Für Den Automatisierten Schaltungsentwurf, Paderborn University, 2008.","bibtex":"@book{Knieper_2008, title={Implementierung und Bewertung des multikriteriellen Optimierungsverfahrens IBEA für den automatisierten Schaltungsentwurf}, publisher={Paderborn University}, author={Knieper, Tobias}, year={2008} }","mla":"Knieper, Tobias. <i>Implementierung Und Bewertung Des Multikriteriellen Optimierungsverfahrens IBEA Für Den Automatisierten Schaltungsentwurf</i>. Paderborn University, 2008."},"user_id":"3118","department":[{"_id":"78"}]},{"citation":{"short":"J. Niklas, Eine Monitoring- Und Debugging-Infrastruktur Für Hybride HW/SW-Systeme, Paderborn University, 2008.","mla":"Niklas, Jörg. <i>Eine Monitoring- Und Debugging-Infrastruktur Für Hybride HW/SW-Systeme</i>. Paderborn University, 2008.","bibtex":"@book{Niklas_2008, title={Eine Monitoring- und Debugging-Infrastruktur für hybride HW/SW-Systeme}, publisher={Paderborn University}, author={Niklas, Jörg}, year={2008} }","chicago":"Niklas, Jörg. <i>Eine Monitoring- Und Debugging-Infrastruktur Für Hybride HW/SW-Systeme</i>. Paderborn University, 2008.","ieee":"J. Niklas, <i>Eine Monitoring- und Debugging-Infrastruktur für hybride HW/SW-Systeme</i>. Paderborn University, 2008.","apa":"Niklas, J. (2008). <i>Eine Monitoring- und Debugging-Infrastruktur für hybride HW/SW-Systeme</i>. Paderborn University.","ama":"Niklas J. <i>Eine Monitoring- Und Debugging-Infrastruktur Für Hybride HW/SW-Systeme</i>. Paderborn University; 2008."},"user_id":"3118","department":[{"_id":"78"}],"title":"Eine Monitoring- und Debugging-Infrastruktur für hybride HW/SW-Systeme","author":[{"last_name":"Niklas","full_name":"Niklas, Jörg","first_name":"Jörg"}],"_id":"10718","date_updated":"2022-01-06T06:50:50Z","date_created":"2019-07-10T11:48:29Z","publisher":"Paderborn University","language":[{"iso":"eng"}],"type":"bachelorsthesis","year":"2008","status":"public"},{"title":"Raytracing on a Custom Instruction Set CPU","author":[{"last_name":"Östermann","first_name":"Marco","full_name":"Östermann, Marco"}],"department":[{"_id":"78"}],"citation":{"short":"M. Östermann, Raytracing on a Custom Instruction Set CPU, Paderborn University, 2008.","bibtex":"@book{Östermann_2008, title={Raytracing on a Custom Instruction Set CPU}, publisher={Paderborn University}, author={Östermann, Marco}, year={2008} }","mla":"Östermann, Marco. <i>Raytracing on a Custom Instruction Set CPU</i>. Paderborn University, 2008.","ieee":"M. Östermann, <i>Raytracing on a Custom Instruction Set CPU</i>. Paderborn University, 2008.","chicago":"Östermann, Marco. <i>Raytracing on a Custom Instruction Set CPU</i>. Paderborn University, 2008.","ama":"Östermann M. <i>Raytracing on a Custom Instruction Set CPU</i>. Paderborn University; 2008.","apa":"Östermann, M. (2008). <i>Raytracing on a Custom Instruction Set CPU</i>. Paderborn University."},"user_id":"3118","language":[{"iso":"eng"}],"type":"bachelorsthesis","year":"2008","status":"public","date_created":"2019-07-10T11:52:51Z","publisher":"Paderborn University","date_updated":"2022-01-06T06:50:50Z","_id":"10721"},{"citation":{"short":"N. Westerheide, Design and Evaluation of MicroBlaze Multi-Core Architectures, Paderborn University, 2008.","bibtex":"@book{Westerheide_2008, title={Design and Evaluation of MicroBlaze Multi-core Architectures}, publisher={Paderborn University}, author={Westerheide, Nico}, year={2008} }","mla":"Westerheide, Nico. <i>Design and Evaluation of MicroBlaze Multi-Core Architectures</i>. Paderborn University, 2008.","ieee":"N. Westerheide, <i>Design and Evaluation of MicroBlaze Multi-core Architectures</i>. Paderborn University, 2008.","chicago":"Westerheide, Nico. <i>Design and Evaluation of MicroBlaze Multi-Core Architectures</i>. Paderborn University, 2008.","ama":"Westerheide N. <i>Design and Evaluation of MicroBlaze Multi-Core Architectures</i>. Paderborn University; 2008.","apa":"Westerheide, N. (2008). <i>Design and Evaluation of MicroBlaze Multi-core Architectures</i>. Paderborn University."},"user_id":"3118","department":[{"_id":"78"}],"title":"Design and Evaluation of MicroBlaze Multi-core Architectures","author":[{"full_name":"Westerheide, Nico","first_name":"Nico","last_name":"Westerheide"}],"_id":"10751","date_updated":"2022-01-06T06:50:50Z","date_created":"2019-07-10T12:03:01Z","publisher":"Paderborn University","year":"2008","type":"bachelorsthesis","language":[{"iso":"eng"}],"status":"public"},{"extern":"1","author":[{"id":"61186","last_name":"Ghasemzadeh Mohammadi","full_name":"Ghasemzadeh Mohammadi, Hassan","first_name":"Hassan"},{"full_name":"Tabkhi, Hamed","first_name":"Hamed","last_name":"Tabkhi"},{"last_name":"Miremadi","first_name":"Seyed Ghassem","full_name":"Miremadi, Seyed Ghassem"},{"first_name":"Alireza","full_name":"Ejlali, Alireza","last_name":"Ejlali"}],"title":"A cost-effective error detection and roll-back recovery technique for embedded microprocessor control logic","doi":"10.1109/ICM.2008.5393497","user_id":"3118","citation":{"short":"H. Ghasemzadeh Mohammadi, H. Tabkhi, S.G. Miremadi, A. Ejlali, in: 2008 International Conference on Microelectronics, IEEE, 2008, pp. 444–447.","bibtex":"@inproceedings{Ghasemzadeh Mohammadi_Tabkhi_Miremadi_Ejlali_2008, title={A cost-effective error detection and roll-back recovery technique for embedded microprocessor control logic}, DOI={<a href=\"https://doi.org/10.1109/ICM.2008.5393497\">10.1109/ICM.2008.5393497</a>}, booktitle={2008 International Conference on Microelectronics}, publisher={IEEE}, author={Ghasemzadeh Mohammadi, Hassan and Tabkhi, Hamed and Miremadi, Seyed Ghassem and Ejlali, Alireza}, year={2008}, pages={444–447} }","mla":"Ghasemzadeh Mohammadi, Hassan, et al. “A Cost-Effective Error Detection and Roll-Back Recovery Technique for Embedded Microprocessor Control Logic.” <i>2008 International Conference on Microelectronics</i>, IEEE, 2008, pp. 444–47, doi:<a href=\"https://doi.org/10.1109/ICM.2008.5393497\">10.1109/ICM.2008.5393497</a>.","ieee":"H. Ghasemzadeh Mohammadi, H. Tabkhi, S. G. Miremadi, and A. Ejlali, “A cost-effective error detection and roll-back recovery technique for embedded microprocessor control logic,” in <i>2008 International Conference on Microelectronics</i>, 2008, pp. 444–447.","chicago":"Ghasemzadeh Mohammadi, Hassan, Hamed Tabkhi, Seyed Ghassem Miremadi, and Alireza Ejlali. “A Cost-Effective Error Detection and Roll-Back Recovery Technique for Embedded Microprocessor Control Logic.” In <i>2008 International Conference on Microelectronics</i>, 444–47. IEEE, 2008. <a href=\"https://doi.org/10.1109/ICM.2008.5393497\">https://doi.org/10.1109/ICM.2008.5393497</a>.","apa":"Ghasemzadeh Mohammadi, H., Tabkhi, H., Miremadi, S. G., &#38; Ejlali, A. (2008). A cost-effective error detection and roll-back recovery technique for embedded microprocessor control logic. In <i>2008 International Conference on Microelectronics</i> (pp. 444–447). IEEE. <a href=\"https://doi.org/10.1109/ICM.2008.5393497\">https://doi.org/10.1109/ICM.2008.5393497</a>","ama":"Ghasemzadeh Mohammadi H, Tabkhi H, Miremadi SG, Ejlali A. A cost-effective error detection and roll-back recovery technique for embedded microprocessor control logic. In: <i>2008 International Conference on Microelectronics</i>. IEEE; 2008:444-447. doi:<a href=\"https://doi.org/10.1109/ICM.2008.5393497\">10.1109/ICM.2008.5393497</a>"},"department":[{"_id":"78"}],"publisher":"IEEE","date_created":"2019-07-10T12:11:35Z","publication":"2008 International Conference on Microelectronics","status":"public","language":[{"iso":"eng"}],"type":"conference","year":"2008","_id":"10778","page":"444-447","date_updated":"2022-01-06T06:50:50Z"},{"date_created":"2019-07-18T09:51:12Z","publication":"2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems","status":"public","language":[{"iso":"eng"}],"year":"2008","publication_identifier":{"isbn":["9781424425747"]},"type":"conference","_id":"11972","date_updated":"2022-01-06T06:51:14Z","author":[{"last_name":"Awad","full_name":"Awad, Abdalkarim","first_name":"Abdalkarim"},{"orcid":"0000-0002-4336-7350","first_name":"Christoph","full_name":"Sommer, Christoph","id":"49154","last_name":"Sommer"},{"first_name":"Reinhard","full_name":"German, Reinhard","last_name":"German"},{"last_name":"Dressler","full_name":"Dressler, Falko","first_name":"Falko"}],"title":"Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks","doi":"10.1109/mahss.2008.4660079","publication_status":"published","user_id":"49154","citation":{"short":"A. Awad, C. Sommer, R. German, F. Dressler, in: 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008.","mla":"Awad, Abdalkarim, et al. “Virtual Cord Protocol (VCP): A Flexible DHT-like Routing Service for Sensor Networks.” <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>, 2008, doi:<a href=\"https://doi.org/10.1109/mahss.2008.4660079\">10.1109/mahss.2008.4660079</a>.","bibtex":"@inproceedings{Awad_Sommer_German_Dressler_2008, title={Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks}, DOI={<a href=\"https://doi.org/10.1109/mahss.2008.4660079\">10.1109/mahss.2008.4660079</a>}, booktitle={2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems}, author={Awad, Abdalkarim and Sommer, Christoph and German, Reinhard and Dressler, Falko}, year={2008} }","chicago":"Awad, Abdalkarim, Christoph Sommer, Reinhard German, and Falko Dressler. “Virtual Cord Protocol (VCP): A Flexible DHT-like Routing Service for Sensor Networks.” In <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>, 2008. <a href=\"https://doi.org/10.1109/mahss.2008.4660079\">https://doi.org/10.1109/mahss.2008.4660079</a>.","ieee":"A. Awad, C. Sommer, R. German, and F. Dressler, “Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks,” in <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>, 2008.","apa":"Awad, A., Sommer, C., German, R., &#38; Dressler, F. (2008). Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks. In <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>. <a href=\"https://doi.org/10.1109/mahss.2008.4660079\">https://doi.org/10.1109/mahss.2008.4660079</a>","ama":"Awad A, Sommer C, German R, Dressler F. Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks. In: <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>. ; 2008. doi:<a href=\"https://doi.org/10.1109/mahss.2008.4660079\">10.1109/mahss.2008.4660079</a>"},"department":[{"_id":"589"}]},{"citation":{"ama":"Dressler F, Sommer C, Gansen T, Wischhof L. Requirements and objectives for secure Traffic Information Systems. In: <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>. ; 2008. doi:<a href=\"https://doi.org/10.1109/mahss.2008.4660135\">10.1109/mahss.2008.4660135</a>","apa":"Dressler, F., Sommer, C., Gansen, T., &#38; Wischhof, L. (2008). Requirements and objectives for secure Traffic Information Systems. In <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>. <a href=\"https://doi.org/10.1109/mahss.2008.4660135\">https://doi.org/10.1109/mahss.2008.4660135</a>","chicago":"Dressler, Falko, Christoph Sommer, Tobias Gansen, and Lars Wischhof. “Requirements and Objectives for Secure Traffic Information Systems.” In <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>, 2008. <a href=\"https://doi.org/10.1109/mahss.2008.4660135\">https://doi.org/10.1109/mahss.2008.4660135</a>.","ieee":"F. Dressler, C. Sommer, T. Gansen, and L. Wischhof, “Requirements and objectives for secure Traffic Information Systems,” in <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>, 2008.","mla":"Dressler, Falko, et al. “Requirements and Objectives for Secure Traffic Information Systems.” <i>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</i>, 2008, doi:<a href=\"https://doi.org/10.1109/mahss.2008.4660135\">10.1109/mahss.2008.4660135</a>.","bibtex":"@inproceedings{Dressler_Sommer_Gansen_Wischhof_2008, title={Requirements and objectives for secure Traffic Information Systems}, DOI={<a href=\"https://doi.org/10.1109/mahss.2008.4660135\">10.1109/mahss.2008.4660135</a>}, booktitle={2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems}, author={Dressler, Falko and Sommer, Christoph and Gansen, Tobias and Wischhof, Lars}, year={2008} }","short":"F. Dressler, C. Sommer, T. Gansen, L. Wischhof, in: 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008."},"publication_status":"published","user_id":"49154","department":[{"_id":"589"}],"title":"Requirements and objectives for secure Traffic Information Systems","author":[{"last_name":"Dressler","full_name":"Dressler, Falko","first_name":"Falko"},{"id":"49154","last_name":"Sommer","first_name":"Christoph","full_name":"Sommer, Christoph","orcid":"0000-0002-4336-7350"},{"last_name":"Gansen","full_name":"Gansen, Tobias","first_name":"Tobias"},{"last_name":"Wischhof","full_name":"Wischhof, Lars","first_name":"Lars"}],"doi":"10.1109/mahss.2008.4660135","_id":"11991","date_updated":"2022-01-06T06:51:15Z","date_created":"2019-07-18T09:52:05Z","publication":"2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9781424425747"]},"year":"2008","type":"conference","status":"public"},{"publication_status":"published","user_id":"49154","citation":{"chicago":"Sommer, Christoph, Isabel Dietrich, and Falko Dressler. “Realistic Simulation of Network Protocols in VANET Scenarios.” In <i>2007 Mobile Networking for Vehicular Environments</i>, 2008. <a href=\"https://doi.org/10.1109/move.2007.4300819\">https://doi.org/10.1109/move.2007.4300819</a>.","ieee":"C. Sommer, I. Dietrich, and F. Dressler, “Realistic Simulation of Network Protocols in VANET Scenarios,” in <i>2007 Mobile Networking for Vehicular Environments</i>, 2008.","ama":"Sommer C, Dietrich I, Dressler F. Realistic Simulation of Network Protocols in VANET Scenarios. In: <i>2007 Mobile Networking for Vehicular Environments</i>. ; 2008. doi:<a href=\"https://doi.org/10.1109/move.2007.4300819\">10.1109/move.2007.4300819</a>","apa":"Sommer, C., Dietrich, I., &#38; Dressler, F. (2008). Realistic Simulation of Network Protocols in VANET Scenarios. In <i>2007 Mobile Networking for Vehicular Environments</i>. <a href=\"https://doi.org/10.1109/move.2007.4300819\">https://doi.org/10.1109/move.2007.4300819</a>","short":"C. Sommer, I. Dietrich, F. Dressler, in: 2007 Mobile Networking for Vehicular Environments, 2008.","mla":"Sommer, Christoph, et al. “Realistic Simulation of Network Protocols in VANET Scenarios.” <i>2007 Mobile Networking for Vehicular Environments</i>, 2008, doi:<a href=\"https://doi.org/10.1109/move.2007.4300819\">10.1109/move.2007.4300819</a>.","bibtex":"@inproceedings{Sommer_Dietrich_Dressler_2008, title={Realistic Simulation of Network Protocols in VANET Scenarios}, DOI={<a href=\"https://doi.org/10.1109/move.2007.4300819\">10.1109/move.2007.4300819</a>}, booktitle={2007 Mobile Networking for Vehicular Environments}, author={Sommer, Christoph and Dietrich, Isabel and Dressler, Falko}, year={2008} }"},"department":[{"_id":"589"}],"author":[{"orcid":"0000-0002-4336-7350","last_name":"Sommer","id":"49154","first_name":"Christoph","full_name":"Sommer, Christoph"},{"last_name":"Dietrich","full_name":"Dietrich, Isabel","first_name":"Isabel"},{"first_name":"Falko","full_name":"Dressler, Falko","last_name":"Dressler"}],"title":"Realistic Simulation of Network Protocols in VANET Scenarios","doi":"10.1109/move.2007.4300819","_id":"12052","date_updated":"2022-01-06T06:51:16Z","date_created":"2019-07-18T09:55:01Z","publication":"2007 Mobile Networking for Vehicular Environments","status":"public","language":[{"iso":"eng"}],"year":"2008","type":"conference"},{"publication_status":"published","user_id":"49154","citation":{"short":"C. Sommer, Z. Yao, R. German, F. Dressler, in: Proceeding of the 1st ACM SIGMOBILE Workshop on Mobility Models  - MobilityModels ’08, 2008.","bibtex":"@inproceedings{Sommer_Yao_German_Dressler_2008, title={On the need for bidirectional coupling of road traffic microsimulation and network simulation}, DOI={<a href=\"https://doi.org/10.1145/1374688.1374697\">10.1145/1374688.1374697</a>}, booktitle={Proceeding of the 1st ACM SIGMOBILE workshop on Mobility models  - MobilityModels ’08}, author={Sommer, Christoph and Yao, Zheng and German, Reinhard and Dressler, Falko}, year={2008} }","mla":"Sommer, Christoph, et al. “On the Need for Bidirectional Coupling of Road Traffic Microsimulation and Network Simulation.” <i>Proceeding of the 1st ACM SIGMOBILE Workshop on Mobility Models  - MobilityModels ’08</i>, 2008, doi:<a href=\"https://doi.org/10.1145/1374688.1374697\">10.1145/1374688.1374697</a>.","ieee":"C. Sommer, Z. Yao, R. German, and F. Dressler, “On the need for bidirectional coupling of road traffic microsimulation and network simulation,” in <i>Proceeding of the 1st ACM SIGMOBILE workshop on Mobility models  - MobilityModels ’08</i>, 2008.","chicago":"Sommer, Christoph, Zheng Yao, Reinhard German, and Falko Dressler. “On the Need for Bidirectional Coupling of Road Traffic Microsimulation and Network Simulation.” In <i>Proceeding of the 1st ACM SIGMOBILE Workshop on Mobility Models  - MobilityModels ’08</i>, 2008. <a href=\"https://doi.org/10.1145/1374688.1374697\">https://doi.org/10.1145/1374688.1374697</a>.","apa":"Sommer, C., Yao, Z., German, R., &#38; Dressler, F. (2008). On the need for bidirectional coupling of road traffic microsimulation and network simulation. In <i>Proceeding of the 1st ACM SIGMOBILE workshop on Mobility models  - MobilityModels ’08</i>. <a href=\"https://doi.org/10.1145/1374688.1374697\">https://doi.org/10.1145/1374688.1374697</a>","ama":"Sommer C, Yao Z, German R, Dressler F. On the need for bidirectional coupling of road traffic microsimulation and network simulation. In: <i>Proceeding of the 1st ACM SIGMOBILE Workshop on Mobility Models  - MobilityModels ’08</i>. ; 2008. doi:<a href=\"https://doi.org/10.1145/1374688.1374697\">10.1145/1374688.1374697</a>"},"department":[{"_id":"589"}],"author":[{"orcid":"0000-0002-4336-7350","last_name":"Sommer","id":"49154","full_name":"Sommer, Christoph","first_name":"Christoph"},{"last_name":"Yao","full_name":"Yao, Zheng","first_name":"Zheng"},{"first_name":"Reinhard","full_name":"German, Reinhard","last_name":"German"},{"last_name":"Dressler","first_name":"Falko","full_name":"Dressler, Falko"}],"title":"On the need for bidirectional coupling of road traffic microsimulation and network simulation","doi":"10.1145/1374688.1374697","_id":"12053","date_updated":"2022-01-06T06:51:16Z","date_created":"2019-07-18T09:55:04Z","publication":"Proceeding of the 1st ACM SIGMOBILE workshop on Mobility models  - MobilityModels '08","status":"public","language":[{"iso":"eng"}],"year":"2008","publication_identifier":{"isbn":["9781605581118"]},"type":"conference"},{"title":"Progressing toward realistic mobility models in VANET simulations","author":[{"orcid":"0000-0002-4336-7350","first_name":"Christoph","full_name":"Sommer, Christoph","last_name":"Sommer","id":"49154"},{"last_name":"Dressler","first_name":"Falko","full_name":"Dressler, Falko"}],"doi":"10.1109/mcom.2008.4689256","citation":{"chicago":"Sommer, Christoph, and Falko Dressler. “Progressing toward Realistic Mobility Models in VANET Simulations.” <i>IEEE Communications Magazine</i>, 2008, 132–37. <a href=\"https://doi.org/10.1109/mcom.2008.4689256\">https://doi.org/10.1109/mcom.2008.4689256</a>.","ieee":"C. Sommer and F. Dressler, “Progressing toward realistic mobility models in VANET simulations,” <i>IEEE Communications Magazine</i>, pp. 132–137, 2008.","ama":"Sommer C, Dressler F. Progressing toward realistic mobility models in VANET simulations. <i>IEEE Communications Magazine</i>. 2008:132-137. doi:<a href=\"https://doi.org/10.1109/mcom.2008.4689256\">10.1109/mcom.2008.4689256</a>","apa":"Sommer, C., &#38; Dressler, F. (2008). Progressing toward realistic mobility models in VANET simulations. <i>IEEE Communications Magazine</i>, 132–137. <a href=\"https://doi.org/10.1109/mcom.2008.4689256\">https://doi.org/10.1109/mcom.2008.4689256</a>","short":"C. Sommer, F. Dressler, IEEE Communications Magazine (2008) 132–137.","mla":"Sommer, Christoph, and Falko Dressler. “Progressing toward Realistic Mobility Models in VANET Simulations.” <i>IEEE Communications Magazine</i>, 2008, pp. 132–37, doi:<a href=\"https://doi.org/10.1109/mcom.2008.4689256\">10.1109/mcom.2008.4689256</a>.","bibtex":"@article{Sommer_Dressler_2008, title={Progressing toward realistic mobility models in VANET simulations}, DOI={<a href=\"https://doi.org/10.1109/mcom.2008.4689256\">10.1109/mcom.2008.4689256</a>}, journal={IEEE Communications Magazine}, author={Sommer, Christoph and Dressler, Falko}, year={2008}, pages={132–137} }"},"publication_status":"published","user_id":"49154","department":[{"_id":"589"}],"date_created":"2019-07-18T09:55:06Z","publication":"IEEE Communications Magazine","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0163-6804","1558-1896"]},"year":"2008","type":"journal_article","status":"public","_id":"12054","page":"132-137","date_updated":"2022-01-06T06:51:16Z"},{"citation":{"bibtex":"@inproceedings{Schulte_2008, title={Block Model: an educational model of program comprehension as a tool for a scholarly approach to teaching}, booktitle={ICER}, publisher={ACM}, author={Schulte, Carsten}, year={2008}, pages={149–160} }","mla":"Schulte, Carsten. “Block Model: An Educational Model of Program Comprehension as a Tool for a Scholarly Approach to Teaching.” <i>ICER</i>, ACM, 2008, pp. 149–60.","short":"C. Schulte, in: ICER, ACM, 2008, pp. 149–160.","apa":"Schulte, C. (2008). Block Model: an educational model of program comprehension as a tool for a scholarly approach to teaching. In <i>ICER</i> (pp. 149–160). ACM.","ama":"Schulte C. Block Model: an educational model of program comprehension as a tool for a scholarly approach to teaching. In: <i>ICER</i>. ACM; 2008:149-160.","ieee":"C. Schulte, “Block Model: an educational model of program comprehension as a tool for a scholarly approach to teaching,” in <i>ICER</i>, 2008, pp. 149–160.","chicago":"Schulte, Carsten. “Block Model: An Educational Model of Program Comprehension as a Tool for a Scholarly Approach to Teaching.” In <i>ICER</i>, 149–60. ACM, 2008."},"user_id":"21145","department":[{"_id":"67"}],"title":"Block Model: an educational model of program comprehension as a tool for a scholarly approach to teaching","author":[{"id":"60311","last_name":"Schulte","full_name":"Schulte, Carsten","first_name":"Carsten"}],"page":"149-160","_id":"15687","date_updated":"2022-01-06T06:52:31Z","date_created":"2020-01-28T10:29:30Z","publication":"ICER","publisher":"ACM","language":[{"iso":"eng"}],"year":"2008","type":"conference","status":"public"},{"date_updated":"2022-01-06T06:52:31Z","volume":5090,"_id":"15688","page":"110-121","status":"public","language":[{"iso":"eng"}],"year":"2008","type":"conference","publisher":"Springer","date_created":"2020-01-28T10:29:31Z","publication":"ISSEP","department":[{"_id":"67"}],"user_id":"21145","citation":{"ama":"Schulte C. Duality Reconstruction - Teaching Digital Artifacts from a Socio-technical Perspective. In: <i>ISSEP</i>. Vol 5090. Lecture Notes in Computer Science. Springer; 2008:110-121.","apa":"Schulte, C. (2008). Duality Reconstruction - Teaching Digital Artifacts from a Socio-technical Perspective. In <i>ISSEP</i> (Vol. 5090, pp. 110–121). Springer.","ieee":"C. Schulte, “Duality Reconstruction - Teaching Digital Artifacts from a Socio-technical Perspective,” in <i>ISSEP</i>, 2008, vol. 5090, pp. 110–121.","chicago":"Schulte, Carsten. “Duality Reconstruction - Teaching Digital Artifacts from a Socio-Technical Perspective.” In <i>ISSEP</i>, 5090:110–21. Lecture Notes in Computer Science. Springer, 2008.","bibtex":"@inproceedings{Schulte_2008, series={Lecture Notes in Computer Science}, title={Duality Reconstruction - Teaching Digital Artifacts from a Socio-technical Perspective}, volume={5090}, booktitle={ISSEP}, publisher={Springer}, author={Schulte, Carsten}, year={2008}, pages={110–121}, collection={Lecture Notes in Computer Science} }","mla":"Schulte, Carsten. “Duality Reconstruction - Teaching Digital Artifacts from a Socio-Technical Perspective.” <i>ISSEP</i>, vol. 5090, Springer, 2008, pp. 110–21.","short":"C. Schulte, in: ISSEP, Springer, 2008, pp. 110–121."},"series_title":"Lecture Notes in Computer Science","intvolume":"      5090","author":[{"full_name":"Schulte, Carsten","first_name":"Carsten","id":"60311","last_name":"Schulte"}],"title":"Duality Reconstruction - Teaching Digital Artifacts from a Socio-technical Perspective"},{"title":"What are information technology's key qualifications?","author":[{"first_name":"Christina","full_name":"Dörge, Christina","last_name":"Dörge"},{"full_name":"Schulte, Carsten","first_name":"Carsten","last_name":"Schulte"}],"department":[{"_id":"67"}],"citation":{"short":"C. Dörge, C. Schulte, in: ITiCSE, ACM, 2008, pp. 296–300.","mla":"Dörge, Christina, and Carsten Schulte. “What Are Information Technology’s Key Qualifications?” <i>ITiCSE</i>, ACM, 2008, pp. 296–300.","bibtex":"@inproceedings{Dörge_Schulte_2008, title={What are information technology’s key qualifications?}, booktitle={ITiCSE}, publisher={ACM}, author={Dörge, Christina and Schulte, Carsten}, year={2008}, pages={296–300} }","chicago":"Dörge, Christina, and Carsten Schulte. “What Are Information Technology’s Key Qualifications?” In <i>ITiCSE</i>, 296–300. ACM, 2008.","ieee":"C. Dörge and C. Schulte, “What are information technology’s key qualifications?,” in <i>ITiCSE</i>, 2008, pp. 296–300.","ama":"Dörge C, Schulte C. What are information technology’s key qualifications? In: <i>ITiCSE</i>. ACM; 2008:296-300.","apa":"Dörge, C., &#38; Schulte, C. (2008). What are information technology’s key qualifications? In <i>ITiCSE</i> (pp. 296–300). ACM."},"user_id":"21145","year":"2008","type":"conference","language":[{"iso":"eng"}],"status":"public","publication":"ITiCSE","date_created":"2020-01-28T10:29:32Z","publisher":"ACM","date_updated":"2022-01-06T06:52:31Z","page":"296-300","_id":"15689"},{"author":[{"id":"60311","last_name":"Schulte","full_name":"Schulte, Carsten","first_name":"Carsten"},{"last_name":"Dörge","full_name":"Dörge, Christina","first_name":"Christina"}],"title":"Digitale Artefakte und Schlüsselkompetenzen im Informatikunterricht der Sekundarstufe I","department":[{"_id":"67"}],"user_id":"21145","series_title":"{LNI}","citation":{"mla":"Schulte, Carsten, and Christina Dörge. “Digitale Artefakte Und Schlüsselkompetenzen Im Informatikunterricht Der Sekundarstufe I.” <i>DDI</i>, vol. P-135, GI, 2008, pp. 13–22.","bibtex":"@inproceedings{Schulte_Dörge_2008, series={{LNI}}, title={Digitale Artefakte und Schlüsselkompetenzen im Informatikunterricht der Sekundarstufe I}, volume={P-135}, booktitle={DDI}, publisher={GI}, author={Schulte, Carsten and Dörge, Christina}, year={2008}, pages={13–22}, collection={{LNI}} }","short":"C. Schulte, C. Dörge, in: DDI, GI, 2008, pp. 13–22.","ama":"Schulte C, Dörge C. Digitale Artefakte und Schlüsselkompetenzen im Informatikunterricht der Sekundarstufe I. In: <i>DDI</i>. Vol P-135. {LNI}. GI; 2008:13-22.","apa":"Schulte, C., &#38; Dörge, C. (2008). Digitale Artefakte und Schlüsselkompetenzen im Informatikunterricht der Sekundarstufe I. In <i>DDI</i> (Vol. P-135, pp. 13–22). GI.","chicago":"Schulte, Carsten, and Christina Dörge. “Digitale Artefakte Und Schlüsselkompetenzen Im Informatikunterricht Der Sekundarstufe I.” In <i>DDI</i>, P-135:13–22. {LNI}. GI, 2008.","ieee":"C. Schulte and C. Dörge, “Digitale Artefakte und Schlüsselkompetenzen im Informatikunterricht der Sekundarstufe I,” in <i>DDI</i>, 2008, vol. P-135, pp. 13–22."},"status":"public","year":"2008","type":"conference","language":[{"iso":"eng"}],"publisher":"GI","publication":"DDI","date_created":"2020-01-28T10:29:33Z","date_updated":"2022-01-06T06:52:31Z","volume":"P-135","_id":"15690","page":"13-22"},{"author":[{"full_name":"Hüllermeier, Eyke","first_name":"Eyke","id":"48129","last_name":"Hüllermeier"},{"full_name":"Vanderlooy, S.","first_name":"S.","last_name":"Vanderlooy"}],"title":"Weighted voting as approximate MAP prediction in pairwise classification","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"user_id":"49109","citation":{"chicago":"Hüllermeier, Eyke, and S. Vanderlooy. “Weighted Voting as Approximate MAP Prediction in Pairwise Classification.” In <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i>, 34–41, 2008.","ieee":"E. Hüllermeier and S. Vanderlooy, “Weighted voting as approximate MAP prediction in pairwise classification,” in <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i>, 2008, pp. 34–41.","apa":"Hüllermeier, E., &#38; Vanderlooy, S. (2008). Weighted voting as approximate MAP prediction in pairwise classification. In <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i> (pp. 34–41).","ama":"Hüllermeier E, Vanderlooy S. Weighted voting as approximate MAP prediction in pairwise classification. In: <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i>. ; 2008:34-41.","short":"E. Hüllermeier, S. Vanderlooy, in: In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany, 2008, pp. 34–41.","mla":"Hüllermeier, Eyke, and S. Vanderlooy. “Weighted Voting as Approximate MAP Prediction in Pairwise Classification.” <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i>, 2008, pp. 34–41.","bibtex":"@inproceedings{Hüllermeier_Vanderlooy_2008, title={Weighted voting as approximate MAP prediction in pairwise classification}, booktitle={In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany}, author={Hüllermeier, Eyke and Vanderlooy, S.}, year={2008}, pages={34–41} }"},"status":"public","language":[{"iso":"eng"}],"year":"2008","type":"conference","date_created":"2020-02-04T16:09:07Z","publication":"In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany","date_updated":"2022-01-06T06:52:32Z","_id":"15779","page":"34-41"},{"status":"public","language":[{"iso":"eng"}],"year":"2008","type":"conference","date_created":"2020-02-04T16:12:58Z","publication":"In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany","date_updated":"2022-01-06T06:52:32Z","_id":"15780","page":"27-33","author":[{"first_name":"T.","full_name":"Fober, T.","last_name":"Fober"},{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","id":"48129","last_name":"Hüllermeier"},{"full_name":"Mernberger, M.","first_name":"M.","last_name":"Mernberger"}],"title":"Evolutionary construction of multiple graph alignments for mining structured biomolecular data ","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"user_id":"49109","citation":{"ieee":"T. Fober, E. Hüllermeier, and M. Mernberger, “Evolutionary construction of multiple graph alignments for mining structured biomolecular data ,” in <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i>, 2008, pp. 27–33.","chicago":"Fober, T., Eyke Hüllermeier, and M. Mernberger. “Evolutionary Construction of Multiple Graph Alignments for Mining Structured Biomolecular Data .” In <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i>, 27–33, 2008.","ama":"Fober T, Hüllermeier E, Mernberger M. Evolutionary construction of multiple graph alignments for mining structured biomolecular data . In: <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i>. ; 2008:27-33.","apa":"Fober, T., Hüllermeier, E., &#38; Mernberger, M. (2008). Evolutionary construction of multiple graph alignments for mining structured biomolecular data . In <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i> (pp. 27–33).","short":"T. Fober, E. Hüllermeier, M. Mernberger, in: In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany, 2008, pp. 27–33.","bibtex":"@inproceedings{Fober_Hüllermeier_Mernberger_2008, title={Evolutionary construction of multiple graph alignments for mining structured biomolecular data }, booktitle={In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany}, author={Fober, T. and Hüllermeier, Eyke and Mernberger, M.}, year={2008}, pages={27–33} }","mla":"Fober, T., et al. “Evolutionary Construction of Multiple Graph Alignments for Mining Structured Biomolecular Data .” <i>In Proceedings Workshop LWA-2008, Lernen-Wissensentdeckung-Adaptivität, Würzburg, Germany</i>, 2008, pp. 27–33."}},{"user_id":"49109","citation":{"ieee":"T. Fober, E. Hüllermeier, and M. Mernberger, “Evolutionary construction of multiple graph alignments for the structural analysis of biomolecules,” in <i>iIn Proceedings GCB-2008, Germany Conference on Bioinformatics, Dresden 2008</i>, 2008, pp. 44–53.","chicago":"Fober, T., Eyke Hüllermeier, and M. Mernberger. “Evolutionary Construction of Multiple Graph Alignments for the Structural Analysis of Biomolecules.” In <i>IIn Proceedings GCB-2008, Germany Conference on Bioinformatics, Dresden 2008</i>, edited by A. Beyer and M. Schroeder, 44–53, 2008.","ama":"Fober T, Hüllermeier E, Mernberger M. Evolutionary construction of multiple graph alignments for the structural analysis of biomolecules. In: Beyer A, Schroeder M, eds. <i>IIn Proceedings GCB-2008, Germany Conference on Bioinformatics, Dresden 2008</i>. ; 2008:44-53.","apa":"Fober, T., Hüllermeier, E., &#38; Mernberger, M. (2008). Evolutionary construction of multiple graph alignments for the structural analysis of biomolecules. In A. Beyer &#38; M. Schroeder (Eds.), <i>iIn Proceedings GCB-2008, Germany Conference on Bioinformatics, Dresden 2008</i> (pp. 44–53).","short":"T. Fober, E. Hüllermeier, M. Mernberger, in: A. Beyer, M. Schroeder (Eds.), IIn Proceedings GCB-2008, Germany Conference on Bioinformatics, Dresden 2008, 2008, pp. 44–53.","bibtex":"@inproceedings{Fober_Hüllermeier_Mernberger_2008, title={Evolutionary construction of multiple graph alignments for the structural analysis of biomolecules}, booktitle={iIn Proceedings GCB-2008, Germany Conference on Bioinformatics, Dresden 2008}, author={Fober, T. and Hüllermeier, Eyke and Mernberger, M.}, editor={Beyer, A. and Schroeder, M.Editors}, year={2008}, pages={44–53} }","mla":"Fober, T., et al. “Evolutionary Construction of Multiple Graph Alignments for the Structural Analysis of Biomolecules.” <i>IIn Proceedings GCB-2008, Germany Conference on Bioinformatics, Dresden 2008</i>, edited by A. Beyer and M. Schroeder, 2008, pp. 44–53."},"department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"author":[{"last_name":"Fober","first_name":"T.","full_name":"Fober, T."},{"id":"48129","last_name":"Hüllermeier","first_name":"Eyke","full_name":"Hüllermeier, Eyke"},{"full_name":"Mernberger, M.","first_name":"M.","last_name":"Mernberger"}],"editor":[{"full_name":"Beyer, A.","first_name":"A.","last_name":"Beyer"},{"last_name":"Schroeder","full_name":"Schroeder, M.","first_name":"M."}],"title":"Evolutionary construction of multiple graph alignments for the structural analysis of biomolecules","page":"44-53","_id":"15781","date_updated":"2022-01-06T06:52:32Z","publication":"iIn Proceedings GCB-2008, Germany Conference on Bioinformatics, Dresden 2008","date_created":"2020-02-04T16:17:52Z","status":"public","type":"conference","year":"2008","language":[{"iso":"eng"}]},{"title":"Neural networks in 3D medical scan visualization","author":[{"last_name":"Zukic","first_name":"D.","full_name":"Zukic, D."},{"first_name":"A.","full_name":"Elsner, A.","last_name":"Elsner"},{"last_name":"Avdagic","first_name":"Z.","full_name":"Avdagic, Z."},{"last_name":"Domik","id":"90","full_name":"Domik, Gitta","first_name":"Gitta"}],"department":[{"_id":"65"}],"citation":{"ama":"Zukic D, Elsner A, Avdagic Z, Domik G. Neural networks in 3D medical scan visualization. <i>Proceedings of 11th International Conference on Computer Graphics and Artificial Intelligence</i>. 2008:183-190.","apa":"Zukic, D., Elsner, A., Avdagic, Z., &#38; Domik, G. (2008). Neural networks in 3D medical scan visualization. <i>Proceedings of 11th International Conference on Computer Graphics and Artificial Intelligence</i>, 183–190.","chicago":"Zukic, D., A. Elsner, Z. Avdagic, and Gitta Domik. “Neural Networks in 3D Medical Scan Visualization.” <i>Proceedings of 11th International Conference on Computer Graphics and Artificial Intelligence</i>, 2008, 183–90.","ieee":"D. Zukic, A. Elsner, Z. Avdagic, and G. Domik, “Neural networks in 3D medical scan visualization,” <i>Proceedings of 11th International Conference on Computer Graphics and Artificial Intelligence</i>, pp. 183–190, 2008.","mla":"Zukic, D., et al. “Neural Networks in 3D Medical Scan Visualization.” <i>Proceedings of 11th International Conference on Computer Graphics and Artificial Intelligence</i>, 2008, pp. 183–90.","bibtex":"@article{Zukic_Elsner_Avdagic_Domik_2008, title={Neural networks in 3D medical scan visualization}, journal={Proceedings of 11th International Conference on Computer Graphics and Artificial Intelligence}, author={Zukic, D. and Elsner, A. and Avdagic, Z. and Domik, Gitta}, year={2008}, pages={183–190} }","short":"D. Zukic, A. Elsner, Z. Avdagic, G. Domik, Proceedings of 11th International Conference on Computer Graphics and Artificial Intelligence (2008) 183–190."},"user_id":"14955","language":[{"iso":"eng"}],"year":"2008","type":"journal_article","status":"public","date_created":"2019-11-15T08:34:22Z","publication":"Proceedings of 11th International Conference on Computer Graphics and Artificial Intelligence","date_updated":"2022-01-06T06:52:13Z","page":"183-190","_id":"14994"},{"department":[{"_id":"69"}],"user_id":"14961","citation":{"ieee":"R. Hartel, <i>Navigierbare Kompression von XML-Datenströmen</i>. University of Paderborn, Germany, 2008.","chicago":"Hartel, Rita. <i>Navigierbare Kompression von XML-Datenströmen</i>. University of Paderborn, Germany, 2008.","apa":"Hartel, R. (2008). <i>Navigierbare Kompression von XML-Datenströmen</i>. University of Paderborn, Germany.","ama":"Hartel R. <i>Navigierbare Kompression von XML-Datenströmen</i>. University of Paderborn, Germany; 2008.","short":"R. Hartel, Navigierbare Kompression von XML-Datenströmen, University of Paderborn, Germany, 2008.","bibtex":"@book{Hartel_2008, title={Navigierbare Kompression von XML-Datenströmen}, publisher={University of Paderborn, Germany}, author={Hartel, Rita}, year={2008} }","mla":"Hartel, Rita. <i>Navigierbare Kompression von XML-Datenströmen</i>. University of Paderborn, Germany, 2008."},"author":[{"last_name":"Hartel","id":"14961","full_name":"Hartel, Rita","first_name":"Rita"}],"title":"Navigierbare Kompression von XML-Datenströmen","date_updated":"2022-01-06T06:52:16Z","_id":"15140","status":"public","language":[{"iso":"eng"}],"year":"2008","type":"dissertation","publisher":"University of Paderborn, Germany","date_created":"2019-11-22T08:52:15Z"},{"_id":"15141","page":"771-778","date_updated":"2022-01-06T06:52:16Z","publisher":"IEEE","publication":"Third International Conference on Availability, Reliability and Security","date_created":"2019-11-22T08:53:19Z","status":"public","year":"2008","type":"conference","publication_identifier":{"isbn":["9780769531021"]},"language":[{"iso":"eng"}],"user_id":"14961","publication_status":"published","citation":{"mla":"Böttcher, Stefan, et al. “Detecting Suspicious Relational Database Queries.” <i>Third International Conference on Availability, Reliability and Security</i>, IEEE, 2008, pp. 771–78, doi:<a href=\"https://doi.org/10.1109/ares.2008.125\">10.1109/ares.2008.125</a>.","bibtex":"@inproceedings{Böttcher_Hartel_Kirschner_2008, title={Detecting Suspicious Relational Database Queries}, DOI={<a href=\"https://doi.org/10.1109/ares.2008.125\">10.1109/ares.2008.125</a>}, booktitle={Third International Conference on Availability, Reliability and Security}, publisher={IEEE}, author={Böttcher, Stefan and Hartel, Rita and Kirschner, Matthias}, year={2008}, pages={771–778} }","short":"S. Böttcher, R. Hartel, M. Kirschner, in: Third International Conference on Availability, Reliability and Security, IEEE, 2008, pp. 771–778.","apa":"Böttcher, S., Hartel, R., &#38; Kirschner, M. (2008). Detecting Suspicious Relational Database Queries. In <i>Third International Conference on Availability, Reliability and Security</i> (pp. 771–778). IEEE. <a href=\"https://doi.org/10.1109/ares.2008.125\">https://doi.org/10.1109/ares.2008.125</a>","ama":"Böttcher S, Hartel R, Kirschner M. Detecting Suspicious Relational Database Queries. In: <i>Third International Conference on Availability, Reliability and Security</i>. IEEE; 2008:771-778. doi:<a href=\"https://doi.org/10.1109/ares.2008.125\">10.1109/ares.2008.125</a>","chicago":"Böttcher, Stefan, Rita Hartel, and Matthias Kirschner. “Detecting Suspicious Relational Database Queries.” In <i>Third International Conference on Availability, Reliability and Security</i>, 771–78. IEEE, 2008. <a href=\"https://doi.org/10.1109/ares.2008.125\">https://doi.org/10.1109/ares.2008.125</a>.","ieee":"S. Böttcher, R. Hartel, and M. Kirschner, “Detecting Suspicious Relational Database Queries,” in <i>Third International Conference on Availability, Reliability and Security</i>, 2008, pp. 771–778."},"department":[{"_id":"69"}],"author":[{"full_name":"Böttcher, Stefan","first_name":"Stefan","last_name":"Böttcher","id":"624"},{"last_name":"Hartel","id":"14961","first_name":"Rita","full_name":"Hartel, Rita"},{"full_name":"Kirschner, Matthias","first_name":"Matthias","last_name":"Kirschner"}],"title":"Detecting Suspicious Relational Database Queries","doi":"10.1109/ares.2008.125"}]
