---
_id: '2022'
author:
- first_name: Baruch
  full_name: Awerbuch, Baruch
  last_name: Awerbuch
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Awerbuch B, Scheideler C. Towards Scalable and Robust Overlay Networks. In:
    <i>6th International Workshop on Peer-To-Peer Systems, IPTPS 2007, Bellevue, WA,
    USA, February 26-27, 2007</i>. ; 2007.'
  apa: Awerbuch, B., &#38; Scheideler, C. (2007). Towards Scalable and Robust Overlay
    Networks. In <i>6th International workshop on Peer-To-Peer Systems, IPTPS 2007,
    Bellevue, WA, USA, February 26-27, 2007</i>.
  bibtex: '@inproceedings{Awerbuch_Scheideler_2007, title={Towards Scalable and Robust
    Overlay Networks}, booktitle={6th International workshop on Peer-To-Peer Systems,
    IPTPS 2007, Bellevue, WA, USA, February 26-27, 2007}, author={Awerbuch, Baruch
    and Scheideler, Christian}, year={2007} }'
  chicago: Awerbuch, Baruch, and Christian Scheideler. “Towards Scalable and Robust
    Overlay Networks.” In <i>6th International Workshop on Peer-To-Peer Systems, IPTPS
    2007, Bellevue, WA, USA, February 26-27, 2007</i>, 2007.
  ieee: B. Awerbuch and C. Scheideler, “Towards Scalable and Robust Overlay Networks,”
    in <i>6th International workshop on Peer-To-Peer Systems, IPTPS 2007, Bellevue,
    WA, USA, February 26-27, 2007</i>, 2007.
  mla: Awerbuch, Baruch, and Christian Scheideler. “Towards Scalable and Robust Overlay
    Networks.” <i>6th International Workshop on Peer-To-Peer Systems, IPTPS 2007,
    Bellevue, WA, USA, February 26-27, 2007</i>, 2007.
  short: 'B. Awerbuch, C. Scheideler, in: 6th International Workshop on Peer-To-Peer
    Systems, IPTPS 2007, Bellevue, WA, USA, February 26-27, 2007, 2007.'
date_created: 2018-03-29T11:55:52Z
date_updated: 2022-01-06T06:54:23Z
ddc:
- '040'
department:
- _id: '79'
file:
- access_level: open_access
  content_type: application/pdf
  creator: florida
  date_created: 2018-04-13T10:00:55Z
  date_updated: 2018-04-13T10:00:55Z
  file_id: '2338'
  file_name: IPTPS07.pdf
  file_size: 191943
  relation: main_file
file_date_updated: 2018-04-13T10:00:55Z
has_accepted_license: '1'
oa: '1'
publication: 6th International workshop on Peer-To-Peer Systems, IPTPS 2007, Bellevue,
  WA, USA, February 26-27, 2007
status: public
title: Towards Scalable and Robust Overlay Networks
type: conference
urn: '20228'
user_id: '15504'
year: '2007'
...
---
_id: '2023'
author:
- first_name: Baruch
  full_name: Awerbuch, Baruch
  last_name: Awerbuch
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Awerbuch B, Scheideler C. A denial-of-service resistant DHT. In: <i>Proceedings
    of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing,
    PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i>. ACM; 2007:370--371.
    doi:<a href="https://doi.org/10.1145/1281100.1281178">10.1145/1281100.1281178</a>'
  apa: Awerbuch, B., &#38; Scheideler, C. (2007). A denial-of-service resistant DHT.
    In <i>Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed
    Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i> (pp. 370--371).
    ACM. <a href="https://doi.org/10.1145/1281100.1281178">https://doi.org/10.1145/1281100.1281178</a>
  bibtex: '@inproceedings{Awerbuch_Scheideler_2007, title={A denial-of-service resistant
    DHT}, DOI={<a href="https://doi.org/10.1145/1281100.1281178">10.1145/1281100.1281178</a>},
    booktitle={Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles
    of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007},
    publisher={ACM}, author={Awerbuch, Baruch and Scheideler, Christian}, year={2007},
    pages={370--371} }'
  chicago: Awerbuch, Baruch, and Christian Scheideler. “A Denial-of-Service Resistant
    DHT.” In <i>Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles
    of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i>,
    370--371. ACM, 2007. <a href="https://doi.org/10.1145/1281100.1281178">https://doi.org/10.1145/1281100.1281178</a>.
  ieee: B. Awerbuch and C. Scheideler, “A denial-of-service resistant DHT,” in <i>Proceedings
    of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing,
    PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i>, 2007, pp. 370--371.
  mla: Awerbuch, Baruch, and Christian Scheideler. “A Denial-of-Service Resistant
    DHT.” <i>Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of
    Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007</i>,
    ACM, 2007, pp. 370--371, doi:<a href="https://doi.org/10.1145/1281100.1281178">10.1145/1281100.1281178</a>.
  short: 'B. Awerbuch, C. Scheideler, in: Proceedings of the Twenty-Sixth Annual ACM
    Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon,
    USA, August 12-15, 2007, ACM, 2007, pp. 370--371.'
date_created: 2018-03-29T11:56:35Z
date_updated: 2022-01-06T06:54:24Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1145/1281100.1281178
file:
- access_level: open_access
  content_type: application/pdf
  creator: florida
  date_created: 2018-04-13T10:02:18Z
  date_updated: 2018-04-13T10:02:18Z
  file_id: '2340'
  file_name: DISC-07.pdf
  file_size: 193097
  relation: main_file
file_date_updated: 2018-04-13T10:02:18Z
has_accepted_license: '1'
oa: '1'
page: 370--371
publication: Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of
  Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007
publication_identifier:
  isbn:
  - 978-1-59593-616-5
publisher: ACM
status: public
title: A denial-of-service resistant DHT
type: conference
urn: '20237'
user_id: '15504'
year: '2007'
...
---
_id: '2024'
author:
- first_name: Baruch
  full_name: Awerbuch, Baruch
  last_name: Awerbuch
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Awerbuch B, Scheideler C. A Denial-of-Service Resistant DHT. In: <i>Distributed
    Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September
    24-26, 2007, Proceedings</i>. Vol 4731. Lecture Notes in Computer Science. Springer;
    2007:33--47. doi:<a href="https://doi.org/10.1007/978-3-540-75142-7_6">10.1007/978-3-540-75142-7_6</a>'
  apa: Awerbuch, B., &#38; Scheideler, C. (2007). A Denial-of-Service Resistant DHT.
    In <i>Distributed Computing, 21st International Symposium, DISC 2007, Lemesos,
    Cyprus, September 24-26, 2007, Proceedings</i> (Vol. 4731, pp. 33--47). Springer.
    <a href="https://doi.org/10.1007/978-3-540-75142-7_6">https://doi.org/10.1007/978-3-540-75142-7_6</a>
  bibtex: '@inproceedings{Awerbuch_Scheideler_2007, series={Lecture Notes in Computer
    Science}, title={A Denial-of-Service Resistant DHT}, volume={4731}, DOI={<a href="https://doi.org/10.1007/978-3-540-75142-7_6">10.1007/978-3-540-75142-7_6</a>},
    booktitle={Distributed Computing, 21st International Symposium, DISC 2007, Lemesos,
    Cyprus, September 24-26, 2007, Proceedings}, publisher={Springer}, author={Awerbuch,
    Baruch and Scheideler, Christian}, year={2007}, pages={33--47}, collection={Lecture
    Notes in Computer Science} }'
  chicago: Awerbuch, Baruch, and Christian Scheideler. “A Denial-of-Service Resistant
    DHT.” In <i>Distributed Computing, 21st International Symposium, DISC 2007, Lemesos,
    Cyprus, September 24-26, 2007, Proceedings</i>, 4731:33--47. Lecture Notes in
    Computer Science. Springer, 2007. <a href="https://doi.org/10.1007/978-3-540-75142-7_6">https://doi.org/10.1007/978-3-540-75142-7_6</a>.
  ieee: B. Awerbuch and C. Scheideler, “A Denial-of-Service Resistant DHT,” in <i>Distributed
    Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September
    24-26, 2007, Proceedings</i>, 2007, vol. 4731, pp. 33--47.
  mla: Awerbuch, Baruch, and Christian Scheideler. “A Denial-of-Service Resistant
    DHT.” <i>Distributed Computing, 21st International Symposium, DISC 2007, Lemesos,
    Cyprus, September 24-26, 2007, Proceedings</i>, vol. 4731, Springer, 2007, pp.
    33--47, doi:<a href="https://doi.org/10.1007/978-3-540-75142-7_6">10.1007/978-3-540-75142-7_6</a>.
  short: 'B. Awerbuch, C. Scheideler, in: Distributed Computing, 21st International
    Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings, Springer,
    2007, pp. 33--47.'
date_created: 2018-03-29T11:57:42Z
date_updated: 2022-01-06T06:54:24Z
department:
- _id: '79'
doi: 10.1007/978-3-540-75142-7_6
intvolume: '      4731'
page: 33--47
publication: Distributed Computing, 21st International Symposium, DISC 2007, Lemesos,
  Cyprus, September 24-26, 2007, Proceedings
publication_identifier:
  isbn:
  - 978-3-540-75141-0
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: A Denial-of-Service Resistant DHT
type: conference
user_id: '15504'
volume: 4731
year: '2007'
...
---
_id: '2025'
citation:
  ama: Aspnes J, Scheideler C, Arora A, Madden S, eds. <i>Distributed Computing in
    Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM,
    USA, June 18-20, 2007, Proceedings</i>. Vol 4549.; 2007. doi:<a href="https://doi.org/10.1007/978-3-540-73090-3">10.1007/978-3-540-73090-3</a>
  apa: Aspnes, J., Scheideler, C., Arora, A., &#38; Madden, S. (Eds.). (2007). <i>Distributed
    Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007,
    Santa Fe, NM, USA, June 18-20, 2007, Proceedings</i> (Vol. 4549). <a href="https://doi.org/10.1007/978-3-540-73090-3">https://doi.org/10.1007/978-3-540-73090-3</a>
  bibtex: '@book{Aspnes_Scheideler_Arora_Madden_2007, series={Lecture Notes in Computer
    Science}, title={Distributed Computing in Sensor Systems, Third IEEE International
    Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings}, volume={4549},
    DOI={<a href="https://doi.org/10.1007/978-3-540-73090-3">10.1007/978-3-540-73090-3</a>},
    year={2007}, collection={Lecture Notes in Computer Science} }'
  chicago: Aspnes, James, Christian Scheideler, Anish Arora, and Samuel Madden, eds.
    <i>Distributed Computing in Sensor Systems, Third IEEE International Conference,
    DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings</i>. Vol. 4549. Lecture
    Notes in Computer Science, 2007. <a href="https://doi.org/10.1007/978-3-540-73090-3">https://doi.org/10.1007/978-3-540-73090-3</a>.
  ieee: J. Aspnes, C. Scheideler, A. Arora, and S. Madden, Eds., <i>Distributed Computing
    in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe,
    NM, USA, June 18-20, 2007, Proceedings</i>, vol. 4549. 2007.
  mla: Aspnes, James, et al., editors. <i>Distributed Computing in Sensor Systems,
    Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20,
    2007, Proceedings</i>. Vol. 4549, 2007, doi:<a href="https://doi.org/10.1007/978-3-540-73090-3">10.1007/978-3-540-73090-3</a>.
  short: J. Aspnes, C. Scheideler, A. Arora, S. Madden, eds., Distributed Computing
    in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe,
    NM, USA, June 18-20, 2007, Proceedings, 2007.
date_created: 2018-03-29T11:58:44Z
date_updated: 2022-01-06T06:54:25Z
department:
- _id: '79'
doi: 10.1007/978-3-540-73090-3
editor:
- first_name: James
  full_name: Aspnes, James
  last_name: Aspnes
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
- first_name: Anish
  full_name: Arora, Anish
  last_name: Arora
- first_name: Samuel
  full_name: Madden, Samuel
  last_name: Madden
intvolume: '      4549'
publication_identifier:
  isbn:
  - 978-3-540-73089-7
series_title: Lecture Notes in Computer Science
status: public
title: Distributed Computing in Sensor Systems, Third IEEE International Conference,
  DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings
type: conference_editor
user_id: '15504'
volume: 4549
year: '2007'
...
---
_id: '2027'
citation:
  ama: 'B. Gibbons P, Scheideler C, eds. <i>SPAA 2007: Proceedings of the 19th Annual
    ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California,
    USA, June 9-11, 2007</i>. ACM; 2007.'
  apa: 'B. Gibbons, P., &#38; Scheideler, C. (Eds.). (2007). <i>SPAA 2007: Proceedings
    of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures,
    San Diego, California, USA, June 9-11, 2007</i>. ACM.'
  bibtex: '@book{B. Gibbons_Scheideler_2007, title={SPAA 2007: Proceedings of the
    19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San
    Diego, California, USA, June 9-11, 2007}, publisher={ACM}, year={2007} }'
  chicago: 'B. Gibbons, Phillip, and Christian Scheideler, eds. <i>SPAA 2007: Proceedings
    of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures,
    San Diego, California, USA, June 9-11, 2007</i>. ACM, 2007.'
  ieee: 'P. B. Gibbons and C. Scheideler, Eds., <i>SPAA 2007: Proceedings of the 19th
    Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego,
    California, USA, June 9-11, 2007</i>. ACM, 2007.'
  mla: 'B. Gibbons, Phillip, and Christian Scheideler, editors. <i>SPAA 2007: Proceedings
    of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures,
    San Diego, California, USA, June 9-11, 2007</i>. ACM, 2007.'
  short: 'P. B. Gibbons, C. Scheideler, eds., SPAA 2007: Proceedings of the 19th Annual
    ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California,
    USA, June 9-11, 2007, ACM, 2007.'
date_created: 2018-03-29T11:59:46Z
date_updated: 2022-01-06T06:54:25Z
department:
- _id: '79'
editor:
- first_name: Phillip
  full_name: B. Gibbons, Phillip
  last_name: B. Gibbons
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
publication_identifier:
  isbn:
  - 978-1-59593-667-7
publisher: ACM
status: public
title: 'SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in
  Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007'
type: conference_editor
user_id: '15504'
year: '2007'
...
---
_id: '2028'
author:
- first_name: Andrea
  full_name: W. Richa, Andrea
  last_name: W. Richa
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'W. Richa A, Scheideler C. Overlay Networks for Peer-to-Peer Networks. In:
    <i>Handbook of Approximation Algorithms and Metaheuristics.</i> ; 2007. doi:<a
    href="https://doi.org/10.1201/9781420010749.ch72">10.1201/9781420010749.ch72</a>'
  apa: W. Richa, A., &#38; Scheideler, C. (2007). Overlay Networks for Peer-to-Peer
    Networks. In <i>Handbook of Approximation Algorithms and Metaheuristics.</i> <a
    href="https://doi.org/10.1201/9781420010749.ch72">https://doi.org/10.1201/9781420010749.ch72</a>
  bibtex: '@inbook{W. Richa_Scheideler_2007, title={Overlay Networks for Peer-to-Peer
    Networks}, DOI={<a href="https://doi.org/10.1201/9781420010749.ch72">10.1201/9781420010749.ch72</a>},
    booktitle={Handbook of Approximation Algorithms and Metaheuristics.}, author={W.
    Richa, Andrea and Scheideler, Christian}, year={2007} }'
  chicago: W. Richa, Andrea, and Christian Scheideler. “Overlay Networks for Peer-to-Peer
    Networks.” In <i>Handbook of Approximation Algorithms and Metaheuristics.</i>,
    2007. <a href="https://doi.org/10.1201/9781420010749.ch72">https://doi.org/10.1201/9781420010749.ch72</a>.
  ieee: A. W. Richa and C. Scheideler, “Overlay Networks for Peer-to-Peer Networks,”
    in <i>Handbook of Approximation Algorithms and Metaheuristics.</i>, 2007.
  mla: W. Richa, Andrea, and Christian Scheideler. “Overlay Networks for Peer-to-Peer
    Networks.” <i>Handbook of Approximation Algorithms and Metaheuristics.</i>, 2007,
    doi:<a href="https://doi.org/10.1201/9781420010749.ch72">10.1201/9781420010749.ch72</a>.
  short: 'A. W. Richa, C. Scheideler, in: Handbook of Approximation Algorithms and
    Metaheuristics., 2007.'
date_created: 2018-03-29T12:00:39Z
date_updated: 2022-01-06T06:54:25Z
department:
- _id: '79'
doi: 10.1201/9781420010749.ch72
publication: Handbook of Approximation Algorithms and Metaheuristics.
publication_identifier:
  isbn:
  - 978-1-58488-550-4
status: public
title: Overlay Networks for Peer-to-Peer Networks
type: book_chapter
user_id: '15504'
year: '2007'
...
---
_id: '24276'
abstract:
- lang: eng
  text: "We define a natural generalization of the prominent k-server problem, the
    k-resource problem. It occurs in metric spaces with some demands and resources
    given at its points. The demands may vary with time, but the total demand may
    never exceed k. The goal of an online algorithm is to satisfy demands by moving
    resources, while minimizing the cost for transporting resources. We give an asymptotically
    optimal O(log(min {n,k}))-competitive randomized algorithm and an O(min {k,n})-competitive
    deterministic one for the k-resource problem on uniform metric spaces consisting
    of n points. This extends known results for paging to the more general setting
    of k-resource.\r\nBasing on the results for uniform metric spaces, we develop
    a randomized algorithm solving the k-resource and the k-server problem on metric
    spaces which can be decomposed into components far away from each other. The algorithm
    achieves a competitive ratio of O(log(min {n,k})), provided that it has some extra
    resources more than the optimal algorithm.\r\n"
author:
- first_name: Marcin
  full_name: Bienkowski, Marcin
  last_name: Bienkowski
- first_name: Jarosław
  full_name: Kutyłowski, Jarosław
  last_name: Kutyłowski
citation:
  ama: 'Bienkowski M, Kutyłowski J. The k-Resource Problem on Uniform and on Uniformly
    Decomposable Metric Spaces. In: <i>Lecture Notes in Computer Science</i>. ; 2007.
    doi:<a href="https://doi.org/10.1007/978-3-540-73951-7_30">10.1007/978-3-540-73951-7_30</a>'
  apa: Bienkowski, M., &#38; Kutyłowski, J. (2007). The k-Resource Problem on Uniform
    and on Uniformly Decomposable Metric Spaces. <i>Lecture Notes in Computer Science</i>.
    <a href="https://doi.org/10.1007/978-3-540-73951-7_30">https://doi.org/10.1007/978-3-540-73951-7_30</a>
  bibtex: '@inproceedings{Bienkowski_Kutyłowski_2007, place={Berlin, Heidelberg},
    title={The k-Resource Problem on Uniform and on Uniformly Decomposable Metric
    Spaces}, DOI={<a href="https://doi.org/10.1007/978-3-540-73951-7_30">10.1007/978-3-540-73951-7_30</a>},
    booktitle={Lecture Notes in Computer Science}, author={Bienkowski, Marcin and
    Kutyłowski, Jarosław}, year={2007} }'
  chicago: Bienkowski, Marcin, and Jarosław Kutyłowski. “The K-Resource Problem on
    Uniform and on Uniformly Decomposable Metric Spaces.” In <i>Lecture Notes in Computer
    Science</i>. Berlin, Heidelberg, 2007. <a href="https://doi.org/10.1007/978-3-540-73951-7_30">https://doi.org/10.1007/978-3-540-73951-7_30</a>.
  ieee: 'M. Bienkowski and J. Kutyłowski, “The k-Resource Problem on Uniform and on
    Uniformly Decomposable Metric Spaces,” 2007, doi: <a href="https://doi.org/10.1007/978-3-540-73951-7_30">10.1007/978-3-540-73951-7_30</a>.'
  mla: Bienkowski, Marcin, and Jarosław Kutyłowski. “The K-Resource Problem on Uniform
    and on Uniformly Decomposable Metric Spaces.” <i>Lecture Notes in Computer Science</i>,
    2007, doi:<a href="https://doi.org/10.1007/978-3-540-73951-7_30">10.1007/978-3-540-73951-7_30</a>.
  short: 'M. Bienkowski, J. Kutyłowski, in: Lecture Notes in Computer Science, Berlin,
    Heidelberg, 2007.'
date_created: 2021-09-13T13:07:57Z
date_updated: 2022-01-06T06:56:13Z
department:
- _id: '63'
doi: 10.1007/978-3-540-73951-7_30
language:
- iso: eng
place: Berlin, Heidelberg
publication: Lecture Notes in Computer Science
publication_identifier:
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces
type: conference
user_id: '15415'
year: '2007'
...
---
_id: '24366'
abstract:
- lang: eng
  text: "Dieses Buch beschäftigt sich mit Algorithmen und Methoden der Peer-to-Peer-Netzwerke
    und gibt einen Einblick in die aktuelle Forschung.\r\n\r\nUrsprünglich waren Peer-to-Peer-Netzwerke
    nur für File-Sharing konzipiert. Mittlerweile hat sich Peer-to-Peer zum Paradigma
    für Rechnernetzwerke entwickelt. Ziel dieses Buches ist es, dem Leser ein grundlegendes
    Verständnis der Techniken hinter den aktuellen Peer-to-Peer-Netzwerken aufzuzeigen
    und im nächsten Schritt Algorithmen vorzustellen, die vielleicht erst in einigen
    Jahren umgesetzt werden.\r\n\r\nDas Buch richtet sich in erster Linie an Informatiker
    (Studenten ab dem 5. Semester). Aber auch interessierte Nichtinformatiker können
    von diesem Buch profitieren, wobei grundlegende Kenntnisse aus den Bereichen der
    Mathematik und Informatik vorausgesetzt werden. Die Ziele, Kernaussagen und Ergebnisse
    sollten jedoch auch ohne akademischen Hintergrund klar werden."
author:
- first_name: Peter
  full_name: Mahlmann, Peter
  last_name: Mahlmann
- first_name: Christian
  full_name: Schindelhauer, Christian
  last_name: Schindelhauer
citation:
  ama: Mahlmann P, Schindelhauer C. <i>Peer-to-Peer-Netzwerke</i>. Springer; 2007.
    doi:<a href="https://doi.org/10.1007/978-3-540-33992-2">10.1007/978-3-540-33992-2</a>
  apa: Mahlmann, P., &#38; Schindelhauer, C. (2007). <i>Peer-to-Peer-Netzwerke</i>.
    Springer. <a href="https://doi.org/10.1007/978-3-540-33992-2">https://doi.org/10.1007/978-3-540-33992-2</a>
  bibtex: '@book{Mahlmann_Schindelhauer_2007, place={Berlin}, title={Peer-to-Peer-Netzwerke},
    DOI={<a href="https://doi.org/10.1007/978-3-540-33992-2">10.1007/978-3-540-33992-2</a>},
    publisher={Springer}, author={Mahlmann, Peter and Schindelhauer, Christian}, year={2007}
    }'
  chicago: 'Mahlmann, Peter, and Christian Schindelhauer. <i>Peer-to-Peer-Netzwerke</i>.
    Berlin: Springer, 2007. <a href="https://doi.org/10.1007/978-3-540-33992-2">https://doi.org/10.1007/978-3-540-33992-2</a>.'
  ieee: 'P. Mahlmann and C. Schindelhauer, <i>Peer-to-Peer-Netzwerke</i>. Berlin:
    Springer, 2007.'
  mla: Mahlmann, Peter, and Christian Schindelhauer. <i>Peer-to-Peer-Netzwerke</i>.
    Springer, 2007, doi:<a href="https://doi.org/10.1007/978-3-540-33992-2">10.1007/978-3-540-33992-2</a>.
  short: P. Mahlmann, C. Schindelhauer, Peer-to-Peer-Netzwerke, Springer, Berlin,
    2007.
date_created: 2021-09-14T10:29:29Z
date_updated: 2022-01-06T06:56:18Z
department:
- _id: '63'
doi: 10.1007/978-3-540-33992-2
language:
- iso: eng
place: Berlin
publication_identifier:
  isbn:
  - '9783540339915'
publication_status: published
publisher: Springer
status: public
title: Peer-to-Peer-Netzwerke
type: book
user_id: '15415'
year: '2007'
...
---
_id: '3211'
author:
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Derrick J, Wehrheim H. On using data abstractions for model checking refinements.
    <i>Acta Inf</i>. 2007;(1):41--71. doi:<a href="https://doi.org/10.1007/s00236-007-0042-3">10.1007/s00236-007-0042-3</a>
  apa: Derrick, J., &#38; Wehrheim, H. (2007). On using data abstractions for model
    checking refinements. <i>Acta Inf.</i>, (1), 41--71. <a href="https://doi.org/10.1007/s00236-007-0042-3">https://doi.org/10.1007/s00236-007-0042-3</a>
  bibtex: '@article{Derrick_Wehrheim_2007, title={On using data abstractions for model
    checking refinements}, DOI={<a href="https://doi.org/10.1007/s00236-007-0042-3">10.1007/s00236-007-0042-3</a>},
    number={1}, journal={Acta Inf.}, author={Derrick, John and Wehrheim, Heike}, year={2007},
    pages={41--71} }'
  chicago: 'Derrick, John, and Heike Wehrheim. “On Using Data Abstractions for Model
    Checking Refinements.” <i>Acta Inf.</i>, no. 1 (2007): 41--71. <a href="https://doi.org/10.1007/s00236-007-0042-3">https://doi.org/10.1007/s00236-007-0042-3</a>.'
  ieee: J. Derrick and H. Wehrheim, “On using data abstractions for model checking
    refinements,” <i>Acta Inf.</i>, no. 1, pp. 41--71, 2007.
  mla: Derrick, John, and Heike Wehrheim. “On Using Data Abstractions for Model Checking
    Refinements.” <i>Acta Inf.</i>, no. 1, 2007, pp. 41--71, doi:<a href="https://doi.org/10.1007/s00236-007-0042-3">10.1007/s00236-007-0042-3</a>.
  short: J. Derrick, H. Wehrheim, Acta Inf. (2007) 41--71.
date_created: 2018-06-13T09:56:17Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1007/s00236-007-0042-3
issue: '1'
page: 41--71
publication: Acta Inf.
status: public
title: On using data abstractions for model checking refinements
type: journal_article
user_id: '29719'
year: '2007'
...
---
_id: '3212'
author:
- first_name: Björn
  full_name: Metzler, Björn
  last_name: Metzler
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Metzler B, Wehrheim H. Extending a Component Specification Language with Time.
    <i>Electr Notes Theor Comput Sci</i>. 2007;(2):47--67. doi:<a href="https://doi.org/10.1016/j.entcs.2006.02.031">10.1016/j.entcs.2006.02.031</a>
  apa: Metzler, B., &#38; Wehrheim, H. (2007). Extending a Component Specification
    Language with Time. <i>Electr. Notes Theor. Comput. Sci.</i>, (2), 47--67. <a
    href="https://doi.org/10.1016/j.entcs.2006.02.031">https://doi.org/10.1016/j.entcs.2006.02.031</a>
  bibtex: '@article{Metzler_Wehrheim_2007, title={Extending a Component Specification
    Language with Time}, DOI={<a href="https://doi.org/10.1016/j.entcs.2006.02.031">10.1016/j.entcs.2006.02.031</a>},
    number={2}, journal={Electr. Notes Theor. Comput. Sci.}, author={Metzler, Björn
    and Wehrheim, Heike}, year={2007}, pages={47--67} }'
  chicago: 'Metzler, Björn, and Heike Wehrheim. “Extending a Component Specification
    Language with Time.” <i>Electr. Notes Theor. Comput. Sci.</i>, no. 2 (2007): 47--67.
    <a href="https://doi.org/10.1016/j.entcs.2006.02.031">https://doi.org/10.1016/j.entcs.2006.02.031</a>.'
  ieee: B. Metzler and H. Wehrheim, “Extending a Component Specification Language
    with Time,” <i>Electr. Notes Theor. Comput. Sci.</i>, no. 2, pp. 47--67, 2007.
  mla: Metzler, Björn, and Heike Wehrheim. “Extending a Component Specification Language
    with Time.” <i>Electr. Notes Theor. Comput. Sci.</i>, no. 2, 2007, pp. 47--67,
    doi:<a href="https://doi.org/10.1016/j.entcs.2006.02.031">10.1016/j.entcs.2006.02.031</a>.
  short: B. Metzler, H. Wehrheim, Electr. Notes Theor. Comput. Sci. (2007) 47--67.
date_created: 2018-06-13T09:57:37Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1016/j.entcs.2006.02.031
issue: '2'
page: 47--67
publication: Electr. Notes Theor. Comput. Sci.
status: public
title: Extending a Component Specification Language with Time
type: journal_article
user_id: '29719'
year: '2007'
...
---
_id: '3213'
author:
- first_name: H.{-}Christian
  full_name: Estler, H.{-}Christian
  last_name: Estler
- first_name: Thomas
  full_name: Ruhroth, Thomas
  last_name: Ruhroth
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Estler H.-}Christian, Ruhroth T, Wehrheim H. Modelchecking Correctness of Refactorings
    - Some Experiments. <i>Electr Notes Theor Comput Sci</i>. 2007:3--17. doi:<a href="https://doi.org/10.1016/j.entcs.2006.08.041">10.1016/j.entcs.2006.08.041</a>
  apa: Estler, H. .-}Christian, Ruhroth, T., &#38; Wehrheim, H. (2007). Modelchecking
    Correctness of Refactorings - Some Experiments. <i>Electr. Notes Theor. Comput.
    Sci.</i>, 3--17. <a href="https://doi.org/10.1016/j.entcs.2006.08.041">https://doi.org/10.1016/j.entcs.2006.08.041</a>
  bibtex: '@article{Estler_Ruhroth_Wehrheim_2007, title={Modelchecking Correctness
    of Refactorings - Some Experiments}, DOI={<a href="https://doi.org/10.1016/j.entcs.2006.08.041">10.1016/j.entcs.2006.08.041</a>},
    journal={Electr. Notes Theor. Comput. Sci.}, author={Estler, H.{-}Christian and
    Ruhroth, Thomas and Wehrheim, Heike}, year={2007}, pages={3--17} }'
  chicago: Estler, H.{-}Christian, Thomas Ruhroth, and Heike Wehrheim. “Modelchecking
    Correctness of Refactorings - Some Experiments.” <i>Electr. Notes Theor. Comput.
    Sci.</i>, 2007, 3--17. <a href="https://doi.org/10.1016/j.entcs.2006.08.041">https://doi.org/10.1016/j.entcs.2006.08.041</a>.
  ieee: H. .-}Christian Estler, T. Ruhroth, and H. Wehrheim, “Modelchecking Correctness
    of Refactorings - Some Experiments,” <i>Electr. Notes Theor. Comput. Sci.</i>,
    pp. 3--17, 2007.
  mla: Estler, H. .. }Christian, et al. “Modelchecking Correctness of Refactorings
    - Some Experiments.” <i>Electr. Notes Theor. Comput. Sci.</i>, 2007, pp. 3--17,
    doi:<a href="https://doi.org/10.1016/j.entcs.2006.08.041">10.1016/j.entcs.2006.08.041</a>.
  short: H..-}Christian Estler, T. Ruhroth, H. Wehrheim, Electr. Notes Theor. Comput.
    Sci. (2007) 3--17.
date_created: 2018-06-13T09:59:12Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1016/j.entcs.2006.08.041
page: 3--17
publication: Electr. Notes Theor. Comput. Sci.
status: public
title: Modelchecking Correctness of Refactorings - Some Experiments
type: journal_article
user_id: '29719'
year: '2007'
...
---
_id: '3214'
author:
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
- first_name: Baris
  full_name: Güldali, Baris
  last_name: Güldali
- first_name: Christian
  full_name: Soltenborn, Christian
  id: '1737'
  last_name: Soltenborn
  orcid: 0000-0002-0342-8227
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Engels G, Güldali B, Soltenborn C, Wehrheim H. Assuring Consistency of Business
    Process Models and Web Services Using Visual Contracts. In: Sch{\"{u}}rr A, Nagl
    M, Z{\"{u}}ndorf A, eds. <i>Applications of Graph Transformations with Industrial
    Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October
    10-12, 2007, Revised Selected and Invited Papers</i>. Lecture Notes in Computer
    Science. ; 2007:17--31. doi:<a href="https://doi.org/10.1007/978-3-540-89020-1_2">10.1007/978-3-540-89020-1_2</a>'
  apa: Engels, G., Güldali, B., Soltenborn, C., &#38; Wehrheim, H. (2007). Assuring
    Consistency of Business Process Models and Web Services Using Visual Contracts.
    In A. Sch{\"{u}}rr, M. Nagl, &#38; A. Z{\"{u}}ndorf (Eds.), <i>Applications of
    Graph Transformations with Industrial Relevance, Third International Symposium,
    {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited
    Papers</i> (pp. 17--31). <a href="https://doi.org/10.1007/978-3-540-89020-1_2">https://doi.org/10.1007/978-3-540-89020-1_2</a>
  bibtex: '@inproceedings{Engels_Güldali_Soltenborn_Wehrheim_2007, series={Lecture
    Notes in Computer Science}, title={Assuring Consistency of Business Process Models
    and Web Services Using Visual Contracts}, DOI={<a href="https://doi.org/10.1007/978-3-540-89020-1_2">10.1007/978-3-540-89020-1_2</a>},
    booktitle={Applications of Graph Transformations with Industrial Relevance, Third
    International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007,
    Revised Selected and Invited Papers}, author={Engels, Gregor and Güldali, Baris
    and Soltenborn, Christian and Wehrheim, Heike}, editor={Sch{\"{u}}rr, Andy and
    Nagl, Manfred and Z{\"{u}}ndorf, AlbertEditors}, year={2007}, pages={17--31},
    collection={Lecture Notes in Computer Science} }'
  chicago: Engels, Gregor, Baris Güldali, Christian Soltenborn, and Heike Wehrheim.
    “Assuring Consistency of Business Process Models and Web Services Using Visual
    Contracts.” In <i>Applications of Graph Transformations with Industrial Relevance,
    Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12,
    2007, Revised Selected and Invited Papers</i>, edited by Andy Sch{\"{u}}rr, Manfred
    Nagl, and Albert Z{\"{u}}ndorf, 17--31. Lecture Notes in Computer Science, 2007.
    <a href="https://doi.org/10.1007/978-3-540-89020-1_2">https://doi.org/10.1007/978-3-540-89020-1_2</a>.
  ieee: G. Engels, B. Güldali, C. Soltenborn, and H. Wehrheim, “Assuring Consistency
    of Business Process Models and Web Services Using Visual Contracts,” in <i>Applications
    of Graph Transformations with Industrial Relevance, Third International Symposium,
    {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited
    Papers</i>, 2007, pp. 17--31.
  mla: Engels, Gregor, et al. “Assuring Consistency of Business Process Models and
    Web Services Using Visual Contracts.” <i>Applications of Graph Transformations
    with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel,
    Germany, October 10-12, 2007, Revised Selected and Invited Papers</i>, edited
    by Andy Sch{\"{u}}rr et al., 2007, pp. 17--31, doi:<a href="https://doi.org/10.1007/978-3-540-89020-1_2">10.1007/978-3-540-89020-1_2</a>.
  short: 'G. Engels, B. Güldali, C. Soltenborn, H. Wehrheim, in: A. Sch{\"{u}}rr,
    M. Nagl, A. Z{\"{u}}ndorf (Eds.), Applications of Graph Transformations with Industrial
    Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October
    10-12, 2007, Revised Selected and Invited Papers, 2007, pp. 17--31.'
date_created: 2018-06-13T10:00:14Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1007/978-3-540-89020-1_2
editor:
- first_name: Andy
  full_name: Sch{\"{u}}rr, Andy
  last_name: Sch{\"{u}}rr
- first_name: Manfred
  full_name: Nagl, Manfred
  last_name: Nagl
- first_name: Albert
  full_name: Z{\"{u}}ndorf, Albert
  last_name: Z{\"{u}}ndorf
language:
- iso: eng
page: 17--31
publication: Applications of Graph Transformations with Industrial Relevance, Third
  International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised
  Selected and Invited Papers
series_title: Lecture Notes in Computer Science
status: public
title: Assuring Consistency of Business Process Models and Web Services Using Visual
  Contracts
type: conference
user_id: '14955'
year: '2007'
...
---
_id: '3215'
author:
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
- first_name: Christian
  full_name: Soltenborn, Christian
  id: '1737'
  last_name: Soltenborn
  orcid: 0000-0002-0342-8227
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Engels G, Soltenborn C, Wehrheim H. Analysis of {UML} Activities Using Dynamic
    Meta Modeling. In: M. Bonsangue M, Broch Johnsen E, eds. <i>Formal Methods for
    Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference,
    {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>. Lecture Notes
    in Computer Science. ; 2007:76--90. doi:<a href="https://doi.org/10.1007/978-3-540-72952-5_5">10.1007/978-3-540-72952-5_5</a>'
  apa: Engels, G., Soltenborn, C., &#38; Wehrheim, H. (2007). Analysis of {UML} Activities
    Using Dynamic Meta Modeling. In M. M. Bonsangue &#38; E. Broch Johnsen (Eds.),
    <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1
    International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>
    (pp. 76--90). <a href="https://doi.org/10.1007/978-3-540-72952-5_5">https://doi.org/10.1007/978-3-540-72952-5_5</a>
  bibtex: '@inproceedings{Engels_Soltenborn_Wehrheim_2007, series={Lecture Notes in
    Computer Science}, title={Analysis of {UML} Activities Using Dynamic Meta Modeling},
    DOI={<a href="https://doi.org/10.1007/978-3-540-72952-5_5">10.1007/978-3-540-72952-5_5</a>},
    booktitle={Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP}
    {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007,
    Proceedings}, author={Engels, Gregor and Soltenborn, Christian and Wehrheim, Heike},
    editor={M. Bonsangue, Marcello and Broch Johnsen, EinarEditors}, year={2007},
    pages={76--90}, collection={Lecture Notes in Computer Science} }'
  chicago: Engels, Gregor, Christian Soltenborn, and Heike Wehrheim. “Analysis of
    {UML} Activities Using Dynamic Meta Modeling.” In <i>Formal Methods for Open Object-Based
    Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007,
    Paphos, Cyprus, June 6-8, 2007, Proceedings</i>, edited by Marcello M. Bonsangue
    and Einar Broch Johnsen, 76--90. Lecture Notes in Computer Science, 2007. <a href="https://doi.org/10.1007/978-3-540-72952-5_5">https://doi.org/10.1007/978-3-540-72952-5_5</a>.
  ieee: G. Engels, C. Soltenborn, and H. Wehrheim, “Analysis of {UML} Activities Using
    Dynamic Meta Modeling,” in <i>Formal Methods for Open Object-Based Distributed
    Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos,
    Cyprus, June 6-8, 2007, Proceedings</i>, 2007, pp. 76--90.
  mla: Engels, Gregor, et al. “Analysis of {UML} Activities Using Dynamic Meta Modeling.”
    <i>Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1
    International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>,
    edited by Marcello M. Bonsangue and Einar Broch Johnsen, 2007, pp. 76--90, doi:<a
    href="https://doi.org/10.1007/978-3-540-72952-5_5">10.1007/978-3-540-72952-5_5</a>.
  short: 'G. Engels, C. Soltenborn, H. Wehrheim, in: M. M. Bonsangue, E. Broch Johnsen
    (Eds.), Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG}
    6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings,
    2007, pp. 76--90.'
date_created: 2018-06-13T10:01:31Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1007/978-3-540-72952-5_5
editor:
- first_name: Marcello
  full_name: M. Bonsangue, Marcello
  last_name: M. Bonsangue
- first_name: Einar
  full_name: Broch Johnsen, Einar
  last_name: Broch Johnsen
language:
- iso: eng
page: 76--90
publication: Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP}
  {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007,
  Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Analysis of {UML} Activities Using Dynamic Meta Modeling
type: conference
user_id: '14955'
year: '2007'
...
---
_id: '3216'
author:
- first_name: Thomas
  full_name: Ruhroth, Thomas
  last_name: Ruhroth
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Ruhroth T, Wehrheim H. Refactoring Object-Oriented Specifications with Data
    and Processes. In: M. Bonsangue M, Broch Johnsen E, eds. <i>Formal Methods for
    Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference,
    {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i>. Lecture Notes
    in Computer Science. ; 2007:236--251. doi:<a href="https://doi.org/10.1007/978-3-540-72952-5_15">10.1007/978-3-540-72952-5_15</a>'
  apa: Ruhroth, T., &#38; Wehrheim, H. (2007). Refactoring Object-Oriented Specifications
    with Data and Processes. In M. M. Bonsangue &#38; E. Broch Johnsen (Eds.), <i>Formal
    Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International
    Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings</i> (pp.
    236--251). <a href="https://doi.org/10.1007/978-3-540-72952-5_15">https://doi.org/10.1007/978-3-540-72952-5_15</a>
  bibtex: '@inproceedings{Ruhroth_Wehrheim_2007, series={Lecture Notes in Computer
    Science}, title={Refactoring Object-Oriented Specifications with Data and Processes},
    DOI={<a href="https://doi.org/10.1007/978-3-540-72952-5_15">10.1007/978-3-540-72952-5_15</a>},
    booktitle={Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP}
    {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007,
    Proceedings}, author={Ruhroth, Thomas and Wehrheim, Heike}, editor={M. Bonsangue,
    Marcello and Broch Johnsen, EinarEditors}, year={2007}, pages={236--251}, collection={Lecture
    Notes in Computer Science} }'
  chicago: Ruhroth, Thomas, and Heike Wehrheim. “Refactoring Object-Oriented Specifications
    with Data and Processes.” In <i>Formal Methods for Open Object-Based Distributed
    Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos,
    Cyprus, June 6-8, 2007, Proceedings</i>, edited by Marcello M. Bonsangue and Einar
    Broch Johnsen, 236--251. Lecture Notes in Computer Science, 2007. <a href="https://doi.org/10.1007/978-3-540-72952-5_15">https://doi.org/10.1007/978-3-540-72952-5_15</a>.
  ieee: T. Ruhroth and H. Wehrheim, “Refactoring Object-Oriented Specifications with
    Data and Processes,” in <i>Formal Methods for Open Object-Based Distributed Systems,
    9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June
    6-8, 2007, Proceedings</i>, 2007, pp. 236--251.
  mla: Ruhroth, Thomas, and Heike Wehrheim. “Refactoring Object-Oriented Specifications
    with Data and Processes.” <i>Formal Methods for Open Object-Based Distributed
    Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos,
    Cyprus, June 6-8, 2007, Proceedings</i>, edited by Marcello M. Bonsangue and Einar
    Broch Johnsen, 2007, pp. 236--251, doi:<a href="https://doi.org/10.1007/978-3-540-72952-5_15">10.1007/978-3-540-72952-5_15</a>.
  short: 'T. Ruhroth, H. Wehrheim, in: M. M. Bonsangue, E. Broch Johnsen (Eds.), Formal
    Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International
    Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007,
    pp. 236--251.'
date_created: 2018-06-13T10:03:09Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1007/978-3-540-72952-5_15
editor:
- first_name: Marcello
  full_name: M. Bonsangue, Marcello
  last_name: M. Bonsangue
- first_name: Einar
  full_name: Broch Johnsen, Einar
  last_name: Broch Johnsen
page: 236--251
publication: Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP}
  {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007,
  Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Refactoring Object-Oriented Specifications with Data and Processes
type: conference
user_id: '29719'
year: '2007'
...
---
_id: '3221'
author:
- first_name: Wilhelm
  full_name: Schäfer, Wilhelm
  last_name: Schäfer
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Schäfer W, Wehrheim H. The Challenges of Building Advanced Mechatronic Systems.
    In: C. Briand L, L. Wolf A, eds. <i>International Conference on Software Engineering,
    {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May
    23-25, 2007, Minneapolis, MN, {USA}</i>. ; 2007:72--84. doi:<a href="https://doi.org/10.1109/FOSE.2007.28">10.1109/FOSE.2007.28</a>'
  apa: Schäfer, W., &#38; Wehrheim, H. (2007). The Challenges of Building Advanced
    Mechatronic Systems. In L. C. Briand &#38; A. L. Wolf (Eds.), <i>International
    Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software
    Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}</i> (pp. 72--84).
    <a href="https://doi.org/10.1109/FOSE.2007.28">https://doi.org/10.1109/FOSE.2007.28</a>
  bibtex: '@inproceedings{Schäfer_Wehrheim_2007, title={The Challenges of Building
    Advanced Mechatronic Systems}, DOI={<a href="https://doi.org/10.1109/FOSE.2007.28">10.1109/FOSE.2007.28</a>},
    booktitle={International Conference on Software Engineering, {ISCE} 2007, Workshop
    on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis,
    MN, {USA}}, author={Schäfer, Wilhelm and Wehrheim, Heike}, editor={C. Briand,
    Lionel and L. Wolf, AlexanderEditors}, year={2007}, pages={72--84} }'
  chicago: Schäfer, Wilhelm, and Heike Wehrheim. “The Challenges of Building Advanced
    Mechatronic Systems.” In <i>International Conference on Software Engineering,
    {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May
    23-25, 2007, Minneapolis, MN, {USA}</i>, edited by Lionel C. Briand and Alexander
    L. Wolf, 72--84, 2007. <a href="https://doi.org/10.1109/FOSE.2007.28">https://doi.org/10.1109/FOSE.2007.28</a>.
  ieee: W. Schäfer and H. Wehrheim, “The Challenges of Building Advanced Mechatronic
    Systems,” in <i>International Conference on Software Engineering, {ISCE} 2007,
    Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007,
    Minneapolis, MN, {USA}</i>, 2007, pp. 72--84.
  mla: Schäfer, Wilhelm, and Heike Wehrheim. “The Challenges of Building Advanced
    Mechatronic Systems.” <i>International Conference on Software Engineering, {ISCE}
    2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25,
    2007, Minneapolis, MN, {USA}</i>, edited by Lionel C. Briand and Alexander L.
    Wolf, 2007, pp. 72--84, doi:<a href="https://doi.org/10.1109/FOSE.2007.28">10.1109/FOSE.2007.28</a>.
  short: 'W. Schäfer, H. Wehrheim, in: L. C. Briand, A. L. Wolf (Eds.), International
    Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software
    Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}, 2007, pp. 72--84.'
date_created: 2018-06-14T06:30:41Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1109/FOSE.2007.28
editor:
- first_name: Lionel
  full_name: C. Briand, Lionel
  last_name: C. Briand
- first_name: Alexander
  full_name: L. Wolf, Alexander
  last_name: L. Wolf
page: 72--84
publication: International Conference on Software Engineering, {ISCE} 2007, Workshop
  on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis,
  MN, {USA}
status: public
title: The Challenges of Building Advanced Mechatronic Systems
type: conference
user_id: '29719'
year: '2007'
...
---
_id: '3222'
author:
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Gerhard
  full_name: Schellhorn, Gerhard
  last_name: Schellhorn
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Derrick J, Schellhorn G, Wehrheim H. Proving Linearizability Via Non-atomic
    Refinement. In: Davies J, Gibbons J, eds. <i>Integrated Formal Methods, 6th International
    Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings</i>. Lecture Notes
    in Computer Science. ; 2007:195--214. doi:<a href="https://doi.org/10.1007/978-3-540-73210-5_11">10.1007/978-3-540-73210-5_11</a>'
  apa: Derrick, J., Schellhorn, G., &#38; Wehrheim, H. (2007). Proving Linearizability
    Via Non-atomic Refinement. In J. Davies &#38; J. Gibbons (Eds.), <i>Integrated
    Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5,
    2007, Proceedings</i> (pp. 195--214). <a href="https://doi.org/10.1007/978-3-540-73210-5_11">https://doi.org/10.1007/978-3-540-73210-5_11</a>
  bibtex: '@inproceedings{Derrick_Schellhorn_Wehrheim_2007, series={Lecture Notes
    in Computer Science}, title={Proving Linearizability Via Non-atomic Refinement},
    DOI={<a href="https://doi.org/10.1007/978-3-540-73210-5_11">10.1007/978-3-540-73210-5_11</a>},
    booktitle={Integrated Formal Methods, 6th International Conference, {IFM} 2007,
    Oxford, UK, July 2-5, 2007, Proceedings}, author={Derrick, John and Schellhorn,
    Gerhard and Wehrheim, Heike}, editor={Davies, Jim and Gibbons, JeremyEditors},
    year={2007}, pages={195--214}, collection={Lecture Notes in Computer Science}
    }'
  chicago: Derrick, John, Gerhard Schellhorn, and Heike Wehrheim. “Proving Linearizability
    Via Non-Atomic Refinement.” In <i>Integrated Formal Methods, 6th International
    Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings</i>, edited by
    Jim Davies and Jeremy Gibbons, 195--214. Lecture Notes in Computer Science, 2007.
    <a href="https://doi.org/10.1007/978-3-540-73210-5_11">https://doi.org/10.1007/978-3-540-73210-5_11</a>.
  ieee: J. Derrick, G. Schellhorn, and H. Wehrheim, “Proving Linearizability Via Non-atomic
    Refinement,” in <i>Integrated Formal Methods, 6th International Conference, {IFM}
    2007, Oxford, UK, July 2-5, 2007, Proceedings</i>, 2007, pp. 195--214.
  mla: Derrick, John, et al. “Proving Linearizability Via Non-Atomic Refinement.”
    <i>Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford,
    UK, July 2-5, 2007, Proceedings</i>, edited by Jim Davies and Jeremy Gibbons,
    2007, pp. 195--214, doi:<a href="https://doi.org/10.1007/978-3-540-73210-5_11">10.1007/978-3-540-73210-5_11</a>.
  short: 'J. Derrick, G. Schellhorn, H. Wehrheim, in: J. Davies, J. Gibbons (Eds.),
    Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK,
    July 2-5, 2007, Proceedings, 2007, pp. 195--214.'
date_created: 2018-06-14T06:32:05Z
date_updated: 2022-01-06T06:59:05Z
department:
- _id: '77'
doi: 10.1007/978-3-540-73210-5_11
editor:
- first_name: Jim
  full_name: Davies, Jim
  last_name: Davies
- first_name: Jeremy
  full_name: Gibbons, Jeremy
  last_name: Gibbons
page: 195--214
publication: Integrated Formal Methods, 6th International Conference, {IFM} 2007,
  Oxford, UK, July 2-5, 2007, Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Proving Linearizability Via Non-atomic Refinement
type: conference
user_id: '29719'
year: '2007'
...
---
_id: '2912'
author:
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
citation:
  ama: Krummel V. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>.
    Universität Paderborn; 2007.
  apa: Krummel, V. (2007). <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>.
    Universität Paderborn.
  bibtex: '@book{Krummel_2007, title={Tamper Resistance of AES -- Models, Attacks
    and Countermeasures}, publisher={Universität Paderborn}, author={Krummel, Volker},
    year={2007} }'
  chicago: Krummel, Volker. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>.
    Universität Paderborn, 2007.
  ieee: V. Krummel, <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>.
    Universität Paderborn, 2007.
  mla: Krummel, Volker. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>.
    Universität Paderborn, 2007.
  short: V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures,
    Universität Paderborn, 2007.
date_created: 2018-05-25T10:49:53Z
date_updated: 2022-01-06T06:58:46Z
department:
- _id: '64'
main_file_link:
- url: http://nbn-resolving.de/urn:nbn:de:hbz:466-20080110018
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Tamper Resistance of AES -- Models, Attacks and Countermeasures
type: dissertation
user_id: '25078'
year: '2007'
...
---
_id: '3002'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
citation:
  ama: 'Blömer J, Krummel V. Analysis of Countermeasures Against Access Driven Cache
    Attacks on AES. In: <i>Selected Areas in Cryptography</i>. Berlin, Heidelberg:
    Springer Berlin Heidelberg; 2007:96-109. doi:<a href="https://doi.org/10.1007/978-3-540-77360-3_7">10.1007/978-3-540-77360-3_7</a>'
  apa: 'Blömer, J., &#38; Krummel, V. (2007). Analysis of Countermeasures Against
    Access Driven Cache Attacks on AES. In <i>Selected Areas in Cryptography</i> (pp.
    96–109). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-540-77360-3_7">https://doi.org/10.1007/978-3-540-77360-3_7</a>'
  bibtex: '@inbook{Blömer_Krummel_2007, place={Berlin, Heidelberg}, title={Analysis
    of Countermeasures Against Access Driven Cache Attacks on AES}, DOI={<a href="https://doi.org/10.1007/978-3-540-77360-3_7">10.1007/978-3-540-77360-3_7</a>},
    booktitle={Selected Areas in Cryptography}, publisher={Springer Berlin Heidelberg},
    author={Blömer, Johannes and Krummel, Volker}, year={2007}, pages={96–109} }'
  chicago: 'Blömer, Johannes, and Volker Krummel. “Analysis of Countermeasures Against
    Access Driven Cache Attacks on AES.” In <i>Selected Areas in Cryptography</i>,
    96–109. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. <a href="https://doi.org/10.1007/978-3-540-77360-3_7">https://doi.org/10.1007/978-3-540-77360-3_7</a>.'
  ieee: 'J. Blömer and V. Krummel, “Analysis of Countermeasures Against Access Driven
    Cache Attacks on AES,” in <i>Selected Areas in Cryptography</i>, Berlin, Heidelberg:
    Springer Berlin Heidelberg, 2007, pp. 96–109.'
  mla: Blömer, Johannes, and Volker Krummel. “Analysis of Countermeasures Against
    Access Driven Cache Attacks on AES.” <i>Selected Areas in Cryptography</i>, Springer
    Berlin Heidelberg, 2007, pp. 96–109, doi:<a href="https://doi.org/10.1007/978-3-540-77360-3_7">10.1007/978-3-540-77360-3_7</a>.
  short: 'J. Blömer, V. Krummel, in: Selected Areas in Cryptography, Springer Berlin
    Heidelberg, Berlin, Heidelberg, 2007, pp. 96–109.'
date_created: 2018-06-05T08:12:18Z
date_updated: 2022-01-06T06:58:50Z
department:
- _id: '64'
doi: 10.1007/978-3-540-77360-3_7
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2007/282
oa: '1'
page: 96-109
place: Berlin, Heidelberg
publication: Selected Areas in Cryptography
publication_identifier:
  isbn:
  - '9783540773597'
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Analysis of Countermeasures Against Access Driven Cache Attacks on AES
type: book_chapter
user_id: '25078'
year: '2007'
...
---
_id: '3019'
author:
- first_name: Alexander
  full_name: May, Alexander
  last_name: May
citation:
  ama: 'May A. Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. In: <i>Advances
    in Cryptology — CRYPTO 2002</i>. Berlin, Heidelberg: Springer Berlin Heidelberg;
    2007:242-256. doi:<a href="https://doi.org/10.1007/3-540-45708-9_16">10.1007/3-540-45708-9_16</a>'
  apa: 'May, A. (2007). Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. In
    <i>Advances in Cryptology — CRYPTO 2002</i> (pp. 242–256). Berlin, Heidelberg:
    Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/3-540-45708-9_16">https://doi.org/10.1007/3-540-45708-9_16</a>'
  bibtex: '@inbook{May_2007, place={Berlin, Heidelberg}, title={Cryptanalysis of Unbalanced
    RSA with Small CRT-Exponent}, DOI={<a href="https://doi.org/10.1007/3-540-45708-9_16">10.1007/3-540-45708-9_16</a>},
    booktitle={Advances in Cryptology — CRYPTO 2002}, publisher={Springer Berlin Heidelberg},
    author={May, Alexander}, year={2007}, pages={242–256} }'
  chicago: 'May, Alexander. “Cryptanalysis of Unbalanced RSA with Small CRT-Exponent.”
    In <i>Advances in Cryptology — CRYPTO 2002</i>, 242–56. Berlin, Heidelberg: Springer
    Berlin Heidelberg, 2007. <a href="https://doi.org/10.1007/3-540-45708-9_16">https://doi.org/10.1007/3-540-45708-9_16</a>.'
  ieee: 'A. May, “Cryptanalysis of Unbalanced RSA with Small CRT-Exponent,” in <i>Advances
    in Cryptology — CRYPTO 2002</i>, Berlin, Heidelberg: Springer Berlin Heidelberg,
    2007, pp. 242–256.'
  mla: May, Alexander. “Cryptanalysis of Unbalanced RSA with Small CRT-Exponent.”
    <i>Advances in Cryptology — CRYPTO 2002</i>, Springer Berlin Heidelberg, 2007,
    pp. 242–56, doi:<a href="https://doi.org/10.1007/3-540-45708-9_16">10.1007/3-540-45708-9_16</a>.
  short: 'A. May, in: Advances in Cryptology — CRYPTO 2002, Springer Berlin Heidelberg,
    Berlin, Heidelberg, 2007, pp. 242–256.'
date_created: 2018-06-05T08:26:03Z
date_updated: 2022-01-06T06:58:51Z
department:
- _id: '64'
doi: 10.1007/3-540-45708-9_16
page: 242-256
place: Berlin, Heidelberg
publication: Advances in Cryptology — CRYPTO 2002
publication_identifier:
  isbn:
  - '9783540440505'
  - '9783540457084'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
type: book_chapter
user_id: '25078'
year: '2007'
...
---
_id: '3020'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Alexander
  full_name: May, Alexander
  last_name: May
citation:
  ama: 'Blömer J, May A. Low Secret Exponent RSA Revisited. In: <i>Lecture Notes in
    Computer Science</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:4-19.
    doi:<a href="https://doi.org/10.1007/3-540-44670-2_2">10.1007/3-540-44670-2_2</a>'
  apa: 'Blömer, J., &#38; May, A. (2007). Low Secret Exponent RSA Revisited. In <i>Lecture
    Notes in Computer Science</i> (pp. 4–19). Berlin, Heidelberg: Springer Berlin
    Heidelberg. <a href="https://doi.org/10.1007/3-540-44670-2_2">https://doi.org/10.1007/3-540-44670-2_2</a>'
  bibtex: '@inbook{Blömer_May_2007, place={Berlin, Heidelberg}, title={Low Secret
    Exponent RSA Revisited}, DOI={<a href="https://doi.org/10.1007/3-540-44670-2_2">10.1007/3-540-44670-2_2</a>},
    booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg},
    author={Blömer, Johannes and May, Alexander}, year={2007}, pages={4–19} }'
  chicago: 'Blömer, Johannes, and Alexander May. “Low Secret Exponent RSA Revisited.”
    In <i>Lecture Notes in Computer Science</i>, 4–19. Berlin, Heidelberg: Springer
    Berlin Heidelberg, 2007. <a href="https://doi.org/10.1007/3-540-44670-2_2">https://doi.org/10.1007/3-540-44670-2_2</a>.'
  ieee: 'J. Blömer and A. May, “Low Secret Exponent RSA Revisited,” in <i>Lecture
    Notes in Computer Science</i>, Berlin, Heidelberg: Springer Berlin Heidelberg,
    2007, pp. 4–19.'
  mla: Blömer, Johannes, and Alexander May. “Low Secret Exponent RSA Revisited.” <i>Lecture
    Notes in Computer Science</i>, Springer Berlin Heidelberg, 2007, pp. 4–19, doi:<a
    href="https://doi.org/10.1007/3-540-44670-2_2">10.1007/3-540-44670-2_2</a>.
  short: 'J. Blömer, A. May, in: Lecture Notes in Computer Science, Springer Berlin
    Heidelberg, Berlin, Heidelberg, 2007, pp. 4–19.'
date_created: 2018-06-05T08:26:29Z
date_updated: 2022-01-06T06:58:51Z
department:
- _id: '64'
doi: 10.1007/3-540-44670-2_2
page: 4-19
place: Berlin, Heidelberg
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783540424888'
  - '9783540446705'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Low Secret Exponent RSA Revisited
type: book_chapter
user_id: '25078'
year: '2007'
...
