---
_id: '26081'
author:
- first_name: Wolfgang
  full_name: Mauerer, Wolfgang
  last_name: Mauerer
- first_name: Gernot
  full_name: Hillier, Gernot
  last_name: Hillier
- first_name: Jan
  full_name: Sawallisch, Jan
  last_name: Sawallisch
- first_name: Stefan
  full_name: Hönick, Stefan
  last_name: Hönick
- first_name: Simon
  full_name: Oberthür, Simon
  id: '383'
  last_name: Oberthür
citation:
  ama: 'Mauerer W, Hillier G, Sawallisch J, Hönick S, Oberthür S. Real-Time Android:
    Deterministic Ease of use. In: <i>Proceedings of Embedded World Conference</i>.
    ; 2012.'
  apa: 'Mauerer, W., Hillier, G., Sawallisch, J., Hönick, S., &#38; Oberthür, S. (2012).
    Real-Time Android: Deterministic Ease of use. <i>Proceedings of Embedded World
    Conference</i>. 28. Feb. - 1. Mrz. 2012.'
  bibtex: '@inproceedings{Mauerer_Hillier_Sawallisch_Hönick_Oberthür_2012, title={Real-Time
    Android: Deterministic Ease of use}, booktitle={Proceedings of Embedded World
    Conference}, author={Mauerer, Wolfgang and Hillier, Gernot and Sawallisch, Jan
    and Hönick, Stefan and Oberthür, Simon}, year={2012} }'
  chicago: 'Mauerer, Wolfgang, Gernot Hillier, Jan Sawallisch, Stefan Hönick, and
    Simon Oberthür. “Real-Time Android: Deterministic Ease of Use.” In <i>Proceedings
    of Embedded World Conference</i>, 2012.'
  ieee: 'W. Mauerer, G. Hillier, J. Sawallisch, S. Hönick, and S. Oberthür, “Real-Time
    Android: Deterministic Ease of use,” presented at the 28. Feb. - 1. Mrz. 2012,
    2012.'
  mla: 'Mauerer, Wolfgang, et al. “Real-Time Android: Deterministic Ease of Use.”
    <i>Proceedings of Embedded World Conference</i>, 2012.'
  short: 'W. Mauerer, G. Hillier, J. Sawallisch, S. Hönick, S. Oberthür, in: Proceedings
    of Embedded World Conference, 2012.'
conference:
  name: 28. Feb. - 1. Mrz. 2012
date_created: 2021-10-12T11:14:50Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
language:
- iso: eng
publication: Proceedings of Embedded World Conference
status: public
title: 'Real-Time Android: Deterministic Ease of use'
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '26086'
abstract:
- lang: eng
  text: "In this paper, an image segmentation approach for object detection on the
    miniature robot BeBot - a deeply embedded system - is presented. In order to enable
    the robot to detect and identify objects in its environment by means of its camera,
    an efficient image segmentation approach was developed. The fundamental algorithm
    bases on the region growing and region merging concept and identifies homogeneous
    regions consisting of adjacent pixels with similar color. By internally representing
    a contiguous block of pixels in terms of run-lengths, the computational effort
    of both the region growing and the region merging operation is minimized. Finally,
    for subsequent object detection processes, a region is efficiently translated
    into a statistically feature representation based on discretized moments.\r\n"
author:
- first_name: Alexander
  full_name: Jungmann, Alexander
  last_name: Jungmann
- first_name: Thomas
  full_name: Schierbaum, Thomas
  last_name: Schierbaum
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
citation:
  ama: 'Jungmann A, Schierbaum T, Kleinjohann B. Image Segmentation For Object Detection
    on a Deeply Embedded Miniature Robot. In: <i>Proceedings of the Seventh International
    Conference on Computer Vision Theory and Applications (VISAPP)</i>.  INSTICC PRESS;
    2012:441-444.'
  apa: Jungmann, A., Schierbaum, T., &#38; Kleinjohann, B. (2012). Image Segmentation
    For Object Detection on a Deeply Embedded Miniature Robot. <i>Proceedings of the
    Seventh International Conference on Computer Vision Theory and Applications (VISAPP)</i>,
    441–444.
  bibtex: '@inproceedings{Jungmann_Schierbaum_Kleinjohann_2012, title={Image Segmentation
    For Object Detection on a Deeply Embedded Miniature Robot}, booktitle={Proceedings
    of the Seventh International Conference on Computer Vision Theory and Applications
    (VISAPP)}, publisher={ INSTICC PRESS}, author={Jungmann, Alexander and Schierbaum,
    Thomas and Kleinjohann, Bernd}, year={2012}, pages={441–444} }'
  chicago: Jungmann, Alexander, Thomas Schierbaum, and Bernd Kleinjohann. “Image Segmentation
    For Object Detection on a Deeply Embedded Miniature Robot.” In <i>Proceedings
    of the Seventh International Conference on Computer Vision Theory and Applications
    (VISAPP)</i>, 441–44.  INSTICC PRESS, 2012.
  ieee: A. Jungmann, T. Schierbaum, and B. Kleinjohann, “Image Segmentation For Object
    Detection on a Deeply Embedded Miniature Robot,” in <i>Proceedings of the Seventh
    International Conference on Computer Vision Theory and Applications (VISAPP)</i>,
    2012, pp. 441–444.
  mla: Jungmann, Alexander, et al. “Image Segmentation For Object Detection on a Deeply
    Embedded Miniature Robot.” <i>Proceedings of the Seventh International Conference
    on Computer Vision Theory and Applications (VISAPP)</i>,  INSTICC PRESS, 2012,
    pp. 441–44.
  short: 'A. Jungmann, T. Schierbaum, B. Kleinjohann, in: Proceedings of the Seventh
    International Conference on Computer Vision Theory and Applications (VISAPP),  INSTICC
    PRESS, 2012, pp. 441–444.'
conference:
  name: 24. - 26. Feb. 2012 INSTICC, INSTICC PRESS
date_created: 2021-10-12T12:43:25Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
language:
- iso: eng
page: 441-444
publication: Proceedings of the Seventh International Conference on Computer Vision
  Theory and Applications (VISAPP)
publisher: ' INSTICC PRESS'
status: public
title: Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '26089'
author:
- first_name: Fahad
  full_name: Bin Tariq, Fahad
  last_name: Bin Tariq
citation:
  ama: 'Bin Tariq F. Deterministic Runtime Adaptation for Hard Real-time Embedded
    Systems with Processing Constraints. In: <i>Proceedings of the 2nd International
    Conference on Pervasive Embedded Computing and Communication Systems</i>. ; 2012.'
  apa: Bin Tariq, F. (2012). Deterministic Runtime Adaptation for Hard Real-time Embedded
    Systems with Processing Constraints. <i>Proceedings of the 2nd International Conference
    on Pervasive Embedded Computing and Communication Systems</i>. 24. - 26. Feb.
    2012.
  bibtex: '@inproceedings{Bin Tariq_2012, title={Deterministic Runtime Adaptation
    for Hard Real-time Embedded Systems with Processing Constraints}, booktitle={Proceedings
    of the 2nd International Conference on Pervasive Embedded Computing and Communication
    Systems}, author={Bin Tariq, Fahad}, year={2012} }'
  chicago: Bin Tariq, Fahad. “Deterministic Runtime Adaptation for Hard Real-Time
    Embedded Systems with Processing Constraints.” In <i>Proceedings of the 2nd International
    Conference on Pervasive Embedded Computing and Communication Systems</i>, 2012.
  ieee: F. Bin Tariq, “Deterministic Runtime Adaptation for Hard Real-time Embedded
    Systems with Processing Constraints,” presented at the 24. - 26. Feb. 2012, 2012.
  mla: Bin Tariq, Fahad. “Deterministic Runtime Adaptation for Hard Real-Time Embedded
    Systems with Processing Constraints.” <i>Proceedings of the 2nd International
    Conference on Pervasive Embedded Computing and Communication Systems</i>, 2012.
  short: 'F. Bin Tariq, in: Proceedings of the 2nd International Conference on Pervasive
    Embedded Computing and Communication Systems, 2012.'
conference:
  name: 24. - 26. Feb. 2012
date_created: 2021-10-13T08:53:43Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
language:
- iso: eng
publication: Proceedings of the 2nd International Conference on Pervasive Embedded
  Computing and Communication Systems
status: public
title: Deterministic Runtime Adaptation for Hard Real-time Embedded Systems with Processing
  Constraints
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '26090'
author:
- first_name: Emi
  full_name: Mathews, Emi
  last_name: Mathews
- first_name: Hannes
  full_name: Frey, Hannes
  last_name: Frey
citation:
  ama: 'Mathews E, Frey H. A Localized Link Removal and Addition based Planarization
    Algorithm. In: <i>13th International Conference On Distributed Computing And Networking
    (ICDCN)</i>. Springer; 2012.'
  apa: Mathews, E., &#38; Frey, H. (2012). A Localized Link Removal and Addition based
    Planarization Algorithm. <i>13th International Conference On Distributed Computing
    And Networking (ICDCN)</i>.
  bibtex: '@inproceedings{Mathews_Frey_2012, place={The Hong Kong Polytechnic University,
    Hong Kong, China}, title={A Localized Link Removal and Addition based Planarization
    Algorithm}, booktitle={13th International Conference On Distributed Computing
    And Networking (ICDCN)}, publisher={Springer}, author={Mathews, Emi and Frey,
    Hannes}, year={2012} }'
  chicago: 'Mathews, Emi, and Hannes Frey. “A Localized Link Removal and Addition
    Based Planarization Algorithm.” In <i>13th International Conference On Distributed
    Computing And Networking (ICDCN)</i>. The Hong Kong Polytechnic University, Hong
    Kong, China: Springer, 2012.'
  ieee: E. Mathews and H. Frey, “A Localized Link Removal and Addition based Planarization
    Algorithm,” 2012.
  mla: Mathews, Emi, and Hannes Frey. “A Localized Link Removal and Addition Based
    Planarization Algorithm.” <i>13th International Conference On Distributed Computing
    And Networking (ICDCN)</i>, Springer, 2012.
  short: 'E. Mathews, H. Frey, in: 13th International Conference On Distributed Computing
    And Networking (ICDCN), Springer, The Hong Kong Polytechnic University, Hong Kong,
    China, 2012.'
date_created: 2021-10-13T10:08:05Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
language:
- iso: eng
place: The Hong Kong Polytechnic University, Hong Kong, China
publication: 13th International Conference On Distributed Computing And Networking
  (ICDCN)
publisher: Springer
status: public
title: A Localized Link Removal and Addition based Planarization Algorithm
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '26091'
author:
- first_name: Emi
  full_name: Mathews, Emi
  last_name: Mathews
- first_name: Ciby
  full_name: Mathew, Ciby
  last_name: Mathew
citation:
  ama: Mathews E, Mathew C. Deployment of mobile routers ensuring coverage and connectivity.
    <i>International Journal of Computer Networks and Communications 4(1)</i>. Published
    online 2012:175-192.
  apa: Mathews, E., &#38; Mathew, C. (2012). Deployment of mobile routers ensuring
    coverage and connectivity. <i>International Journal of Computer Networks and Communications
    4(1)</i>, 175–192.
  bibtex: '@article{Mathews_Mathew_2012, title={Deployment of mobile routers ensuring
    coverage and connectivity}, journal={International Journal of Computer Networks
    and Communications 4(1)}, author={Mathews, Emi and Mathew, Ciby}, year={2012},
    pages={175–192} }'
  chicago: Mathews, Emi, and Ciby Mathew. “Deployment of Mobile Routers Ensuring Coverage
    and Connectivity.” <i>International Journal of Computer Networks and Communications
    4(1)</i>, 2012, 175–92.
  ieee: E. Mathews and C. Mathew, “Deployment of mobile routers ensuring coverage
    and connectivity,” <i>International Journal of Computer Networks and Communications
    4(1)</i>, pp. 175–192, 2012.
  mla: Mathews, Emi, and Ciby Mathew. “Deployment of Mobile Routers Ensuring Coverage
    and Connectivity.” <i>International Journal of Computer Networks and Communications
    4(1)</i>, 2012, pp. 175–92.
  short: E. Mathews, C. Mathew, International Journal of Computer Networks and Communications
    4(1) (2012) 175–192.
date_created: 2021-10-13T10:17:10Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
language:
- iso: eng
page: 175-192
publication: International Journal of Computer Networks and Communications 4(1)
status: public
title: Deployment of mobile routers ensuring coverage and connectivity
type: journal_article
user_id: '21240'
year: '2012'
...
---
_id: '26092'
author:
- first_name: Wolfgang
  full_name: Müller, Wolfgang
  id: '16243'
  last_name: Müller
- first_name: Markus
  full_name: Becker, Markus
  last_name: Becker
- first_name: Henning
  full_name: Zabel, Henning
  last_name: Zabel
- first_name: Ahmed
  full_name: Elfeky, Ahmed
  last_name: Elfeky
- first_name: Anthony
  full_name: DiPasquale, Anthony
  last_name: DiPasquale
citation:
  ama: 'Müller W, Becker M, Zabel H, Elfeky A, DiPasquale A. Virtual Prototyping of
    Cyber-Physical Systems. In: <i>In Proceedings of 17th Asia and South Pacific Design
    Automation Conference (ASP-DAC 2012</i>. ; 2012.'
  apa: Müller, W., Becker, M., Zabel, H., Elfeky, A., &#38; DiPasquale, A. (2012).
    Virtual Prototyping of Cyber-Physical Systems. <i>In Proceedings of 17th Asia
    and South Pacific Design Automation Conference (ASP-DAC 2012</i>.
  bibtex: '@inproceedings{Müller_Becker_Zabel_Elfeky_DiPasquale_2012, place={Sydney},
    title={Virtual Prototyping of Cyber-Physical Systems}, booktitle={In Proceedings
    of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012}, author={Müller,
    Wolfgang and Becker, Markus and Zabel, Henning and Elfeky, Ahmed and DiPasquale,
    Anthony}, year={2012} }'
  chicago: Müller, Wolfgang, Markus Becker, Henning Zabel, Ahmed Elfeky, and Anthony
    DiPasquale. “Virtual Prototyping of Cyber-Physical Systems.” In <i>In Proceedings
    of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012</i>.
    Sydney, 2012.
  ieee: W. Müller, M. Becker, H. Zabel, A. Elfeky, and A. DiPasquale, “Virtual Prototyping
    of Cyber-Physical Systems,” 2012.
  mla: Müller, Wolfgang, et al. “Virtual Prototyping of Cyber-Physical Systems.” <i>In
    Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC
    2012</i>, 2012.
  short: 'W. Müller, M. Becker, H. Zabel, A. Elfeky, A. DiPasquale, in: In Proceedings
    of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012, Sydney,
    2012.'
date_created: 2021-10-13T10:36:35Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
language:
- iso: eng
place: Sydney
publication: In Proceedings of 17th Asia and South Pacific Design Automation Conference
  (ASP-DAC 2012
status: public
title: Virtual Prototyping of Cyber-Physical Systems
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '26093'
author:
- first_name: Yara
  full_name: Khaluf, Yara
  last_name: Khaluf
- first_name: Emi
  full_name: Mathews, Emi
  last_name: Mathews
- first_name: Franz-Josef
  full_name: Rammig, Franz-Josef
  last_name: Rammig
citation:
  ama: 'Khaluf Y, Mathews E, Rammig F-J. Swarm Robotic Time Synchronization for Object
    Tracking. In: Higuera-Toledano MT, Brinkschulte U, Rettberg A, eds. <i>Self-Organization
    in Embedded Real-Time Systems</i>. Springer; 2012:75-92.'
  apa: Khaluf, Y., Mathews, E., &#38; Rammig, F.-J. (2012). Swarm Robotic Time Synchronization
    for Object Tracking. In M. T. Higuera-Toledano, U. Brinkschulte, &#38; A. Rettberg
    (Eds.), <i>Self-Organization in Embedded Real-Time Systems</i> (pp. 75–92). Springer.
  bibtex: '@inbook{Khaluf_Mathews_Rammig_2012, place={New York, Heidelberg, Dordrecht,
    London}, title={Swarm Robotic Time Synchronization for Object Tracking}, booktitle={Self-Organization
    in Embedded Real-Time Systems}, publisher={Springer}, author={Khaluf, Yara and
    Mathews, Emi and Rammig, Franz-Josef}, editor={Higuera-Toledano, M. Theresa and
    Brinkschulte, Uwe and Rettberg, Achim}, year={2012}, pages={75–92} }'
  chicago: 'Khaluf, Yara, Emi Mathews, and Franz-Josef Rammig. “Swarm Robotic Time
    Synchronization for Object Tracking.” In <i>Self-Organization in Embedded Real-Time
    Systems</i>, edited by M. Theresa Higuera-Toledano, Uwe Brinkschulte, and Achim
    Rettberg, 75–92. New York, Heidelberg, Dordrecht, London: Springer, 2012.'
  ieee: 'Y. Khaluf, E. Mathews, and F.-J. Rammig, “Swarm Robotic Time Synchronization
    for Object Tracking,” in <i>Self-Organization in Embedded Real-Time Systems</i>,
    M. T. Higuera-Toledano, U. Brinkschulte, and A. Rettberg, Eds. New York, Heidelberg,
    Dordrecht, London: Springer, 2012, pp. 75–92.'
  mla: Khaluf, Yara, et al. “Swarm Robotic Time Synchronization for Object Tracking.”
    <i>Self-Organization in Embedded Real-Time Systems</i>, edited by M. Theresa Higuera-Toledano
    et al., Springer, 2012, pp. 75–92.
  short: 'Y. Khaluf, E. Mathews, F.-J. Rammig, in: M.T. Higuera-Toledano, U. Brinkschulte,
    A. Rettberg (Eds.), Self-Organization in Embedded Real-Time Systems, Springer,
    New York, Heidelberg, Dordrecht, London, 2012, pp. 75–92.'
date_created: 2021-10-13T11:21:49Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
editor:
- first_name: M. Theresa
  full_name: Higuera-Toledano, M. Theresa
  last_name: Higuera-Toledano
- first_name: Uwe
  full_name: Brinkschulte, Uwe
  last_name: Brinkschulte
- first_name: Achim
  full_name: Rettberg, Achim
  last_name: Rettberg
language:
- iso: eng
page: 75-92
place: New York, Heidelberg, Dordrecht, London
publication: Self-Organization in Embedded Real-Time Systems
publisher: Springer
status: public
title: Swarm Robotic Time Synchronization for Object Tracking
type: book_chapter
user_id: '21240'
year: '2012'
...
---
_id: '26094'
author:
- first_name: Franz-Josef
  full_name: Rammig, Franz-Josef
  last_name: Rammig
citation:
  ama: 'Rammig F-J. Biologically Inspired Information Technology: Towards a Cyber
    Biosphere. In: Conradi T, Ecker G, Eke NO, Muhle F, eds. <i>Schemata Und Praktiken</i>.
    Wilhelm Fink Verlag; 2012:141-160.'
  apa: 'Rammig, F.-J. (2012). Biologically Inspired Information Technology: Towards
    a Cyber Biosphere. In T. Conradi, G. Ecker, N. O. Eke, &#38; F. Muhle (Eds.),
    <i>Schemata und Praktiken</i> (pp. 141–160). Wilhelm Fink Verlag.'
  bibtex: '@inbook{Rammig_2012, place={München}, title={Biologically Inspired Information
    Technology: Towards a Cyber Biosphere}, booktitle={Schemata und Praktiken}, publisher={Wilhelm
    Fink Verlag}, author={Rammig, Franz-Josef}, editor={Conradi, Tobias and Ecker,
    Gisela and Eke, Norbert Otto and Muhle, Florian}, year={2012}, pages={141–160}
    }'
  chicago: 'Rammig, Franz-Josef. “Biologically Inspired Information Technology: Towards
    a Cyber Biosphere.” In <i>Schemata Und Praktiken</i>, edited by Tobias Conradi,
    Gisela Ecker, Norbert Otto Eke, and Florian Muhle, 141–60. München: Wilhelm Fink
    Verlag, 2012.'
  ieee: 'F.-J. Rammig, “Biologically Inspired Information Technology: Towards a Cyber
    Biosphere,” in <i>Schemata und Praktiken</i>, T. Conradi, G. Ecker, N. O. Eke,
    and F. Muhle, Eds. München: Wilhelm Fink Verlag, 2012, pp. 141–160.'
  mla: 'Rammig, Franz-Josef. “Biologically Inspired Information Technology: Towards
    a Cyber Biosphere.” <i>Schemata Und Praktiken</i>, edited by Tobias Conradi et
    al., Wilhelm Fink Verlag, 2012, pp. 141–60.'
  short: 'F.-J. Rammig, in: T. Conradi, G. Ecker, N.O. Eke, F. Muhle (Eds.), Schemata
    Und Praktiken, Wilhelm Fink Verlag, München, 2012, pp. 141–160.'
date_created: 2021-10-13T11:53:31Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
editor:
- first_name: Tobias
  full_name: Conradi, Tobias
  last_name: Conradi
- first_name: Gisela
  full_name: Ecker, Gisela
  last_name: Ecker
- first_name: Norbert Otto
  full_name: Eke, Norbert Otto
  last_name: Eke
- first_name: Florian
  full_name: Muhle, Florian
  last_name: Muhle
language:
- iso: eng
page: 141-160
place: München
publication: Schemata und Praktiken
publisher: Wilhelm Fink Verlag
status: public
title: 'Biologically Inspired Information Technology: Towards a Cyber Biosphere'
type: book_chapter
user_id: '21240'
year: '2012'
...
---
_id: '26102'
author:
- first_name: Fahad
  full_name: Bin Tariq, Fahad
  last_name: Bin Tariq
- first_name: Sandeep
  full_name: Korrapati, Sandeep
  last_name: Korrapati
citation:
  ama: 'Bin Tariq F, Korrapati S. Adaptive Web Services for Modular and Reusable Software
    Development. In: <i>Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation
    of Cyber Physical Systems</i>.  IGI Global; 2012:263-276.'
  apa: 'Bin Tariq, F., &#38; Korrapati, S. (2012). Adaptive Web Services for Modular
    and Reusable Software Development. In <i>Kapitel: F-DRARE: A Framework for Deterministic
    Runtime Adaptation of Cyber Physical Systems</i> (pp. 263–276).  IGI Global.'
  bibtex: '@inbook{Bin Tariq_Korrapati_2012, title={Adaptive Web Services for Modular
    and Reusable Software Development}, booktitle={Kapitel: F-DRARE: A Framework for
    Deterministic Runtime Adaptation of Cyber Physical Systems}, publisher={ IGI Global},
    author={Bin Tariq, Fahad and Korrapati, Sandeep}, year={2012}, pages={263–276}
    }'
  chicago: 'Bin Tariq, Fahad, and Sandeep Korrapati. “Adaptive Web Services for Modular
    and Reusable Software Development.” In <i>Kapitel: F-DRARE: A Framework for Deterministic
    Runtime Adaptation of Cyber Physical Systems</i>, 263–76.  IGI Global, 2012.'
  ieee: 'F. Bin Tariq and S. Korrapati, “Adaptive Web Services for Modular and Reusable
    Software Development,” in <i>Kapitel: F-DRARE: A Framework for Deterministic Runtime
    Adaptation of Cyber Physical Systems</i>,  IGI Global, 2012, pp. 263–276.'
  mla: 'Bin Tariq, Fahad, and Sandeep Korrapati. “Adaptive Web Services for Modular
    and Reusable Software Development.” <i>Kapitel: F-DRARE: A Framework for Deterministic
    Runtime Adaptation of Cyber Physical Systems</i>,  IGI Global, 2012, pp. 263–76.'
  short: 'F. Bin Tariq, S. Korrapati, in: Kapitel: F-DRARE: A Framework for Deterministic
    Runtime Adaptation of Cyber Physical Systems,  IGI Global, 2012, pp. 263–276.'
date_created: 2021-10-13T12:48:56Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '672'
language:
- iso: eng
page: 263-276
publication: 'Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of
  Cyber Physical Systems'
publisher: ' IGI Global'
status: public
title: Adaptive Web Services for Modular and Reusable Software Development
type: book_chapter
user_id: '21240'
year: '2012'
...
---
_id: '26181'
abstract:
- lang: eng
  text: The paradigm shift from purchasing monolithic software solutions to a dynamic
    composition of individual solutions entails many new possibilities yet great challenges,
    too. In order to satisfy user requirements, complex services have to be automatically
    composed of elementary services. Multiple possibilities of composing a complex
    service inevitably emerge. The problem of selecting the most appropriate services
    has to be solved by comparing the different service candidates with respect to
    their quality in terms of inherent non-functional properties while simultaneously
    taking the user requirements into account.We are aiming for an integrated service
    rating and ranking methodology in order to support the automation of the underlying
    decision-making process. The main contribution of this paper is a first decomposition
    of the quality-based service selection process, while emphasizing major issues
    and challenges, which we are addressing in the On-The-Fly Computing project.
author:
- first_name: Alexander
  full_name: Jungmann, Alexander
  last_name: Jungmann
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
citation:
  ama: 'Jungmann A, Kleinjohann B. Towards an Integrated Service Rating and Ranking
    Methodology for Quality Based Service Selection in Automatic Service Composition.
    In: <i>Proceedings of the Fourth International Conferences on Advanced Service
    Computing (SERVICE COMPUTATION)</i>. Xpert Publishing Services; 2012:43-47.'
  apa: Jungmann, A., &#38; Kleinjohann, B. (2012). Towards an Integrated Service Rating
    and Ranking Methodology for Quality Based Service Selection in Automatic Service
    Composition. <i>Proceedings of the Fourth International Conferences on Advanced
    Service Computing (SERVICE COMPUTATION)</i>, 43–47.
  bibtex: '@inproceedings{Jungmann_Kleinjohann_2012, title={Towards an Integrated
    Service Rating and Ranking Methodology for Quality Based Service Selection in
    Automatic Service Composition}, booktitle={Proceedings of the Fourth International
    Conferences on Advanced Service Computing (SERVICE COMPUTATION)}, publisher={Xpert
    Publishing Services}, author={Jungmann, Alexander and Kleinjohann, Bernd}, year={2012},
    pages={43–47} }'
  chicago: Jungmann, Alexander, and Bernd Kleinjohann. “Towards an Integrated Service
    Rating and Ranking Methodology for Quality Based Service Selection in Automatic
    Service Composition.” In <i>Proceedings of the Fourth International Conferences
    on Advanced Service Computing (SERVICE COMPUTATION)</i>, 43–47. Xpert Publishing
    Services, 2012.
  ieee: A. Jungmann and B. Kleinjohann, “Towards an Integrated Service Rating and
    Ranking Methodology for Quality Based Service Selection in Automatic Service Composition,”
    in <i>Proceedings of the Fourth International Conferences on Advanced Service
    Computing (SERVICE COMPUTATION)</i>, 2012, pp. 43–47.
  mla: Jungmann, Alexander, and Bernd Kleinjohann. “Towards an Integrated Service
    Rating and Ranking Methodology for Quality Based Service Selection in Automatic
    Service Composition.” <i>Proceedings of the Fourth International Conferences on
    Advanced Service Computing (SERVICE COMPUTATION)</i>, Xpert Publishing Services,
    2012, pp. 43–47.
  short: 'A. Jungmann, B. Kleinjohann, in: Proceedings of the Fourth International
    Conferences on Advanced Service Computing (SERVICE COMPUTATION), Xpert Publishing
    Services, 2012, pp. 43–47.'
date_created: 2021-10-15T07:14:05Z
date_updated: 2022-01-06T06:57:17Z
department:
- _id: '672'
language:
- iso: eng
page: 43-47
publication: Proceedings of the Fourth International Conferences on Advanced Service
  Computing (SERVICE COMPUTATION)
publisher: Xpert Publishing Services
status: public
title: Towards an Integrated Service Rating and Ranking Methodology for Quality Based
  Service Selection in Automatic Service Composition
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '26190'
abstract:
- lang: eng
  text: A major goal of the On-The-Fly Computing project is the automated composition
    of individual services based on services that are available in dynamic markets.
    Dependent on the granularity of a market, different alternatives that satisfy
    the requested functional requirements may emerge. In order to select the best
    solution, services are usually selected with respect to their quality in terms
    of inherent non-functional properties. In this paper, we describe our idea of
    how to model this service selection process as a Markov Decision Process, which
    we in turn intend to solve by means of Reinforcement Learning techniques in order
    to control the underlying service composition process. In addition, some initial
    issues with respect to our approach are addressed.
author:
- first_name: Alexander
  full_name: Jungmann, Alexander
  last_name: Jungmann
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
citation:
  ama: 'Jungmann A, Kleinjohann B. Towards the Application of Reinforcement Learning
    Techniques for Quality-Based Service Selection in Automated Service Composition.
    In: <i>Proceedings of the 9th IEEE International Conference on Services Computing
    (SCC)</i>. IEEE; 2012.'
  apa: Jungmann, A., &#38; Kleinjohann, B. (2012). Towards the Application of Reinforcement
    Learning Techniques for Quality-Based Service Selection in Automated Service Composition.
    <i>Proceedings of the 9th IEEE International Conference on Services Computing
    (SCC)</i>.
  bibtex: '@inproceedings{Jungmann_Kleinjohann_2012, title={Towards the Application
    of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated
    Service Composition}, booktitle={Proceedings of the 9th IEEE International Conference
    on Services Computing (SCC)}, publisher={IEEE}, author={Jungmann, Alexander and
    Kleinjohann, Bernd}, year={2012} }'
  chicago: Jungmann, Alexander, and Bernd Kleinjohann. “Towards the Application of
    Reinforcement Learning Techniques for Quality-Based Service Selection in Automated
    Service Composition.” In <i>Proceedings of the 9th IEEE International Conference
    on Services Computing (SCC)</i>. IEEE, 2012.
  ieee: A. Jungmann and B. Kleinjohann, “Towards the Application of Reinforcement
    Learning Techniques for Quality-Based Service Selection in Automated Service Composition,”
    2012.
  mla: Jungmann, Alexander, and Bernd Kleinjohann. “Towards the Application of Reinforcement
    Learning Techniques for Quality-Based Service Selection in Automated Service Composition.”
    <i>Proceedings of the 9th IEEE International Conference on Services Computing
    (SCC)</i>, IEEE, 2012.
  short: 'A. Jungmann, B. Kleinjohann, in: Proceedings of the 9th IEEE International
    Conference on Services Computing (SCC), IEEE, 2012.'
date_created: 2021-10-15T07:52:47Z
date_updated: 2022-01-06T06:57:17Z
department:
- _id: '672'
language:
- iso: eng
publication: Proceedings of the 9th IEEE International Conference on Services Computing
  (SCC)
publisher: IEEE
status: public
title: Towards the Application of Reinforcement Learning Techniques for Quality-Based
  Service Selection in Automated Service Composition
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '26212'
author:
- first_name: Yara
  full_name: Khaluf, Yara
  last_name: Khaluf
- first_name: Fabian
  full_name: Weiss, Fabian
  last_name: Weiss
- first_name: Sebastian
  full_name: Micus, Sebastian
  last_name: Micus
citation:
  ama: 'Khaluf Y, Weiss F, Micus S. Master Election for Time Synchronization in Swarm
    Robotic Systems. In: <i>The 10th IEEE International Symposium on Parallel and
    Distributed Processing with Applications</i>. ; 2012.'
  apa: Khaluf, Y., Weiss, F., &#38; Micus, S. (2012). Master Election for Time Synchronization
    in Swarm Robotic Systems. <i>The 10th IEEE International Symposium on Parallel
    and Distributed Processing with Applications</i>.
  bibtex: '@inproceedings{Khaluf_Weiss_Micus_2012, place={ Leganés, Madrid}, title={Master
    Election for Time Synchronization in Swarm Robotic Systems}, booktitle={The 10th
    IEEE International Symposium on Parallel and Distributed Processing with Applications},
    author={Khaluf, Yara and Weiss, Fabian and Micus, Sebastian}, year={2012} }'
  chicago: Khaluf, Yara, Fabian Weiss, and Sebastian Micus. “Master Election for Time
    Synchronization in Swarm Robotic Systems.” In <i>The 10th IEEE International Symposium
    on Parallel and Distributed Processing with Applications</i>.  Leganés, Madrid,
    2012.
  ieee: Y. Khaluf, F. Weiss, and S. Micus, “Master Election for Time Synchronization
    in Swarm Robotic Systems,” 2012.
  mla: Khaluf, Yara, et al. “Master Election for Time Synchronization in Swarm Robotic
    Systems.” <i>The 10th IEEE International Symposium on Parallel and Distributed
    Processing with Applications</i>, 2012.
  short: 'Y. Khaluf, F. Weiss, S. Micus, in: The 10th IEEE International Symposium
    on Parallel and Distributed Processing with Applications,  Leganés, Madrid, 2012.'
date_created: 2021-10-15T09:16:19Z
date_updated: 2022-01-06T06:57:18Z
department:
- _id: '672'
language:
- iso: eng
place: ' Leganés, Madrid'
publication: The 10th IEEE International Symposium on Parallel and Distributed Processing
  with Applications
status: public
title: Master Election for Time Synchronization in Swarm Robotic Systems
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '26264'
author:
- first_name: Emi
  full_name: Mathews, Emi
  last_name: Mathews
- first_name: Ciby
  full_name: Mathew, Ciby
  last_name: Mathew
citation:
  ama: 'Mathews E, Mathew C. Connectivity of Autonomous Agents Using Ad-hoc Mobile
    Router Networks. In: <i>Third International Conference on Networks &#38; Communications,
    LNICST</i>. Springer; 2012.'
  apa: Mathews, E., &#38; Mathew, C. (2012). Connectivity of Autonomous Agents Using
    Ad-hoc Mobile Router Networks. <i>Third International Conference on Networks &#38;
    Communications, LNICST</i>.
  bibtex: '@inproceedings{Mathews_Mathew_2012, place={Bangalore, India}, title={Connectivity
    of Autonomous Agents Using Ad-hoc Mobile Router Networks}, booktitle={Third International
    Conference on Networks &#38; Communications, LNICST}, publisher={Springer}, author={Mathews,
    Emi and Mathew, Ciby}, year={2012} }'
  chicago: 'Mathews, Emi, and Ciby Mathew. “Connectivity of Autonomous Agents Using
    Ad-Hoc Mobile Router Networks.” In <i>Third International Conference on Networks
    &#38; Communications, LNICST</i>. Bangalore, India: Springer, 2012.'
  ieee: E. Mathews and C. Mathew, “Connectivity of Autonomous Agents Using Ad-hoc
    Mobile Router Networks,” 2012.
  mla: Mathews, Emi, and Ciby Mathew. “Connectivity of Autonomous Agents Using Ad-Hoc
    Mobile Router Networks.” <i>Third International Conference on Networks &#38; Communications,
    LNICST</i>, Springer, 2012.
  short: 'E. Mathews, C. Mathew, in: Third International Conference on Networks &#38;
    Communications, LNICST, Springer, Bangalore, India, 2012.'
date_created: 2021-10-15T11:20:32Z
date_updated: 2022-01-06T06:57:18Z
department:
- _id: '672'
language:
- iso: eng
place: Bangalore, India
publication: Third International Conference on Networks & Communications, LNICST
publisher: Springer
status: public
title: Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks
type: conference
user_id: '21240'
year: '2012'
...
---
_id: '3812'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
citation:
  ama: 'Wachsmuth H, Stein B. Optimal Scheduling of Information Extraction Algorithms.
    In: <i>Proceedings of COLING 2012: Posters</i>. ; 2012:1281-1290.'
  apa: 'Wachsmuth, H., &#38; Stein, B. (2012). Optimal Scheduling of Information Extraction
    Algorithms. In <i>Proceedings of COLING 2012: Posters</i> (pp. 1281–1290).'
  bibtex: '@inproceedings{Wachsmuth_Stein_2012, title={Optimal Scheduling of Information
    Extraction Algorithms}, booktitle={Proceedings of COLING 2012: Posters}, author={Wachsmuth,
    Henning and Stein, Benno}, year={2012}, pages={1281–1290} }'
  chicago: 'Wachsmuth, Henning, and Benno Stein. “Optimal Scheduling of Information
    Extraction Algorithms.” In <i>Proceedings of COLING 2012: Posters</i>, 1281–90,
    2012.'
  ieee: 'H. Wachsmuth and B. Stein, “Optimal Scheduling of Information Extraction
    Algorithms,” in <i>Proceedings of COLING 2012: Posters</i>, 2012, pp. 1281–1290.'
  mla: 'Wachsmuth, Henning, and Benno Stein. “Optimal Scheduling of Information Extraction
    Algorithms.” <i>Proceedings of COLING 2012: Posters</i>, 2012, pp. 1281–90.'
  short: 'H. Wachsmuth, B. Stein, in: Proceedings of COLING 2012: Posters, 2012, pp.
    1281–1290.'
date_created: 2018-08-02T13:38:37Z
date_updated: 2022-01-06T06:59:37Z
department:
- _id: '600'
language:
- iso: eng
main_file_link:
- url: https://www.aclweb.org/anthology/C12-2125.pdf
page: 1281-1290
publication: 'Proceedings of COLING 2012: Posters'
status: public
title: Optimal Scheduling of Information Extraction Algorithms
type: conference
user_id: '82920'
year: '2012'
...
---
_id: '2918'
author:
- first_name: Saqib
  full_name: Kakvi, Saqib
  id: '66268'
  last_name: Kakvi
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Alexander
  full_name: May, Alexander
  last_name: May
citation:
  ama: 'Kakvi S, Kiltz E, May A. Certifying RSA. In: <i>Advances in Cryptology – ASIACRYPT
    2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:<a
    href="https://doi.org/10.1007/978-3-642-34961-4_25">10.1007/978-3-642-34961-4_25</a>'
  apa: 'Kakvi, S., Kiltz, E., &#38; May, A. (2012). Certifying RSA. In <i>Advances
    in Cryptology – ASIACRYPT 2012</i> (pp. 404–414). Berlin, Heidelberg: Springer
    Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-642-34961-4_25">https://doi.org/10.1007/978-3-642-34961-4_25</a>'
  bibtex: '@inbook{Kakvi_Kiltz_May_2012, place={Berlin, Heidelberg}, title={Certifying
    RSA}, DOI={<a href="https://doi.org/10.1007/978-3-642-34961-4_25">10.1007/978-3-642-34961-4_25</a>},
    booktitle={Advances in Cryptology – ASIACRYPT 2012}, publisher={Springer Berlin
    Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike and May, Alexander}, year={2012},
    pages={404–414} }'
  chicago: 'Kakvi, Saqib, Eike Kiltz, and Alexander May. “Certifying RSA.” In <i>Advances
    in Cryptology – ASIACRYPT 2012</i>, 404–14. Berlin, Heidelberg: Springer Berlin
    Heidelberg, 2012. <a href="https://doi.org/10.1007/978-3-642-34961-4_25">https://doi.org/10.1007/978-3-642-34961-4_25</a>.'
  ieee: 'S. Kakvi, E. Kiltz, and A. May, “Certifying RSA,” in <i>Advances in Cryptology
    – ASIACRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp.
    404–414.'
  mla: Kakvi, Saqib, et al. “Certifying RSA.” <i>Advances in Cryptology – ASIACRYPT
    2012</i>, Springer Berlin Heidelberg, 2012, pp. 404–14, doi:<a href="https://doi.org/10.1007/978-3-642-34961-4_25">10.1007/978-3-642-34961-4_25</a>.
  short: 'S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012,
    Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.'
date_created: 2018-05-25T12:34:06Z
date_updated: 2022-01-06T06:58:47Z
department:
- _id: '558'
doi: 10.1007/978-3-642-34961-4_25
extern: '1'
page: 404-414
place: Berlin, Heidelberg
publication: Advances in Cryptology – ASIACRYPT 2012
publication_identifier:
  isbn:
  - '9783642349607'
  - '9783642349614'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Certifying RSA
type: book_chapter
user_id: '25078'
year: '2012'
...
---
_id: '2919'
author:
- first_name: Saqib
  full_name: Kakvi, Saqib
  id: '66268'
  last_name: Kakvi
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
citation:
  ama: 'Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited.
    In: <i>Advances in Cryptology – EUROCRYPT 2012</i>. Berlin, Heidelberg: Springer
    Berlin Heidelberg; 2012:537-553. doi:<a href="https://doi.org/10.1007/978-3-642-29011-4_32">10.1007/978-3-642-29011-4_32</a>'
  apa: 'Kakvi, S., &#38; Kiltz, E. (2012). Optimal Security Proofs for Full Domain
    Hash, Revisited. In <i>Advances in Cryptology – EUROCRYPT 2012</i> (pp. 537–553).
    Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-642-29011-4_32">https://doi.org/10.1007/978-3-642-29011-4_32</a>'
  bibtex: '@inbook{Kakvi_Kiltz_2012, place={Berlin, Heidelberg}, title={Optimal Security
    Proofs for Full Domain Hash, Revisited}, DOI={<a href="https://doi.org/10.1007/978-3-642-29011-4_32">10.1007/978-3-642-29011-4_32</a>},
    booktitle={Advances in Cryptology – EUROCRYPT 2012}, publisher={Springer Berlin
    Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike}, year={2012}, pages={537–553}
    }'
  chicago: 'Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain
    Hash, Revisited.” In <i>Advances in Cryptology – EUROCRYPT 2012</i>, 537–53. Berlin,
    Heidelberg: Springer Berlin Heidelberg, 2012. <a href="https://doi.org/10.1007/978-3-642-29011-4_32">https://doi.org/10.1007/978-3-642-29011-4_32</a>.'
  ieee: 'S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,”
    in <i>Advances in Cryptology – EUROCRYPT 2012</i>, Berlin, Heidelberg: Springer
    Berlin Heidelberg, 2012, pp. 537–553.'
  mla: Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash,
    Revisited.” <i>Advances in Cryptology – EUROCRYPT 2012</i>, Springer Berlin Heidelberg,
    2012, pp. 537–53, doi:<a href="https://doi.org/10.1007/978-3-642-29011-4_32">10.1007/978-3-642-29011-4_32</a>.
  short: 'S. Kakvi, E. Kiltz, in: Advances in Cryptology – EUROCRYPT 2012, Springer
    Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 537–553.'
date_created: 2018-05-25T12:36:44Z
date_updated: 2022-01-06T06:58:47Z
department:
- _id: '558'
doi: 10.1007/978-3-642-29011-4_32
extern: '1'
main_file_link:
- url: https://doi.org/10.1007/s00145-017-9257-9
page: 537-553
place: Berlin, Heidelberg
publication: Advances in Cryptology – EUROCRYPT 2012
publication_identifier:
  isbn:
  - '9783642290107'
  - '9783642290114'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Optimal Security Proofs for Full Domain Hash, Revisited
type: book_chapter
user_id: '66268'
year: '2012'
...
---
_id: '2982'
author:
- first_name: Marcel Rudolf
  full_name: Ackermann, Marcel Rudolf
  last_name: Ackermann
- first_name: Marcus
  full_name: Märtens, Marcus
  last_name: Märtens
- first_name: Christoph
  full_name: Raupach, Christoph
  last_name: Raupach
- first_name: Kamil
  full_name: Swierkot, Kamil
  last_name: Swierkot
- first_name: Christiane
  full_name: Lammersen, Christiane
  last_name: Lammersen
- first_name: Christian
  full_name: Sohler, Christian
  last_name: Sohler
citation:
  ama: 'Ackermann MR, Märtens M, Raupach C, Swierkot K, Lammersen C, Sohler C. StreamKM++:
    A clustering algorithm for data streams. 2012;17. doi:<a href="https://doi.org/10.1145/2133803.2184450">10.1145/2133803.2184450</a>'
  apa: 'Ackermann, M. R., Märtens, M., Raupach, C., Swierkot, K., Lammersen, C., &#38;
    Sohler, C. (2012). StreamKM++: A clustering algorithm for data streams. New York,
    NY, USA: ACM. <a href="https://doi.org/10.1145/2133803.2184450">https://doi.org/10.1145/2133803.2184450</a>'
  bibtex: '@article{Ackermann_Märtens_Raupach_Swierkot_Lammersen_Sohler_2012, place={New
    York, NY, USA}, series={ACM Journal of Experimental Algorithmics}, title={StreamKM++:
    A clustering algorithm for data streams}, volume={17}, DOI={<a href="https://doi.org/10.1145/2133803.2184450">10.1145/2133803.2184450</a>},
    publisher={ACM}, author={Ackermann, Marcel Rudolf and Märtens, Marcus and Raupach,
    Christoph and Swierkot, Kamil and Lammersen, Christiane and Sohler, Christian},
    year={2012}, collection={ACM Journal of Experimental Algorithmics} }'
  chicago: 'Ackermann, Marcel Rudolf, Marcus Märtens, Christoph Raupach, Kamil Swierkot,
    Christiane Lammersen, and Christian Sohler. “StreamKM++: A Clustering Algorithm
    for Data Streams.” ACM Journal of Experimental Algorithmics. New York, NY, USA:
    ACM, 2012. <a href="https://doi.org/10.1145/2133803.2184450">https://doi.org/10.1145/2133803.2184450</a>.'
  ieee: 'M. R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, and C.
    Sohler, “StreamKM++: A clustering algorithm for data streams,” vol. 17. ACM, New
    York, NY, USA, 2012.'
  mla: 'Ackermann, Marcel Rudolf, et al. <i>StreamKM++: A Clustering Algorithm for
    Data Streams</i>. Vol. 17, ACM, 2012, doi:<a href="https://doi.org/10.1145/2133803.2184450">10.1145/2133803.2184450</a>.'
  short: M.R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, C. Sohler,
    17 (2012).
date_created: 2018-06-05T07:41:14Z
date_updated: 2022-01-06T06:58:50Z
department:
- _id: '64'
doi: 10.1145/2133803.2184450
intvolume: '        17'
place: New York, NY, USA
publication_status: published
publisher: ACM
series_title: ACM Journal of Experimental Algorithmics
status: public
title: 'StreamKM++: A clustering algorithm for data streams'
type: conference
user_id: '25078'
volume: 17
year: '2012'
...
---
_id: '2984'
abstract:
- lang: eng
  text: 'Ich beschreibe die deutsche Enigma-VerschlÃ¼sselungsmaschine und skizziere,
    wie sie von den Codebrechern von Bletchely Park um Alan Turing gebrochen wurde.
    Besonderes Augenmerk lege ich auf die BeitrÃ¤ge Alan Turings und die Bedeutung
    seiner Leistung fÃ¼r die Entwicklung moderner Kryptografie. '
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
citation:
  ama: Blömer J. Turing und Kryptografie. <i>Informatik-Spektrum</i>. 2012;35(4).
    doi:<a href="https://doi.org/10.1007/s00287-012-0622-7">10.1007/s00287-012-0622-7</a>
  apa: Blömer, J. (2012). Turing und Kryptografie. <i>Informatik-Spektrum</i>, <i>35</i>(4).
    <a href="https://doi.org/10.1007/s00287-012-0622-7">https://doi.org/10.1007/s00287-012-0622-7</a>
  bibtex: '@article{Blömer_2012, title={Turing und Kryptografie}, volume={35}, DOI={<a
    href="https://doi.org/10.1007/s00287-012-0622-7">10.1007/s00287-012-0622-7</a>},
    number={4}, journal={Informatik-Spektrum}, author={Blömer, Johannes}, year={2012}
    }'
  chicago: Blömer, Johannes. “Turing Und Kryptografie.” <i>Informatik-Spektrum</i>
    35, no. 4 (2012). <a href="https://doi.org/10.1007/s00287-012-0622-7">https://doi.org/10.1007/s00287-012-0622-7</a>.
  ieee: J. Blömer, “Turing und Kryptografie,” <i>Informatik-Spektrum</i>, vol. 35,
    no. 4, 2012.
  mla: Blömer, Johannes. “Turing Und Kryptografie.” <i>Informatik-Spektrum</i>, vol.
    35, no. 4, 2012, doi:<a href="https://doi.org/10.1007/s00287-012-0622-7">10.1007/s00287-012-0622-7</a>.
  short: J. Blömer, Informatik-Spektrum 35 (2012).
date_created: 2018-06-05T07:42:38Z
date_updated: 2022-01-06T06:58:50Z
department:
- _id: '64'
doi: 10.1007/s00287-012-0622-7
intvolume: '        35'
issue: '4'
language:
- iso: eng
publication: Informatik-Spektrum
publication_identifier:
  issn:
  - 1432-122X
publication_status: published
quality_controlled: '1'
status: public
title: Turing und Kryptografie
type: journal_article
user_id: '25078'
volume: 35
year: '2012'
...
---
_id: '3132'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: Jager T. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University
    Bochum; 2012.
  apa: Jager, T. (2012). <i>On black-box models of computation in cryptology</i>.
    Ruhr University Bochum.
  bibtex: '@book{Jager_2012, title={On black-box models of computation in cryptology},
    publisher={Ruhr University Bochum}, author={Jager, Tibor}, year={2012} }'
  chicago: Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>.
    Ruhr University Bochum, 2012.
  ieee: T. Jager, <i>On black-box models of computation in cryptology</i>. Ruhr University
    Bochum, 2012.
  mla: Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr
    University Bochum, 2012.
  short: T. Jager, On Black-Box Models of Computation in Cryptology, Ruhr University
    Bochum, 2012.
date_created: 2018-06-07T09:25:35Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
extern: '1'
publication_identifier:
  isbn:
  - 978-3-8348-1989-5
publisher: Ruhr University Bochum
status: public
title: On black-box models of computation in cryptology
type: dissertation
user_id: '38235'
year: '2012'
...
---
_id: '3133'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Florian
  full_name: Kohlar, Florian
  last_name: Kohlar
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Jager T, Kohlar F, Schäge S, Schwenk J. On the Security of TLS-DHE in the
    Standard Model. In: <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology
    Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>. ; 2012:273--293.
    doi:<a href="https://doi.org/10.1007/978-3-642-32009-5_17">10.1007/978-3-642-32009-5_17</a>'
  apa: Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2012). On the Security
    of TLS-DHE in the Standard Model. In <i>Advances in Cryptology - CRYPTO 2012 -
    32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012.
    Proceedings</i> (pp. 273--293). <a href="https://doi.org/10.1007/978-3-642-32009-5_17">https://doi.org/10.1007/978-3-642-32009-5_17</a>
  bibtex: '@inproceedings{Jager_Kohlar_Schäge_Schwenk_2012, title={On the Security
    of TLS-DHE in the Standard Model}, DOI={<a href="https://doi.org/10.1007/978-3-642-32009-5_17">10.1007/978-3-642-32009-5_17</a>},
    booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference,
    Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Jager, Tibor
    and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2012}, pages={273--293}
    }'
  chicago: Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “On the Security
    of TLS-DHE in the Standard Model.” In <i>Advances in Cryptology - CRYPTO 2012
    - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012.
    Proceedings</i>, 273--293, 2012. <a href="https://doi.org/10.1007/978-3-642-32009-5_17">https://doi.org/10.1007/978-3-642-32009-5_17</a>.
  ieee: T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “On the Security of TLS-DHE
    in the Standard Model,” in <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual
    Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>,
    2012, pp. 273--293.
  mla: Jager, Tibor, et al. “On the Security of TLS-DHE in the Standard Model.” <i>Advances
    in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara,
    CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 273--293, doi:<a href="https://doi.org/10.1007/978-3-642-32009-5_17">10.1007/978-3-642-32009-5_17</a>.
  short: 'T. Jager, F. Kohlar, S. Schäge, J. Schwenk, in: Advances in Cryptology -
    CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August
    19-23, 2012. Proceedings, 2012, pp. 273--293.'
date_created: 2018-06-07T09:25:56Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-32009-5_17
extern: '1'
page: 273--293
publication: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference,
  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
status: public
title: On the Security of TLS-DHE in the Standard Model
type: conference
user_id: '38235'
year: '2012'
...
