---
_id: '26235'
abstract:
- lang: eng
  text: "Kolmogorov Complexity constitutes an integral part of computability theory,\r\ninformation
    theory, and computational complexity theory -- in the discrete\r\nsetting of bits
    and Turing machines. Over real numbers, on the other hand, the\r\nBSS-machine
    (aka real-RAM) has been established as a major model of\r\ncomputation. This real
    realm has turned out to exhibit natural counterparts to\r\nmany notions and results
    in classical complexity and recursion theory; although\r\nusually with considerably
    different proofs. The present work investigates\r\nsimilarities and differences
    between discrete and real Kolmogorov Complexity as\r\nintroduced by Montana and
    Pardo (1998)."
author:
- first_name: Martin
  full_name: Ziegler, Martin
  last_name: Ziegler
- first_name: Wouter M.
  full_name: Koolen, Wouter M.
  last_name: Koolen
citation:
  ama: Ziegler M, Koolen WM. Kolmogorov Complexity Theory over the Reals. <i>arXiv:08022027</i>.
    Published online 2008.
  apa: Ziegler, M., &#38; Koolen, W. M. (2008). Kolmogorov Complexity Theory over
    the Reals. In <i>arXiv:0802.2027</i>.
  bibtex: '@article{Ziegler_Koolen_2008, title={Kolmogorov Complexity Theory over
    the Reals}, journal={arXiv:0802.2027}, author={Ziegler, Martin and Koolen, Wouter
    M.}, year={2008} }'
  chicago: Ziegler, Martin, and Wouter M. Koolen. “Kolmogorov Complexity Theory over
    the Reals.” <i>ArXiv:0802.2027</i>, 2008.
  ieee: M. Ziegler and W. M. Koolen, “Kolmogorov Complexity Theory over the Reals,”
    <i>arXiv:0802.2027</i>. 2008.
  mla: Ziegler, Martin, and Wouter M. Koolen. “Kolmogorov Complexity Theory over the
    Reals.” <i>ArXiv:0802.2027</i>, 2008.
  short: M. Ziegler, W.M. Koolen, ArXiv:0802.2027 (2008).
date_created: 2021-10-15T09:34:19Z
date_updated: 2022-01-06T06:57:18Z
department:
- _id: '63'
language:
- iso: eng
publication: arXiv:0802.2027
status: public
title: Kolmogorov Complexity Theory over the Reals
type: preprint
user_id: '15415'
year: '2008'
...
---
_id: '26243'
abstract:
- lang: eng
  text: "Operations on univariate dense polynomials—multiplication, division with
    remainder, multipoint\r\nevaluation—constitute central primitives entering as
    build-up blocks into many higher applications and\r\nalgorithms. Fast Fourier
    Transform permits to accelerate them from naive quadratic to running time\r\nO(n·polylogn),
    that is softly linear in the degree n of the input. This is routinely employed
    in complexity\r\ntheoretic considerations and, over integers and finite fields,
    in practical number theoretic calculations.\r\nThe present work explores the benefit
    of fast polynomial arithmetic over the field of real numbers\r\nwhere the precision
    of approximation becomes crucial. To this end, we study the computability of the\r\nabove
    operations in the sense of Recursive Analysis as an effective refinement of continuity.
    This theo-\r\nretical worst-case stability analysis is then complemented by an
    empirical evaluation: We use GMP and\r\nthe iRRAM to find the precision required
    for the intermediate calculations in order to achieve a desired\r\noutput accuracy."
author:
- first_name: Sven
  full_name: Köhler, Sven
  last_name: Köhler
- first_name: Martin
  full_name: Ziegler, Martin
  last_name: Ziegler
citation:
  ama: 'Köhler S, Ziegler M. On the Stability of Fast Polynomial Arithmetic. In: <i>Proc.
    8th Conference on Real Numbers and Computers</i>. ; 2008:147-156.'
  apa: Köhler, S., &#38; Ziegler, M. (2008). On the Stability of Fast Polynomial Arithmetic.
    <i>Proc. 8th Conference on Real Numbers and Computers</i>, 147–156.
  bibtex: '@inproceedings{Köhler_Ziegler_2008, title={On the Stability of Fast Polynomial
    Arithmetic}, booktitle={Proc. 8th Conference on Real Numbers and Computers}, author={Köhler,
    Sven and Ziegler, Martin}, year={2008}, pages={147–156} }'
  chicago: Köhler, Sven, and Martin Ziegler. “On the Stability of Fast Polynomial
    Arithmetic.” In <i>Proc. 8th Conference on Real Numbers and Computers</i>, 147–56,
    2008.
  ieee: S. Köhler and M. Ziegler, “On the Stability of Fast Polynomial Arithmetic,”
    in <i>Proc. 8th Conference on Real Numbers and Computers</i>, 2008, pp. 147–156.
  mla: Köhler, Sven, and Martin Ziegler. “On the Stability of Fast Polynomial Arithmetic.”
    <i>Proc. 8th Conference on Real Numbers and Computers</i>, 2008, pp. 147–56.
  short: 'S. Köhler, M. Ziegler, in: Proc. 8th Conference on Real Numbers and Computers,
    2008, pp. 147–156.'
date_created: 2021-10-15T09:57:36Z
date_updated: 2022-01-06T06:57:18Z
department:
- _id: '63'
language:
- iso: eng
page: 147-156
publication: Proc. 8th Conference on Real Numbers and Computers
status: public
title: On the Stability of Fast Polynomial Arithmetic
type: conference
user_id: '15415'
year: '2008'
...
---
_id: '26255'
abstract:
- lang: eng
  text: "We turn the physical Church-Turing Hypothesis from an ambiguous source of
    sensational\r\nspeculations into a (collection of) sound and well-defined scientific
    problem(s):\r\nExamining recent controversies and causes for misunderstanding
    concerning the state of the Church-\r\nTuring Hypothesis (CTH), it is suggested
    to study the CTH ‘sharpened’ relative to an arbitrary but\r\nspecific physical
    theory—rather than vaguely referring to “nature” in general. For this purpose
    we\r\ncombine physical structuralism with computational complexity theory. The
    benefits of this approach\r\nare illustrated by some exemplary results on computability
    and complexity in computational physics."
author:
- first_name: Martin
  full_name: Ziegler, Martin
  last_name: Ziegler
citation:
  ama: Ziegler M. Physically-Relativized Church-Turing Hypotheses. <i>Applied Mathematics
    and Computation</i>. Published online 2008.
  apa: Ziegler, M. (2008). Physically-Relativized Church-Turing Hypotheses. <i>Applied
    Mathematics and Computation</i>.
  bibtex: '@article{Ziegler_2008, title={Physically-Relativized Church-Turing Hypotheses},
    journal={Applied Mathematics and Computation}, author={Ziegler, Martin}, year={2008}
    }'
  chicago: Ziegler, Martin. “Physically-Relativized Church-Turing Hypotheses.” <i>Applied
    Mathematics and Computation</i>, 2008.
  ieee: M. Ziegler, “Physically-Relativized Church-Turing Hypotheses,” <i>Applied
    Mathematics and Computation</i>, 2008.
  mla: Ziegler, Martin. “Physically-Relativized Church-Turing Hypotheses.” <i>Applied
    Mathematics and Computation</i>, 2008.
  short: M. Ziegler, Applied Mathematics and Computation (2008).
date_created: 2021-10-15T10:10:04Z
date_updated: 2022-01-06T06:57:18Z
department:
- _id: '63'
- _id: '26'
external_id:
  arxiv:
  - '0805.1292'
language:
- iso: eng
publication: Applied Mathematics and Computation
status: public
title: Physically-Relativized Church-Turing Hypotheses
type: journal_article
user_id: '15415'
year: '2008'
...
---
_id: '26262'
author:
- first_name: Martin
  full_name: Ziegler, Martin
  last_name: Ziegler
citation:
  ama: 'Ziegler M. A Meta-Theory of Physics and Computation. In: <i>Verhandlungen
    Der Deutschen Physikalischen Gesellschaft</i>. Deutsche Physikalische Gesellschaft
    (DPG); 2008:145.'
  apa: Ziegler, M. (2008). A Meta-Theory of Physics and Computation. In <i>Verhandlungen
    der Deutschen Physikalischen Gesellschaft</i> (p. 145). Deutsche Physikalische
    Gesellschaft (DPG).
  bibtex: '@inbook{Ziegler_2008, title={A Meta-Theory of Physics and Computation},
    booktitle={Verhandlungen der Deutschen Physikalischen Gesellschaft}, publisher={Deutsche
    Physikalische Gesellschaft (DPG)}, author={Ziegler, Martin}, year={2008}, pages={145}
    }'
  chicago: Ziegler, Martin. “A Meta-Theory of Physics and Computation.” In <i>Verhandlungen
    Der Deutschen Physikalischen Gesellschaft</i>, 145. Deutsche Physikalische Gesellschaft
    (DPG), 2008.
  ieee: M. Ziegler, “A Meta-Theory of Physics and Computation,” in <i>Verhandlungen
    der Deutschen Physikalischen Gesellschaft</i>, Deutsche Physikalische Gesellschaft
    (DPG), 2008, p. 145.
  mla: Ziegler, Martin. “A Meta-Theory of Physics and Computation.” <i>Verhandlungen
    Der Deutschen Physikalischen Gesellschaft</i>, Deutsche Physikalische Gesellschaft
    (DPG), 2008, p. 145.
  short: 'M. Ziegler, in: Verhandlungen Der Deutschen Physikalischen Gesellschaft,
    Deutsche Physikalische Gesellschaft (DPG), 2008, p. 145.'
date_created: 2021-10-15T10:35:55Z
date_updated: 2022-01-06T06:57:18Z
department:
- _id: '63'
- _id: '26'
language:
- iso: eng
page: '145'
publication: Verhandlungen der Deutschen Physikalischen Gesellschaft
publisher: Deutsche Physikalische Gesellschaft (DPG)
status: public
title: A Meta-Theory of Physics and Computation
type: book_chapter
user_id: '15415'
year: '2008'
...
---
_id: '26280'
author:
- first_name: Klaus
  full_name: Meer, Klaus
  last_name: Meer
- first_name: Martin
  full_name: Ziegler, Martin
  last_name: Ziegler
citation:
  ama: Meer K, Ziegler M. An explicit solution to Post’s Problem over the reals. <i>Journal
    of Complexity</i>. Published online 2008:3-15. doi:<a href="https://doi.org/10.1016/j.jco.2006.09.004">10.1016/j.jco.2006.09.004</a>
  apa: Meer, K., &#38; Ziegler, M. (2008). An explicit solution to Post’s Problem
    over the reals. <i>Journal of Complexity</i>, 3–15. <a href="https://doi.org/10.1016/j.jco.2006.09.004">https://doi.org/10.1016/j.jco.2006.09.004</a>
  bibtex: '@article{Meer_Ziegler_2008, title={An explicit solution to Post’s Problem
    over the reals}, DOI={<a href="https://doi.org/10.1016/j.jco.2006.09.004">10.1016/j.jco.2006.09.004</a>},
    journal={Journal of Complexity}, author={Meer, Klaus and Ziegler, Martin}, year={2008},
    pages={3–15} }'
  chicago: Meer, Klaus, and Martin Ziegler. “An Explicit Solution to Post’s Problem
    over the Reals.” <i>Journal of Complexity</i>, 2008, 3–15. <a href="https://doi.org/10.1016/j.jco.2006.09.004">https://doi.org/10.1016/j.jco.2006.09.004</a>.
  ieee: 'K. Meer and M. Ziegler, “An explicit solution to Post’s Problem over the
    reals,” <i>Journal of Complexity</i>, pp. 3–15, 2008, doi: <a href="https://doi.org/10.1016/j.jco.2006.09.004">10.1016/j.jco.2006.09.004</a>.'
  mla: Meer, Klaus, and Martin Ziegler. “An Explicit Solution to Post’s Problem over
    the Reals.” <i>Journal of Complexity</i>, 2008, pp. 3–15, doi:<a href="https://doi.org/10.1016/j.jco.2006.09.004">10.1016/j.jco.2006.09.004</a>.
  short: K. Meer, M. Ziegler, Journal of Complexity (2008) 3–15.
date_created: 2021-10-15T12:42:15Z
date_updated: 2022-01-06T06:57:18Z
department:
- _id: '63'
- _id: '26'
doi: 10.1016/j.jco.2006.09.004
language:
- iso: eng
page: 3-15
publication: Journal of Complexity
publication_identifier:
  issn:
  - 0885-064X
publication_status: published
status: public
title: An explicit solution to Post's Problem over the reals
type: journal_article
user_id: '15415'
year: '2008'
...
---
_id: '3203'
author:
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Wehrheim H. Refinement in the Presence of Unknowns. <i>Electr Notes Theor Comput
    Sci</i>. 2008:255--264. doi:<a href="https://doi.org/10.1016/j.entcs.2008.02.023">10.1016/j.entcs.2008.02.023</a>
  apa: Wehrheim, H. (2008). Refinement in the Presence of Unknowns. <i>Electr. Notes
    Theor. Comput. Sci.</i>, 255--264. <a href="https://doi.org/10.1016/j.entcs.2008.02.023">https://doi.org/10.1016/j.entcs.2008.02.023</a>
  bibtex: '@article{Wehrheim_2008, title={Refinement in the Presence of Unknowns},
    DOI={<a href="https://doi.org/10.1016/j.entcs.2008.02.023">10.1016/j.entcs.2008.02.023</a>},
    journal={Electr. Notes Theor. Comput. Sci.}, author={Wehrheim, Heike}, year={2008},
    pages={255--264} }'
  chicago: Wehrheim, Heike. “Refinement in the Presence of Unknowns.” <i>Electr. Notes
    Theor. Comput. Sci.</i>, 2008, 255--264. <a href="https://doi.org/10.1016/j.entcs.2008.02.023">https://doi.org/10.1016/j.entcs.2008.02.023</a>.
  ieee: H. Wehrheim, “Refinement in the Presence of Unknowns,” <i>Electr. Notes Theor.
    Comput. Sci.</i>, pp. 255--264, 2008.
  mla: Wehrheim, Heike. “Refinement in the Presence of Unknowns.” <i>Electr. Notes
    Theor. Comput. Sci.</i>, 2008, pp. 255--264, doi:<a href="https://doi.org/10.1016/j.entcs.2008.02.023">10.1016/j.entcs.2008.02.023</a>.
  short: H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2008) 255--264.
date_created: 2018-06-13T09:45:42Z
date_updated: 2022-01-06T06:59:04Z
department:
- _id: '77'
doi: 10.1016/j.entcs.2008.02.023
page: 255--264
publication: Electr. Notes Theor. Comput. Sci.
status: public
title: Refinement in the Presence of Unknowns
type: journal_article
user_id: '29719'
year: '2008'
...
---
_id: '3204'
author:
- first_name: H.{-}Christian
  full_name: Estler, H.{-}Christian
  last_name: Estler
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Estler H.-}Christian, Wehrheim H. Alloy as a Refactoring Checker? <i>Electr
    Notes Theor Comput Sci</i>. 2008:331--357. doi:<a href="https://doi.org/10.1016/j.entcs.2008.06.015">10.1016/j.entcs.2008.06.015</a>
  apa: Estler, H. .-}Christian, &#38; Wehrheim, H. (2008). Alloy as a Refactoring
    Checker? <i>Electr. Notes Theor. Comput. Sci.</i>, 331--357. <a href="https://doi.org/10.1016/j.entcs.2008.06.015">https://doi.org/10.1016/j.entcs.2008.06.015</a>
  bibtex: '@article{Estler_Wehrheim_2008, title={Alloy as a Refactoring Checker?},
    DOI={<a href="https://doi.org/10.1016/j.entcs.2008.06.015">10.1016/j.entcs.2008.06.015</a>},
    journal={Electr. Notes Theor. Comput. Sci.}, author={Estler, H.{-}Christian and
    Wehrheim, Heike}, year={2008}, pages={331--357} }'
  chicago: Estler, H.{-}Christian, and Heike Wehrheim. “Alloy as a Refactoring Checker?”
    <i>Electr. Notes Theor. Comput. Sci.</i>, 2008, 331--357. <a href="https://doi.org/10.1016/j.entcs.2008.06.015">https://doi.org/10.1016/j.entcs.2008.06.015</a>.
  ieee: H. .-}Christian Estler and H. Wehrheim, “Alloy as a Refactoring Checker?,”
    <i>Electr. Notes Theor. Comput. Sci.</i>, pp. 331--357, 2008.
  mla: Estler, H. .. }Christian, and Heike Wehrheim. “Alloy as a Refactoring Checker?”
    <i>Electr. Notes Theor. Comput. Sci.</i>, 2008, pp. 331--357, doi:<a href="https://doi.org/10.1016/j.entcs.2008.06.015">10.1016/j.entcs.2008.06.015</a>.
  short: H..-}Christian Estler, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2008)
    331--357.
date_created: 2018-06-13T09:47:06Z
date_updated: 2022-01-06T06:59:04Z
department:
- _id: '77'
doi: 10.1016/j.entcs.2008.06.015
page: 331--357
publication: Electr. Notes Theor. Comput. Sci.
status: public
title: Alloy as a Refactoring Checker?
type: journal_article
user_id: '29719'
year: '2008'
...
---
_id: '3205'
author:
- first_name: Michael
  full_name: Möller, Michael
  last_name: Möller
- first_name: Ernst-Rüdiger
  full_name: Olderog, Ernst-Rüdiger
  last_name: Olderog
- first_name: Holger
  full_name: Rasch, Holger
  last_name: Rasch
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Möller M, Olderog E-R, Rasch H, Wehrheim H. Integrating a formal method into
    a software engineering process with {UML} and Java. <i>Formal Asp Comput</i>.
    2008;(2):161--204. doi:<a href="https://doi.org/10.1007/s00165-007-0042-7">10.1007/s00165-007-0042-7</a>
  apa: Möller, M., Olderog, E.-R., Rasch, H., &#38; Wehrheim, H. (2008). Integrating
    a formal method into a software engineering process with {UML} and Java. <i>Formal
    Asp. Comput.</i>, (2), 161--204. <a href="https://doi.org/10.1007/s00165-007-0042-7">https://doi.org/10.1007/s00165-007-0042-7</a>
  bibtex: '@article{Möller_Olderog_Rasch_Wehrheim_2008, title={Integrating a formal
    method into a software engineering process with {UML} and Java}, DOI={<a href="https://doi.org/10.1007/s00165-007-0042-7">10.1007/s00165-007-0042-7</a>},
    number={2}, journal={Formal Asp. Comput.}, author={Möller, Michael and Olderog,
    Ernst-Rüdiger and Rasch, Holger and Wehrheim, Heike}, year={2008}, pages={161--204}
    }'
  chicago: 'Möller, Michael, Ernst-Rüdiger Olderog, Holger Rasch, and Heike Wehrheim.
    “Integrating a Formal Method into a Software Engineering Process with {UML} and
    Java.” <i>Formal Asp. Comput.</i>, no. 2 (2008): 161--204. <a href="https://doi.org/10.1007/s00165-007-0042-7">https://doi.org/10.1007/s00165-007-0042-7</a>.'
  ieee: M. Möller, E.-R. Olderog, H. Rasch, and H. Wehrheim, “Integrating a formal
    method into a software engineering process with {UML} and Java,” <i>Formal Asp.
    Comput.</i>, no. 2, pp. 161--204, 2008.
  mla: Möller, Michael, et al. “Integrating a Formal Method into a Software Engineering
    Process with {UML} and Java.” <i>Formal Asp. Comput.</i>, no. 2, 2008, pp. 161--204,
    doi:<a href="https://doi.org/10.1007/s00165-007-0042-7">10.1007/s00165-007-0042-7</a>.
  short: M. Möller, E.-R. Olderog, H. Rasch, H. Wehrheim, Formal Asp. Comput. (2008)
    161--204.
date_created: 2018-06-13T09:48:29Z
date_updated: 2022-01-06T06:59:04Z
department:
- _id: '77'
doi: 10.1007/s00165-007-0042-7
issue: '2'
page: 161--204
publication: Formal Asp. Comput.
status: public
title: Integrating a formal method into a software engineering process with {UML}
  and Java
type: journal_article
user_id: '29719'
year: '2008'
...
---
_id: '3206'
author:
- first_name: Ingo
  full_name: Brückner, Ingo
  last_name: Brückner
- first_name: Klaus
  full_name: Dräger, Klaus
  last_name: Dräger
- first_name: Bernd
  full_name: Finkbeiner, Bernd
  last_name: Finkbeiner
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Brückner I, Dräger K, Finkbeiner B, Wehrheim H. Slicing Abstractions. <i>Fundam
    Inform</i>. 2008;(4):369--392.
  apa: Brückner, I., Dräger, K., Finkbeiner, B., &#38; Wehrheim, H. (2008). Slicing
    Abstractions. <i>Fundam. Inform.</i>, (4), 369--392.
  bibtex: '@article{Brückner_Dräger_Finkbeiner_Wehrheim_2008, title={Slicing Abstractions},
    number={4}, journal={Fundam. Inform.}, author={Brückner, Ingo and Dräger, Klaus
    and Finkbeiner, Bernd and Wehrheim, Heike}, year={2008}, pages={369--392} }'
  chicago: 'Brückner, Ingo, Klaus Dräger, Bernd Finkbeiner, and Heike Wehrheim. “Slicing
    Abstractions.” <i>Fundam. Inform.</i>, no. 4 (2008): 369--392.'
  ieee: I. Brückner, K. Dräger, B. Finkbeiner, and H. Wehrheim, “Slicing Abstractions,”
    <i>Fundam. Inform.</i>, no. 4, pp. 369--392, 2008.
  mla: Brückner, Ingo, et al. “Slicing Abstractions.” <i>Fundam. Inform.</i>, no.
    4, 2008, pp. 369--392.
  short: I. Brückner, K. Dräger, B. Finkbeiner, H. Wehrheim, Fundam. Inform. (2008)
    369--392.
date_created: 2018-06-13T09:50:07Z
date_updated: 2022-01-06T06:59:04Z
department:
- _id: '77'
issue: '4'
page: 369--392
publication: Fundam. Inform.
status: public
title: Slicing Abstractions
type: journal_article
user_id: '29719'
year: '2008'
...
---
_id: '3207'
author:
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
- first_name: Anneke
  full_name: Kleppe, Anneke
  last_name: Kleppe
- first_name: Arend
  full_name: Rensink, Arend
  last_name: Rensink
- first_name: Maria
  full_name: Semenyak, Maria
  last_name: Semenyak
- first_name: Christian
  full_name: Soltenborn, Christian
  id: '1737'
  last_name: Soltenborn
  orcid: 0000-0002-0342-8227
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Engels G, Kleppe A, Rensink A, Semenyak M, Soltenborn C, Wehrheim H. From
    {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations.
    In: Schieferdecker I, Hartman A, eds. <i>Model Driven Architecture - Foundations
    and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June
    9-13, 2008. Proceedings</i>. Lecture Notes in Computer Science. ; 2008:94--109.
    doi:<a href="https://doi.org/10.1007/978-3-540-69100-6_7">10.1007/978-3-540-69100-6_7</a>'
  apa: Engels, G., Kleppe, A., Rensink, A., Semenyak, M., Soltenborn, C., &#38; Wehrheim,
    H. (2008). From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model
    Transformations. In I. Schieferdecker &#38; A. Hartman (Eds.), <i>Model Driven
    Architecture - Foundations and Applications, 4th European Conference, {ECMDA-FA}
    2008, Berlin, Germany, June 9-13, 2008. Proceedings</i> (pp. 94--109). <a href="https://doi.org/10.1007/978-3-540-69100-6_7">https://doi.org/10.1007/978-3-540-69100-6_7</a>
  bibtex: '@inproceedings{Engels_Kleppe_Rensink_Semenyak_Soltenborn_Wehrheim_2008,
    series={Lecture Notes in Computer Science}, title={From {UML} Activities to {TAAL}
    - Towards Behaviour-Preserving Model Transformations}, DOI={<a href="https://doi.org/10.1007/978-3-540-69100-6_7">10.1007/978-3-540-69100-6_7</a>},
    booktitle={Model Driven Architecture - Foundations and Applications, 4th European
    Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings}, author={Engels,
    Gregor and Kleppe, Anneke and Rensink, Arend and Semenyak, Maria and Soltenborn,
    Christian and Wehrheim, Heike}, editor={Schieferdecker, Ina and Hartman, AlanEditors},
    year={2008}, pages={94--109}, collection={Lecture Notes in Computer Science} }'
  chicago: Engels, Gregor, Anneke Kleppe, Arend Rensink, Maria Semenyak, Christian
    Soltenborn, and Heike Wehrheim. “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving
    Model Transformations.” In <i>Model Driven Architecture - Foundations and Applications,
    4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings</i>,
    edited by Ina Schieferdecker and Alan Hartman, 94--109. Lecture Notes in Computer
    Science, 2008. <a href="https://doi.org/10.1007/978-3-540-69100-6_7">https://doi.org/10.1007/978-3-540-69100-6_7</a>.
  ieee: G. Engels, A. Kleppe, A. Rensink, M. Semenyak, C. Soltenborn, and H. Wehrheim,
    “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations,”
    in <i>Model Driven Architecture - Foundations and Applications, 4th European Conference,
    {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings</i>, 2008, pp.
    94--109.
  mla: Engels, Gregor, et al. “From {UML} Activities to {TAAL} - Towards Behaviour-Preserving
    Model Transformations.” <i>Model Driven Architecture - Foundations and Applications,
    4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings</i>,
    edited by Ina Schieferdecker and Alan Hartman, 2008, pp. 94--109, doi:<a href="https://doi.org/10.1007/978-3-540-69100-6_7">10.1007/978-3-540-69100-6_7</a>.
  short: 'G. Engels, A. Kleppe, A. Rensink, M. Semenyak, C. Soltenborn, H. Wehrheim,
    in: I. Schieferdecker, A. Hartman (Eds.), Model Driven Architecture - Foundations
    and Applications, 4th European Conference, {ECMDA-FA} 2008, Berlin, Germany, June
    9-13, 2008. Proceedings, 2008, pp. 94--109.'
date_created: 2018-06-13T09:51:29Z
date_updated: 2022-01-06T06:59:04Z
department:
- _id: '77'
doi: 10.1007/978-3-540-69100-6_7
editor:
- first_name: Ina
  full_name: Schieferdecker, Ina
  last_name: Schieferdecker
- first_name: Alan
  full_name: Hartman, Alan
  last_name: Hartman
language:
- iso: eng
page: 94--109
publication: Model Driven Architecture - Foundations and Applications, 4th European
  Conference, {ECMDA-FA} 2008, Berlin, Germany, June 9-13, 2008. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: From {UML} Activities to {TAAL} - Towards Behaviour-Preserving Model Transformations
type: conference
user_id: '14955'
year: '2008'
...
---
_id: '3208'
author:
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Gerhard
  full_name: Schellhorn, Gerhard
  last_name: Schellhorn
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Derrick J, Schellhorn G, Wehrheim H. Mechanizing a Correctness Proof for a
    Lock-Free Concurrent Stack. In: Barthe G, S. de Boer F, eds. <i>Formal Methods
    for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International
    Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings</i>. Lecture
    Notes in Computer Science. ; 2008:78--95. doi:<a href="https://doi.org/10.1007/978-3-540-68863-1_6">10.1007/978-3-540-68863-1_6</a>'
  apa: Derrick, J., Schellhorn, G., &#38; Wehrheim, H. (2008). Mechanizing a Correctness
    Proof for a Lock-Free Concurrent Stack. In G. Barthe &#38; F. S. de Boer (Eds.),
    <i>Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG}
    6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings</i>
    (pp. 78--95). <a href="https://doi.org/10.1007/978-3-540-68863-1_6">https://doi.org/10.1007/978-3-540-68863-1_6</a>
  bibtex: '@inproceedings{Derrick_Schellhorn_Wehrheim_2008, series={Lecture Notes
    in Computer Science}, title={Mechanizing a Correctness Proof for a Lock-Free Concurrent
    Stack}, DOI={<a href="https://doi.org/10.1007/978-3-540-68863-1_6">10.1007/978-3-540-68863-1_6</a>},
    booktitle={Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP}
    {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008,
    Proceedings}, author={Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike},
    editor={Barthe, Gilles and S. de Boer, FrankEditors}, year={2008}, pages={78--95},
    collection={Lecture Notes in Computer Science} }'
  chicago: Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Mechanizing a Correctness
    Proof for a Lock-Free Concurrent Stack.” In <i>Formal Methods for Open Object-Based
    Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008,
    Oslo, Norway, June 4-6, 2008, Proceedings</i>, edited by Gilles Barthe and Frank
    S. de Boer, 78--95. Lecture Notes in Computer Science, 2008. <a href="https://doi.org/10.1007/978-3-540-68863-1_6">https://doi.org/10.1007/978-3-540-68863-1_6</a>.
  ieee: J. Derrick, G. Schellhorn, and H. Wehrheim, “Mechanizing a Correctness Proof
    for a Lock-Free Concurrent Stack,” in <i>Formal Methods for Open Object-Based
    Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008,
    Oslo, Norway, June 4-6, 2008, Proceedings</i>, 2008, pp. 78--95.
  mla: Derrick, John, et al. “Mechanizing a Correctness Proof for a Lock-Free Concurrent
    Stack.” <i>Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP}
    {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008,
    Proceedings</i>, edited by Gilles Barthe and Frank S. de Boer, 2008, pp. 78--95,
    doi:<a href="https://doi.org/10.1007/978-3-540-68863-1_6">10.1007/978-3-540-68863-1_6</a>.
  short: 'J. Derrick, G. Schellhorn, H. Wehrheim, in: G. Barthe, F. S. de Boer (Eds.),
    Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1
    International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings,
    2008, pp. 78--95.'
date_created: 2018-06-13T09:52:29Z
date_updated: 2022-01-06T06:59:04Z
department:
- _id: '77'
doi: 10.1007/978-3-540-68863-1_6
editor:
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Frank
  full_name: S. de Boer, Frank
  last_name: S. de Boer
page: 78--95
publication: Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP}
  {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008,
  Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Mechanizing a Correctness Proof for a Lock-Free Concurrent Stack
type: conference
user_id: '29719'
year: '2008'
...
---
_id: '3209'
author:
- first_name: Björn
  full_name: Metzler, Björn
  last_name: Metzler
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
- first_name: Daniel
  full_name: Wonisch, Daniel
  last_name: Wonisch
citation:
  ama: 'Metzler B, Wehrheim H, Wonisch D. Decomposition for Compositional Verification.
    In: Liu S, S. E. Maibaum T, Araki K, eds. <i>Formal Methods and Software Engineering,
    10th International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City,
    Japan, October 27-31, 2008. Proceedings</i>. Lecture Notes in Computer Science.
    ; 2008:105--125. doi:<a href="https://doi.org/10.1007/978-3-540-88194-0_9">10.1007/978-3-540-88194-0_9</a>'
  apa: Metzler, B., Wehrheim, H., &#38; Wonisch, D. (2008). Decomposition for Compositional
    Verification. In S. Liu, T. S. E. Maibaum, &#38; K. Araki (Eds.), <i>Formal Methods
    and Software Engineering, 10th International Conference on Formal Engineering
    Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings</i>
    (pp. 105--125). <a href="https://doi.org/10.1007/978-3-540-88194-0_9">https://doi.org/10.1007/978-3-540-88194-0_9</a>
  bibtex: '@inproceedings{Metzler_Wehrheim_Wonisch_2008, series={Lecture Notes in
    Computer Science}, title={Decomposition for Compositional Verification}, DOI={<a
    href="https://doi.org/10.1007/978-3-540-88194-0_9">10.1007/978-3-540-88194-0_9</a>},
    booktitle={Formal Methods and Software Engineering, 10th International Conference
    on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31,
    2008. Proceedings}, author={Metzler, Björn and Wehrheim, Heike and Wonisch, Daniel},
    editor={Liu, Shaoying and S. E. Maibaum, T. and Araki, KeijiroEditors}, year={2008},
    pages={105--125}, collection={Lecture Notes in Computer Science} }'
  chicago: Metzler, Björn, Heike Wehrheim, and Daniel Wonisch. “Decomposition for
    Compositional Verification.” In <i>Formal Methods and Software Engineering, 10th
    International Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City,
    Japan, October 27-31, 2008. Proceedings</i>, edited by Shaoying Liu, T. S. E.
    Maibaum, and Keijiro Araki, 105--125. Lecture Notes in Computer Science, 2008.
    <a href="https://doi.org/10.1007/978-3-540-88194-0_9">https://doi.org/10.1007/978-3-540-88194-0_9</a>.
  ieee: B. Metzler, H. Wehrheim, and D. Wonisch, “Decomposition for Compositional
    Verification,” in <i>Formal Methods and Software Engineering, 10th International
    Conference on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan,
    October 27-31, 2008. Proceedings</i>, 2008, pp. 105--125.
  mla: Metzler, Björn, et al. “Decomposition for Compositional Verification.” <i>Formal
    Methods and Software Engineering, 10th International Conference on Formal Engineering
    Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings</i>,
    edited by Shaoying Liu et al., 2008, pp. 105--125, doi:<a href="https://doi.org/10.1007/978-3-540-88194-0_9">10.1007/978-3-540-88194-0_9</a>.
  short: 'B. Metzler, H. Wehrheim, D. Wonisch, in: S. Liu, T. S. E. Maibaum, K. Araki
    (Eds.), Formal Methods and Software Engineering, 10th International Conference
    on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31,
    2008. Proceedings, 2008, pp. 105--125.'
date_created: 2018-06-13T09:53:43Z
date_updated: 2022-01-06T06:59:04Z
department:
- _id: '77'
doi: 10.1007/978-3-540-88194-0_9
editor:
- first_name: Shaoying
  full_name: Liu, Shaoying
  last_name: Liu
- first_name: T.
  full_name: S. E. Maibaum, T.
  last_name: S. E. Maibaum
- first_name: Keijiro
  full_name: Araki, Keijiro
  last_name: Araki
page: 105--125
publication: Formal Methods and Software Engineering, 10th International Conference
  on Formal Engineering Methods, {ICFEM} 2008, Kitakyushu-City, Japan, October 27-31,
  2008. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Decomposition for Compositional Verification
type: conference
user_id: '29719'
year: '2008'
...
---
_id: '3210'
author:
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Wehrheim H. Bounded Model Checking for Partial Kripke Structures. In: S. Fitzgerald
    J, Elisabeth Haxthausen A, Yenig{\"{u}}n H, eds. <i>Theoretical Aspects of Computing
    - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3,
    2008. Proceedings</i>. Lecture Notes in Computer Science. ; 2008:380--394. doi:<a
    href="https://doi.org/10.1007/978-3-540-85762-4_26">10.1007/978-3-540-85762-4_26</a>'
  apa: Wehrheim, H. (2008). Bounded Model Checking for Partial Kripke Structures.
    In J. S. Fitzgerald, A. Elisabeth Haxthausen, &#38; H. Yenig{\"{u}}n (Eds.), <i>Theoretical
    Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey,
    September 1-3, 2008. Proceedings</i> (pp. 380--394). <a href="https://doi.org/10.1007/978-3-540-85762-4_26">https://doi.org/10.1007/978-3-540-85762-4_26</a>
  bibtex: '@inproceedings{Wehrheim_2008, series={Lecture Notes in Computer Science},
    title={Bounded Model Checking for Partial Kripke Structures}, DOI={<a href="https://doi.org/10.1007/978-3-540-85762-4_26">10.1007/978-3-540-85762-4_26</a>},
    booktitle={Theoretical Aspects of Computing - {ICTAC} 2008, 5th International
    Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings}, author={Wehrheim,
    Heike}, editor={S. Fitzgerald, John and Elisabeth Haxthausen, Anne and Yenig{\"{u}}n,
    H{\"{u}}sn{\"{u}}Editors}, year={2008}, pages={380--394}, collection={Lecture
    Notes in Computer Science} }'
  chicago: Wehrheim, Heike. “Bounded Model Checking for Partial Kripke Structures.”
    In <i>Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium,
    Istanbul, Turkey, September 1-3, 2008. Proceedings</i>, edited by John S. Fitzgerald,
    Anne Elisabeth Haxthausen, and H{\"{u}}sn{\"{u}} Yenig{\"{u}}n, 380--394. Lecture
    Notes in Computer Science, 2008. <a href="https://doi.org/10.1007/978-3-540-85762-4_26">https://doi.org/10.1007/978-3-540-85762-4_26</a>.
  ieee: H. Wehrheim, “Bounded Model Checking for Partial Kripke Structures,” in <i>Theoretical
    Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey,
    September 1-3, 2008. Proceedings</i>, 2008, pp. 380--394.
  mla: Wehrheim, Heike. “Bounded Model Checking for Partial Kripke Structures.” <i>Theoretical
    Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey,
    September 1-3, 2008. Proceedings</i>, edited by John S. Fitzgerald et al., 2008,
    pp. 380--394, doi:<a href="https://doi.org/10.1007/978-3-540-85762-4_26">10.1007/978-3-540-85762-4_26</a>.
  short: 'H. Wehrheim, in: J. S. Fitzgerald, A. Elisabeth Haxthausen, H. Yenig{\"{u}}n
    (Eds.), Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium,
    Istanbul, Turkey, September 1-3, 2008. Proceedings, 2008, pp. 380--394.'
date_created: 2018-06-13T09:54:58Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1007/978-3-540-85762-4_26
editor:
- first_name: John
  full_name: S. Fitzgerald, John
  last_name: S. Fitzgerald
- first_name: Anne
  full_name: Elisabeth Haxthausen, Anne
  last_name: Elisabeth Haxthausen
- first_name: H{\"{u}}sn{\"{u}}
  full_name: Yenig{\"{u}}n, H{\"{u}}sn{\"{u}}
  last_name: Yenig{\"{u}}n
page: 380--394
publication: Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium,
  Istanbul, Turkey, September 1-3, 2008. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Bounded Model Checking for Partial Kripke Structures
type: conference
user_id: '29719'
year: '2008'
...
---
_id: '3001'
author:
- first_name: Claudius
  full_name: Stern, Claudius
  last_name: Stern
- first_name: Philipp
  full_name: Adelt, Philipp
  last_name: Adelt
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
- first_name: Marcel Rudolf
  full_name: Ackermann, Marcel Rudolf
  last_name: Ackermann
citation:
  ama: 'Stern C, Adelt P, Krummel V, Ackermann MR. Reliable Evidence of Data Integrity
    from an Untrusted Storage Service. In: <i>Fourth International Conference on Networking
    and Services (Icns 2008)</i>. IEEE; 2008. doi:<a href="https://doi.org/10.1109/icns.2008.28">10.1109/icns.2008.28</a>'
  apa: Stern, C., Adelt, P., Krummel, V., &#38; Ackermann, M. R. (2008). Reliable
    Evidence of Data Integrity from an Untrusted Storage Service. In <i>Fourth International
    Conference on Networking and Services (icns 2008)</i>. IEEE. <a href="https://doi.org/10.1109/icns.2008.28">https://doi.org/10.1109/icns.2008.28</a>
  bibtex: '@inproceedings{Stern_Adelt_Krummel_Ackermann_2008, title={Reliable Evidence
    of Data Integrity from an Untrusted Storage Service}, DOI={<a href="https://doi.org/10.1109/icns.2008.28">10.1109/icns.2008.28</a>},
    booktitle={Fourth International Conference on Networking and Services (icns 2008)},
    publisher={IEEE}, author={Stern, Claudius and Adelt, Philipp and Krummel, Volker
    and Ackermann, Marcel Rudolf}, year={2008} }'
  chicago: Stern, Claudius, Philipp Adelt, Volker Krummel, and Marcel Rudolf Ackermann.
    “Reliable Evidence of Data Integrity from an Untrusted Storage Service.” In <i>Fourth
    International Conference on Networking and Services (Icns 2008)</i>. IEEE, 2008.
    <a href="https://doi.org/10.1109/icns.2008.28">https://doi.org/10.1109/icns.2008.28</a>.
  ieee: C. Stern, P. Adelt, V. Krummel, and M. R. Ackermann, “Reliable Evidence of
    Data Integrity from an Untrusted Storage Service,” in <i>Fourth International
    Conference on Networking and Services (icns 2008)</i>, 2008.
  mla: Stern, Claudius, et al. “Reliable Evidence of Data Integrity from an Untrusted
    Storage Service.” <i>Fourth International Conference on Networking and Services
    (Icns 2008)</i>, IEEE, 2008, doi:<a href="https://doi.org/10.1109/icns.2008.28">10.1109/icns.2008.28</a>.
  short: 'C. Stern, P. Adelt, V. Krummel, M.R. Ackermann, in: Fourth International
    Conference on Networking and Services (Icns 2008), IEEE, 2008.'
date_created: 2018-06-05T08:10:19Z
date_updated: 2022-01-06T06:58:50Z
department:
- _id: '64'
- _id: '70'
doi: 10.1109/icns.2008.28
publication: Fourth International Conference on Networking and Services (icns 2008)
publication_identifier:
  isbn:
  - '9780769530949'
publication_status: published
publisher: IEEE
status: public
title: Reliable Evidence of Data Integrity from an Untrusted Storage Service
type: conference
user_id: '25078'
year: '2008'
...
---
_id: '3143'
author:
- first_name: Sebastian
  full_name: Gajek, Sebastian
  last_name: Gajek
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Mark
  full_name: Manulis, Mark
  last_name: Manulis
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Gajek S, Jager T, Manulis M, Schwenk J. A Browser-Based Kerberos Authentication
    Scheme. In: <i>Computer Security - ESORICS 2008, 13th European Symposium on Research
    in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>. ; 2008:115--129.
    doi:<a href="https://doi.org/10.1007/978-3-540-88313-5_8">10.1007/978-3-540-88313-5_8</a>'
  apa: Gajek, S., Jager, T., Manulis, M., &#38; Schwenk, J. (2008). A Browser-Based
    Kerberos Authentication Scheme. In <i>Computer Security - ESORICS 2008, 13th European
    Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008.
    Proceedings</i> (pp. 115--129). <a href="https://doi.org/10.1007/978-3-540-88313-5_8">https://doi.org/10.1007/978-3-540-88313-5_8</a>
  bibtex: '@inproceedings{Gajek_Jager_Manulis_Schwenk_2008, title={A Browser-Based
    Kerberos Authentication Scheme}, DOI={<a href="https://doi.org/10.1007/978-3-540-88313-5_8">10.1007/978-3-540-88313-5_8</a>},
    booktitle={Computer Security - ESORICS 2008, 13th European Symposium on Research
    in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings}, author={Gajek,
    Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg}, year={2008},
    pages={115--129} }'
  chicago: Gajek, Sebastian, Tibor Jager, Mark Manulis, and Jörg Schwenk. “A Browser-Based
    Kerberos Authentication Scheme.” In <i>Computer Security - ESORICS 2008, 13th
    European Symposium on Research in Computer Security, Málaga, Spain, October 6-8,
    2008. Proceedings</i>, 115--129, 2008. <a href="https://doi.org/10.1007/978-3-540-88313-5_8">https://doi.org/10.1007/978-3-540-88313-5_8</a>.
  ieee: S. Gajek, T. Jager, M. Manulis, and J. Schwenk, “A Browser-Based Kerberos
    Authentication Scheme,” in <i>Computer Security - ESORICS 2008, 13th European
    Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008.
    Proceedings</i>, 2008, pp. 115--129.
  mla: Gajek, Sebastian, et al. “A Browser-Based Kerberos Authentication Scheme.”
    <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer
    Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>, 2008, pp. 115--129,
    doi:<a href="https://doi.org/10.1007/978-3-540-88313-5_8">10.1007/978-3-540-88313-5_8</a>.
  short: 'S. Gajek, T. Jager, M. Manulis, J. Schwenk, in: Computer Security - ESORICS
    2008, 13th European Symposium on Research in Computer Security, Málaga, Spain,
    October 6-8, 2008. Proceedings, 2008, pp. 115--129.'
date_created: 2018-06-07T09:30:48Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-540-88313-5_8
extern: '1'
page: 115--129
publication: Computer Security - ESORICS 2008, 13th European Symposium on Research
  in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
status: public
title: A Browser-Based Kerberos Authentication Scheme
type: conference
user_id: '38235'
year: '2008'
...
---
_id: '3144'
author:
- first_name: Kristina
  full_name: Altmann, Kristina
  last_name: Altmann
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Altmann K, Jager T, Rupp A. On Black-Box Ring Extraction and Integer Factorization.
    In: <i>Automata, Languages and Programming, 35th International Colloquium, ICALP
    2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic,
    Semantics, and Theory of Programming &#38; Track C: Security and Cryptography
    Foundations</i>. ; 2008:437--448. doi:<a href="https://doi.org/10.1007/978-3-540-70583-3_36">10.1007/978-3-540-70583-3_36</a>'
  apa: 'Altmann, K., Jager, T., &#38; Rupp, A. (2008). On Black-Box Ring Extraction
    and Integer Factorization. In <i>Automata, Languages and Programming, 35th International
    Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
    II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security
    and Cryptography Foundations</i> (pp. 437--448). <a href="https://doi.org/10.1007/978-3-540-70583-3_36">https://doi.org/10.1007/978-3-540-70583-3_36</a>'
  bibtex: '@inproceedings{Altmann_Jager_Rupp_2008, title={On Black-Box Ring Extraction
    and Integer Factorization}, DOI={<a href="https://doi.org/10.1007/978-3-540-70583-3_36">10.1007/978-3-540-70583-3_36</a>},
    booktitle={Automata, Languages and Programming, 35th International Colloquium,
    ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track
    B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography
    Foundations}, author={Altmann, Kristina and Jager, Tibor and Rupp, Andy}, year={2008},
    pages={437--448} }'
  chicago: 'Altmann, Kristina, Tibor Jager, and Andy Rupp. “On Black-Box Ring Extraction
    and Integer Factorization.” In <i>Automata, Languages and Programming, 35th International
    Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
    II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security
    and Cryptography Foundations</i>, 437--448, 2008. <a href="https://doi.org/10.1007/978-3-540-70583-3_36">https://doi.org/10.1007/978-3-540-70583-3_36</a>.'
  ieee: 'K. Altmann, T. Jager, and A. Rupp, “On Black-Box Ring Extraction and Integer
    Factorization,” in <i>Automata, Languages and Programming, 35th International
    Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
    II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security
    and Cryptography Foundations</i>, 2008, pp. 437--448.'
  mla: 'Altmann, Kristina, et al. “On Black-Box Ring Extraction and Integer Factorization.”
    <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008,
    Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics,
    and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>,
    2008, pp. 437--448, doi:<a href="https://doi.org/10.1007/978-3-540-70583-3_36">10.1007/978-3-540-70583-3_36</a>.'
  short: 'K. Altmann, T. Jager, A. Rupp, in: Automata, Languages and Programming,
    35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008,
    Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38;
    Track C: Security and Cryptography Foundations, 2008, pp. 437--448.'
date_created: 2018-06-07T09:32:07Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-540-70583-3_36
extern: '1'
page: 437--448
publication: 'Automata, Languages and Programming, 35th International Colloquium,
  ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B:
  Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography
  Foundations'
status: public
title: On Black-Box Ring Extraction and Integer Factorization
type: conference
user_id: '38235'
year: '2008'
...
---
_id: '3145'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Jager T, Schwenk J. On the Equivalence of Generic Group Models. In: <i>Provable
    Security, Second International Conference, ProvSec 2008, Shanghai, China, October
    30 - November 1, 2008. Proceedings</i>. ; 2008:200--209. doi:<a href="https://doi.org/10.1007/978-3-540-88733-1_14">10.1007/978-3-540-88733-1_14</a>'
  apa: Jager, T., &#38; Schwenk, J. (2008). On the Equivalence of Generic Group Models.
    In <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings</i> (pp. 200--209). <a href="https://doi.org/10.1007/978-3-540-88733-1_14">https://doi.org/10.1007/978-3-540-88733-1_14</a>
  bibtex: '@inproceedings{Jager_Schwenk_2008, title={On the Equivalence of Generic
    Group Models}, DOI={<a href="https://doi.org/10.1007/978-3-540-88733-1_14">10.1007/978-3-540-88733-1_14</a>},
    booktitle={Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings}, author={Jager, Tibor and Schwenk,
    Jörg}, year={2008}, pages={200--209} }'
  chicago: Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.”
    In <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings</i>, 200--209, 2008. <a href="https://doi.org/10.1007/978-3-540-88733-1_14">https://doi.org/10.1007/978-3-540-88733-1_14</a>.
  ieee: T. Jager and J. Schwenk, “On the Equivalence of Generic Group Models,” in
    <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings</i>, 2008, pp. 200--209.
  mla: Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.”
    <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings</i>, 2008, pp. 200--209, doi:<a
    href="https://doi.org/10.1007/978-3-540-88733-1_14">10.1007/978-3-540-88733-1_14</a>.
  short: 'T. Jager, J. Schwenk, in: Provable Security, Second International Conference,
    ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 2008,
    pp. 200--209.'
date_created: 2018-06-07T09:32:53Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-540-88733-1_14
extern: '1'
page: 200--209
publication: Provable Security, Second International Conference, ProvSec 2008, Shanghai,
  China, October 30 - November 1, 2008. Proceedings
status: public
title: On the Equivalence of Generic Group Models
type: conference
user_id: '38235'
year: '2008'
...
---
_id: '3146'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Heiko
  full_name: Jäkel, Heiko
  last_name: Jäkel
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Jager T, Jäkel H, Schwenk J. Nutzung von selbstsignierten Client-Zertifikaten
    zur Authentifikation bei SSL/TLS. In: <i>Sicherheit 2008: Sicherheit, Schutz Und
    Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit
    Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i>
    ; 2008:127--136.'
  apa: 'Jager, T., Jäkel, H., &#38; Schwenk, J. (2008). Nutzung von selbstsignierten
    Client-Zertifikaten zur Authentifikation bei SSL/TLS. In <i>Sicherheit 2008: Sicherheit,
    Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs
    Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker
    Schloss.</i> (pp. 127--136).'
  bibtex: '@inproceedings{Jager_Jäkel_Schwenk_2008, title={Nutzung von selbstsignierten
    Client-Zertifikaten zur Authentifikation bei SSL/TLS}, booktitle={Sicherheit 2008:
    Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des
    Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April
    2008 im Saarbrücker Schloss.}, author={Jager, Tibor and Jäkel, Heiko and Schwenk,
    Jörg}, year={2008}, pages={127--136} }'
  chicago: 'Jager, Tibor, Heiko Jäkel, and Jörg Schwenk. “Nutzung von Selbstsignierten
    Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” In <i>Sicherheit 2008:
    Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des
    Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April
    2008 Im Saarbrücker Schloss.</i>, 127--136, 2008.'
  ieee: 'T. Jager, H. Jäkel, and J. Schwenk, “Nutzung von selbstsignierten Client-Zertifikaten
    zur Authentifikation bei SSL/TLS,” in <i>Sicherheit 2008: Sicherheit, Schutz und
    Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit
    der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.</i>,
    2008, pp. 127--136.'
  mla: 'Jager, Tibor, et al. “Nutzung von Selbstsignierten Client-Zertifikaten Zur
    Authentifikation Bei SSL/TLS.” <i>Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit.
    Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft
    Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i>, 2008,
    pp. 127--136.'
  short: 'T. Jager, H. Jäkel, J. Schwenk, in: Sicherheit 2008: Sicherheit, Schutz
    Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit
    Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.,
    2008, pp. 127--136.'
date_created: 2018-06-07T09:33:24Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
extern: '1'
page: 127--136
publication: 'Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband
  der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik
  e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.'
status: public
title: Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS
type: conference
user_id: '38235'
year: '2008'
...
---
_id: '20938'
author:
- first_name: Matthias
  full_name: Tichy, Matthias
  last_name: Tichy
- first_name: Stefan
  full_name: Henkler, Stefan
  last_name: Henkler
- first_name: Matthias
  full_name: Meyer, Matthias
  id: '683'
  last_name: Meyer
- first_name: Markus
  full_name: von Detten, Markus
  last_name: von Detten
citation:
  ama: 'Tichy M, Henkler S, Meyer M, von Detten M. Safety of Component-Based Systems:
    Analysis and Improvement using Fujaba4Eclipse. In: <i>Companion Proceedings of
    the 30th International Conference on Software Engineering (ICSE), Leipzig, Germany</i>.
    ; 2008.'
  apa: 'Tichy, M., Henkler, S., Meyer, M., &#38; von Detten, M. (2008). Safety of
    Component-Based Systems: Analysis and Improvement using Fujaba4Eclipse. <i>Companion
    Proceedings of the 30th International Conference on Software Engineering (ICSE),
    Leipzig, Germany</i>.'
  bibtex: '@inproceedings{Tichy_Henkler_Meyer_von Detten_2008, title={Safety of Component-Based
    Systems: Analysis and Improvement using Fujaba4Eclipse}, booktitle={Companion
    Proceedings of the 30th International Conference on Software Engineering (ICSE),
    Leipzig, Germany}, author={Tichy, Matthias and Henkler, Stefan and Meyer, Matthias
    and von Detten, Markus}, year={2008} }'
  chicago: 'Tichy, Matthias, Stefan Henkler, Matthias Meyer, and Markus von Detten.
    “Safety of Component-Based Systems: Analysis and Improvement Using Fujaba4Eclipse.”
    In <i>Companion Proceedings of the 30th International Conference on Software Engineering
    (ICSE), Leipzig, Germany</i>, 2008.'
  ieee: 'M. Tichy, S. Henkler, M. Meyer, and M. von Detten, “Safety of Component-Based
    Systems: Analysis and Improvement using Fujaba4Eclipse,” 2008.'
  mla: 'Tichy, Matthias, et al. “Safety of Component-Based Systems: Analysis and Improvement
    Using Fujaba4Eclipse.” <i>Companion Proceedings of the 30th International Conference
    on Software Engineering (ICSE), Leipzig, Germany</i>, 2008.'
  short: 'M. Tichy, S. Henkler, M. Meyer, M. von Detten, in: Companion Proceedings
    of the 30th International Conference on Software Engineering (ICSE), Leipzig,
    Germany, 2008.'
date_created: 2021-01-13T10:04:58Z
date_updated: 2022-01-06T06:54:41Z
department:
- _id: '76'
language:
- iso: eng
publication: Companion Proceedings of the 30th International Conference on Software
  Engineering (ICSE), Leipzig, Germany
status: public
title: 'Safety of Component-Based Systems: Analysis and Improvement using Fujaba4Eclipse'
type: conference
user_id: '5786'
year: '2008'
...
---
_id: '20957'
abstract:
- lang: eng
  text: 'In this paper, we report on a new approach of aspect-oriented modelling,
    which is particularly suited for domains with naturally born aspects as part of
    that domain: MoDowA for Modelling Domains with Aspects. Though these models are
    on a very high level of abstraction and could be made early in the development
    process, these models are fully operational in that they can be executed by an
    interpreter. This way, we shed a light on Aspect-oriented Modelling from a new,
    different angle.'
author:
- first_name: Ekkart
  full_name: Kindler, Ekkart
  last_name: Kindler
- first_name: David
  full_name: Schmelter, David
  id: '40982'
  last_name: Schmelter
  orcid: 0000-0001-7787-5380
citation:
  ama: 'Kindler E, Schmelter D. Aspect-oriented modelling from a different angle.
    In: <i>Proceedings of the 2008 AOSD Workshop on Aspect-Oriented Modeling - AOM
    ’08</i>. ; 2008. doi:<a href="https://doi.org/10.1145/1404920.1404922">10.1145/1404920.1404922</a>'
  apa: Kindler, E., &#38; Schmelter, D. (2008). Aspect-oriented modelling from a different
    angle. <i>Proceedings of the 2008 AOSD Workshop on Aspect-Oriented Modeling -
    AOM ’08</i>. <a href="https://doi.org/10.1145/1404920.1404922">https://doi.org/10.1145/1404920.1404922</a>
  bibtex: '@inproceedings{Kindler_Schmelter_2008, title={Aspect-oriented modelling
    from a different angle}, DOI={<a href="https://doi.org/10.1145/1404920.1404922">10.1145/1404920.1404922</a>},
    booktitle={Proceedings of the 2008 AOSD workshop on Aspect-oriented modeling -
    AOM ’08}, author={Kindler, Ekkart and Schmelter, David}, year={2008} }'
  chicago: Kindler, Ekkart, and David Schmelter. “Aspect-Oriented Modelling from a
    Different Angle.” In <i>Proceedings of the 2008 AOSD Workshop on Aspect-Oriented
    Modeling - AOM ’08</i>, 2008. <a href="https://doi.org/10.1145/1404920.1404922">https://doi.org/10.1145/1404920.1404922</a>.
  ieee: 'E. Kindler and D. Schmelter, “Aspect-oriented modelling from a different
    angle,” 2008, doi: <a href="https://doi.org/10.1145/1404920.1404922">10.1145/1404920.1404922</a>.'
  mla: Kindler, Ekkart, and David Schmelter. “Aspect-Oriented Modelling from a Different
    Angle.” <i>Proceedings of the 2008 AOSD Workshop on Aspect-Oriented Modeling -
    AOM ’08</i>, 2008, doi:<a href="https://doi.org/10.1145/1404920.1404922">10.1145/1404920.1404922</a>.
  short: 'E. Kindler, D. Schmelter, in: Proceedings of the 2008 AOSD Workshop on Aspect-Oriented
    Modeling - AOM ’08, 2008.'
date_created: 2021-01-13T10:48:57Z
date_updated: 2022-01-06T06:54:42Z
department:
- _id: '76'
doi: 10.1145/1404920.1404922
language:
- iso: eng
publication: Proceedings of the 2008 AOSD workshop on Aspect-oriented modeling - AOM
  '08
publication_identifier:
  isbn:
  - '9781605581453'
publication_status: published
status: public
title: Aspect-oriented modelling from a different angle
type: conference
user_id: '5786'
year: '2008'
...
