@article{60387,
  abstract     = {{Der Artikel zeigt, wie Döblin die Erlösungsbedürftigkeit des Menschen in der säkularisierten Lebenswelt darstellt. Zwischen dem Ordnungswillen des "furchtbaren Kopfes" und dem Wunsch, "Sau" zu sein, findet der Mensch keinen Zugang mehr zu einem Gott, dessen Engel auch nicht mehr helfen können.}},
  author       = {{Schulte Eickholt, Swen}},
  journal      = {{Expressionismus}},
  number       = {{3}},
  pages        = {{70--79}},
  title        = {{{Die Engel des Franz Biberkopf. Zum religiösen Subtext von Döblins "Berlin Alexanderplatz"}}},
  year         = {{2016}},
}

@proceedings{60755,
  editor       = {{Pieczewski, J and Nettekoven, C and Neuschmelting, V and Thiele, K and  Grefkes, C and Goldbrunner, R and Lucas, C.W}},
  number       = {{9}},
  pages        = {{e266}},
  title        = {{{EP 66 Better tolerability and lower mean intensities favour higher-frequent  stimulation as compared to 10 Hz online-rTMS for language mapping: A test-retest reliability  study in healthy volunteers}}},
  doi          = {{https://doi.org/10.1016/j.clinph.2016.05.117 }},
  volume       = {{127}},
  year         = {{2016}},
}

@proceedings{60756,
  editor       = {{Pieczewski, J and Nettekoven, C and  Neuschmelting, V and Thiele, K and Goldbrunner, R and Lucas, C.W}},
  title        = {{{ Retest-reliability and tolerability of 10, 30 and 50 Hz repetitive transcranial magnetic  stimulation (rTMS) for language mapping: A preclinical study}}},
  doi          = {{https://doi.org/10.3205/16dgnc323  }},
  year         = {{2016}},
}

@article{60704,
  author       = {{Thiele, K and Quinting, J.M and  Stenneken, P}},
  journal      = {{Journal of Clinical and Experimental Neuropsychology}},
  number       = {{7}},
  pages        = {{764--781}},
  title        = {{{New ways to analyze word generation  performance in brain injury: A systematic review and meta-analysis of additional  performance measures}}},
  doi          = {{https://doi.org/10.1080/13803395.2016.1163327 }},
  volume       = {{38}},
  year         = {{2016}},
}

@article{13458,
  author       = {{Liebhaber, M. and Halbig, B. and Bass, U. and Geurts, J. and Neufeld, Sergej and Sanna, S. and Schmidt, Wolf Gero and Speiser, E. and Räthel, J. and Chandola, S. and Esser, N.}},
  issn         = {{2469-9950}},
  journal      = {{Physical Review B}},
  number       = {{23}},
  title        = {{{Vibration eigenmodes of the Au-(5×2)/Si(111) surface studied by Raman spectroscopy and first-principles calculations}}},
  doi          = {{10.1103/physrevb.94.235304}},
  volume       = {{94}},
  year         = {{2016}},
}

@misc{65148,
  author       = {{Keuchen, Marion and Klappenecker, Gabriele}},
  isbn         = {{9-783525-773062}},
  pages        = {{48}},
  publisher    = {{Vandenhoeck&Ruprecht }},
  title        = {{{Schöpfung inklusive. Material zu Schöpfung und Inklusion für die Klassen 5/6}}},
  year         = {{2016}},
}

@inproceedings{57965,
  author       = {{Pieczewski, Julia and Nettekoven, Charlotte and Neuschmelting, Volker and Thiele, Kristina and Goldbrunner, Roland and Weiss Lucas, Carolin}},
  keywords     = {{610 Medical sciences, language mapping, Medicine, retest-reliability, rTMS}},
  title        = {{{Retest-reliability and tolerability of 10, 30 and 50 Hz repetitive transcranial magnetic stimulation (rTMS) for language mapping: a preclinical study}}},
  doi          = {{10.3205/16dgnc323}},
  year         = {{2016}},
}

@article{53951,
  author       = {{Thiele, Kristina and Quinting, Jana Marie and Stenneken, Prisca}},
  issn         = {{1380-3395}},
  journal      = {{Journal of Clinical and Experimental Neuropsychology}},
  number       = {{7}},
  pages        = {{764--781}},
  publisher    = {{Informa UK Limited}},
  title        = {{{New ways to analyze word generation performance in brain injury: A systematic review and meta-analysis of additional performance measures}}},
  doi          = {{10.1080/13803395.2016.1163327}},
  volume       = {{38}},
  year         = {{2016}},
}

@inproceedings{57970,
  author       = {{Pieczewski, J. and Nettekoven, C. and Neuschmelting, V. and Thiele, Kristina and Grefkes, C. and Goldbrunner, R. and Lucas, C. Weiss}},
  booktitle    = {{Clinical Neurophysiology}},
  issn         = {{13882457}},
  number       = {{9}},
  pages        = {{e266}},
  title        = {{{EP 66. Better tolerability and lower mean intensities favour higher-frequent stimulation as compared to 10 Hz online-rTMS for language mapping: A test-retest reliability study in healthy volunteers}}},
  doi          = {{10.1016/j.clinph.2016.05.117}},
  volume       = {{127}},
  year         = {{2016}},
}

@inproceedings{253,
  abstract     = {{Group signatures, introduced by Chaum and van Heyst [15], are an important primitive in cryptography. In group signature schemes every group member can anonymously sign messages on behalf of the group. In case of disputes a dedicated opening manager is able to trace signatures - he can extract the identity of the producer of a given signature. A formal model for static group signatures schemes and their security is defined by Bellare, Micciancio, and Warinschi [4], the case of dynamic groups is considered by Bellare, Shi, and Zhang [5]. Both models define group signature schemes with a single opening manager. The main difference between these models is that the number of group members in static schemes is fixed, while in dynamic schemes group members can join the group over time.}},
  author       = {{Blömer, Johannes and Juhnke, Jakob and Löken, Nils}},
  booktitle    = {{Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}},
  pages        = {{166--180}},
  title        = {{{Short Group Signatures with Distributed Traceability}}},
  doi          = {{10.1007/978-3-319-32859-1_14}},
  year         = {{2015}},
}

@inbook{25413,
  author       = {{Geierhos, Michaela and  Baeumer,  Frederik Simon  and  Sabine, Schulze and Valentina, Stu{\ss}}},
  booktitle    = {{Current Approaches in Applied Artificial Intelligence, Lecture Notes in Computer Science}},
  editor       = {{Ali, Moonis and Kwon, Young Sig  and Lee, Chang-Hwan  and Kim, Juntae and  Kim, Yongdai}},
  isbn         = {{978-3-319-19065-5}},
  pages        = {{305--315}},
  publisher    = {{Springer International Publishing Switzerland}},
  title        = {{{Filtering Reviews by Random Individual Error}}},
  volume       = {{9101}},
  year         = {{2015}},
}

@inproceedings{19988,
  author       = {{Hamann, Heiko and Schmickl, Thomas and Zahadat, Payam}},
  booktitle    = {{13th European Conference on Artificial Life (ECAL 2015)}},
  pages        = {{174}},
  publisher    = {{MIT Press}},
  title        = {{{Evolving Collective Behaviors With Diverse But Predictable Sensor States}}},
  doi          = {{10.7551/978-0-262-33027-5-ch036}},
  year         = {{2015}},
}

@misc{281,
  author       = {{Rojahn, Tobias}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Load Balancing for Range Queries in a Dimension Invariant Peer-to-Peer Network}}},
  year         = {{2015}},
}

@misc{28223,
  author       = {{Gausemeier, Jürgen and Dumitrescu, Roman and Rammig, Franz-Josef and Schäfer, Wilhelm and Trächtler, Ansgar}},
  isbn         = {{978-3-942647-62-5}},
  publisher    = {{Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}},
  title        = {{{10. Paderborner Workshop Entwurf mechatronischer Systeme}}},
  volume       = {{343}},
  year         = {{2015}},
}

@inproceedings{28317,
  abstract     = {{his paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in this paper.}},
  author       = {{Kliewe, Daniel and Kühn, Arno and Dumitrescu, Roman and Gausemeier, Jürgen}},
  booktitle    = {{International Science Index, Band 9-5}},
  pages        = {{3566--3573}},
  title        = {{{Challenges in Anti-Counterfeiting of Cyber-Physical Systems}}},
  year         = {{2015}},
}

@inproceedings{28321,
  abstract     = {{Der Lebenszyklus von Produktionssystemen besteht nach Wiendahl et al. aus den drei Phasen Planung und Realisierung, Betrieb und Redistribution (Wiendahl et al. in Anlaufrobuste Produktionssysteme. Werkstattstechnik (wt) online, Jahrg. 92, Ausgabe 11/12, 2002, S. 650-655). Jede Phase enthält vielfältige Aufgaben die maßgeblich vom Fach- und Erfahrungswissen der Mitarbeiter abhängen. In der ersten Phase werden unter anderem die Fertigungsprozesse und -ressourcen festgelegt. Hierfür bedarf es genauer Kenntnisse über die zu fertigenden Bauteile, benötigten Prozesse und geeigneten Ressourcen selbst sowie deren Abhängigkeiten untereinander. In der Betriebsphase des Produktionssystems muss auf Maschinenausfälle oder Eilaufträge mit Um- bzw. Neuplanungen von Ressourcen reagiert werden. Das benötigte Wissen im Lebenszyklus von Produktionssystemen verteilt sich in der Regel auf verschiedene Personen und eine Vielzahl unterschiedlicher Dokumente; teilweise ist es auch nur implizit vorhanden. Demzufolge liegt es verteilt und unstrukturiert vor und eignet sich nicht für eine bedarfsgerechte Bereitstellung. Darüber hinaus fehlt eine Semantik, die das vorhandene Wissen in Beziehung setzt und durch automatisierte Schlussfolgerungen ergänzt. Hierfür bieten wissensbasierte Systeme (WBS) auf Basis von Ontologien einen vielversprechenden Lösungsansatz. Diese bieten eine Semantik und Inferenz zur Wissensmodellierung und ermöglichen den effizienten Zugriff auf das benötigte Wissen. Dies verspricht eine große Zeitersparnis bei den Aufgaben im Lebenszyklus von Produktionssystemen, auch im Hinblick auf die immer kürzer werdenden Produktlebenszyklen. Der Beitrag beschreibt den Aufbau von drei Ontologien für das Wissensmanagement im Rahmen verschiedener Aufgaben. Ferner werden die Vorteile durch den Einsatz von Ontologien praxisorientiert anhand eines Produktionssystems für eine Taschenlampe dargestellt.}},
  author       = {{Petersen, Marcus and Rehage, Gerald and Gausemeier, Jürgen and Bauer, Frank}},
  booktitle    = {{Wissenschafts- und Industrieforum 2015 Intelligente Technische Systeme - 10. Paderborner Workshop Entwurf mechatronischer Systeme, Nr. 343}},
  editor       = {{Gausemeier, Jürgen and Dumitrescu, Roman and Rammig, Franz-Josef and Schäfer, Wilhelm and Trächtler, Ansgar}},
  isbn         = {{978-3-942647-62-5}},
  pages        = {{189--209}},
  publisher    = {{Verlagsschriftenreihe des Heinz Nixdorf Instituts}},
  title        = {{{Wissensaufbereitung und -bereitstellung durch Ontologien im Lebenszyklus von Produktionssystemen}}},
  year         = {{2015}},
}

@inbook{28360,
  abstract     = {{Dieser Beitrag untersucht den Einfluss der Aussprache auf die Selbstkonstruktion von Lernenden und deren Bereitschaft, sich auf die zu erlernende Sprache und Kultur einzulassen. Im Gegensatz zu traditionellen Forschungsansätzen wird die Aussprache dabei als subjektiv bedeutsame Dimension im Sprachlernprozess konzipiert, die die Wahrnehmungen der Lernenden gegenüber sich selbst, anderen Sprechenden und dem gesamten Lernkontext stark mitprägt. Die Untersuchungen basieren auf den Narrationen zweier kanadischer Germanistikstudierender, die zwei Semester an deutschen Universitäten verbrachten. Der Selbstfindungs- und Lernprozess beider Studierender im fremden Umfeld wird dabei wesentlich durch ihre Selbstwahrnehmungen gelenkt, welche wiederum stark um das Thema Aussprache kreisen. Obwohl sich beide Lernende sehr unterschiedlich als Sprechende des Deutschen konstruieren,
fixieren sie sich darauf, wie sie meinen zu klingen und folglich wahrgenommen zu werden. Dabei erweist sich vor allem das Konstrukt des Native Speaker als zentraler Vergleichspunkt, an dem sich die Lernenden messen und der somit als Basis für die Wertung des Auslandsaufenthalts und des eigenen Lernerfolgs dient. Durch die Analyse subjektiver Lernertheorien entwirft dieser Beitrag einen gänzlich neuen Rahmen für die Betrachtung von Aussprache im Sprachlernprozess, der über die rein phonetische Dimension hinausgeht und den Fokus auf die sozialpsychologischen Funktionen von Aussprache lenkt.}},
  author       = {{Müller, Mareike and Schmenk, Barbara}},
  booktitle    = {{Konzepte aus der Sprachlehrforschung – Impulse für die Praxis: Festschrift für Karin Kleppin}},
  editor       = {{Böcker , Jessica  and Stauch, Annette}},
  isbn         = {{ 9783631647189}},
  pages        = {{171--188}},
  publisher    = {{Peter Lang}},
  title        = {{{Der Klang meines Selbst: Aussprache und Selbstkonstruktion von Fremdsprachenlernenden}}},
  year         = {{2015}},
}

@inproceedings{241,
  abstract     = {{Distributed applications are commonly based on overlay networks interconnecting their sites so that they can exchange information. For these overlay networks to preserve their functionality, they should be able to recover from various problems like membership changes or faults. Various self-stabilizing overlay networks have already been proposed in recent years, which have the advantage of being able to recover from any illegal state, but none of these networks can give any guarantees on its functionality while the recovery process is going on. We initiate research on overlay networks that are not only self-stabilizing but that also ensure that searchability is maintained while the recovery process is going on, as long as there are no corrupted messages in the system. More precisely, once a search message from node u to another node v is successfully delivered, all future search messages from u to v succeed as well. We call this property monotonic searchability. We show that in general it is impossible to provide monotonic searchability if corrupted messages are present in the system, which justifies the restriction to system states without corrupted messages. Furthermore, we provide a self-stabilizing protocol for the line for which we can also show monotonic searchability. It turns out that even for the line it is non-trivial to achieve this property. Additionally, we extend our protocol to deal with node departures in terms of the Finite Departure Problem of Foreback et. al (SSS 2014). This makes our protocol even capable of handling node dynamics.}},
  author       = {{Scheideler, Christian and Setzer, Alexander and Strothmann, Thim Frederik}},
  booktitle    = {{Proceedings of the 19th International Conference on Principles of Distributed Systems (OPODIS)}},
  title        = {{{Towards Establishing Monotonic Searchability in Self-Stabilizing Data Structures}}},
  doi          = {{10.4230/LIPIcs.OPODIS.2015.24}},
  year         = {{2015}},
}

@inproceedings{242,
  abstract     = {{A fundamental problem for overlay networks is to safely exclude leaving nodes, i.e., the nodes requesting to leave the overlay network are excluded from it without affecting its connectivity. There are a number of studies for safe node exclusion if the overlay is in a well-defined state, but almost no formal results are known for the case in which the overlay network is in an arbitrary initial state, i.e., when looking for a self-stabilizing solution for excluding leaving nodes. We study this problem in two variants: the Finite Departure Problem (FDP) and the Finite Sleep Problem (FSP). In the FDP the leaving nodes have to irrevocably decide when it is safe to leave the network, whereas in the FSP, this leaving decision does not have to be final: the nodes may resume computation when woken up by an incoming message. We are the first to present a self-stabilizing protocol for the FDP and the FSP that can be combined with a large class of overlay maintenance protocols so that these are then guaranteed to safely exclude leaving nodes from the system from any initial state while operating as specified for the staying nodes. In order to formally define the properties these overlay maintenance protocols have to satisfy, we identify four basic primitives for manipulating edges in an overlay network that might be of independent interest.}},
  author       = {{Koutsopoulos, Andreas and Scheideler, Christian and Strothmann, Thim Frederik}},
  booktitle    = {{Proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}},
  pages        = {{201--216}},
  title        = {{{Towards a Universal Approach for the Finite Departure Problem in Overlay Networks}}},
  doi          = {{10.1007/978-3-319-21741-3_14}},
  year         = {{2015}},
}

@inproceedings{243,
  abstract     = {{This paper introduces the problem of communication pattern adaption for a distributed self-adjusting binary search tree. We propose a simple local algorithm, which is closely related to the nearly thirty-year-old idea of splay trees and evaluate its adaption performance in the distributed scenario if different communication patterns are provided.To do so, the process of self-adjustment is modeled similarly to a basic network creation game, in which the nodes want to communicate with only a certain subset of all nodes. We show that, in general, the game (i.e., the process of local adjustments) does not converge, and convergence is related to certain structures of the communication interests, which we call conflicts.We classify conflicts and show that for two communication scenarios in which convergence is guaranteed, the self-adjusting tree performs well.Furthermore, we investigate the different classes of conflicts separately and show that, for a certain class of conflicts, the performance of the tree network is asymptotically as good as the performance for converging instances. However, for the other conflict classes, a distributed self-adjusting binary search tree adapts poorly.}},
  author       = {{Strothmann, Thim Frederik}},
  booktitle    = {{Proceedings of the 9th International Workshop on Algorithms and Computation (WALCOM)}},
  pages        = {{175----186}},
  title        = {{{The impact of communication patterns on distributed locally self-adjusting binary search trees}}},
  doi          = {{10.1007/978-3-319-15612-5_16}},
  year         = {{2015}},
}

