[{"has_accepted_license":"1","doi":"10.1145/1281100.1281178","file":[{"date_updated":"2018-04-13T10:02:18Z","relation":"main_file","date_created":"2018-04-13T10:02:18Z","file_id":"2340","access_level":"open_access","content_type":"application/pdf","file_name":"DISC-07.pdf","file_size":193097,"creator":"florida"}],"title":"A denial-of-service resistant DHT","user_id":"15504","oa":"1","type":"conference","publication":"Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007","ddc":["040"],"page":"370--371","author":[{"last_name":"Awerbuch","first_name":"Baruch","full_name":"Awerbuch, Baruch"},{"first_name":"Christian","full_name":"Scheideler, Christian","last_name":"Scheideler","id":"20792"}],"urn":"20237","department":[{"_id":"79"}],"citation":{"ama":"Awerbuch B, Scheideler C. A denial-of-service resistant DHT. In: <i>Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i>. ACM; 2007:370--371. doi:<a href=\"https://doi.org/10.1145/1281100.1281178\">10.1145/1281100.1281178</a>","apa":"Awerbuch, B., &#38; Scheideler, C. (2007). A denial-of-service resistant DHT. In <i>Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i> (pp. 370--371). ACM. <a href=\"https://doi.org/10.1145/1281100.1281178\">https://doi.org/10.1145/1281100.1281178</a>","ieee":"B. Awerbuch and C. Scheideler, “A denial-of-service resistant DHT,” in <i>Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i>, 2007, pp. 370--371.","chicago":"Awerbuch, Baruch, and Christian Scheideler. “A Denial-of-Service Resistant DHT.” In <i>Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i>, 370--371. ACM, 2007. <a href=\"https://doi.org/10.1145/1281100.1281178\">https://doi.org/10.1145/1281100.1281178</a>.","bibtex":"@inproceedings{Awerbuch_Scheideler_2007, title={A denial-of-service resistant DHT}, DOI={<a href=\"https://doi.org/10.1145/1281100.1281178\">10.1145/1281100.1281178</a>}, booktitle={Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007}, publisher={ACM}, author={Awerbuch, Baruch and Scheideler, Christian}, year={2007}, pages={370--371} }","mla":"Awerbuch, Baruch, and Christian Scheideler. “A Denial-of-Service Resistant DHT.” <i>Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i>, ACM, 2007, pp. 370--371, doi:<a href=\"https://doi.org/10.1145/1281100.1281178\">10.1145/1281100.1281178</a>.","short":"B. Awerbuch, C. Scheideler, in: Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007, ACM, 2007, pp. 370--371."},"status":"public","year":"2007","publication_identifier":{"isbn":["978-1-59593-616-5"]},"publisher":"ACM","date_created":"2018-03-29T11:56:35Z","date_updated":"2022-01-06T06:54:24Z","_id":"2023","file_date_updated":"2018-04-13T10:02:18Z"},{"date_updated":"2022-01-06T06:54:24Z","page":"33--47","_id":"2024","volume":4731,"type":"conference","year":"2007","publication_identifier":{"isbn":["978-3-540-75141-0"]},"status":"public","date_created":"2018-03-29T11:57:42Z","publication":"Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings","publisher":"Springer","department":[{"_id":"79"}],"citation":{"mla":"Awerbuch, Baruch, and Christian Scheideler. “A Denial-of-Service Resistant DHT.” <i>Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings</i>, vol. 4731, Springer, 2007, pp. 33--47, doi:<a href=\"https://doi.org/10.1007/978-3-540-75142-7_6\">10.1007/978-3-540-75142-7_6</a>.","bibtex":"@inproceedings{Awerbuch_Scheideler_2007, series={Lecture Notes in Computer Science}, title={A Denial-of-Service Resistant DHT}, volume={4731}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-75142-7_6\">10.1007/978-3-540-75142-7_6</a>}, booktitle={Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings}, publisher={Springer}, author={Awerbuch, Baruch and Scheideler, Christian}, year={2007}, pages={33--47}, collection={Lecture Notes in Computer Science} }","short":"B. Awerbuch, C. Scheideler, in: Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings, Springer, 2007, pp. 33--47.","apa":"Awerbuch, B., &#38; Scheideler, C. (2007). A Denial-of-Service Resistant DHT. In <i>Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings</i> (Vol. 4731, pp. 33--47). Springer. <a href=\"https://doi.org/10.1007/978-3-540-75142-7_6\">https://doi.org/10.1007/978-3-540-75142-7_6</a>","ama":"Awerbuch B, Scheideler C. A Denial-of-Service Resistant DHT. In: <i>Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings</i>. Vol 4731. Lecture Notes in Computer Science. Springer; 2007:33--47. doi:<a href=\"https://doi.org/10.1007/978-3-540-75142-7_6\">10.1007/978-3-540-75142-7_6</a>","chicago":"Awerbuch, Baruch, and Christian Scheideler. “A Denial-of-Service Resistant DHT.” In <i>Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings</i>, 4731:33--47. Lecture Notes in Computer Science. Springer, 2007. <a href=\"https://doi.org/10.1007/978-3-540-75142-7_6\">https://doi.org/10.1007/978-3-540-75142-7_6</a>.","ieee":"B. Awerbuch and C. Scheideler, “A Denial-of-Service Resistant DHT,” in <i>Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings</i>, 2007, vol. 4731, pp. 33--47."},"series_title":"Lecture Notes in Computer Science","user_id":"15504","intvolume":"      4731","doi":"10.1007/978-3-540-75142-7_6","title":"A Denial-of-Service Resistant DHT","author":[{"last_name":"Awerbuch","full_name":"Awerbuch, Baruch","first_name":"Baruch"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}]},{"_id":"2025","volume":4549,"date_updated":"2022-01-06T06:54:25Z","date_created":"2018-03-29T11:58:44Z","type":"conference_editor","publication_identifier":{"isbn":["978-3-540-73089-7"]},"year":"2007","status":"public","citation":{"ama":"Aspnes J, Scheideler C, Arora A, Madden S, eds. <i>Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings</i>. Vol 4549.; 2007. doi:<a href=\"https://doi.org/10.1007/978-3-540-73090-3\">10.1007/978-3-540-73090-3</a>","apa":"Aspnes, J., Scheideler, C., Arora, A., &#38; Madden, S. (Eds.). (2007). <i>Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings</i> (Vol. 4549). <a href=\"https://doi.org/10.1007/978-3-540-73090-3\">https://doi.org/10.1007/978-3-540-73090-3</a>","ieee":"J. Aspnes, C. Scheideler, A. Arora, and S. Madden, Eds., <i>Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings</i>, vol. 4549. 2007.","chicago":"Aspnes, James, Christian Scheideler, Anish Arora, and Samuel Madden, eds. <i>Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings</i>. Vol. 4549. Lecture Notes in Computer Science, 2007. <a href=\"https://doi.org/10.1007/978-3-540-73090-3\">https://doi.org/10.1007/978-3-540-73090-3</a>.","bibtex":"@book{Aspnes_Scheideler_Arora_Madden_2007, series={Lecture Notes in Computer Science}, title={Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings}, volume={4549}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-73090-3\">10.1007/978-3-540-73090-3</a>}, year={2007}, collection={Lecture Notes in Computer Science} }","mla":"Aspnes, James, et al., editors. <i>Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings</i>. Vol. 4549, 2007, doi:<a href=\"https://doi.org/10.1007/978-3-540-73090-3\">10.1007/978-3-540-73090-3</a>.","short":"J. Aspnes, C. Scheideler, A. Arora, S. Madden, eds., Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings, 2007."},"series_title":"Lecture Notes in Computer Science","user_id":"15504","department":[{"_id":"79"}],"title":"Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings","editor":[{"first_name":"James","full_name":"Aspnes, James","last_name":"Aspnes"},{"first_name":"Christian","full_name":"Scheideler, Christian","last_name":"Scheideler","id":"20792"},{"last_name":"Arora","first_name":"Anish","full_name":"Arora, Anish"},{"full_name":"Madden, Samuel","first_name":"Samuel","last_name":"Madden"}],"doi":"10.1007/978-3-540-73090-3","intvolume":"      4549"},{"editor":[{"last_name":"B. Gibbons","first_name":"Phillip","full_name":"B. Gibbons, Phillip"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"title":"SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007","department":[{"_id":"79"}],"user_id":"15504","citation":{"ieee":"P. B. Gibbons and C. Scheideler, Eds., <i>SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007</i>. ACM, 2007.","chicago":"B. Gibbons, Phillip, and Christian Scheideler, eds. <i>SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007</i>. ACM, 2007.","ama":"B. Gibbons P, Scheideler C, eds. <i>SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007</i>. ACM; 2007.","apa":"B. Gibbons, P., &#38; Scheideler, C. (Eds.). (2007). <i>SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007</i>. ACM.","short":"P. B. Gibbons, C. Scheideler, eds., SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007, ACM, 2007.","bibtex":"@book{B. Gibbons_Scheideler_2007, title={SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007}, publisher={ACM}, year={2007} }","mla":"B. Gibbons, Phillip, and Christian Scheideler, editors. <i>SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007</i>. ACM, 2007."},"status":"public","type":"conference_editor","publication_identifier":{"isbn":["978-1-59593-667-7"]},"year":"2007","publisher":"ACM","date_created":"2018-03-29T11:59:46Z","date_updated":"2022-01-06T06:54:25Z","_id":"2027"},{"status":"public","type":"book_chapter","publication_identifier":{"isbn":["978-1-58488-550-4"]},"year":"2007","publication":"Handbook of Approximation Algorithms and Metaheuristics.","date_created":"2018-03-29T12:00:39Z","date_updated":"2022-01-06T06:54:25Z","_id":"2028","doi":"10.1201/9781420010749.ch72","author":[{"full_name":"W. Richa, Andrea","first_name":"Andrea","last_name":"W. Richa"},{"last_name":"Scheideler","id":"20792","first_name":"Christian","full_name":"Scheideler, Christian"}],"title":"Overlay Networks for Peer-to-Peer Networks","department":[{"_id":"79"}],"user_id":"15504","citation":{"apa":"W. Richa, A., &#38; Scheideler, C. (2007). Overlay Networks for Peer-to-Peer Networks. In <i>Handbook of Approximation Algorithms and Metaheuristics.</i> <a href=\"https://doi.org/10.1201/9781420010749.ch72\">https://doi.org/10.1201/9781420010749.ch72</a>","ama":"W. Richa A, Scheideler C. Overlay Networks for Peer-to-Peer Networks. In: <i>Handbook of Approximation Algorithms and Metaheuristics.</i> ; 2007. doi:<a href=\"https://doi.org/10.1201/9781420010749.ch72\">10.1201/9781420010749.ch72</a>","chicago":"W. Richa, Andrea, and Christian Scheideler. “Overlay Networks for Peer-to-Peer Networks.” In <i>Handbook of Approximation Algorithms and Metaheuristics.</i>, 2007. <a href=\"https://doi.org/10.1201/9781420010749.ch72\">https://doi.org/10.1201/9781420010749.ch72</a>.","ieee":"A. W. Richa and C. Scheideler, “Overlay Networks for Peer-to-Peer Networks,” in <i>Handbook of Approximation Algorithms and Metaheuristics.</i>, 2007.","mla":"W. Richa, Andrea, and Christian Scheideler. “Overlay Networks for Peer-to-Peer Networks.” <i>Handbook of Approximation Algorithms and Metaheuristics.</i>, 2007, doi:<a href=\"https://doi.org/10.1201/9781420010749.ch72\">10.1201/9781420010749.ch72</a>.","bibtex":"@inbook{W. Richa_Scheideler_2007, title={Overlay Networks for Peer-to-Peer Networks}, DOI={<a href=\"https://doi.org/10.1201/9781420010749.ch72\">10.1201/9781420010749.ch72</a>}, booktitle={Handbook of Approximation Algorithms and Metaheuristics.}, author={W. Richa, Andrea and Scheideler, Christian}, year={2007} }","short":"A. W. Richa, C. Scheideler, in: Handbook of Approximation Algorithms and Metaheuristics., 2007."}},{"author":[{"full_name":"Bienkowski, Marcin","first_name":"Marcin","last_name":"Bienkowski"},{"first_name":"Jarosław","full_name":"Kutyłowski, Jarosław","last_name":"Kutyłowski"}],"title":"The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces","doi":"10.1007/978-3-540-73951-7_30","abstract":[{"text":"We define a natural generalization of the prominent k-server problem, the k-resource problem. It occurs in metric spaces with some demands and resources given at its points. The demands may vary with time, but the total demand may never exceed k. The goal of an online algorithm is to satisfy demands by moving resources, while minimizing the cost for transporting resources. We give an asymptotically optimal O(log(min {n,k}))-competitive randomized algorithm and an O(min {k,n})-competitive deterministic one for the k-resource problem on uniform metric spaces consisting of n points. This extends known results for paging to the more general setting of k-resource.\r\nBasing on the results for uniform metric spaces, we develop a randomized algorithm solving the k-resource and the k-server problem on metric spaces which can be decomposed into components far away from each other. The algorithm achieves a competitive ratio of O(log(min {n,k})), provided that it has some extra resources more than the optimal algorithm.\r\n","lang":"eng"}],"place":"Berlin, Heidelberg","publication_status":"published","user_id":"15415","citation":{"short":"M. Bienkowski, J. Kutyłowski, in: Lecture Notes in Computer Science, Berlin, Heidelberg, 2007.","bibtex":"@inproceedings{Bienkowski_Kutyłowski_2007, place={Berlin, Heidelberg}, title={The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-73951-7_30\">10.1007/978-3-540-73951-7_30</a>}, booktitle={Lecture Notes in Computer Science}, author={Bienkowski, Marcin and Kutyłowski, Jarosław}, year={2007} }","mla":"Bienkowski, Marcin, and Jarosław Kutyłowski. “The K-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces.” <i>Lecture Notes in Computer Science</i>, 2007, doi:<a href=\"https://doi.org/10.1007/978-3-540-73951-7_30\">10.1007/978-3-540-73951-7_30</a>.","ieee":"M. Bienkowski and J. Kutyłowski, “The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces,” 2007, doi: <a href=\"https://doi.org/10.1007/978-3-540-73951-7_30\">10.1007/978-3-540-73951-7_30</a>.","chicago":"Bienkowski, Marcin, and Jarosław Kutyłowski. “The K-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces.” In <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg, 2007. <a href=\"https://doi.org/10.1007/978-3-540-73951-7_30\">https://doi.org/10.1007/978-3-540-73951-7_30</a>.","apa":"Bienkowski, M., &#38; Kutyłowski, J. (2007). The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces. <i>Lecture Notes in Computer Science</i>. <a href=\"https://doi.org/10.1007/978-3-540-73951-7_30\">https://doi.org/10.1007/978-3-540-73951-7_30</a>","ama":"Bienkowski M, Kutyłowski J. The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces. In: <i>Lecture Notes in Computer Science</i>. ; 2007. doi:<a href=\"https://doi.org/10.1007/978-3-540-73951-7_30\">10.1007/978-3-540-73951-7_30</a>"},"department":[{"_id":"63"}],"date_created":"2021-09-13T13:07:57Z","publication":"Lecture Notes in Computer Science","status":"public","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0302-9743","1611-3349"]},"year":"2007","type":"conference","_id":"24276","date_updated":"2022-01-06T06:56:13Z"},{"publisher":"Springer","date_created":"2021-09-14T10:29:29Z","status":"public","language":[{"iso":"eng"}],"type":"book","year":"2007","publication_identifier":{"isbn":["9783540339915"]},"_id":"24366","date_updated":"2022-01-06T06:56:18Z","author":[{"last_name":"Mahlmann","full_name":"Mahlmann, Peter","first_name":"Peter"},{"full_name":"Schindelhauer, Christian","first_name":"Christian","last_name":"Schindelhauer"}],"title":"Peer-to-Peer-Netzwerke","abstract":[{"lang":"eng","text":"Dieses Buch beschäftigt sich mit Algorithmen und Methoden der Peer-to-Peer-Netzwerke und gibt einen Einblick in die aktuelle Forschung.\r\n\r\nUrsprünglich waren Peer-to-Peer-Netzwerke nur für File-Sharing konzipiert. Mittlerweile hat sich Peer-to-Peer zum Paradigma für Rechnernetzwerke entwickelt. Ziel dieses Buches ist es, dem Leser ein grundlegendes Verständnis der Techniken hinter den aktuellen Peer-to-Peer-Netzwerken aufzuzeigen und im nächsten Schritt Algorithmen vorzustellen, die vielleicht erst in einigen Jahren umgesetzt werden.\r\n\r\nDas Buch richtet sich in erster Linie an Informatiker (Studenten ab dem 5. Semester). Aber auch interessierte Nichtinformatiker können von diesem Buch profitieren, wobei grundlegende Kenntnisse aus den Bereichen der Mathematik und Informatik vorausgesetzt werden. Die Ziele, Kernaussagen und Ergebnisse sollten jedoch auch ohne akademischen Hintergrund klar werden."}],"doi":"10.1007/978-3-540-33992-2","place":"Berlin","publication_status":"published","user_id":"15415","citation":{"apa":"Mahlmann, P., &#38; Schindelhauer, C. (2007). <i>Peer-to-Peer-Netzwerke</i>. Springer. <a href=\"https://doi.org/10.1007/978-3-540-33992-2\">https://doi.org/10.1007/978-3-540-33992-2</a>","ama":"Mahlmann P, Schindelhauer C. <i>Peer-to-Peer-Netzwerke</i>. Springer; 2007. doi:<a href=\"https://doi.org/10.1007/978-3-540-33992-2\">10.1007/978-3-540-33992-2</a>","chicago":"Mahlmann, Peter, and Christian Schindelhauer. <i>Peer-to-Peer-Netzwerke</i>. Berlin: Springer, 2007. <a href=\"https://doi.org/10.1007/978-3-540-33992-2\">https://doi.org/10.1007/978-3-540-33992-2</a>.","ieee":"P. Mahlmann and C. Schindelhauer, <i>Peer-to-Peer-Netzwerke</i>. Berlin: Springer, 2007.","mla":"Mahlmann, Peter, and Christian Schindelhauer. <i>Peer-to-Peer-Netzwerke</i>. Springer, 2007, doi:<a href=\"https://doi.org/10.1007/978-3-540-33992-2\">10.1007/978-3-540-33992-2</a>.","bibtex":"@book{Mahlmann_Schindelhauer_2007, place={Berlin}, title={Peer-to-Peer-Netzwerke}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-33992-2\">10.1007/978-3-540-33992-2</a>}, publisher={Springer}, author={Mahlmann, Peter and Schindelhauer, Christian}, year={2007} }","short":"P. Mahlmann, C. Schindelhauer, Peer-to-Peer-Netzwerke, Springer, Berlin, 2007."},"department":[{"_id":"63"}]},{"citation":{"short":"J. Derrick, H. Wehrheim, Acta Inf. (2007) 41--71.","bibtex":"@article{Derrick_Wehrheim_2007, title={On using data abstractions for model checking refinements}, DOI={<a href=\"https://doi.org/10.1007/s00236-007-0042-3\">10.1007/s00236-007-0042-3</a>}, number={1}, journal={Acta Inf.}, author={Derrick, John and Wehrheim, Heike}, year={2007}, pages={41--71} }","mla":"Derrick, John, and Heike Wehrheim. “On Using Data Abstractions for Model Checking Refinements.” <i>Acta Inf.</i>, no. 1, 2007, pp. 41--71, doi:<a href=\"https://doi.org/10.1007/s00236-007-0042-3\">10.1007/s00236-007-0042-3</a>.","ieee":"J. Derrick and H. Wehrheim, “On using data abstractions for model checking refinements,” <i>Acta Inf.</i>, no. 1, pp. 41--71, 2007.","chicago":"Derrick, John, and Heike Wehrheim. “On Using Data Abstractions for Model Checking Refinements.” <i>Acta Inf.</i>, no. 1 (2007): 41--71. <a href=\"https://doi.org/10.1007/s00236-007-0042-3\">https://doi.org/10.1007/s00236-007-0042-3</a>.","apa":"Derrick, J., &#38; Wehrheim, H. (2007). On using data abstractions for model checking refinements. <i>Acta Inf.</i>, (1), 41--71. <a href=\"https://doi.org/10.1007/s00236-007-0042-3\">https://doi.org/10.1007/s00236-007-0042-3</a>","ama":"Derrick J, Wehrheim H. On using data abstractions for model checking refinements. <i>Acta Inf</i>. 2007;(1):41--71. doi:<a href=\"https://doi.org/10.1007/s00236-007-0042-3\">10.1007/s00236-007-0042-3</a>"},"user_id":"29719","department":[{"_id":"77"}],"title":"On using data abstractions for model checking refinements","author":[{"full_name":"Derrick, John","first_name":"John","last_name":"Derrick"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"doi":"10.1007/s00236-007-0042-3","_id":"3211","page":"41--71","date_updated":"2022-01-06T06:59:05Z","issue":"1","publication":"Acta Inf.","date_created":"2018-06-13T09:56:17Z","type":"journal_article","year":"2007","status":"public"},{"page":"47--67","_id":"3212","issue":"2","date_updated":"2022-01-06T06:59:05Z","date_created":"2018-06-13T09:57:37Z","publication":"Electr. Notes Theor. Comput. Sci.","type":"journal_article","year":"2007","status":"public","citation":{"bibtex":"@article{Metzler_Wehrheim_2007, title={Extending a Component Specification Language with Time}, DOI={<a href=\"https://doi.org/10.1016/j.entcs.2006.02.031\">10.1016/j.entcs.2006.02.031</a>}, number={2}, journal={Electr. Notes Theor. Comput. Sci.}, author={Metzler, Björn and Wehrheim, Heike}, year={2007}, pages={47--67} }","mla":"Metzler, Björn, and Heike Wehrheim. “Extending a Component Specification Language with Time.” <i>Electr. Notes Theor. Comput. Sci.</i>, no. 2, 2007, pp. 47--67, doi:<a href=\"https://doi.org/10.1016/j.entcs.2006.02.031\">10.1016/j.entcs.2006.02.031</a>.","short":"B. Metzler, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2007) 47--67.","apa":"Metzler, B., &#38; Wehrheim, H. (2007). Extending a Component Specification Language with Time. <i>Electr. Notes Theor. Comput. Sci.</i>, (2), 47--67. <a href=\"https://doi.org/10.1016/j.entcs.2006.02.031\">https://doi.org/10.1016/j.entcs.2006.02.031</a>","ama":"Metzler B, Wehrheim H. Extending a Component Specification Language with Time. <i>Electr Notes Theor Comput Sci</i>. 2007;(2):47--67. doi:<a href=\"https://doi.org/10.1016/j.entcs.2006.02.031\">10.1016/j.entcs.2006.02.031</a>","ieee":"B. Metzler and H. Wehrheim, “Extending a Component Specification Language with Time,” <i>Electr. Notes Theor. Comput. Sci.</i>, no. 2, pp. 47--67, 2007.","chicago":"Metzler, Björn, and Heike Wehrheim. “Extending a Component Specification Language with Time.” <i>Electr. Notes Theor. Comput. Sci.</i>, no. 2 (2007): 47--67. <a href=\"https://doi.org/10.1016/j.entcs.2006.02.031\">https://doi.org/10.1016/j.entcs.2006.02.031</a>."},"user_id":"29719","department":[{"_id":"77"}],"title":"Extending a Component Specification Language with Time","author":[{"last_name":"Metzler","full_name":"Metzler, Björn","first_name":"Björn"},{"full_name":"Wehrheim, Heike","first_name":"Heike","last_name":"Wehrheim","id":"573"}],"doi":"10.1016/j.entcs.2006.02.031"},{"doi":"10.1016/j.entcs.2006.08.041","title":"Modelchecking Correctness of Refactorings - Some Experiments","author":[{"last_name":"Estler","first_name":"H.{-}Christian","full_name":"Estler, H.{-}Christian"},{"last_name":"Ruhroth","full_name":"Ruhroth, Thomas","first_name":"Thomas"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"department":[{"_id":"77"}],"citation":{"chicago":"Estler, H.{-}Christian, Thomas Ruhroth, and Heike Wehrheim. “Modelchecking Correctness of Refactorings - Some Experiments.” <i>Electr. Notes Theor. Comput. Sci.</i>, 2007, 3--17. <a href=\"https://doi.org/10.1016/j.entcs.2006.08.041\">https://doi.org/10.1016/j.entcs.2006.08.041</a>.","ieee":"H. .-}Christian Estler, T. Ruhroth, and H. Wehrheim, “Modelchecking Correctness of Refactorings - Some Experiments,” <i>Electr. Notes Theor. Comput. Sci.</i>, pp. 3--17, 2007.","ama":"Estler H.-}Christian, Ruhroth T, Wehrheim H. Modelchecking Correctness of Refactorings - Some Experiments. <i>Electr Notes Theor Comput Sci</i>. 2007:3--17. doi:<a href=\"https://doi.org/10.1016/j.entcs.2006.08.041\">10.1016/j.entcs.2006.08.041</a>","apa":"Estler, H. .-}Christian, Ruhroth, T., &#38; Wehrheim, H. (2007). Modelchecking Correctness of Refactorings - Some Experiments. <i>Electr. Notes Theor. Comput. Sci.</i>, 3--17. <a href=\"https://doi.org/10.1016/j.entcs.2006.08.041\">https://doi.org/10.1016/j.entcs.2006.08.041</a>","short":"H..-}Christian Estler, T. Ruhroth, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2007) 3--17.","mla":"Estler, H. .. }Christian, et al. “Modelchecking Correctness of Refactorings - Some Experiments.” <i>Electr. Notes Theor. Comput. Sci.</i>, 2007, pp. 3--17, doi:<a href=\"https://doi.org/10.1016/j.entcs.2006.08.041\">10.1016/j.entcs.2006.08.041</a>.","bibtex":"@article{Estler_Ruhroth_Wehrheim_2007, title={Modelchecking Correctness of Refactorings - Some Experiments}, DOI={<a href=\"https://doi.org/10.1016/j.entcs.2006.08.041\">10.1016/j.entcs.2006.08.041</a>}, journal={Electr. Notes Theor. Comput. Sci.}, author={Estler, H.{-}Christian and Ruhroth, Thomas and Wehrheim, Heike}, year={2007}, pages={3--17} }"},"user_id":"29719","type":"journal_article","year":"2007","status":"public","date_created":"2018-06-13T09:59:12Z","publication":"Electr. Notes Theor. Comput. Sci.","date_updated":"2022-01-06T06:59:05Z","_id":"3213","page":"3--17"},{"_id":"3214","page":"17--31","date_updated":"2022-01-06T06:59:05Z","publication":"Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers","date_created":"2018-06-13T10:00:14Z","status":"public","type":"conference","year":"2007","language":[{"iso":"eng"}],"user_id":"14955","series_title":"Lecture Notes in Computer Science","citation":{"short":"G. Engels, B. Güldali, C. Soltenborn, H. Wehrheim, in: A. Sch{\\\"{u}}rr, M. Nagl, A. Z{\\\"{u}}ndorf (Eds.), Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers, 2007, pp. 17--31.","mla":"Engels, Gregor, et al. “Assuring Consistency of Business Process Models and Web Services Using Visual Contracts.” <i>Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers</i>, edited by Andy Sch{\\\"{u}}rr et al., 2007, pp. 17--31, doi:<a href=\"https://doi.org/10.1007/978-3-540-89020-1_2\">10.1007/978-3-540-89020-1_2</a>.","bibtex":"@inproceedings{Engels_Güldali_Soltenborn_Wehrheim_2007, series={Lecture Notes in Computer Science}, title={Assuring Consistency of Business Process Models and Web Services Using Visual Contracts}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-89020-1_2\">10.1007/978-3-540-89020-1_2</a>}, booktitle={Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers}, author={Engels, Gregor and Güldali, Baris and Soltenborn, Christian and Wehrheim, Heike}, editor={Sch{\\\"{u}}rr, Andy and Nagl, Manfred and Z{\\\"{u}}ndorf, AlbertEditors}, year={2007}, pages={17--31}, collection={Lecture Notes in Computer Science} }","chicago":"Engels, Gregor, Baris Güldali, Christian Soltenborn, and Heike Wehrheim. “Assuring Consistency of Business Process Models and Web Services Using Visual Contracts.” In <i>Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers</i>, edited by Andy Sch{\\\"{u}}rr, Manfred Nagl, and Albert Z{\\\"{u}}ndorf, 17--31. Lecture Notes in Computer Science, 2007. <a href=\"https://doi.org/10.1007/978-3-540-89020-1_2\">https://doi.org/10.1007/978-3-540-89020-1_2</a>.","ieee":"G. Engels, B. Güldali, C. Soltenborn, and H. Wehrheim, “Assuring Consistency of Business Process Models and Web Services Using Visual Contracts,” in <i>Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers</i>, 2007, pp. 17--31.","apa":"Engels, G., Güldali, B., Soltenborn, C., &#38; Wehrheim, H. (2007). Assuring Consistency of Business Process Models and Web Services Using Visual Contracts. In A. Sch{\\\"{u}}rr, M. Nagl, &#38; A. Z{\\\"{u}}ndorf (Eds.), <i>Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers</i> (pp. 17--31). <a href=\"https://doi.org/10.1007/978-3-540-89020-1_2\">https://doi.org/10.1007/978-3-540-89020-1_2</a>","ama":"Engels G, Güldali B, Soltenborn C, Wehrheim H. Assuring Consistency of Business Process Models and Web Services Using Visual Contracts. In: Sch{\\\"{u}}rr A, Nagl M, Z{\\\"{u}}ndorf A, eds. <i>Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers</i>. Lecture Notes in Computer Science. ; 2007:17--31. doi:<a href=\"https://doi.org/10.1007/978-3-540-89020-1_2\">10.1007/978-3-540-89020-1_2</a>"},"department":[{"_id":"77"}],"author":[{"first_name":"Gregor","full_name":"Engels, Gregor","id":"107","last_name":"Engels"},{"last_name":"Güldali","full_name":"Güldali, Baris","first_name":"Baris"},{"first_name":"Christian","full_name":"Soltenborn, Christian","id":"1737","last_name":"Soltenborn","orcid":"0000-0002-0342-8227"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"editor":[{"first_name":"Andy","full_name":"Sch{\\\"{u}}rr, Andy","last_name":"Sch{\\\"{u}}rr"},{"last_name":"Nagl","first_name":"Manfred","full_name":"Nagl, Manfred"},{"full_name":"Z{\\\"{u}}ndorf, Albert","first_name":"Albert","last_name":"Z{\\\"{u}}ndorf"}],"title":"Assuring Consistency of Business Process Models and Web Services Using Visual Contracts","doi":"10.1007/978-3-540-89020-1_2"},{"_id":"3215","page":"76--90","date_updated":"2022-01-06T06:59:05Z","publication":"Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings","date_created":"2018-06-13T10:01:31Z","year":"2007","type":"conference","language":[{"iso":"eng"}],"status":"public","series_title":"Lecture Notes in Computer Science","citation":{"chicago":"Engels, Gregor, Christian Soltenborn, and Heike Wehrheim. “Analysis of {UML} Activities Using Dynamic Meta Modeling.” In <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>, edited by Marcello M. Bonsangue and Einar Broch Johnsen, 76--90. Lecture Notes in Computer Science, 2007. <a href=\"https://doi.org/10.1007/978-3-540-72952-5_5\">https://doi.org/10.1007/978-3-540-72952-5_5</a>.","ieee":"G. Engels, C. Soltenborn, and H. Wehrheim, “Analysis of {UML} Activities Using Dynamic Meta Modeling,” in <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>, 2007, pp. 76--90.","ama":"Engels G, Soltenborn C, Wehrheim H. Analysis of {UML} Activities Using Dynamic Meta Modeling. In: M. Bonsangue M, Broch Johnsen E, eds. <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>. Lecture Notes in Computer Science. ; 2007:76--90. doi:<a href=\"https://doi.org/10.1007/978-3-540-72952-5_5\">10.1007/978-3-540-72952-5_5</a>","apa":"Engels, G., Soltenborn, C., &#38; Wehrheim, H. (2007). Analysis of {UML} Activities Using Dynamic Meta Modeling. In M. M. Bonsangue &#38; E. Broch Johnsen (Eds.), <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i> (pp. 76--90). <a href=\"https://doi.org/10.1007/978-3-540-72952-5_5\">https://doi.org/10.1007/978-3-540-72952-5_5</a>","short":"G. Engels, C. Soltenborn, H. Wehrheim, in: M. M. Bonsangue, E. Broch Johnsen (Eds.), Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007, pp. 76--90.","mla":"Engels, Gregor, et al. “Analysis of {UML} Activities Using Dynamic Meta Modeling.” <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>, edited by Marcello M. Bonsangue and Einar Broch Johnsen, 2007, pp. 76--90, doi:<a href=\"https://doi.org/10.1007/978-3-540-72952-5_5\">10.1007/978-3-540-72952-5_5</a>.","bibtex":"@inproceedings{Engels_Soltenborn_Wehrheim_2007, series={Lecture Notes in Computer Science}, title={Analysis of {UML} Activities Using Dynamic Meta Modeling}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-72952-5_5\">10.1007/978-3-540-72952-5_5</a>}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings}, author={Engels, Gregor and Soltenborn, Christian and Wehrheim, Heike}, editor={M. Bonsangue, Marcello and Broch Johnsen, EinarEditors}, year={2007}, pages={76--90}, collection={Lecture Notes in Computer Science} }"},"user_id":"14955","department":[{"_id":"77"}],"title":"Analysis of {UML} Activities Using Dynamic Meta Modeling","author":[{"id":"107","last_name":"Engels","first_name":"Gregor","full_name":"Engels, Gregor"},{"last_name":"Soltenborn","id":"1737","first_name":"Christian","full_name":"Soltenborn, Christian","orcid":"0000-0002-0342-8227"},{"id":"573","last_name":"Wehrheim","first_name":"Heike","full_name":"Wehrheim, Heike"}],"editor":[{"last_name":"M. Bonsangue","first_name":"Marcello","full_name":"M. Bonsangue, Marcello"},{"first_name":"Einar","full_name":"Broch Johnsen, Einar","last_name":"Broch Johnsen"}],"doi":"10.1007/978-3-540-72952-5_5"},{"publication":"Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings","date_created":"2018-06-13T10:03:09Z","status":"public","year":"2007","type":"conference","_id":"3216","page":"236--251","date_updated":"2022-01-06T06:59:05Z","editor":[{"last_name":"M. Bonsangue","full_name":"M. Bonsangue, Marcello","first_name":"Marcello"},{"full_name":"Broch Johnsen, Einar","first_name":"Einar","last_name":"Broch Johnsen"}],"author":[{"last_name":"Ruhroth","full_name":"Ruhroth, Thomas","first_name":"Thomas"},{"full_name":"Wehrheim, Heike","first_name":"Heike","last_name":"Wehrheim","id":"573"}],"title":"Refactoring Object-Oriented Specifications with Data and Processes","doi":"10.1007/978-3-540-72952-5_15","user_id":"29719","series_title":"Lecture Notes in Computer Science","citation":{"short":"T. Ruhroth, H. Wehrheim, in: M. M. Bonsangue, E. Broch Johnsen (Eds.), Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007, pp. 236--251.","bibtex":"@inproceedings{Ruhroth_Wehrheim_2007, series={Lecture Notes in Computer Science}, title={Refactoring Object-Oriented Specifications with Data and Processes}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-72952-5_15\">10.1007/978-3-540-72952-5_15</a>}, booktitle={Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings}, author={Ruhroth, Thomas and Wehrheim, Heike}, editor={M. Bonsangue, Marcello and Broch Johnsen, EinarEditors}, year={2007}, pages={236--251}, collection={Lecture Notes in Computer Science} }","mla":"Ruhroth, Thomas, and Heike Wehrheim. “Refactoring Object-Oriented Specifications with Data and Processes.” <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>, edited by Marcello M. Bonsangue and Einar Broch Johnsen, 2007, pp. 236--251, doi:<a href=\"https://doi.org/10.1007/978-3-540-72952-5_15\">10.1007/978-3-540-72952-5_15</a>.","ieee":"T. Ruhroth and H. Wehrheim, “Refactoring Object-Oriented Specifications with Data and Processes,” in <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>, 2007, pp. 236--251.","chicago":"Ruhroth, Thomas, and Heike Wehrheim. “Refactoring Object-Oriented Specifications with Data and Processes.” In <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>, edited by Marcello M. Bonsangue and Einar Broch Johnsen, 236--251. Lecture Notes in Computer Science, 2007. <a href=\"https://doi.org/10.1007/978-3-540-72952-5_15\">https://doi.org/10.1007/978-3-540-72952-5_15</a>.","ama":"Ruhroth T, Wehrheim H. Refactoring Object-Oriented Specifications with Data and Processes. In: M. Bonsangue M, Broch Johnsen E, eds. <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>. Lecture Notes in Computer Science. ; 2007:236--251. doi:<a href=\"https://doi.org/10.1007/978-3-540-72952-5_15\">10.1007/978-3-540-72952-5_15</a>","apa":"Ruhroth, T., &#38; Wehrheim, H. (2007). Refactoring Object-Oriented Specifications with Data and Processes. In M. M. Bonsangue &#38; E. Broch Johnsen (Eds.), <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i> (pp. 236--251). <a href=\"https://doi.org/10.1007/978-3-540-72952-5_15\">https://doi.org/10.1007/978-3-540-72952-5_15</a>"},"department":[{"_id":"77"}]},{"date_created":"2018-06-14T06:30:41Z","publication":"International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}","status":"public","type":"conference","year":"2007","_id":"3221","page":"72--84","date_updated":"2022-01-06T06:59:05Z","editor":[{"last_name":"C. Briand","full_name":"C. Briand, Lionel","first_name":"Lionel"},{"last_name":"L. Wolf","first_name":"Alexander","full_name":"L. Wolf, Alexander"}],"author":[{"last_name":"Schäfer","first_name":"Wilhelm","full_name":"Schäfer, Wilhelm"},{"id":"573","last_name":"Wehrheim","first_name":"Heike","full_name":"Wehrheim, Heike"}],"title":"The Challenges of Building Advanced Mechatronic Systems","doi":"10.1109/FOSE.2007.28","user_id":"29719","citation":{"chicago":"Schäfer, Wilhelm, and Heike Wehrheim. “The Challenges of Building Advanced Mechatronic Systems.” In <i>International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}</i>, edited by Lionel C. Briand and Alexander L. Wolf, 72--84, 2007. <a href=\"https://doi.org/10.1109/FOSE.2007.28\">https://doi.org/10.1109/FOSE.2007.28</a>.","ieee":"W. Schäfer and H. Wehrheim, “The Challenges of Building Advanced Mechatronic Systems,” in <i>International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}</i>, 2007, pp. 72--84.","apa":"Schäfer, W., &#38; Wehrheim, H. (2007). The Challenges of Building Advanced Mechatronic Systems. In L. C. Briand &#38; A. L. Wolf (Eds.), <i>International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}</i> (pp. 72--84). <a href=\"https://doi.org/10.1109/FOSE.2007.28\">https://doi.org/10.1109/FOSE.2007.28</a>","ama":"Schäfer W, Wehrheim H. The Challenges of Building Advanced Mechatronic Systems. In: C. Briand L, L. Wolf A, eds. <i>International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}</i>. ; 2007:72--84. doi:<a href=\"https://doi.org/10.1109/FOSE.2007.28\">10.1109/FOSE.2007.28</a>","short":"W. Schäfer, H. Wehrheim, in: L. C. Briand, A. L. Wolf (Eds.), International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}, 2007, pp. 72--84.","mla":"Schäfer, Wilhelm, and Heike Wehrheim. “The Challenges of Building Advanced Mechatronic Systems.” <i>International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}</i>, edited by Lionel C. Briand and Alexander L. Wolf, 2007, pp. 72--84, doi:<a href=\"https://doi.org/10.1109/FOSE.2007.28\">10.1109/FOSE.2007.28</a>.","bibtex":"@inproceedings{Schäfer_Wehrheim_2007, title={The Challenges of Building Advanced Mechatronic Systems}, DOI={<a href=\"https://doi.org/10.1109/FOSE.2007.28\">10.1109/FOSE.2007.28</a>}, booktitle={International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}}, author={Schäfer, Wilhelm and Wehrheim, Heike}, editor={C. Briand, Lionel and L. Wolf, AlexanderEditors}, year={2007}, pages={72--84} }"},"department":[{"_id":"77"}]},{"date_created":"2018-06-14T06:32:05Z","publication":"Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings","type":"conference","year":"2007","status":"public","page":"195--214","_id":"3222","date_updated":"2022-01-06T06:59:05Z","title":"Proving Linearizability Via Non-atomic Refinement","author":[{"full_name":"Derrick, John","first_name":"John","last_name":"Derrick"},{"full_name":"Schellhorn, Gerhard","first_name":"Gerhard","last_name":"Schellhorn"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"editor":[{"last_name":"Davies","first_name":"Jim","full_name":"Davies, Jim"},{"full_name":"Gibbons, Jeremy","first_name":"Jeremy","last_name":"Gibbons"}],"doi":"10.1007/978-3-540-73210-5_11","citation":{"bibtex":"@inproceedings{Derrick_Schellhorn_Wehrheim_2007, series={Lecture Notes in Computer Science}, title={Proving Linearizability Via Non-atomic Refinement}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-73210-5_11\">10.1007/978-3-540-73210-5_11</a>}, booktitle={Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}, editor={Davies, Jim and Gibbons, JeremyEditors}, year={2007}, pages={195--214}, collection={Lecture Notes in Computer Science} }","mla":"Derrick, John, et al. “Proving Linearizability Via Non-Atomic Refinement.” <i>Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings</i>, edited by Jim Davies and Jeremy Gibbons, 2007, pp. 195--214, doi:<a href=\"https://doi.org/10.1007/978-3-540-73210-5_11\">10.1007/978-3-540-73210-5_11</a>.","short":"J. Derrick, G. Schellhorn, H. Wehrheim, in: J. Davies, J. Gibbons (Eds.), Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings, 2007, pp. 195--214.","apa":"Derrick, J., Schellhorn, G., &#38; Wehrheim, H. (2007). Proving Linearizability Via Non-atomic Refinement. In J. Davies &#38; J. Gibbons (Eds.), <i>Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings</i> (pp. 195--214). <a href=\"https://doi.org/10.1007/978-3-540-73210-5_11\">https://doi.org/10.1007/978-3-540-73210-5_11</a>","ama":"Derrick J, Schellhorn G, Wehrheim H. Proving Linearizability Via Non-atomic Refinement. In: Davies J, Gibbons J, eds. <i>Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings</i>. Lecture Notes in Computer Science. ; 2007:195--214. doi:<a href=\"https://doi.org/10.1007/978-3-540-73210-5_11\">10.1007/978-3-540-73210-5_11</a>","ieee":"J. Derrick, G. Schellhorn, and H. Wehrheim, “Proving Linearizability Via Non-atomic Refinement,” in <i>Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings</i>, 2007, pp. 195--214.","chicago":"Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Proving Linearizability Via Non-Atomic Refinement.” In <i>Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings</i>, edited by Jim Davies and Jeremy Gibbons, 195--214. Lecture Notes in Computer Science, 2007. <a href=\"https://doi.org/10.1007/978-3-540-73210-5_11\">https://doi.org/10.1007/978-3-540-73210-5_11</a>."},"series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}]},{"publisher":"Universität Paderborn","date_created":"2018-05-25T10:49:53Z","status":"public","year":"2007","type":"dissertation","_id":"2912","date_updated":"2022-01-06T06:58:46Z","author":[{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"title":"Tamper Resistance of AES -- Models, Attacks and Countermeasures","supervisor":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"}],"user_id":"25078","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466-20080110018"}],"citation":{"short":"V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures, Universität Paderborn, 2007.","bibtex":"@book{Krummel_2007, title={Tamper Resistance of AES -- Models, Attacks and Countermeasures}, publisher={Universität Paderborn}, author={Krummel, Volker}, year={2007} }","mla":"Krummel, Volker. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn, 2007.","ieee":"V. Krummel, <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn, 2007.","chicago":"Krummel, Volker. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn, 2007.","apa":"Krummel, V. (2007). <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn.","ama":"Krummel V. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn; 2007."},"department":[{"_id":"64"}]},{"department":[{"_id":"64"}],"citation":{"mla":"Blömer, Johannes, and Volker Krummel. “Analysis of Countermeasures Against Access Driven Cache Attacks on AES.” <i>Selected Areas in Cryptography</i>, Springer Berlin Heidelberg, 2007, pp. 96–109, doi:<a href=\"https://doi.org/10.1007/978-3-540-77360-3_7\">10.1007/978-3-540-77360-3_7</a>.","bibtex":"@inbook{Blömer_Krummel_2007, place={Berlin, Heidelberg}, title={Analysis of Countermeasures Against Access Driven Cache Attacks on AES}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-77360-3_7\">10.1007/978-3-540-77360-3_7</a>}, booktitle={Selected Areas in Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Krummel, Volker}, year={2007}, pages={96–109} }","short":"J. Blömer, V. Krummel, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 96–109.","ama":"Blömer J, Krummel V. Analysis of Countermeasures Against Access Driven Cache Attacks on AES. In: <i>Selected Areas in Cryptography</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:96-109. doi:<a href=\"https://doi.org/10.1007/978-3-540-77360-3_7\">10.1007/978-3-540-77360-3_7</a>","apa":"Blömer, J., &#38; Krummel, V. (2007). Analysis of Countermeasures Against Access Driven Cache Attacks on AES. In <i>Selected Areas in Cryptography</i> (pp. 96–109). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-77360-3_7\">https://doi.org/10.1007/978-3-540-77360-3_7</a>","chicago":"Blömer, Johannes, and Volker Krummel. “Analysis of Countermeasures Against Access Driven Cache Attacks on AES.” In <i>Selected Areas in Cryptography</i>, 96–109. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. <a href=\"https://doi.org/10.1007/978-3-540-77360-3_7\">https://doi.org/10.1007/978-3-540-77360-3_7</a>.","ieee":"J. Blömer and V. Krummel, “Analysis of Countermeasures Against Access Driven Cache Attacks on AES,” in <i>Selected Areas in Cryptography</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 96–109."},"user_id":"25078","oa":"1","main_file_link":[{"url":"https://eprint.iacr.org/2007/282","open_access":"1"}],"publication_status":"published","place":"Berlin, Heidelberg","doi":"10.1007/978-3-540-77360-3_7","title":"Analysis of Countermeasures Against Access Driven Cache Attacks on AES","author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"last_name":"Krummel","full_name":"Krummel, Volker","first_name":"Volker"}],"date_updated":"2022-01-06T06:58:50Z","page":"96-109","_id":"3002","year":"2007","publication_identifier":{"isbn":["9783540773597"]},"type":"book_chapter","status":"public","publication":"Selected Areas in Cryptography","date_created":"2018-06-05T08:12:18Z","publisher":"Springer Berlin Heidelberg"},{"status":"public","type":"book_chapter","publication_identifier":{"isbn":["9783540440505","9783540457084"],"issn":["0302-9743"]},"year":"2007","publisher":"Springer Berlin Heidelberg","date_created":"2018-06-05T08:26:03Z","publication":"Advances in Cryptology — CRYPTO 2002","date_updated":"2022-01-06T06:58:51Z","page":"242-256","_id":"3019","doi":"10.1007/3-540-45708-9_16","place":"Berlin, Heidelberg","author":[{"full_name":"May, Alexander","first_name":"Alexander","last_name":"May"}],"title":"Cryptanalysis of Unbalanced RSA with Small CRT-Exponent","department":[{"_id":"64"}],"publication_status":"published","user_id":"25078","citation":{"chicago":"May, Alexander. “Cryptanalysis of Unbalanced RSA with Small CRT-Exponent.” In <i>Advances in Cryptology — CRYPTO 2002</i>, 242–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. <a href=\"https://doi.org/10.1007/3-540-45708-9_16\">https://doi.org/10.1007/3-540-45708-9_16</a>.","ieee":"A. May, “Cryptanalysis of Unbalanced RSA with Small CRT-Exponent,” in <i>Advances in Cryptology — CRYPTO 2002</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 242–256.","apa":"May, A. (2007). Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. In <i>Advances in Cryptology — CRYPTO 2002</i> (pp. 242–256). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/3-540-45708-9_16\">https://doi.org/10.1007/3-540-45708-9_16</a>","ama":"May A. Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. In: <i>Advances in Cryptology — CRYPTO 2002</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:242-256. doi:<a href=\"https://doi.org/10.1007/3-540-45708-9_16\">10.1007/3-540-45708-9_16</a>","short":"A. May, in: Advances in Cryptology — CRYPTO 2002, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 242–256.","mla":"May, Alexander. “Cryptanalysis of Unbalanced RSA with Small CRT-Exponent.” <i>Advances in Cryptology — CRYPTO 2002</i>, Springer Berlin Heidelberg, 2007, pp. 242–56, doi:<a href=\"https://doi.org/10.1007/3-540-45708-9_16\">10.1007/3-540-45708-9_16</a>.","bibtex":"@inbook{May_2007, place={Berlin, Heidelberg}, title={Cryptanalysis of Unbalanced RSA with Small CRT-Exponent}, DOI={<a href=\"https://doi.org/10.1007/3-540-45708-9_16\">10.1007/3-540-45708-9_16</a>}, booktitle={Advances in Cryptology — CRYPTO 2002}, publisher={Springer Berlin Heidelberg}, author={May, Alexander}, year={2007}, pages={242–256} }"}},{"publication":"Lecture Notes in Computer Science","date_created":"2018-06-05T08:26:29Z","publisher":"Springer Berlin Heidelberg","publication_identifier":{"issn":["0302-9743"],"isbn":["9783540424888","9783540446705"]},"year":"2007","type":"book_chapter","status":"public","page":"4-19","_id":"3020","date_updated":"2022-01-06T06:58:51Z","title":"Low Secret Exponent RSA Revisited","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"full_name":"May, Alexander","first_name":"Alexander","last_name":"May"}],"place":"Berlin, Heidelberg","doi":"10.1007/3-540-44670-2_2","citation":{"short":"J. Blömer, A. May, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 4–19.","mla":"Blömer, Johannes, and Alexander May. “Low Secret Exponent RSA Revisited.” <i>Lecture Notes in Computer Science</i>, Springer Berlin Heidelberg, 2007, pp. 4–19, doi:<a href=\"https://doi.org/10.1007/3-540-44670-2_2\">10.1007/3-540-44670-2_2</a>.","bibtex":"@inbook{Blömer_May_2007, place={Berlin, Heidelberg}, title={Low Secret Exponent RSA Revisited}, DOI={<a href=\"https://doi.org/10.1007/3-540-44670-2_2\">10.1007/3-540-44670-2_2</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2007}, pages={4–19} }","chicago":"Blömer, Johannes, and Alexander May. “Low Secret Exponent RSA Revisited.” In <i>Lecture Notes in Computer Science</i>, 4–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. <a href=\"https://doi.org/10.1007/3-540-44670-2_2\">https://doi.org/10.1007/3-540-44670-2_2</a>.","ieee":"J. Blömer and A. May, “Low Secret Exponent RSA Revisited,” in <i>Lecture Notes in Computer Science</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 4–19.","apa":"Blömer, J., &#38; May, A. (2007). Low Secret Exponent RSA Revisited. In <i>Lecture Notes in Computer Science</i> (pp. 4–19). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/3-540-44670-2_2\">https://doi.org/10.1007/3-540-44670-2_2</a>","ama":"Blömer J, May A. Low Secret Exponent RSA Revisited. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:4-19. doi:<a href=\"https://doi.org/10.1007/3-540-44670-2_2\">10.1007/3-540-44670-2_2</a>"},"user_id":"25078","publication_status":"published","department":[{"_id":"64"}]},{"user_id":"25078","publication_status":"published","citation":{"mla":"Blömer, Johannes, and Alexander May. “Key Revocation with Interval Cover Families.” <i>Selected Areas in Cryptography</i>, Springer Berlin Heidelberg, 2007, pp. 325–41, doi:<a href=\"https://doi.org/10.1007/3-540-45537-x_26\">10.1007/3-540-45537-x_26</a>.","bibtex":"@inbook{Blömer_May_2007, place={Berlin, Heidelberg}, title={Key Revocation with Interval Cover Families}, DOI={<a href=\"https://doi.org/10.1007/3-540-45537-x_26\">10.1007/3-540-45537-x_26</a>}, booktitle={Selected Areas in Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2007}, pages={325–341} }","short":"J. Blömer, A. May, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 325–341.","ama":"Blömer J, May A. Key Revocation with Interval Cover Families. In: <i>Selected Areas in Cryptography</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:325-341. doi:<a href=\"https://doi.org/10.1007/3-540-45537-x_26\">10.1007/3-540-45537-x_26</a>","apa":"Blömer, J., &#38; May, A. (2007). Key Revocation with Interval Cover Families. In <i>Selected Areas in Cryptography</i> (pp. 325–341). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/3-540-45537-x_26\">https://doi.org/10.1007/3-540-45537-x_26</a>","chicago":"Blömer, Johannes, and Alexander May. “Key Revocation with Interval Cover Families.” In <i>Selected Areas in Cryptography</i>, 325–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. <a href=\"https://doi.org/10.1007/3-540-45537-x_26\">https://doi.org/10.1007/3-540-45537-x_26</a>.","ieee":"J. Blömer and A. May, “Key Revocation with Interval Cover Families,” in <i>Selected Areas in Cryptography</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 325–341."},"department":[{"_id":"64"}],"author":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"},{"first_name":"Alexander","full_name":"May, Alexander","last_name":"May"}],"title":"Key Revocation with Interval Cover Families","doi":"10.1007/3-540-45537-x_26","place":"Berlin, Heidelberg","_id":"3021","page":"325-341","date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","publication":"Selected Areas in Cryptography","date_created":"2018-06-05T08:26:50Z","status":"public","type":"book_chapter","year":"2007","publication_identifier":{"issn":["0302-9743"],"isbn":["9783540430667","9783540455370"]}}]
