---
_id: '48865'
author:
- first_name: Jakob
  full_name: Bossek, Jakob
  id: '102979'
  last_name: Bossek
  orcid: 0000-0002-4121-4668
citation:
  ama: 'Bossek J. Smoof: Single- and Multi-Objective Optimization Test Functions.
    <i>The R Journal</i>. 2017;9(1):103–113.'
  apa: 'Bossek, J. (2017). Smoof: Single- and Multi-Objective Optimization Test Functions.
    <i>The R Journal</i>, <i>9</i>(1), 103–113.'
  bibtex: '@article{Bossek_2017, title={Smoof: Single- and Multi-Objective Optimization
    Test Functions}, volume={9}, number={1}, journal={The R Journal}, author={Bossek,
    Jakob}, year={2017}, pages={103–113} }'
  chicago: 'Bossek, Jakob. “Smoof: Single- and Multi-Objective Optimization Test Functions.”
    <i>The R Journal</i> 9, no. 1 (2017): 103–113.'
  ieee: 'J. Bossek, “Smoof: Single- and Multi-Objective Optimization Test Functions,”
    <i>The R Journal</i>, vol. 9, no. 1, pp. 103–113, 2017.'
  mla: 'Bossek, Jakob. “Smoof: Single- and Multi-Objective Optimization Test Functions.”
    <i>The R Journal</i>, vol. 9, no. 1, 2017, pp. 103–113.'
  short: J. Bossek, The R Journal 9 (2017) 103–113.
date_created: 2023-11-14T15:58:56Z
date_updated: 2023-12-13T10:51:57Z
department:
- _id: '819'
intvolume: '         9'
issue: '1'
language:
- iso: eng
page: 103–113
publication: The R Journal
publication_identifier:
  issn:
  - 2073-4859
status: public
title: 'Smoof: Single- and Multi-Objective Optimization Test Functions'
type: journal_article
user_id: '102979'
volume: 9
year: '2017'
...
---
_id: '48837'
author:
- first_name: Bernd
  full_name: Bischl, Bernd
  last_name: Bischl
- first_name: Jakob
  full_name: Richter, Jakob
  last_name: Richter
- first_name: Jakob
  full_name: Bossek, Jakob
  id: '102979'
  last_name: Bossek
  orcid: 0000-0002-4121-4668
- first_name: Daniel
  full_name: Horn, Daniel
  last_name: Horn
- first_name: Janek
  full_name: Thomas, Janek
  last_name: Thomas
- first_name: Michel
  full_name: Lang, Michel
  last_name: Lang
citation:
  ama: 'Bischl B, Richter J, Bossek J, Horn D, Thomas J, Lang M. mlrMBO: A Modular
    Framework for Model-Based Optimization of Expensive Black-Box Functions. <i>CoRR</i>.
    Published online 2017.'
  apa: 'Bischl, B., Richter, J., Bossek, J., Horn, D., Thomas, J., &#38; Lang, M.
    (2017). mlrMBO: A Modular Framework for Model-Based Optimization of Expensive
    Black-Box Functions. <i>CoRR</i>.'
  bibtex: '@article{Bischl_Richter_Bossek_Horn_Thomas_Lang_2017, title={mlrMBO: A
    Modular Framework for Model-Based Optimization of Expensive Black-Box Functions},
    journal={CoRR}, author={Bischl, Bernd and Richter, Jakob and Bossek, Jakob and
    Horn, Daniel and Thomas, Janek and Lang, Michel}, year={2017} }'
  chicago: 'Bischl, Bernd, Jakob Richter, Jakob Bossek, Daniel Horn, Janek Thomas,
    and Michel Lang. “MlrMBO: A Modular Framework for Model-Based Optimization of
    Expensive Black-Box Functions.” <i>CoRR</i>, 2017.'
  ieee: 'B. Bischl, J. Richter, J. Bossek, D. Horn, J. Thomas, and M. Lang, “mlrMBO:
    A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions,”
    <i>CoRR</i>, 2017.'
  mla: 'Bischl, Bernd, et al. “MlrMBO: A Modular Framework for Model-Based Optimization
    of Expensive Black-Box Functions.” <i>CoRR</i>, 2017.'
  short: B. Bischl, J. Richter, J. Bossek, D. Horn, J. Thomas, M. Lang, CoRR (2017).
date_created: 2023-11-14T15:58:51Z
date_updated: 2023-12-13T10:52:31Z
department:
- _id: '819'
language:
- iso: eng
publication: CoRR
status: public
title: 'mlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box
  Functions'
type: journal_article
user_id: '102979'
year: '2017'
...
---
_id: '6721'
author:
- first_name: Stefan
  full_name: Heindorf, Stefan
  id: '11871'
  last_name: Heindorf
  orcid: 0000-0002-4525-6865
- first_name: Martin
  full_name: Potthast, Martin
  last_name: Potthast
- first_name: Hannah
  full_name: Bast, Hannah
  last_name: Bast
- first_name: Björn
  full_name: Buchhold, Björn
  last_name: Buchhold
- first_name: Elmar
  full_name: Haussmann, Elmar
  last_name: Haussmann
citation:
  ama: 'Heindorf S, Potthast M, Bast H, Buchhold B, Haussmann E. WSDM Cup 2017: Vandalism
    Detection and Triple Scoring. In: <i>WSDM</i>. ACM; 2017:827-828. doi:<a href="https://doi.org/10.1145/3018661.3022762">10.1145/3018661.3022762</a>'
  apa: 'Heindorf, S., Potthast, M., Bast, H., Buchhold, B., &#38; Haussmann, E. (2017).
    WSDM Cup 2017: Vandalism Detection and Triple Scoring. <i>WSDM</i>, 827–828. <a
    href="https://doi.org/10.1145/3018661.3022762">https://doi.org/10.1145/3018661.3022762</a>'
  bibtex: '@inproceedings{Heindorf_Potthast_Bast_Buchhold_Haussmann_2017, title={WSDM
    Cup 2017: Vandalism Detection and Triple Scoring}, DOI={<a href="https://doi.org/10.1145/3018661.3022762">10.1145/3018661.3022762</a>},
    booktitle={WSDM}, publisher={ACM}, author={Heindorf, Stefan and Potthast, Martin
    and Bast, Hannah and Buchhold, Björn and Haussmann, Elmar}, year={2017}, pages={827–828}
    }'
  chicago: 'Heindorf, Stefan, Martin Potthast, Hannah Bast, Björn Buchhold, and Elmar
    Haussmann. “WSDM Cup 2017: Vandalism Detection and Triple Scoring.” In <i>WSDM</i>,
    827–28. ACM, 2017. <a href="https://doi.org/10.1145/3018661.3022762">https://doi.org/10.1145/3018661.3022762</a>.'
  ieee: 'S. Heindorf, M. Potthast, H. Bast, B. Buchhold, and E. Haussmann, “WSDM Cup
    2017: Vandalism Detection and Triple Scoring,” in <i>WSDM</i>, 2017, pp. 827–828,
    doi: <a href="https://doi.org/10.1145/3018661.3022762">10.1145/3018661.3022762</a>.'
  mla: 'Heindorf, Stefan, et al. “WSDM Cup 2017: Vandalism Detection and Triple Scoring.”
    <i>WSDM</i>, ACM, 2017, pp. 827–28, doi:<a href="https://doi.org/10.1145/3018661.3022762">10.1145/3018661.3022762</a>.'
  short: 'S. Heindorf, M. Potthast, H. Bast, B. Buchhold, E. Haussmann, in: WSDM,
    ACM, 2017, pp. 827–828.'
date_created: 2019-01-15T08:54:23Z
date_updated: 2024-05-26T19:15:24Z
department:
- _id: '66'
doi: 10.1145/3018661.3022762
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://cs.uni-paderborn.de/fileadmin/informatik/fg/dbis/Publikationen/2017/heindorf2017_WSDM.pdf
oa: '1'
page: 827-828
publication: WSDM
publisher: ACM
status: public
title: 'WSDM Cup 2017: Vandalism Detection and Triple Scoring'
type: conference
user_id: '11871'
year: '2017'
...
---
_id: '47249'
author:
- first_name: Erik
  full_name: Derr, Erik
  last_name: Derr
- first_name: Sven
  full_name: Bugiel, Sven
  last_name: Bugiel
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
citation:
  ama: 'Derr E, Bugiel S, Fahl S, Acar Y, Backes M. Keep me Updated: An Empirical
    Study of Third-Party Library Updatability on Android. In: <i>Proceedings of the
    2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017.
    doi:<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>'
  apa: 'Derr, E., Bugiel, S., Fahl, S., Acar, Y., &#38; Backes, M. (2017). Keep me
    Updated: An Empirical Study of Third-Party Library Updatability on Android. <i>Proceedings
    of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>.
    <a href="https://doi.org/10.1145/3133956.3134059">https://doi.org/10.1145/3133956.3134059</a>'
  bibtex: '@inproceedings{Derr_Bugiel_Fahl_Acar_Backes_2017, title={Keep me Updated:
    An Empirical Study of Third-Party Library Updatability on Android}, DOI={<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>},
    booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Derr, Erik and Bugiel, Sven and Fahl, Sascha
    and Acar, Yasemin and Backes, Michael}, year={2017} }'
  chicago: 'Derr, Erik, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes.
    “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.”
    In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security</i>. ACM, 2017. <a href="https://doi.org/10.1145/3133956.3134059">https://doi.org/10.1145/3133956.3134059</a>.'
  ieee: 'E. Derr, S. Bugiel, S. Fahl, Y. Acar, and M. Backes, “Keep me Updated: An
    Empirical Study of Third-Party Library Updatability on Android,” 2017, doi: <a
    href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>.'
  mla: 'Derr, Erik, et al. “Keep Me Updated: An Empirical Study of Third-Party Library
    Updatability on Android.” <i>Proceedings of the 2017 ACM SIGSAC Conference on
    Computer and Communications Security</i>, ACM, 2017, doi:<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>.'
  short: 'E. Derr, S. Bugiel, S. Fahl, Y. Acar, M. Backes, in: Proceedings of the
    2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.'
date_created: 2023-09-22T12:50:32Z
date_updated: 2024-06-05T13:09:19Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3133956.3134059
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'Keep me Updated: An Empirical Study of Third-Party Library Updatability on
  Android'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47309'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
citation:
  ama: Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. How Internet Resources
    Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur Priv</i>.
    2017;15(2):50–60. doi:<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>
  apa: Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C.
    (2017). How Internet Resources Might Be Helping You Develop Faster but Less Securely.
    <i>IEEE Secur. Priv.</i>, <i>15</i>(2), 50–60. <a href="https://doi.org/10.1109/MSP.2017.24">https://doi.org/10.1109/MSP.2017.24</a>
  bibtex: '@article{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2017, title={How Internet
    Resources Might Be Helping You Develop Faster but Less Securely}, volume={15},
    DOI={<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>}, number={2},
    journal={IEEE Secur. Priv.}, author={Acar, Yasemin and Backes, Michael and Fahl,
    Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017},
    pages={50–60} }'
  chicago: 'Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek,
    and Christian Stransky. “How Internet Resources Might Be Helping You Develop Faster
    but Less Securely.” <i>IEEE Secur. Priv.</i> 15, no. 2 (2017): 50–60. <a href="https://doi.org/10.1109/MSP.2017.24">https://doi.org/10.1109/MSP.2017.24</a>.'
  ieee: 'Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “How
    Internet Resources Might Be Helping You Develop Faster but Less Securely,” <i>IEEE
    Secur. Priv.</i>, vol. 15, no. 2, pp. 50–60, 2017, doi: <a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>.'
  mla: Acar, Yasemin, et al. “How Internet Resources Might Be Helping You Develop
    Faster but Less Securely.” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, 2017, pp.
    50–60, doi:<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>.
  short: Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, IEEE Secur.
    Priv. 15 (2017) 50–60.
date_created: 2023-09-22T13:39:01Z
date_updated: 2024-06-05T13:09:42Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/MSP.2017.24
extern: '1'
intvolume: '        15'
issue: '2'
language:
- iso: eng
page: 50–60
publication: IEEE Secur. Priv.
status: public
title: How Internet Resources Might Be Helping You Develop Faster but Less Securely
type: journal_article
user_id: '14931'
volume: 15
year: '2017'
...
---
_id: '47245'
author:
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Duc Cuong
  full_name: Nguyen, Duc Cuong
  last_name: Nguyen
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Elissa M.
  full_name: Redmiles, Elissa M.
  last_name: Redmiles
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Simson L.
  full_name: Garfinkel, Simson L.
  last_name: Garfinkel
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Stransky C, Acar Y, Nguyen DC, et al. Lessons Learned from Using an Online
    Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software
    Developers. In: Fernandez JM, Payer M, eds. <i>10th USENIX Workshop on Cyber Security
    Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>.
    USENIX Association; 2017.'
  apa: Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M.,
    Backes, M., Garfinkel, S. L., Mazurek, M. L., &#38; Fahl, S. (2017). Lessons Learned
    from Using an Online Platform to Conduct Large-Scale, Online Controlled Security
    Experiments with Software Developers. In J. M. Fernandez &#38; M. Payer (Eds.),
    <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association.
  bibtex: '@inproceedings{Stransky_Acar_Nguyen_Wermke_Kim_Redmiles_Backes_Garfinkel_Mazurek_Fahl_2017,
    title={Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online
    Controlled Security Experiments with Software Developers}, booktitle={10th USENIX
    Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC,
    Canada, August 14, 2017}, publisher={USENIX Association}, author={Stransky, Christian
    and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and
    Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek,
    Michelle L. and Fahl, Sascha}, editor={Fernandez, José M. and Payer, Mathias},
    year={2017} }'
  chicago: Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon
    Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek,
    and Sascha Fahl. “Lessons Learned from Using an Online Platform to Conduct Large-Scale,
    Online Controlled Security Experiments with Software Developers.” In <i>10th USENIX
    Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC,
    Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer. USENIX
    Association, 2017.
  ieee: C. Stransky <i>et al.</i>, “Lessons Learned from Using an Online Platform
    to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers,”
    in <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>, 2017.
  mla: Stransky, Christian, et al. “Lessons Learned from Using an Online Platform
    to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.”
    <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias
    Payer, USENIX Association, 2017.
  short: 'C. Stransky, Y. Acar, D.C. Nguyen, D. Wermke, D. Kim, E.M. Redmiles, M.
    Backes, S.L. Garfinkel, M.L. Mazurek, S. Fahl, in: J.M. Fernandez, M. Payer (Eds.),
    10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver,
    BC, Canada, August 14, 2017, USENIX Association, 2017.'
date_created: 2023-09-22T12:47:30Z
date_updated: 2024-06-05T13:12:04Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: José M.
  full_name: Fernandez, José M.
  last_name: Fernandez
- first_name: Mathias
  full_name: Payer, Mathias
  last_name: Payer
extern: '1'
language:
- iso: eng
publication: 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET
  2017, Vancouver, BC, Canada, August 14, 2017
publisher: USENIX Association
status: public
title: Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online
  Controlled Security Experiments with Software Developers
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47243'
author:
- first_name: Felix
  full_name: Fischer, Felix
  last_name: Fischer
- first_name: Konstantin
  full_name: Böttinger, Konstantin
  last_name: Böttinger
- first_name: Huang
  full_name: Xiao, Huang
  last_name: Xiao
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Fischer F, Böttinger K, Xiao H, et al. Stack Overflow Considered Harmful?
    The Impact of Copy&#38;Paste on Android Application Security. In: <i>2017 IEEE
    Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>.
    IEEE Computer Society; 2017:121–136. doi:<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>'
  apa: Fischer, F., Böttinger, K., Xiao, H., Stransky, C., Acar, Y., Backes, M., &#38;
    Fahl, S. (2017). Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste
    on Android Application Security. <i>2017 IEEE Symposium on Security and Privacy,
    SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. <a href="https://doi.org/10.1109/SP.2017.31">https://doi.org/10.1109/SP.2017.31</a>
  bibtex: '@inproceedings{Fischer_Böttinger_Xiao_Stransky_Acar_Backes_Fahl_2017, title={Stack
    Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application
    Security}, DOI={<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>},
    booktitle={2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA,
    USA, May 22-26, 2017}, publisher={IEEE Computer Society}, author={Fischer, Felix
    and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin
    and Backes, Michael and Fahl, Sascha}, year={2017}, pages={121–136} }'
  chicago: Fischer, Felix, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin
    Acar, Michael Backes, and Sascha Fahl. “Stack Overflow Considered Harmful? The
    Impact of Copy&#38;Paste on Android Application Security.” In <i>2017 IEEE Symposium
    on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136.
    IEEE Computer Society, 2017. <a href="https://doi.org/10.1109/SP.2017.31">https://doi.org/10.1109/SP.2017.31</a>.
  ieee: 'F. Fischer <i>et al.</i>, “Stack Overflow Considered Harmful? The Impact
    of Copy&#38;Paste on Android Application Security,” in <i>2017 IEEE Symposium
    on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 2017,
    pp. 121–136, doi: <a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>.'
  mla: Fischer, Felix, et al. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste
    on Android Application Security.” <i>2017 IEEE Symposium on Security and Privacy,
    SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, IEEE Computer Society, 2017,
    pp. 121–136, doi:<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>.
  short: 'F. Fischer, K. Böttinger, H. Xiao, C. Stransky, Y. Acar, M. Backes, S. Fahl,
    in: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May
    22-26, 2017, IEEE Computer Society, 2017, pp. 121–136.'
date_created: 2023-09-22T12:43:27Z
date_updated: 2024-06-05T13:12:27Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP.2017.31
extern: '1'
language:
- iso: eng
page: 121–136
publication: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA,
  May 22-26, 2017
publisher: IEEE Computer Society
status: public
title: Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application
  Security
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47250'
author:
- first_name: Duc Cuong
  full_name: Nguyen, Duc Cuong
  last_name: Nguyen
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Charles
  full_name: Weir, Charles
  last_name: Weir
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Nguyen DC, Wermke D, Acar Y, Backes M, Weir C, Fahl S. A Stitch in Time: Supporting
    Android Developers in Writing Secure Code. In: <i>Proceedings of the 2017 ACM
    SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a
    href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>'
  apa: 'Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., &#38; Fahl, S.
    (2017). A Stitch in Time: Supporting Android Developers in Writing Secure Code.
    <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security</i>. <a href="https://doi.org/10.1145/3133956.3133977">https://doi.org/10.1145/3133956.3133977</a>'
  bibtex: '@inproceedings{Nguyen_Wermke_Acar_Backes_Weir_Fahl_2017, title={A Stitch
    in Time: Supporting Android Developers in Writing Secure Code}, DOI={<a href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>},
    booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Nguyen, Duc Cuong and Wermke, Dominik and
    Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}, year={2017}
    }'
  chicago: 'Nguyen, Duc Cuong, Dominik Wermke, Yasemin Acar, Michael Backes, Charles
    Weir, and Sascha Fahl. “A Stitch in Time: Supporting Android Developers in Writing
    Secure Code.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer
    and Communications Security</i>. ACM, 2017. <a href="https://doi.org/10.1145/3133956.3133977">https://doi.org/10.1145/3133956.3133977</a>.'
  ieee: 'D. C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, and S. Fahl, “A Stitch
    in Time: Supporting Android Developers in Writing Secure Code,” 2017, doi: <a
    href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>.'
  mla: 'Nguyen, Duc Cuong, et al. “A Stitch in Time: Supporting Android Developers
    in Writing Secure Code.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer
    and Communications Security</i>, ACM, 2017, doi:<a href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>.'
  short: 'D.C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, S. Fahl, in: Proceedings
    of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM,
    2017.'
date_created: 2023-09-22T12:50:51Z
date_updated: 2024-06-05T13:12:56Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3133956.3133977
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'A Stitch in Time: Supporting Android Developers in Writing Secure Code'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47248'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Charles
  full_name: Weir, Charles
  last_name: Weir
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Acar Y, Stransky C, Wermke D, Weir C, Mazurek ML, Fahl S. Developers Need
    Support, Too: A Survey of Security Advice for Software Developers. In: <i>2017
    IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>'
  apa: 'Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., &#38; Fahl,
    S. (2017). Developers Need Support, Too: A Survey of Security Advice for Software
    Developers. <i>2017 IEEE Cybersecurity Development (SecDev)</i>. <a href="https://doi.org/10.1109/secdev.2017.17">https://doi.org/10.1109/secdev.2017.17</a>'
  bibtex: '@inproceedings{Acar_Stransky_Wermke_Weir_Mazurek_Fahl_2017, title={Developers
    Need Support, Too: A Survey of Security Advice for Software Developers}, DOI={<a
    href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>}, booktitle={2017
    IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin
    and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle
    L. and Fahl, Sascha}, year={2017} }'
  chicago: 'Acar, Yasemin, Christian Stransky, Dominik Wermke, Charles Weir, Michelle
    L. Mazurek, and Sascha Fahl. “Developers Need Support, Too: A Survey of Security
    Advice for Software Developers.” In <i>2017 IEEE Cybersecurity Development (SecDev)</i>.
    IEEE, 2017. <a href="https://doi.org/10.1109/secdev.2017.17">https://doi.org/10.1109/secdev.2017.17</a>.'
  ieee: 'Y. Acar, C. Stransky, D. Wermke, C. Weir, M. L. Mazurek, and S. Fahl, “Developers
    Need Support, Too: A Survey of Security Advice for Software Developers,” 2017,
    doi: <a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>.'
  mla: 'Acar, Yasemin, et al. “Developers Need Support, Too: A Survey of Security
    Advice for Software Developers.” <i>2017 IEEE Cybersecurity Development (SecDev)</i>,
    IEEE, 2017, doi:<a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>.'
  short: 'Y. Acar, C. Stransky, D. Wermke, C. Weir, M.L. Mazurek, S. Fahl, in: 2017
    IEEE Cybersecurity Development (SecDev), IEEE, 2017.'
date_created: 2023-09-22T12:50:12Z
date_updated: 2024-06-05T13:11:41Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/secdev.2017.17
extern: '1'
language:
- iso: eng
publication: 2017 IEEE Cybersecurity Development (SecDev)
publication_status: published
publisher: IEEE
status: public
title: 'Developers Need Support, Too: A Survey of Security Advice for Software Developers'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47242'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
citation:
  ama: 'Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research
    Agenda for Usable Security and Privacy Research Beyond End Users. In: <i>2016
    IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>'
  apa: 'Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). You are Not Your Developer,
    Either: A Research Agenda for Usable Security and Privacy Research Beyond End
    Users. <i>2016 IEEE Cybersecurity Development (SecDev)</i>. <a href="https://doi.org/10.1109/secdev.2016.013">https://doi.org/10.1109/secdev.2016.013</a>'
  bibtex: '@inproceedings{Acar_Fahl_Mazurek_2017, title={You are Not Your Developer,
    Either: A Research Agenda for Usable Security and Privacy Research Beyond End
    Users}, DOI={<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>},
    booktitle={2016 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar,
    Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }'
  chicago: 'Acar, Yasemin, Sascha Fahl, and Michelle L. Mazurek. “You Are Not Your
    Developer, Either: A Research Agenda for Usable Security and Privacy Research
    Beyond End Users.” In <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE,
    2017. <a href="https://doi.org/10.1109/secdev.2016.013">https://doi.org/10.1109/secdev.2016.013</a>.'
  ieee: 'Y. Acar, S. Fahl, and M. L. Mazurek, “You are Not Your Developer, Either:
    A Research Agenda for Usable Security and Privacy Research Beyond End Users,”
    2017, doi: <a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>.'
  mla: 'Acar, Yasemin, et al. “You Are Not Your Developer, Either: A Research Agenda
    for Usable Security and Privacy Research Beyond End Users.” <i>2016 IEEE Cybersecurity
    Development (SecDev)</i>, IEEE, 2017, doi:<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>.'
  short: 'Y. Acar, S. Fahl, M.L. Mazurek, in: 2016 IEEE Cybersecurity Development
    (SecDev), IEEE, 2017.'
date_created: 2023-09-22T12:42:23Z
date_updated: 2024-06-05T13:13:34Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/secdev.2016.013
extern: '1'
language:
- iso: eng
publication: 2016 IEEE Cybersecurity Development (SecDev)
publication_status: published
publisher: IEEE
status: public
title: 'You are Not Your Developer, Either: A Research Agenda for Usable Security
  and Privacy Research Beyond End Users'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47246'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Simson
  full_name: Garfinkel, Simson
  last_name: Garfinkel
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
citation:
  ama: 'Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic
    APIs. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017.
    doi:<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>'
  apa: Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., Mazurek, M. L., &#38;
    Stransky, C. (2017). Comparing the Usability of Cryptographic APIs. <i>2017 IEEE
    Symposium on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2017.52">https://doi.org/10.1109/sp.2017.52</a>
  bibtex: '@inproceedings{Acar_Backes_Fahl_Garfinkel_Kim_Mazurek_Stransky_2017, title={Comparing
    the Usability of Cryptographic APIs}, DOI={<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>},
    booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson
    and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017}
    }'
  chicago: Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim,
    Michelle L. Mazurek, and Christian Stransky. “Comparing the Usability of Cryptographic
    APIs.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017.
    <a href="https://doi.org/10.1109/sp.2017.52">https://doi.org/10.1109/sp.2017.52</a>.
  ieee: 'Y. Acar <i>et al.</i>, “Comparing the Usability of Cryptographic APIs,” 2017,
    doi: <a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>.'
  mla: Acar, Yasemin, et al. “Comparing the Usability of Cryptographic APIs.” <i>2017
    IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>.
  short: 'Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M.L. Mazurek, C. Stransky,
    in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.'
date_created: 2023-09-22T12:48:37Z
date_updated: 2024-06-05T13:14:03Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2017.52
extern: '1'
language:
- iso: eng
publication: 2017 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: Comparing the Usability of Cryptographic APIs
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47244'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies
    with GitHub Users: Exploring a Convenience Sample. In: <i>Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017</i>. USENIX Association; 2017:81–95.'
  apa: 'Acar, Y., Stransky, C., Wermke, D., Mazurek, M. L., &#38; Fahl, S. (2017).
    Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
    <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara,
    CA, USA, July 12-14, 2017</i>, 81–95.'
  bibtex: '@inproceedings{Acar_Stransky_Wermke_Mazurek_Fahl_2017, title={Security
    Developer Studies with GitHub Users: Exploring a Convenience Sample}, booktitle={Thirteenth
    Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July
    12-14, 2017}, publisher={USENIX Association}, author={Acar, Yasemin and Stransky,
    Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}, year={2017},
    pages={81–95} }'
  chicago: 'Acar, Yasemin, Christian Stransky, Dominik Wermke, Michelle L. Mazurek,
    and Sascha Fahl. “Security Developer Studies with GitHub Users: Exploring a Convenience
    Sample.” In <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017,
    Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95. USENIX Association, 2017.'
  ieee: 'Y. Acar, C. Stransky, D. Wermke, M. L. Mazurek, and S. Fahl, “Security Developer
    Studies with GitHub Users: Exploring a Convenience Sample,” in <i>Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017</i>, 2017, pp. 81–95.'
  mla: 'Acar, Yasemin, et al. “Security Developer Studies with GitHub Users: Exploring
    a Convenience Sample.” <i>Thirteenth Symposium on Usable Privacy and Security,
    SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, USENIX Association, 2017,
    pp. 81–95.'
  short: 'Y. Acar, C. Stransky, D. Wermke, M.L. Mazurek, S. Fahl, in: Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017, USENIX Association, 2017, pp. 81–95.'
date_created: 2023-09-22T12:45:33Z
date_updated: 2024-06-05T13:14:32Z
department:
- _id: '34'
- _id: '858'
extern: '1'
language:
- iso: eng
page: 81–95
publication: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa
  Clara, CA, USA, July 12-14, 2017
publisher: USENIX Association
status: public
title: 'Security Developer Studies with GitHub Users: Exploring a Convenience Sample'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47873'
author:
- first_name: Elissa M.
  full_name: Redmiles, Elissa M.
  last_name: Redmiles
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
citation:
  ama: Redmiles EM, Acar Y, Fahl S, Mazurek ML. <i>A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers</i>. University of Maryland
    Computer Science Department; 2017. doi:<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>
  apa: Redmiles, E. M., Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). <i>A Summary
    of Survey Methodology Best Practices for Security and Privacy Researchers</i>.
    University of Maryland Computer Science Department. <a href="https://doi.org/10.13016/M22K2W">https://doi.org/10.13016/M22K2W</a>
  bibtex: '@book{Redmiles_Acar_Fahl_Mazurek_2017, title={A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers}, DOI={<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>},
    publisher={University of Maryland Computer Science Department}, author={Redmiles,
    Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017}
    }'
  chicago: Redmiles, Elissa M., Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek.
    <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>.
    University of Maryland Computer Science Department, 2017. <a href="https://doi.org/10.13016/M22K2W">https://doi.org/10.13016/M22K2W</a>.
  ieee: E. M. Redmiles, Y. Acar, S. Fahl, and M. L. Mazurek, <i>A Summary of Survey
    Methodology Best Practices for Security and Privacy Researchers</i>. University
    of Maryland Computer Science Department, 2017.
  mla: Redmiles, Elissa M., et al. <i>A Summary of Survey Methodology Best Practices
    for Security and Privacy Researchers</i>. University of Maryland Computer Science
    Department, 2017, doi:<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>.
  short: E.M. Redmiles, Y. Acar, S. Fahl, M.L. Mazurek, A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers, University of Maryland Computer
    Science Department, 2017.
date_created: 2023-10-09T13:16:14Z
date_updated: 2024-06-05T13:10:02Z
department:
- _id: '34'
- _id: '858'
doi: 10.13016/M22K2W
extern: '1'
language:
- iso: eng
publisher: University of Maryland Computer Science Department
status: public
title: A Summary of Survey Methodology Best Practices for Security and Privacy Researchers
type: report
user_id: '14931'
year: '2017'
...
---
_id: '18'
abstract:
- lang: eng
  text: "Branch and bound (B&B) algorithms structure the search space as a tree and
    eliminate infeasible solutions early by pruning subtrees that cannot lead to a
    valid or optimal solution. Custom hardware designs significantly accelerate the
    execution of these algorithms. In this article, we demonstrate a high-performance
    B&B implementation on FPGAs. First, we identify general elements of B&B algorithms
    and describe their implementation as a finite state machine. Then, we introduce
    workers that autonomously cooperate using work stealing to allow parallel execution
    and full utilization of the target FPGA. Finally, we explore advantages of instance-specific
    designs that target a specific problem instance to improve performance.\r\n\r\nWe
    evaluate our concepts by applying them to a branch and bound problem, the reconstruction
    of corrupted AES keys obtained from cold-boot attacks. The evaluation shows that
    our work stealing approach is scalable with the available resources and provides
    speedups proportional to the number of workers. Instance-specific designs allow
    us to achieve an overall speedup of 47 × compared to the fastest implementation
    of AES key reconstruction so far. Finally, we demonstrate how instance-specific
    designs can be generated just-in-time such that the provided speedups outweigh
    the additional time required for design synthesis."
author:
- first_name: Heinrich
  full_name: Riebler, Heinrich
  id: '8961'
  last_name: Riebler
- first_name: Michael
  full_name: Lass, Michael
  id: '24135'
  last_name: Lass
  orcid: 0000-0002-5708-7632
- first_name: Robert
  full_name: Mittendorf, Robert
  last_name: Mittendorf
- first_name: Thomas
  full_name: Löcke, Thomas
  last_name: Löcke
- first_name: Christian
  full_name: Plessl, Christian
  id: '16153'
  last_name: Plessl
  orcid: 0000-0001-5728-9982
citation:
  ama: Riebler H, Lass M, Mittendorf R, Löcke T, Plessl C. Efficient Branch and Bound
    on FPGAs Using Work Stealing and Instance-Specific Designs. <i>ACM Transactions
    on Reconfigurable Technology and Systems (TRETS)</i>. 2017;10(3):24:1-24:23. doi:<a
    href="https://doi.org/10.1145/3053687">10.1145/3053687</a>
  apa: Riebler, H., Lass, M., Mittendorf, R., Löcke, T., &#38; Plessl, C. (2017).
    Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific
    Designs. <i>ACM Transactions on Reconfigurable Technology and Systems (TRETS)</i>,
    <i>10</i>(3), 24:1-24:23. <a href="https://doi.org/10.1145/3053687">https://doi.org/10.1145/3053687</a>
  bibtex: '@article{Riebler_Lass_Mittendorf_Löcke_Plessl_2017, title={Efficient Branch
    and Bound on FPGAs Using Work Stealing and Instance-Specific Designs}, volume={10},
    DOI={<a href="https://doi.org/10.1145/3053687">10.1145/3053687</a>}, number={3},
    journal={ACM Transactions on Reconfigurable Technology and Systems (TRETS)}, publisher={Association
    for Computing Machinery (ACM)}, author={Riebler, Heinrich and Lass, Michael and
    Mittendorf, Robert and Löcke, Thomas and Plessl, Christian}, year={2017}, pages={24:1-24:23}
    }'
  chicago: 'Riebler, Heinrich, Michael Lass, Robert Mittendorf, Thomas Löcke, and
    Christian Plessl. “Efficient Branch and Bound on FPGAs Using Work Stealing and
    Instance-Specific Designs.” <i>ACM Transactions on Reconfigurable Technology and
    Systems (TRETS)</i> 10, no. 3 (2017): 24:1-24:23. <a href="https://doi.org/10.1145/3053687">https://doi.org/10.1145/3053687</a>.'
  ieee: 'H. Riebler, M. Lass, R. Mittendorf, T. Löcke, and C. Plessl, “Efficient Branch
    and Bound on FPGAs Using Work Stealing and Instance-Specific Designs,” <i>ACM
    Transactions on Reconfigurable Technology and Systems (TRETS)</i>, vol. 10, no.
    3, p. 24:1-24:23, 2017, doi: <a href="https://doi.org/10.1145/3053687">10.1145/3053687</a>.'
  mla: Riebler, Heinrich, et al. “Efficient Branch and Bound on FPGAs Using Work Stealing
    and Instance-Specific Designs.” <i>ACM Transactions on Reconfigurable Technology
    and Systems (TRETS)</i>, vol. 10, no. 3, Association for Computing Machinery (ACM),
    2017, p. 24:1-24:23, doi:<a href="https://doi.org/10.1145/3053687">10.1145/3053687</a>.
  short: H. Riebler, M. Lass, R. Mittendorf, T. Löcke, C. Plessl, ACM Transactions
    on Reconfigurable Technology and Systems (TRETS) 10 (2017) 24:1-24:23.
date_created: 2017-07-25T14:17:32Z
date_updated: 2023-09-26T13:23:58Z
ddc:
- '000'
department:
- _id: '27'
- _id: '518'
doi: 10.1145/3053687
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T16:04:14Z
  date_updated: 2018-11-02T16:04:14Z
  file_id: '5322'
  file_name: a24-riebler.pdf
  file_size: 2131617
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T16:04:14Z
has_accepted_license: '1'
intvolume: '        10'
issue: '3'
keyword:
- coldboot
language:
- iso: eng
page: 24:1-24:23
project:
- _id: '1'
  grant_number: '160364472'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '14'
  grant_number: '160364472'
  name: SFB 901 - Subproject C2
- _id: '34'
  grant_number: '610996'
  name: Self-Adaptive Virtualisation-Aware High-Performance/Low-Energy Heterogeneous
    System Architectures
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: ACM Transactions on Reconfigurable Technology and Systems (TRETS)
publication_identifier:
  issn:
  - 1936-7406
publication_status: published
publisher: Association for Computing Machinery (ACM)
quality_controlled: '1'
status: public
title: Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific
  Designs
type: journal_article
user_id: '15278'
volume: 10
year: '2017'
...
---
_id: '1592'
abstract:
- lang: eng
  text: Compared to classical HDL designs, generating FPGA with high-level synthesis
    from an OpenCL specification promises easier exploration of different design alternatives
    and, through ready-to-use infrastructure and common abstractions for host and
    memory interfaces, easier portability between different FPGA families. In this
    work, we evaluate the extent of this promise. To this end, we present a parameterized
    FDTD implementation for photonic microcavity simulations. Our design can trade-off
    different forms of parallelism and works for two independent OpenCL-based FPGA
    design flows. Hence, we can target FPGAs from different vendors and different
    FPGA families. We describe how we used pre-processor macros to achieve this flexibility
    and to work around different shortcomings of the current tools. Choosing the right
    design configurations, we are able to present two extremely competitive solutions
    for very different FPGA targets, reaching up to 172 GFLOPS sustained performance.
    With the portability and flexibility demonstrated, code developers not only avoid
    vendor lock-in, but can even make best use of real trade-offs between different
    architectures.
author:
- first_name: Tobias
  full_name: Kenter, Tobias
  id: '3145'
  last_name: Kenter
- first_name: Jens
  full_name: Förstner, Jens
  id: '158'
  last_name: Förstner
  orcid: 0000-0001-7059-9862
- first_name: Christian
  full_name: Plessl, Christian
  id: '16153'
  last_name: Plessl
  orcid: 0000-0001-5728-9982
citation:
  ama: 'Kenter T, Förstner J, Plessl C. Flexible FPGA design for FDTD using OpenCL.
    In: <i>Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)</i>.
    IEEE; 2017. doi:<a href="https://doi.org/10.23919/FPL.2017.8056844">10.23919/FPL.2017.8056844</a>'
  apa: Kenter, T., Förstner, J., &#38; Plessl, C. (2017). Flexible FPGA design for
    FDTD using OpenCL. <i>Proc. Int. Conf. on Field Programmable Logic and Applications
    (FPL)</i>. <a href="https://doi.org/10.23919/FPL.2017.8056844">https://doi.org/10.23919/FPL.2017.8056844</a>
  bibtex: '@inproceedings{Kenter_Förstner_Plessl_2017, title={Flexible FPGA design
    for FDTD using OpenCL}, DOI={<a href="https://doi.org/10.23919/FPL.2017.8056844">10.23919/FPL.2017.8056844</a>},
    booktitle={Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)},
    publisher={IEEE}, author={Kenter, Tobias and Förstner, Jens and Plessl, Christian},
    year={2017} }'
  chicago: Kenter, Tobias, Jens Förstner, and Christian Plessl. “Flexible FPGA Design
    for FDTD Using OpenCL.” In <i>Proc. Int. Conf. on Field Programmable Logic and
    Applications (FPL)</i>. IEEE, 2017. <a href="https://doi.org/10.23919/FPL.2017.8056844">https://doi.org/10.23919/FPL.2017.8056844</a>.
  ieee: 'T. Kenter, J. Förstner, and C. Plessl, “Flexible FPGA design for FDTD using
    OpenCL,” 2017, doi: <a href="https://doi.org/10.23919/FPL.2017.8056844">10.23919/FPL.2017.8056844</a>.'
  mla: Kenter, Tobias, et al. “Flexible FPGA Design for FDTD Using OpenCL.” <i>Proc.
    Int. Conf. on Field Programmable Logic and Applications (FPL)</i>, IEEE, 2017,
    doi:<a href="https://doi.org/10.23919/FPL.2017.8056844">10.23919/FPL.2017.8056844</a>.
  short: 'T. Kenter, J. Förstner, C. Plessl, in: Proc. Int. Conf. on Field Programmable
    Logic and Applications (FPL), IEEE, 2017.'
date_created: 2018-03-22T11:10:23Z
date_updated: 2023-09-26T13:24:38Z
ddc:
- '000'
department:
- _id: '27'
- _id: '518'
- _id: '61'
doi: 10.23919/FPL.2017.8056844
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T15:02:28Z
  date_updated: 2018-11-02T15:02:28Z
  file_id: '5291'
  file_name: 08056844.pdf
  file_size: 230235
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T15:02:28Z
has_accepted_license: '1'
keyword:
- tet_topic_hpc
language:
- iso: eng
project:
- _id: '1'
  grant_number: '160364472'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '14'
  grant_number: '160364472'
  name: SFB 901 - Subproject C2
- _id: '33'
  grant_number: 01|H16005A
  name: HighPerMeshes
- _id: '32'
  grant_number: PL 595/2-1 / 320898746
  name: Performance and Efficiency in HPC with Custom Computing
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: Proc. Int. Conf. on Field Programmable Logic and Applications (FPL)
publisher: IEEE
quality_controlled: '1'
status: public
title: Flexible FPGA design for FDTD using OpenCL
type: conference
user_id: '15278'
year: '2017'
...
---
_id: '1589'
article_number: '082003'
author:
- first_name: Jörn
  full_name: Schumacher, Jörn
  last_name: Schumacher
- first_name: Christian
  full_name: Plessl, Christian
  id: '16153'
  last_name: Plessl
  orcid: 0000-0001-5728-9982
- first_name: Wainer
  full_name: Vandelli, Wainer
  last_name: Vandelli
citation:
  ama: 'Schumacher J, Plessl C, Vandelli W. High-Throughput and Low-Latency Network
    Communication with NetIO. <i>Journal of Physics: Conference Series</i>. 2017;898.
    doi:<a href="https://doi.org/10.1088/1742-6596/898/8/082003">10.1088/1742-6596/898/8/082003</a>'
  apa: 'Schumacher, J., Plessl, C., &#38; Vandelli, W. (2017). High-Throughput and
    Low-Latency Network Communication with NetIO. <i>Journal of Physics: Conference
    Series</i>, <i>898</i>, Article 082003. <a href="https://doi.org/10.1088/1742-6596/898/8/082003">https://doi.org/10.1088/1742-6596/898/8/082003</a>'
  bibtex: '@article{Schumacher_Plessl_Vandelli_2017, title={High-Throughput and Low-Latency
    Network Communication with NetIO}, volume={898}, DOI={<a href="https://doi.org/10.1088/1742-6596/898/8/082003">10.1088/1742-6596/898/8/082003</a>},
    number={082003}, journal={Journal of Physics: Conference Series}, publisher={IOP
    Publishing}, author={Schumacher, Jörn and Plessl, Christian and Vandelli, Wainer},
    year={2017} }'
  chicago: 'Schumacher, Jörn, Christian Plessl, and Wainer Vandelli. “High-Throughput
    and Low-Latency Network Communication with NetIO.” <i>Journal of Physics: Conference
    Series</i> 898 (2017). <a href="https://doi.org/10.1088/1742-6596/898/8/082003">https://doi.org/10.1088/1742-6596/898/8/082003</a>.'
  ieee: 'J. Schumacher, C. Plessl, and W. Vandelli, “High-Throughput and Low-Latency
    Network Communication with NetIO,” <i>Journal of Physics: Conference Series</i>,
    vol. 898, Art. no. 082003, 2017, doi: <a href="https://doi.org/10.1088/1742-6596/898/8/082003">10.1088/1742-6596/898/8/082003</a>.'
  mla: 'Schumacher, Jörn, et al. “High-Throughput and Low-Latency Network Communication
    with NetIO.” <i>Journal of Physics: Conference Series</i>, vol. 898, 082003, IOP
    Publishing, 2017, doi:<a href="https://doi.org/10.1088/1742-6596/898/8/082003">10.1088/1742-6596/898/8/082003</a>.'
  short: 'J. Schumacher, C. Plessl, W. Vandelli, Journal of Physics: Conference Series
    898 (2017).'
date_created: 2018-03-22T10:51:20Z
date_updated: 2023-09-26T13:24:19Z
department:
- _id: '27'
- _id: '518'
doi: 10.1088/1742-6596/898/8/082003
intvolume: '       898'
language:
- iso: eng
publication: 'Journal of Physics: Conference Series'
publisher: IOP Publishing
quality_controlled: '1'
status: public
title: High-Throughput and Low-Latency Network Communication with NetIO
type: journal_article
user_id: '15278'
volume: 898
year: '2017'
...
---
_id: '20555'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
citation:
  ama: 'Krüger S, Späth J, Ali K, Bodden E, Mezini M. <i>CrySL: Validating Correct
    Usage of Cryptographic APIs</i>.; 2017.'
  apa: 'Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2017). <i>CrySL:
    Validating Correct Usage of Cryptographic APIs</i>.'
  bibtex: '@book{Krüger_Späth_Ali_Bodden_Mezini_2017, title={CrySL: Validating Correct
    Usage of Cryptographic APIs}, author={Krüger, Stefan and Späth, Johannes and Ali,
    Karim and Bodden, Eric and Mezini, Mira}, year={2017} }'
  chicago: 'Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini.
    <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>, 2017.'
  ieee: 'S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, <i>CrySL: Validating
    Correct Usage of Cryptographic APIs</i>. 2017.'
  mla: 'Krüger, Stefan, et al. <i>CrySL: Validating Correct Usage of Cryptographic
    APIs</i>. 2017.'
  short: 'S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, CrySL: Validating Correct
    Usage of Cryptographic APIs, 2017.'
date_created: 2020-11-30T10:29:41Z
date_updated: 2026-02-19T14:39:50Z
department:
- _id: '76'
external_id:
  arxiv:
  - '1710.00564'
keyword:
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: https://arxiv.org/abs/1710.00564
status: public
title: 'CrySL: Validating Correct Usage of Cryptographic APIs'
type: report
user_id: '14972'
year: '2017'
...
---
_id: '57234'
author:
- first_name: Bianca
  full_name: Meise, Bianca
  last_name: Meise
- first_name: Franziska Margarete
  full_name: Schloots, Franziska Margarete
  id: '33185'
  last_name: Schloots
- first_name: Jörg
  full_name: Müller-Lietzkow, Jörg
  last_name: Müller-Lietzkow
- first_name: Dorothee M.
  full_name: Meister, Dorothee M.
  last_name: Meister
citation:
  ama: 'Meise B, Schloots FM, Müller-Lietzkow J, Meister DM. Interdisziplinäres Projektmanagement
    – Strategische Handlungsempfehlungen für Kooperationsverbünde in akademischen
    Kontexten. In: <i>Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung</i>.
    Springer Fachmedien Wiesbaden; 2017. doi:<a href="https://doi.org/10.1007/978-3-658-20265-1_18">10.1007/978-3-658-20265-1_18</a>'
  apa: Meise, B., Schloots, F. M., Müller-Lietzkow, J., &#38; Meister, D. M. (2017).
    Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für
    Kooperationsverbünde in akademischen Kontexten. In <i>Interdisziplinäre Perspektiven
    zur Zukunft der Wertschöpfung</i>. Springer Fachmedien Wiesbaden. <a href="https://doi.org/10.1007/978-3-658-20265-1_18">https://doi.org/10.1007/978-3-658-20265-1_18</a>
  bibtex: '@inbook{Meise_Schloots_Müller-Lietzkow_Meister_2017, place={Wiesbaden},
    title={Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen
    für Kooperationsverbünde in akademischen Kontexten}, DOI={<a href="https://doi.org/10.1007/978-3-658-20265-1_18">10.1007/978-3-658-20265-1_18</a>},
    booktitle={Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung}, publisher={Springer
    Fachmedien Wiesbaden}, author={Meise, Bianca and Schloots, Franziska Margarete
    and Müller-Lietzkow, Jörg and Meister, Dorothee M.}, year={2017} }'
  chicago: 'Meise, Bianca, Franziska Margarete Schloots, Jörg Müller-Lietzkow, and
    Dorothee M. Meister. “Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen
    für Kooperationsverbünde in akademischen Kontexten.” In <i>Interdisziplinäre Perspektiven
    zur Zukunft der Wertschöpfung</i>. Wiesbaden: Springer Fachmedien Wiesbaden, 2017.
    <a href="https://doi.org/10.1007/978-3-658-20265-1_18">https://doi.org/10.1007/978-3-658-20265-1_18</a>.'
  ieee: 'B. Meise, F. M. Schloots, J. Müller-Lietzkow, and D. M. Meister, “Interdisziplinäres
    Projektmanagement – Strategische Handlungsempfehlungen für Kooperationsverbünde
    in akademischen Kontexten,” in <i>Interdisziplinäre Perspektiven zur Zukunft der
    Wertschöpfung</i>, Wiesbaden: Springer Fachmedien Wiesbaden, 2017.'
  mla: Meise, Bianca, et al. “Interdisziplinäres Projektmanagement – Strategische
    Handlungsempfehlungen für Kooperationsverbünde in akademischen Kontexten.” <i>Interdisziplinäre
    Perspektiven zur Zukunft der Wertschöpfung</i>, Springer Fachmedien Wiesbaden,
    2017, doi:<a href="https://doi.org/10.1007/978-3-658-20265-1_18">10.1007/978-3-658-20265-1_18</a>.
  short: 'B. Meise, F.M. Schloots, J. Müller-Lietzkow, D.M. Meister, in: Interdisziplinäre
    Perspektiven zur Zukunft der Wertschöpfung, Springer Fachmedien Wiesbaden, Wiesbaden,
    2017.'
date_created: 2024-11-19T11:30:16Z
date_updated: 2024-11-19T11:31:51Z
department:
- _id: '574'
doi: 10.1007/978-3-658-20265-1_18
language:
- iso: ger
place: Wiesbaden
publication: Interdisziplinäre Perspektiven zur Zukunft der Wertschöpfung
publication_identifier:
  isbn:
  - '9783658202644'
  - '9783658202651'
publication_status: published
publisher: Springer Fachmedien Wiesbaden
status: public
title: Interdisziplinäres Projektmanagement – Strategische Handlungsempfehlungen für
  Kooperationsverbünde in akademischen Kontexten
type: book_chapter
user_id: '33185'
year: '2017'
...
---
_id: '25068'
author:
- first_name: Peer
  full_name: Adelt, Peer
  id: '5603'
  last_name: Adelt
- first_name: Bastian
  full_name: Koppelmann, Bastian
  id: '25260'
  last_name: Koppelmann
- first_name: Wolfgang
  full_name: Müller, Wolfgang
  id: '16243'
  last_name: Müller
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
- first_name: J. Christoph
  full_name: Scheytt, J. Christoph
  id: '37144'
  last_name: Scheytt
  orcid: '0000-0002-5950-6618 '
citation:
  ama: 'Adelt P, Koppelmann B, Müller W, Kleinjohann B, Scheytt JC. ANALISA - A Tool
    for Static Instruction Set Analysis. In: University Booth Interactive Presentation,
    ed. <i>Design Automation and Testing in Europe (DATE)</i>. ; 2017.'
  apa: Adelt, P., Koppelmann, B., Müller, W., Kleinjohann, B., &#38; Scheytt, J. C.
    (2017). ANALISA - A Tool for Static Instruction Set Analysis. In University Booth
    Interactive Presentation (Ed.), <i>Design Automation and Testing in Europe (DATE)</i>.
  bibtex: '@inproceedings{Adelt_Koppelmann_Müller_Kleinjohann_Scheytt_2017, title={ANALISA
    - A Tool for Static Instruction Set Analysis}, booktitle={Design Automation and
    Testing in Europe (DATE)}, author={Adelt, Peer and Koppelmann, Bastian and Müller,
    Wolfgang and Kleinjohann, Bernd and Scheytt, J. Christoph}, editor={University
    Booth Interactive Presentation}, year={2017} }'
  chicago: Adelt, Peer, Bastian Koppelmann, Wolfgang Müller, Bernd Kleinjohann, and
    J. Christoph Scheytt. “ANALISA - A Tool for Static Instruction Set Analysis.”
    In <i>Design Automation and Testing in Europe (DATE)</i>, edited by University
    Booth Interactive Presentation, 2017.
  ieee: P. Adelt, B. Koppelmann, W. Müller, B. Kleinjohann, and J. C. Scheytt, “ANALISA
    - A Tool for Static Instruction Set Analysis,” in <i>Design Automation and Testing
    in Europe (DATE)</i>, Lausanne, CH, Mrz. 2017, 2017.
  mla: Adelt, Peer, et al. “ANALISA - A Tool for Static Instruction Set Analysis.”
    <i>Design Automation and Testing in Europe (DATE)</i>, edited by University Booth
    Interactive Presentation, 2017.
  short: 'P. Adelt, B. Koppelmann, W. Müller, B. Kleinjohann, J.C. Scheytt, in: University
    Booth Interactive Presentation (Ed.), Design Automation and Testing in Europe
    (DATE), 2017.'
conference:
  location: Lausanne, CH, Mrz. 2017
corporate_editor:
- University Booth Interactive Presentation
date_created: 2021-09-28T11:08:16Z
date_updated: 2025-02-26T14:45:09Z
department:
- _id: '70'
language:
- iso: eng
publication: Design Automation and Testing in Europe (DATE)
status: public
title: ANALISA - A Tool for Static Instruction Set Analysis
type: conference
user_id: '5603'
year: '2017'
...
---
_id: '25069'
author:
- first_name: Peer
  full_name: Adelt, Peer
  id: '5603'
  last_name: Adelt
- first_name: Bastian
  full_name: Koppelmann, Bastian
  id: '25260'
  last_name: Koppelmann
- first_name: Wolfgang
  full_name: Müller, Wolfgang
  id: '16243'
  last_name: Müller
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
- first_name: J. Christoph
  full_name: Scheytt, J. Christoph
  id: '37144'
  last_name: Scheytt
  orcid: '0000-0002-5950-6618 '
citation:
  ama: 'Adelt P, Koppelmann B, Müller W, Kleinjohann B, Scheytt JC. ANALISA - A Tool
    for Static Instruction Set Analysis. In: University Booth Interactive Presentation,
    ed. <i>Design Automation and Testing in Europe (DATE)</i>. ; 2017.'
  apa: Adelt, P., Koppelmann, B., Müller, W., Kleinjohann, B., &#38; Scheytt, J. C.
    (2017). ANALISA - A Tool for Static Instruction Set Analysis. In University Booth
    Interactive Presentation (Ed.), <i>Design Automation and Testing in Europe (DATE)</i>.
  bibtex: '@inproceedings{Adelt_Koppelmann_Müller_Kleinjohann_Scheytt_2017, title={ANALISA
    - A Tool for Static Instruction Set Analysis}, booktitle={Design Automation and
    Testing in Europe (DATE)}, author={Adelt, Peer and Koppelmann, Bastian and Müller,
    Wolfgang and Kleinjohann, Bernd and Scheytt, J. Christoph}, editor={University
    Booth Interactive Presentation}, year={2017} }'
  chicago: Adelt, Peer, Bastian Koppelmann, Wolfgang Müller, Bernd Kleinjohann, and
    J. Christoph Scheytt. “ANALISA - A Tool for Static Instruction Set Analysis.”
    In <i>Design Automation and Testing in Europe (DATE)</i>, edited by University
    Booth Interactive Presentation, 2017.
  ieee: P. Adelt, B. Koppelmann, W. Müller, B. Kleinjohann, and J. C. Scheytt, “ANALISA
    - A Tool for Static Instruction Set Analysis,” in <i>Design Automation and Testing
    in Europe (DATE)</i>, Lausanne, CH, Mrz. 2017, 2017.
  mla: Adelt, Peer, et al. “ANALISA - A Tool for Static Instruction Set Analysis.”
    <i>Design Automation and Testing in Europe (DATE)</i>, edited by University Booth
    Interactive Presentation, 2017.
  short: 'P. Adelt, B. Koppelmann, W. Müller, B. Kleinjohann, J.C. Scheytt, in: University
    Booth Interactive Presentation (Ed.), Design Automation and Testing in Europe
    (DATE), 2017.'
conference:
  location: Lausanne, CH, Mrz. 2017
corporate_editor:
- University Booth Interactive Presentation
date_created: 2021-09-28T11:12:00Z
date_updated: 2025-02-26T14:45:23Z
department:
- _id: '672'
language:
- iso: eng
publication: Design Automation and Testing in Europe (DATE)
status: public
title: ANALISA - A Tool for Static Instruction Set Analysis
type: conference
user_id: '5603'
year: '2017'
...
