---
_id: '2917'
author:
- first_name: Jakob
  full_name: Juhnke, Jakob
  id: '48090'
  last_name: Juhnke
- first_name: Hanno
  full_name: Lefmann, Hanno
  last_name: Lefmann
- first_name: Volker
  full_name: Strehl, Volker
  last_name: Strehl
citation:
  ama: Juhnke J, Lefmann H, Strehl V. <i>An Approach for Determining Optimal Contrast
    in Visual Cryptography</i>. Fortschritt-Berichte VDI; 2013.
  apa: Juhnke, J., Lefmann, H., &#38; Strehl, V. (2013). <i>An Approach for Determining
    Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI.
  bibtex: '@book{Juhnke_Lefmann_Strehl_2013, title={An Approach for Determining Optimal
    Contrast in Visual Cryptography}, publisher={Fortschritt-Berichte VDI}, author={Juhnke,
    Jakob and Lefmann, Hanno and Strehl, Volker}, year={2013} }'
  chicago: Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. <i>An Approach for Determining
    Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  ieee: J. Juhnke, H. Lefmann, and V. Strehl, <i>An Approach for Determining Optimal
    Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  mla: Juhnke, Jakob, et al. <i>An Approach for Determining Optimal Contrast in Visual
    Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  short: J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast
    in Visual Cryptography, Fortschritt-Berichte VDI, 2013.
date_created: 2018-05-25T11:42:38Z
date_updated: 2022-01-06T06:58:47Z
department:
- _id: '64'
extern: '1'
publisher: Fortschritt-Berichte VDI
status: public
title: An Approach for Determining Optimal Contrast in Visual Cryptography
type: report
user_id: '48090'
year: '2013'
...
---
_id: '2979'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: 'Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based
    Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>.
    Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>'
  apa: 'Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks
    on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure
    Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-642-40026-1_10">https://doi.org/10.1007/978-3-642-40026-1_10</a>'
  bibtex: '@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved
    Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>},
    booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer
    Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij},
    year={2013}, pages={154–168} }'
  chicago: 'Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel
    Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis
    and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg,
    2013. <a href="https://doi.org/10.1007/978-3-642-40026-1_10">https://doi.org/10.1007/978-3-642-40026-1_10</a>.'
  ieee: 'J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing
    Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>,
    Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.'
  mla: Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.”
    <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg,
    2013, pp. 154–68, doi:<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>.
  short: 'J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis
    and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.'
date_created: 2018-06-05T07:33:22Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-642-40026-1_10
page: 154-168
place: Berlin, Heidelberg
publication: Constructive Side-Channel Analysis and Secure Design
publication_identifier:
  isbn:
  - '9783642400254'
  - '9783642400261'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Improved Side Channel Attacks on Pairing Based Cryptography
type: book_chapter
user_id: '25078'
year: '2013'
...
---
_id: '3129'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic
    Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>
  apa: Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href="https://doi.org/10.1007/s00145-012-9120-y">https://doi.org/10.1007/s00145-012-9120-y</a>
  bibtex: '@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model}, DOI={<a href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>},
    number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg},
    year={2013}, pages={225--245} }'
  chicago: 'Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href="https://doi.org/10.1007/s00145-012-9120-y">https://doi.org/10.1007/s00145-012-9120-y</a>.'
  ieee: T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in
    the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.
  mla: Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a
    href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>.
  short: T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.
date_created: 2018-06-07T09:22:18Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/s00145-012-9120-y
extern: '1'
issue: '2'
page: 225--245
publication: J. Cryptology
status: public
title: On the Analysis of Cryptographic Assumptions in the Generic Ring Model
type: journal_article
user_id: '38235'
year: '2013'
...
---
_id: '3130'
author:
- first_name: Florian
  full_name: Böhl, Florian
  last_name: Böhl
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jessica
  full_name: Koch, Jessica
  last_name: Koch
- first_name: Jae
  full_name: Hong Seo, Jae
  last_name: Hong Seo
- first_name: Christoph
  full_name: Striecks, Christoph
  last_name: Striecks
citation:
  ama: 'Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures
    from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd
    Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485.
    doi:<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>'
  apa: Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks,
    C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology
    - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications
    of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>
    (pp. 461--485). <a href="https://doi.org/10.1007/978-3-642-38348-9_28">https://doi.org/10.1007/978-3-642-38348-9_28</a>
  bibtex: '@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical
    Signatures from Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Athens,
    Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis
    and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph},
    year={2013}, pages={461--485} }'
  chicago: Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo,
    and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings</i>, 461--485, 2013. <a href="https://doi.org/10.1007/978-3-642-38348-9_28">https://doi.org/10.1007/978-3-642-38348-9_28</a>.
  ieee: F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical
    Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT
    2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.
  mla: Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings</i>, 2013, pp. 461--485, doi:<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>.
  short: 'F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings, 2013, pp. 461--485.'
date_created: 2018-06-07T09:22:39Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-38348-9_28
extern: '1'
page: 461--485
publication: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May
  26-30, 2013. Proceedings
status: public
title: Practical Signatures from Standard Assumptions
type: conference
user_id: '38235'
year: '2013'
...
---
_id: '3131'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Kenneth G.
  full_name: Paterson, Kenneth G.
  last_name: Paterson
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility
    Attacks on State-of-the-Art Cryptography. In: <i>20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013</i>. ; 2013.'
  apa: 'Jager, T., Paterson, K. G., &#38; Somorovsky, J. (2013). One Bad Apple: Backwards
    Compatibility Attacks on State-of-the-Art Cryptography. In <i>20th Annual Network
    and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA,
    February 24-27, 2013</i>.'
  bibtex: '@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards
    Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual
    Network and Distributed System Security Symposium, NDSS 2013, San Diego, California,
    USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and
    Somorovsky, Juraj}, year={2013} }'
  chicago: 'Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple:
    Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In <i>20th
    Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego,
    California, USA, February 24-27, 2013</i>, 2013.'
  ieee: 'T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility
    Attacks on State-of-the-Art Cryptography,” in <i>20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013</i>, 2013.'
  mla: 'Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art
    Cryptography.” <i>20th Annual Network and Distributed System Security Symposium,
    NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.'
  short: 'T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013, 2013.'
date_created: 2018-06-07T09:23:49Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
extern: '1'
publication: 20th Annual Network and Distributed System Security Symposium, NDSS 2013,
  San Diego, California, USA, February 24-27, 2013
status: public
title: 'One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography'
type: conference
user_id: '38235'
year: '2013'
...
---
_id: '3176'
author:
- first_name: Tobias
  full_name: Isenberg, Tobias
  last_name: Isenberg
- first_name: Dominik
  full_name: Steenken, Dominik
  last_name: Steenken
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation
    Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. <i>Formal Techniques for
    Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE}
    2013, Held as Part of the 8th International Federated Conference on Distributed
    Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>.
    Lecture Notes in Computer Science. ; 2013:178--192. doi:<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>'
  apa: Isenberg, T., Steenken, D., &#38; Wehrheim, H. (2013). Bounded Model Checking
    of Graph Transformation Systems via {SMT} Solving. In D. Beyer &#38; M. Boreale
    (Eds.), <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings</i> (pp. 178--192). <a href="https://doi.org/10.1007/978-3-642-38592-6_13">https://doi.org/10.1007/978-3-642-38592-6_13</a>
  bibtex: '@inproceedings{Isenberg_Steenken_Wehrheim_2013, series={Lecture Notes in
    Computer Science}, title={Bounded Model Checking of Graph Transformation Systems
    via {SMT} Solving}, DOI={<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>},
    booktitle={Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings}, author={Isenberg, Tobias and Steenken, Dominik and
    Wehrheim, Heike}, editor={Beyer, Dirk and Boreale, MicheleEditors}, year={2013},
    pages={178--192}, collection={Lecture Notes in Computer Science} }'
  chicago: Isenberg, Tobias, Dominik Steenken, and Heike Wehrheim. “Bounded Model
    Checking of Graph Transformation Systems via {SMT} Solving.” In <i>Formal Techniques
    for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE}
    2013, Held as Part of the 8th International Federated Conference on Distributed
    Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>,
    edited by Dirk Beyer and Michele Boreale, 178--192. Lecture Notes in Computer
    Science, 2013. <a href="https://doi.org/10.1007/978-3-642-38592-6_13">https://doi.org/10.1007/978-3-642-38592-6_13</a>.
  ieee: T. Isenberg, D. Steenken, and H. Wehrheim, “Bounded Model Checking of Graph
    Transformation Systems via {SMT} Solving,” in <i>Formal Techniques for Distributed
    Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013,
    Held as Part of the 8th International Federated Conference on Distributed Computing
    Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, 2013,
    pp. 178--192.
  mla: Isenberg, Tobias, et al. “Bounded Model Checking of Graph Transformation Systems
    via {SMT} Solving.” <i>Formal Techniques for Distributed Systems - Joint {IFIP}
    {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th
    International Federated Conference on Distributed Computing Techniques, DisCoTec
    2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and
    Michele Boreale, 2013, pp. 178--192, doi:<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>.
  short: 'T. Isenberg, D. Steenken, H. Wehrheim, in: D. Beyer, M. Boreale (Eds.),
    Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings, 2013, pp. 178--192.'
date_created: 2018-06-13T08:08:39Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-642-38592-6_13
editor:
- first_name: Dirk
  full_name: Beyer, Dirk
  last_name: Beyer
- first_name: Michele
  full_name: Boreale, Michele
  last_name: Boreale
page: 178--192
publication: Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
  Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
  Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
  June 3-5, 2013. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Bounded Model Checking of Graph Transformation Systems via {SMT} Solving
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3177'
author:
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: Annika
  full_name: Mütze, Annika
  last_name: Mütze
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under
    Weak Memory Models. In: Bertacco V, Legay A, eds. <i>Hardware and Software: Verification
    and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa,
    Israel, November 5-7, 2013, Proceedings</i>. Lecture Notes in Computer Science.
    ; 2013:311--326. doi:<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>'
  apa: 'Travkin, O., Mütze, A., &#38; Wehrheim, H. (2013). {SPIN} as a Linearizability
    Checker under Weak Memory Models. In V. Bertacco &#38; A. Legay (Eds.), <i>Hardware
    and Software: Verification and Testing - 9th International Haifa Verification
    Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i> (pp.
    311--326). <a href="https://doi.org/10.1007/978-3-319-03077-7_21">https://doi.org/10.1007/978-3-319-03077-7_21</a>'
  bibtex: '@inproceedings{Travkin_Mütze_Wehrheim_2013, series={Lecture Notes in Computer
    Science}, title={{SPIN} as a Linearizability Checker under Weak Memory Models},
    DOI={<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>},
    booktitle={Hardware and Software: Verification and Testing - 9th International
    Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013,
    Proceedings}, author={Travkin, Oleg and Mütze, Annika and Wehrheim, Heike}, editor={Bertacco,
    Valeria and Legay, AxelEditors}, year={2013}, pages={311--326}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Travkin, Oleg, Annika Mütze, and Heike Wehrheim. “{SPIN} as a Linearizability
    Checker under Weak Memory Models.” In <i>Hardware and Software: Verification and
    Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa,
    Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel
    Legay, 311--326. Lecture Notes in Computer Science, 2013. <a href="https://doi.org/10.1007/978-3-319-03077-7_21">https://doi.org/10.1007/978-3-319-03077-7_21</a>.'
  ieee: 'O. Travkin, A. Mütze, and H. Wehrheim, “{SPIN} as a Linearizability Checker
    under Weak Memory Models,” in <i>Hardware and Software: Verification and Testing
    - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel,
    November 5-7, 2013, Proceedings</i>, 2013, pp. 311--326.'
  mla: 'Travkin, Oleg, et al. “{SPIN} as a Linearizability Checker under Weak Memory
    Models.” <i>Hardware and Software: Verification and Testing - 9th International
    Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013,
    Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 2013, pp. 311--326,
    doi:<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>.'
  short: 'O. Travkin, A. Mütze, H. Wehrheim, in: V. Bertacco, A. Legay (Eds.), Hardware
    and Software: Verification and Testing - 9th International Haifa Verification
    Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013,
    pp. 311--326.'
date_created: 2018-06-13T08:09:44Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-319-03077-7_21
editor:
- first_name: Valeria
  full_name: Bertacco, Valeria
  last_name: Bertacco
- first_name: Axel
  full_name: Legay, Axel
  last_name: Legay
page: 311--326
publication: 'Hardware and Software: Verification and Testing - 9th International
  Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: '{SPIN} as a Linearizability Checker under Weak Memory Models'
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3178'
author:
- first_name: Brijesh
  full_name: Dongol, Brijesh
  last_name: Dongol
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Dongol B, Travkin O, Derrick J, Wehrheim H. A High-Level Semantics for Program
    Execution under Total Store Order Memory. In: Liu Z, Woodcock J, Zhu H, eds. <i>Theoretical
    Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai,
    China, September 4-6, 2013. Proceedings</i>. Lecture Notes in Computer Science.
    ; 2013:177--194. doi:<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>'
  apa: Dongol, B., Travkin, O., Derrick, J., &#38; Wehrheim, H. (2013). A High-Level
    Semantics for Program Execution under Total Store Order Memory. In Z. Liu, J.
    Woodcock, &#38; H. Zhu (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2013
    - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>
    (pp. 177--194). <a href="https://doi.org/10.1007/978-3-642-39718-9_11">https://doi.org/10.1007/978-3-642-39718-9_11</a>
  bibtex: '@inproceedings{Dongol_Travkin_Derrick_Wehrheim_2013, series={Lecture Notes
    in Computer Science}, title={A High-Level Semantics for Program Execution under
    Total Store Order Memory}, DOI={<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>},
    booktitle={Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
    Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, author={Dongol,
    Brijesh and Travkin, Oleg and Derrick, John and Wehrheim, Heike}, editor={Liu,
    Zhiming and Woodcock, Jim and Zhu, HuibiaoEditors}, year={2013}, pages={177--194},
    collection={Lecture Notes in Computer Science} }'
  chicago: Dongol, Brijesh, Oleg Travkin, John Derrick, and Heike Wehrheim. “A High-Level
    Semantics for Program Execution under Total Store Order Memory.” In <i>Theoretical
    Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai,
    China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu, Jim Woodcock,
    and Huibiao Zhu, 177--194. Lecture Notes in Computer Science, 2013. <a href="https://doi.org/10.1007/978-3-642-39718-9_11">https://doi.org/10.1007/978-3-642-39718-9_11</a>.
  ieee: B. Dongol, O. Travkin, J. Derrick, and H. Wehrheim, “A High-Level Semantics
    for Program Execution under Total Store Order Memory,” in <i>Theoretical Aspects
    of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China,
    September 4-6, 2013. Proceedings</i>, 2013, pp. 177--194.
  mla: Dongol, Brijesh, et al. “A High-Level Semantics for Program Execution under
    Total Store Order Memory.” <i>Theoretical Aspects of Computing - {ICTAC} 2013
    - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>,
    edited by Zhiming Liu et al., 2013, pp. 177--194, doi:<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>.
  short: 'B. Dongol, O. Travkin, J. Derrick, H. Wehrheim, in: Z. Liu, J. Woodcock,
    H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
    Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194.'
date_created: 2018-06-13T08:13:31Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-642-39718-9_11
editor:
- first_name: Zhiming
  full_name: Liu, Zhiming
  last_name: Liu
- first_name: Jim
  full_name: Woodcock, Jim
  last_name: Woodcock
- first_name: Huibiao
  full_name: Zhu, Huibiao
  last_name: Zhu
page: 177--194
publication: Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
  Colloquium, Shanghai, China, September 4-6, 2013. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: A High-Level Semantics for Program Execution under Total Store Order Memory
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3179'
author:
- first_name: Steffen
  full_name: Ziegert, Steffen
  last_name: Ziegert
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Ziegert S, Wehrheim H. Temporal Reconfiguration Plans for Self-Adaptive Systems.
    In: Kowalewski S, Rumpe B, eds. <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>. {LNI}. ; 2013:271--284.'
  apa: 'Ziegert, S., &#38; Wehrheim, H. (2013). Temporal Reconfiguration Plans for
    Self-Adaptive Systems. In S. Kowalewski &#38; B. Rumpe (Eds.), <i>Software Engineering
    2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz
    2013 in Aachen</i> (pp. 271--284).'
  bibtex: '@inproceedings{Ziegert_Wehrheim_2013, series={{LNI}}, title={Temporal Reconfiguration
    Plans for Self-Adaptive Systems}, booktitle={Software Engineering 2013: Fachtagung
    des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen},
    author={Ziegert, Steffen and Wehrheim, Heike}, editor={Kowalewski, Stefan and
    Rumpe, BernhardEditors}, year={2013}, pages={271--284}, collection={{LNI}} }'
  chicago: 'Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans
    for Self-Adaptive Systems.” In <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, edited by Stefan
    Kowalewski and Bernhard Rumpe, 271--284. {LNI}, 2013.'
  ieee: 'S. Ziegert and H. Wehrheim, “Temporal Reconfiguration Plans for Self-Adaptive
    Systems,” in <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik,
    26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, 2013, pp. 271--284.'
  mla: 'Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for
    Self-Adaptive Systems.” <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, edited by Stefan
    Kowalewski and Bernhard Rumpe, 2013, pp. 271--284.'
  short: 'S. Ziegert, H. Wehrheim, in: S. Kowalewski, B. Rumpe (Eds.), Software Engineering
    2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz
    2013 in Aachen, 2013, pp. 271--284.'
date_created: 2018-06-13T08:15:08Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
editor:
- first_name: Stefan
  full_name: Kowalewski, Stefan
  last_name: Kowalewski
- first_name: Bernhard
  full_name: Rumpe, Bernhard
  last_name: Rumpe
page: 271--284
publication: 'Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik,
  26. Februar - 2. M{\"{a}}rz 2013 in Aachen'
series_title: '{LNI}'
status: public
title: Temporal Reconfiguration Plans for Self-Adaptive Systems
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '27054'
author:
- first_name: Jürgen
  full_name: Gausemeier, Jürgen
  last_name: Gausemeier
- first_name: Michael
  full_name: Grafe, Michael
  last_name: Grafe
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
citation:
  ama: 'Gausemeier J, Grafe M, Meyer auf der Heide F. 11. Paderborner Workshop Augmented
    &#38; Virtual Reality in der Produktentstehung. In: Vol 311. Verlagsschriftenreihe
    des Heinz Nixdorf Instituts, Paderborn, Band 311 ; 2013.'
  apa: Gausemeier, J., Grafe, M., &#38; Meyer auf der Heide, F. (2013). <i>11. Paderborner
    Workshop Augmented &#38; Virtual Reality in der Produktentstehung</i>. <i>311</i>.
  bibtex: '@inproceedings{Gausemeier_Grafe_Meyer auf der Heide_2013, title={11. Paderborner
    Workshop Augmented &#38; Virtual Reality in der Produktentstehung}, volume={311},
    publisher={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band
    311 }, author={Gausemeier, Jürgen and Grafe, Michael and Meyer auf der Heide,
    Friedhelm}, year={2013} }'
  chicago: Gausemeier, Jürgen, Michael Grafe, and Friedhelm Meyer auf der Heide. “11.
    Paderborner Workshop Augmented &#38; Virtual Reality in Der Produktentstehung,”
    Vol. 311. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311
    , 2013.
  ieee: J. Gausemeier, M. Grafe, and F. Meyer auf der Heide, “11. Paderborner Workshop
    Augmented &#38; Virtual Reality in der Produktentstehung,” 2013, vol. 311.
  mla: Gausemeier, Jürgen, et al. <i>11. Paderborner Workshop Augmented &#38; Virtual
    Reality in Der Produktentstehung</i>. Verlagsschriftenreihe des Heinz Nixdorf
    Instituts, Paderborn, Band 311 , 2013.
  short: 'J. Gausemeier, M. Grafe, F. Meyer auf der Heide, in: Verlagsschriftenreihe
    des Heinz Nixdorf Instituts, Paderborn, Band 311 , 2013.'
conference:
  name: 18. - 19. Apr. 2013, Heinz Nixdorf Institut
date_created: 2021-11-02T10:53:04Z
date_updated: 2022-01-06T06:57:33Z
department:
- _id: '672'
intvolume: '       311'
language:
- iso: eng
publisher: 'Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 '
status: public
title: 11. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung
type: conference
user_id: '21240'
volume: 311
year: '2013'
...
---
_id: '27168'
author:
- first_name: Reinhard
  full_name: Keil, Reinhard
  last_name: Keil
- first_name: Felix
  full_name: Winkelnkemper, Felix
  id: '3117'
  last_name: Winkelnkemper
citation:
  ama: 'Keil R, Winkelnkemper F. Approaches for an informational separation of powers
    in learning platforms. In: Society for Informatics; 2013:131-142.'
  apa: Keil, R., &#38; Winkelnkemper, F. (2013). <i>Approaches for an informational
    separation of powers in learning platforms</i>. 131–142.
  bibtex: '@inproceedings{Keil_Winkelnkemper_2013, title={Approaches for an informational
    separation of powers in learning platforms}, publisher={Society for Informatics},
    author={Keil, Reinhard and Winkelnkemper, Felix}, year={2013}, pages={131–142}
    }'
  chicago: Keil, Reinhard, and Felix Winkelnkemper. “Approaches for an Informational
    Separation of Powers in Learning Platforms,” 131–42. Society for Informatics,
    2013.
  ieee: R. Keil and F. Winkelnkemper, “Approaches for an informational separation
    of powers in learning platforms,” 2013, pp. 131–142.
  mla: Keil, Reinhard, and Felix Winkelnkemper. <i>Approaches for an Informational
    Separation of Powers in Learning Platforms</i>. Society for Informatics, 2013,
    pp. 131–42.
  short: 'R. Keil, F. Winkelnkemper, in: Society for Informatics, 2013, pp. 131–142.'
conference:
  end_date: 2013-09-11
  name: ' DeLFI 2013 - The 11th e-Learning Conference Computer Science,'
  start_date: 2013-09-08
date_created: 2021-11-05T23:26:32Z
date_updated: 2022-01-06T06:57:35Z
department:
- _id: '71'
language:
- iso: eng
page: 131-142
publication_status: published
publisher: Society for Informatics
status: public
title: Approaches for an informational separation of powers in learning platforms
type: conference
user_id: '71124'
year: '2013'
...
---
_id: '27169'
author:
- first_name: Holger Gerhard
  full_name: Fischer, Holger Gerhard
  id: '30457'
  last_name: Fischer
- first_name: Thomas
  full_name: Geis, Thomas
  last_name: Geis
- first_name: Rolf
  full_name: ' Molich, Rolf'
  last_name: ' Molich'
- first_name: 'Oliver '
  full_name: 'Kluge, Oliver '
  last_name: Kluge
- first_name: ' R{\"u}diger'
  full_name: Heimg{\"a}rtner,  R{\"u}diger
  last_name: Heimg{\"a}rtner
- first_name: ' Peter '
  full_name: 'Hunkirchen,  Peter '
  last_name: Hunkirchen
- first_name: Knut
  full_name: Polkehn, Knut
  last_name: Polkehn
citation:
  ama: 'Fischer HG, Geis T,  Molich R, et al. „Do You Speak Usability?“ – Aktueller
    Stand des Glossars und des Curriculums f{\"u}r den „Certified Professional for
    Usability and User Experience (CPUX)“ der German UPA. In: German UPA; 2013:28-34.'
  apa: Fischer, H. G., Geis, T.,  Molich, R., Kluge, O., Heimg{\"a}rtner,  R{\"u}diger,
    Hunkirchen,  Peter , &#38; Polkehn, K. (2013). <i>„Do You Speak Usability?“ –
    Aktueller Stand des Glossars und des Curriculums f{\"u}r den „Certified Professional
    for Usability and User Experience (CPUX)“ der German UPA</i>. 28–34.
  bibtex: '@inproceedings{Fischer_Geis_ Molich_Kluge_Heimg{\"a}rtner_Hunkirchen_Polkehn_2013,
    title={„Do You Speak Usability?“ – Aktueller Stand des Glossars und des Curriculums
    f{\"u}r den „Certified Professional for Usability and User Experience (CPUX)“
    der German UPA}, publisher={German UPA}, author={Fischer, Holger Gerhard and Geis,
    Thomas and  Molich, Rolf and Kluge, Oliver  and Heimg{\"a}rtner,  R{\"u}diger
    and Hunkirchen,  Peter  and Polkehn, Knut}, year={2013}, pages={28–34} }'
  chicago: Fischer, Holger Gerhard, Thomas Geis, Rolf  Molich, Oliver  Kluge,  R{\"u}diger
    Heimg{\"a}rtner,  Peter  Hunkirchen, and Knut Polkehn. “„Do You Speak Usability?“
    – Aktueller Stand Des Glossars Und Des Curriculums F{\"u}r Den „Certified Professional
    for Usability and User Experience (CPUX)“ Der German UPA,” 28–34. German UPA,
    2013.
  ieee: H. G. Fischer <i>et al.</i>, “„Do You Speak Usability?“ – Aktueller Stand
    des Glossars und des Curriculums f{\"u}r den „Certified Professional for Usability
    and User Experience (CPUX)“ der German UPA,” 2013, pp. 28–34.
  mla: Fischer, Holger Gerhard, et al. <i>„Do You Speak Usability?“ – Aktueller Stand
    Des Glossars Und Des Curriculums F{\"u}r Den „Certified Professional for Usability
    and User Experience (CPUX)“ Der German UPA</i>. German UPA, 2013, pp. 28–34.
  short: 'H.G. Fischer, T. Geis, R.  Molich, O. Kluge,  R{\"u}diger Heimg{\"a}rtner,  Peter  Hunkirchen,
    K. Polkehn, in: German UPA, 2013, pp. 28–34.'
date_created: 2021-11-05T23:34:47Z
date_updated: 2022-01-06T06:57:35Z
department:
- _id: '71'
language:
- iso: eng
page: 28-34
publication_status: published
publisher: German UPA
status: public
title: „Do You Speak Usability?“ – Aktueller Stand des Glossars und des Curriculums
  f{\"u}r den „Certified Professional for Usability and User Experience (CPUX)“ der
  German UPA
type: conference
user_id: '71124'
year: '2013'
...
---
_id: '27171'
author:
- first_name: Birger
  full_name: K {\ "u} hnel, Birger
  last_name: K {\ "u} hnel
citation:
  ama: K {\ "u} hnel B. <i>Contextual Tagging in the Coactive Knowledge Organization</i>.
    Heinz Nixdorf Institute, Universit {\ "a} t Paderborn; 2013.
  apa: K {\ "u} hnel, B. (2013). <i>Contextual tagging in the coactive knowledge organization</i>.
    Heinz Nixdorf Institute, Universit {\ "a} t Paderborn.
  bibtex: '@book{K {\ "u} hnel_2013, place={Universit {\" a} t Paderborn, Heinz Nixdorf
    Institute, Contextual Computer Science}, title={Contextual tagging in the coactive
    knowledge organization}, publisher={Heinz Nixdorf Institute, Universit {\ "a}
    t Paderborn}, author={K {\ "u} hnel, Birger}, year={2013} }'
  chicago: 'K {\ "u} hnel, Birger. <i>Contextual Tagging in the Coactive Knowledge
    Organization</i>. Universit {\" a} t Paderborn, Heinz Nixdorf Institute, Contextual
    Computer Science: Heinz Nixdorf Institute, Universit {\ "a} t Paderborn, 2013.'
  ieee: 'B. K {\ "u} hnel, <i>Contextual tagging in the coactive knowledge organization</i>.
    Universit {\" a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science:
    Heinz Nixdorf Institute, Universit {\ "a} t Paderborn, 2013.'
  mla: K {\ "u} hnel, Birger. <i>Contextual Tagging in the Coactive Knowledge Organization</i>.
    Heinz Nixdorf Institute, Universit {\ "a} t Paderborn, 2013.
  short: B. K {\ "u} hnel, Contextual Tagging in the Coactive Knowledge Organization,
    Heinz Nixdorf Institute, Universit {\ "a} t Paderborn, Universit {\" a} t Paderborn,
    Heinz Nixdorf Institute, Contextual Computer Science, 2013.
date_created: 2021-11-05T23:37:26Z
date_updated: 2022-01-06T06:57:35Z
department:
- _id: '71'
language:
- iso: eng
place: Universit {\" a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer
  Science
publication_status: published
publisher: Heinz Nixdorf Institute, Universit {\ "a} t Paderborn
status: public
title: Contextual tagging in the coactive knowledge organization
type: dissertation
user_id: '71124'
year: '2013'
...
---
_id: '27172'
author:
- first_name: Holger Gerhard
  full_name: Fischer, Holger Gerhard
  id: '30457'
  last_name: Fischer
- first_name: Benjamin
  full_name: Strenge, Benjamin
  last_name: Strenge
- first_name: ' Karsten'
  full_name: Nebe,  Karsten
  last_name: Nebe
citation:
  ama: Fischer HG, Strenge B, Nebe  Karsten. Towards a Holistic Tool for the Selection
    and Validation of Usability Method Sets Supporting Human-Centered Design. Published
    online 2013:252-261.
  apa: Fischer, H. G., Strenge, B., &#38; Nebe,  Karsten. (2013). <i>Towards a Holistic
    Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered
    Design</i> (pp. 252–261). Springer Verlag.
  bibtex: '@article{Fischer_Strenge_Nebe_2013, series={LNCS 8012}, title={Towards
    a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting
    Human-Centered Design}, publisher={Springer Verlag}, author={Fischer, Holger Gerhard
    and Strenge, Benjamin and Nebe,  Karsten}, year={2013}, pages={252–261}, collection={LNCS
    8012} }'
  chicago: Fischer, Holger Gerhard, Benjamin Strenge, and  Karsten Nebe. “Towards
    a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting
    Human-Centered Design.” LNCS 8012. Springer Verlag, 2013.
  ieee: H. G. Fischer, B. Strenge, and  Karsten Nebe, “Towards a Holistic Tool for
    the Selection and Validation of Usability Method Sets Supporting Human-Centered
    Design.” Springer Verlag, pp. 252–261, 2013.
  mla: Fischer, Holger Gerhard, et al. <i>Towards a Holistic Tool for the Selection
    and Validation of Usability Method Sets Supporting Human-Centered Design</i>.
    Springer Verlag, 2013, pp. 252–61.
  short: H.G. Fischer, B. Strenge,  Karsten Nebe, (2013) 252–261.
date_created: 2021-11-05T23:42:55Z
date_updated: 2022-01-06T06:57:35Z
department:
- _id: '71'
language:
- iso: eng
page: 252-261
publication_status: published
publisher: Springer Verlag
series_title: LNCS 8012
status: public
title: Towards a Holistic Tool for the Selection and Validation of Usability Method
  Sets Supporting Human-Centered Design
type: conference
user_id: '71124'
year: '2013'
...
---
_id: '27173'
author:
- first_name: ' Reinhard'
  full_name: Keil,  Reinhard
  last_name: Keil
- first_name: Harald
  full_name: Selke, Harald
  id: '497'
  last_name: Selke
- first_name: Felix
  full_name: Winkelnkemper, Felix
  id: '3117'
  last_name: Winkelnkemper
citation:
  ama: Keil  Reinhard, Selke H, Winkelnkemper F. Computer science and education -
    A struggle for creative sovereignty in society? <i>FIfF-Kommunikation</i>. Published
    online 2013:61-65.
  apa: Keil,  Reinhard, Selke, H., &#38; Winkelnkemper, F. (2013). Computer science
    and education - A struggle for creative sovereignty in society? <i>FIfF-Kommunikation</i>,
    61–65.
  bibtex: '@article{Keil_Selke_Winkelnkemper_2013, title={Computer science and education
    - A struggle for creative sovereignty in society?}, journal={FIfF-Kommunikation},
    author={Keil,  Reinhard and Selke, Harald and Winkelnkemper, Felix}, year={2013},
    pages={61–65} }'
  chicago: Keil,  Reinhard, Harald Selke, and Felix Winkelnkemper. “Computer Science
    and Education - A Struggle for Creative Sovereignty in Society?” <i>FIfF-Kommunikation</i>,
    2013, 61–65.
  ieee: Reinhard Keil, H. Selke, and F. Winkelnkemper, “Computer science and education
    - A struggle for creative sovereignty in society?,” <i>FIfF-Kommunikation</i>,
    pp. 61–65, 2013.
  mla: Keil,  Reinhard, et al. “Computer Science and Education - A Struggle for Creative
    Sovereignty in Society?” <i>FIfF-Kommunikation</i>, 2013, pp. 61–65.
  short: Reinhard Keil, H. Selke, F. Winkelnkemper, FIfF-Kommunikation (2013) 61–65.
date_created: 2021-11-05T23:47:18Z
date_updated: 2022-01-06T06:57:35Z
department:
- _id: '71'
language:
- iso: eng
page: 61-65
publication: FIfF-Kommunikation
status: public
title: Computer science and education - A struggle for creative sovereignty in society?
type: journal_article
user_id: '71124'
year: '2013'
...
---
_id: '27174'
author:
- first_name: Reinhard
  full_name: Keil, Reinhard
  last_name: Keil
citation:
  ama: 'Keil R. Media contexts - context media. In: Verbrecher Verlag; 2013:217-226.'
  apa: Keil, R. (2013). <i>Media contexts - context media</i>. 217–226.
  bibtex: '@inproceedings{Keil_2013, place={Berlin}, title={Media contexts - context
    media}, publisher={Verbrecher Verlag}, author={Keil, Reinhard}, year={2013}, pages={217–226}
    }'
  chicago: 'Keil, Reinhard. “Media Contexts - Context Media,” 217–26. Berlin: Verbrecher
    Verlag, 2013.'
  ieee: R. Keil, “Media contexts - context media,” 2013, pp. 217–226.
  mla: Keil, Reinhard. <i>Media Contexts - Context Media</i>. Verbrecher Verlag, 2013,
    pp. 217–26.
  short: 'R. Keil, in: Verbrecher Verlag, Berlin, 2013, pp. 217–226.'
date_created: 2021-11-05T23:49:41Z
date_updated: 2022-01-06T06:57:35Z
department:
- _id: '71'
language:
- iso: eng
page: 217-226
place: Berlin
publication_status: published
publisher: Verbrecher Verlag
status: public
title: Media contexts - context media
type: conference
user_id: '71124'
year: '2013'
...
---
_id: '27175'
author:
- first_name: Florian
  full_name: Klompmaker, Florian
  last_name: Klompmaker
- first_name: Volker
  full_name: Paelke, Volker
  last_name: Paelke
- first_name: Holger Gerhard
  full_name: Fischer, Holger Gerhard
  id: '30457'
  last_name: Fischer
citation:
  ama: Klompmaker F, Paelke V, Fischer HG. A Taxonomy-Based Approach Towards NUI Interaction
    Design. Published online 2013:32-41.
  apa: Klompmaker, F., Paelke, V., &#38; Fischer, H. G. (2013). <i>A Taxonomy-Based
    Approach Towards NUI Interaction Design</i> (pp. 32–41). Springer Verlag.
  bibtex: '@article{Klompmaker_Paelke_Fischer_2013, series={LNCS 8028}, title={A Taxonomy-Based
    Approach Towards NUI Interaction Design}, publisher={Springer Verlag}, author={Klompmaker,
    Florian and Paelke, Volker and Fischer, Holger Gerhard}, year={2013}, pages={32–41},
    collection={LNCS 8028} }'
  chicago: Klompmaker, Florian, Volker Paelke, and Holger Gerhard Fischer. “A Taxonomy-Based
    Approach Towards NUI Interaction Design.” LNCS 8028. Springer Verlag, 2013.
  ieee: F. Klompmaker, V. Paelke, and H. G. Fischer, “A Taxonomy-Based Approach Towards
    NUI Interaction Design.” Springer Verlag, pp. 32–41, 2013.
  mla: Klompmaker, Florian, et al. <i>A Taxonomy-Based Approach Towards NUI Interaction
    Design</i>. Springer Verlag, 2013, pp. 32–41.
  short: F. Klompmaker, V. Paelke, H.G. Fischer, (2013) 32–41.
date_created: 2021-11-05T23:52:16Z
date_updated: 2022-01-06T06:57:35Z
department:
- _id: '71'
language:
- iso: eng
page: 32-41
publication_status: published
publisher: Springer Verlag
series_title: LNCS 8028
status: public
title: A Taxonomy-Based Approach Towards NUI Interaction Design
type: conference
user_id: '71124'
year: '2013'
...
---
_id: '11619'
abstract:
- lang: eng
  text: "Reconfigurable circuit devices have opened up a fundamentally new way of
    creating adaptable systems. Combined with artificial evolution, reconfigurable
    circuits allow an elegant adaptation approach to compensating for changes in the
    distribution of input data, computational resource errors, and variations in resource
    requirements. Referred to as ``Evolvable Hardware'' (EHW), this paradigm has yielded
    astonishing results for traditional engineering challenges and has discovered
    intriguing design principles, which have not yet been seen in conventional engineering.\r\n\r\nIn
    this thesis, we present new and fundamental work on Evolvable Hardware motivated
    by the insight that Evolvable Hardware needs to compensate for events with different
    change rates. To solve the challenge of different adaptation speeds, we propose
    a unified adaptation approach based on multi-objective evolution, evolving and
    propagating candidate solutions that are diverse in objectives that may experience
    radical changes.\r\n\r\nFocusing on algorithmic aspects, we enable Cartesian Genetic
    Programming (CGP) model, which we are using to encode Boolean circuits, for multi-objective
    optimization by introducing a meaningful recombination operator. We improve the
    scalability of CGP by objectives scaling, periodization of local- and global-search
    algorithms, and the automatic acquisition and reuse of subfunctions using age-
    and cone-based techniques. We validate our methods on the applications of adaptation
    of hardware classifiers to resource changes, recognition of muscular signals for
    prosthesis control and optimization of processor caches."
author:
- first_name: Paul
  full_name: Kaufmann, Paul
  last_name: Kaufmann
citation:
  ama: 'Kaufmann P. <i>Adapting Hardware Systems by Means of Multi-Objective Evolution</i>.
    Berlin: Logos Verlag Berlin GmbH; 2013.'
  apa: 'Kaufmann, P. (2013). <i>Adapting Hardware Systems by Means of Multi-Objective
    Evolution</i>. Berlin: Logos Verlag Berlin GmbH.'
  bibtex: '@book{Kaufmann_2013, place={Berlin}, title={Adapting Hardware Systems by
    Means of Multi-Objective Evolution}, publisher={Logos Verlag Berlin GmbH}, author={Kaufmann,
    Paul}, year={2013} }'
  chicago: 'Kaufmann, Paul. <i>Adapting Hardware Systems by Means of Multi-Objective
    Evolution</i>. Berlin: Logos Verlag Berlin GmbH, 2013.'
  ieee: 'P. Kaufmann, <i>Adapting Hardware Systems by Means of Multi-Objective Evolution</i>.
    Berlin: Logos Verlag Berlin GmbH, 2013.'
  mla: Kaufmann, Paul. <i>Adapting Hardware Systems by Means of Multi-Objective Evolution</i>.
    Logos Verlag Berlin GmbH, 2013.
  short: P. Kaufmann, Adapting Hardware Systems by Means of Multi-Objective Evolution,
    Logos Verlag Berlin GmbH, Berlin, 2013.
date_created: 2019-07-11T11:51:51Z
date_updated: 2022-01-06T06:51:04Z
department:
- _id: '78'
language:
- iso: eng
page: '249'
place: Berlin
publication_identifier:
  isbn:
  - 978-3-8325-3530-8
publication_status: published
publisher: Logos Verlag Berlin GmbH
status: public
supervisor:
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
title: Adapting Hardware Systems by Means of Multi-Objective Evolution
type: dissertation
user_id: '3118'
year: '2013'
...
---
_id: '20978'
author:
- first_name: Marcus
  full_name: Hüwe, Marcus
  id: '13606'
  last_name: Hüwe
citation:
  ama: Hüwe M. <i>Das Verteilungsproblem Für Mechatronische Systeme</i>. Universität
    Paderborn, Heinz Nixdorf Institut, Softwaretechnik; 2013.
  apa: Hüwe, M. (2013). <i>Das Verteilungsproblem für mechatronische Systeme</i>.
    Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik.
  bibtex: '@book{Hüwe_2013, title={Das Verteilungsproblem für mechatronische Systeme},
    publisher={Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik}, author={Hüwe,
    Marcus}, year={2013} }'
  chicago: Hüwe, Marcus. <i>Das Verteilungsproblem Für Mechatronische Systeme</i>.
    Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2013.
  ieee: M. Hüwe, <i>Das Verteilungsproblem für mechatronische Systeme</i>. Universität
    Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2013.
  mla: Hüwe, Marcus. <i>Das Verteilungsproblem Für Mechatronische Systeme</i>. Universität
    Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2013.
  short: M. Hüwe, Das Verteilungsproblem Für Mechatronische Systeme, Universität Paderborn,
    Heinz Nixdorf Institut, Softwaretechnik, 2013.
date_created: 2021-01-13T13:23:53Z
date_updated: 2022-01-06T06:54:42Z
department:
- _id: '76'
language:
- iso: eng
publisher: Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik
status: public
title: Das Verteilungsproblem für mechatronische Systeme
type: bachelorsthesis
user_id: '5786'
year: '2013'
...
---
_id: '20980'
abstract:
- lang: ger
  text: Das Thema Elektromobilität hat in der Fahrzeugindustrie in den letzten Jahren
    viel Aufmerksamkeit erhalten. Gerade im Bereich der Entwicklung von Steuergeräte-Software
    ist der Bedarf an frühzeitiger Absicherung hoch. Nur so können Produkteinführungszeiten
    minimiert und effektiv Entwicklungskosten eingespart werden. Komplexe Werkzeugketten
    und die verteilte Entwicklung erschweren den Prozess und verlängern die Entwicklungszeit.
    Das Förderprojekt „Simulationsgestützter Entwurf für Elektrofahrzeuge“, kurz „E-Mobil“,
    nimmt sich der Herausforderungen einer verteilten Entwicklung von Steuergeräte-Software
    an. Vier Projektpartner aus Industrie und Forschung untersuchen die Besonderheiten
    sowohl bzgl. des Entwurfsprozesses, als auch der beteiligten Entwurfswerkzeuge
    im Vergleich zur konventionellen Fahrzeugentwicklung. Im Fokus stehen die Modellierung
    und die simulationsgestützte Absicherung in frühen Entwurfsstadien. Die Modellierung
    umfasst Regelungssoftware sowie die für die Simulation nötigen elektrischen und
    mechatronischen Komponenten. Die vorliegende Arbeit stellt die Kernthemen sowie
    aktuelle Ergebnisse aus dem Projekt vor.
author:
- first_name: Emad
  full_name: Farshizadeh, Emad
  last_name: Farshizadeh
- first_name: Hermann
  full_name: Briese, Hermann
  last_name: Briese
- first_name: David
  full_name: Steinmann, David
  last_name: Steinmann
- first_name: Lars
  full_name: Stockmann, Lars
  id: '48144'
  last_name: Stockmann
- first_name: Steffen
  full_name: Beringer, Steffen
  last_name: Beringer
- first_name: Dominik
  full_name: Holler, Dominik
  last_name: Holler
- first_name: Kay
  full_name: Klobedanz, Kay
  last_name: Klobedanz
- first_name: Christian
  full_name: Heinzemann, Christian
  last_name: Heinzemann
- first_name: Klaus
  full_name: Peter, Klaus
  last_name: Peter
- first_name: Michael
  full_name: Leuer, Michael
  last_name: Leuer
citation:
  ama: 'Farshizadeh E, Briese H, Steinmann D, et al. Simulationsgestützter Entwurf
    für Elektrofahrzeuge. In: <i>8. Dortmunder Autotag</i>. ; 2013.'
  apa: Farshizadeh, E., Briese, H., Steinmann, D., Stockmann, L., Beringer, S., Holler,
    D., Klobedanz, K., Heinzemann, C., Peter, K., &#38; Leuer, M. (2013). Simulationsgestützter
    Entwurf für Elektrofahrzeuge. <i>8. Dortmunder Autotag</i>.
  bibtex: '@inproceedings{Farshizadeh_Briese_Steinmann_Stockmann_Beringer_Holler_Klobedanz_Heinzemann_Peter_Leuer_2013,
    title={Simulationsgestützter Entwurf für Elektrofahrzeuge}, booktitle={8. Dortmunder
    Autotag}, author={Farshizadeh, Emad and Briese, Hermann and Steinmann, David and
    Stockmann, Lars and Beringer, Steffen and Holler, Dominik and Klobedanz, Kay and
    Heinzemann, Christian and Peter, Klaus and Leuer, Michael}, year={2013} }'
  chicago: Farshizadeh, Emad, Hermann Briese, David Steinmann, Lars Stockmann, Steffen
    Beringer, Dominik Holler, Kay Klobedanz, Christian Heinzemann, Klaus Peter, and
    Michael Leuer. “Simulationsgestützter Entwurf Für Elektrofahrzeuge.” In <i>8.
    Dortmunder Autotag</i>, 2013.
  ieee: E. Farshizadeh <i>et al.</i>, “Simulationsgestützter Entwurf für Elektrofahrzeuge,”
    2013.
  mla: Farshizadeh, Emad, et al. “Simulationsgestützter Entwurf Für Elektrofahrzeuge.”
    <i>8. Dortmunder Autotag</i>, 2013.
  short: 'E. Farshizadeh, H. Briese, D. Steinmann, L. Stockmann, S. Beringer, D. Holler,
    K. Klobedanz, C. Heinzemann, K. Peter, M. Leuer, in: 8. Dortmunder Autotag, 2013.'
date_created: 2021-01-13T13:28:47Z
date_updated: 2022-01-06T06:54:42Z
department:
- _id: '76'
language:
- iso: eng
publication: 8. Dortmunder Autotag
status: public
title: Simulationsgestützter Entwurf für Elektrofahrzeuge
type: conference
user_id: '5786'
year: '2013'
...
