[{"issue":"3","year":"2017","date_created":"2018-08-07T08:40:41Z","publisher":"The Optical Society","title":"Hybrid coupled-mode modeling in 3D: perturbed and coupled channels, and waveguide crossings","publication":"Journal of the Optical Society of America B","file":[{"relation":"main_file","content_type":"application/pdf","file_id":"3829","file_name":"2017-02 Hammer_Hybrid coupled mode modelling in 3D_Perturbed and coupled channels and waveguide crossings_Coupled Mode Theory JOSA B.pdf","access_level":"open_access","file_size":5539592,"creator":"hclaudia","date_created":"2018-08-07T09:46:13Z","date_updated":"2018-09-03T14:09:04Z"}],"abstract":[{"lang":"eng","text":"The 3D implementation of a hybrid analytical/numerical variant of the coupled-mode theory is discussed.\r\nEigenmodes of the constituting dielectric channels are computed numerically. The frequency-domain\r\ncoupled-mode models then combine these into fully vectorial approximations for the optical electromagnetic\r\nfields of the composite structure. Following a discretization of amplitude functions by 1D finite elements, pro-\r\ncedures from the realm of finite-element numerics are applied to establish systems of linear equations for the then-\r\ndiscrete modal amplitudes. Examples substantiate the functioning of the technique and allow for some numerical\r\nassessment. The full 3D simulations are highly efficient in memory consumption, moderately demanding in com-\r\nputational time, and, in regimes of low radiative losses, sufficiently accurate for practical design. Our results\r\ninclude the perturbation of guided modes by changes of the refractive indices, the interaction of waves in parallel,\r\nhorizontally or vertically coupled straight waveguides, and a series of crossings of potentially overlapping channels\r\nwith fairly arbitrary relative positions and orientations."}],"language":[{"iso":"eng"}],"keyword":["tet_topic_waveguide","tet_topic_numerics"],"ddc":["530"],"publication_identifier":{"issn":["0740-3224","1520-8540"]},"has_accepted_license":"1","publication_status":"published","page":"613-624","intvolume":"        34","citation":{"apa":"Hammer, M., Alhaddad, S., &#38; Förstner, J. (2017). Hybrid coupled-mode modeling in 3D: perturbed and coupled channels, and waveguide crossings. <i>Journal of the Optical Society of America B</i>, <i>34</i>(3), 613–624. <a href=\"https://doi.org/10.1364/josab.34.000613\">https://doi.org/10.1364/josab.34.000613</a>","short":"M. Hammer, S. Alhaddad, J. Förstner, Journal of the Optical Society of America B 34 (2017) 613–624.","bibtex":"@article{Hammer_Alhaddad_Förstner_2017, title={Hybrid coupled-mode modeling in 3D: perturbed and coupled channels, and waveguide crossings}, volume={34}, DOI={<a href=\"https://doi.org/10.1364/josab.34.000613\">10.1364/josab.34.000613</a>}, number={3}, journal={Journal of the Optical Society of America B}, publisher={The Optical Society}, author={Hammer, Manfred and Alhaddad, Samer and Förstner, Jens}, year={2017}, pages={613–624} }","mla":"Hammer, Manfred, et al. “Hybrid Coupled-Mode Modeling in 3D: Perturbed and Coupled Channels, and Waveguide Crossings.” <i>Journal of the Optical Society of America B</i>, vol. 34, no. 3, The Optical Society, 2017, pp. 613–24, doi:<a href=\"https://doi.org/10.1364/josab.34.000613\">10.1364/josab.34.000613</a>.","ama":"Hammer M, Alhaddad S, Förstner J. Hybrid coupled-mode modeling in 3D: perturbed and coupled channels, and waveguide crossings. <i>Journal of the Optical Society of America B</i>. 2017;34(3):613-624. doi:<a href=\"https://doi.org/10.1364/josab.34.000613\">10.1364/josab.34.000613</a>","ieee":"M. Hammer, S. Alhaddad, and J. Förstner, “Hybrid coupled-mode modeling in 3D: perturbed and coupled channels, and waveguide crossings,” <i>Journal of the Optical Society of America B</i>, vol. 34, no. 3, pp. 613–624, 2017.","chicago":"Hammer, Manfred, Samer Alhaddad, and Jens Förstner. “Hybrid Coupled-Mode Modeling in 3D: Perturbed and Coupled Channels, and Waveguide Crossings.” <i>Journal of the Optical Society of America B</i> 34, no. 3 (2017): 613–24. <a href=\"https://doi.org/10.1364/josab.34.000613\">https://doi.org/10.1364/josab.34.000613</a>."},"volume":34,"author":[{"last_name":"Hammer","orcid":"0000-0002-6331-9348","full_name":"Hammer, Manfred","id":"48077","first_name":"Manfred"},{"full_name":"Alhaddad, Samer","last_name":"Alhaddad","first_name":"Samer"},{"first_name":"Jens","last_name":"Förstner","orcid":"0000-0001-7059-9862","full_name":"Förstner, Jens","id":"158"}],"oa":"1","date_updated":"2022-01-06T06:59:38Z","doi":"10.1364/josab.34.000613","type":"journal_article","status":"public","urn":"38287","department":[{"_id":"61"}],"user_id":"158","_id":"3828","file_date_updated":"2018-09-03T14:09:04Z","article_type":"original"},{"author":[{"last_name":"Ebers","full_name":"Ebers, Lena","id":"40428","first_name":"Lena"},{"orcid":"0000-0002-6331-9348","last_name":"Hammer","full_name":"Hammer, Manfred","id":"48077","first_name":"Manfred"},{"orcid":"0000-0001-7059-9862","last_name":"Förstner","id":"158","full_name":"Förstner, Jens","first_name":"Jens"}],"volume":49,"date_updated":"2022-01-06T06:59:39Z","doi":"10.1007/s11082-017-1011-x","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["0306-8919","1572-817X"]},"citation":{"short":"L. Ebers, M. Hammer, J. Förstner, Optical and Quantum Electronics 49 (2017) 49:176.","mla":"Ebers, Lena, et al. “Spiral Modes Supported by Circular Dielectric Tubes and Tube Segments.” <i>Optical and Quantum Electronics</i>, vol. 49, no. 4, Springer Nature, 2017, p. 49:176, doi:<a href=\"https://doi.org/10.1007/s11082-017-1011-x\">10.1007/s11082-017-1011-x</a>.","bibtex":"@article{Ebers_Hammer_Förstner_2017, title={Spiral modes supported by circular dielectric tubes and tube segments}, volume={49}, DOI={<a href=\"https://doi.org/10.1007/s11082-017-1011-x\">10.1007/s11082-017-1011-x</a>}, number={4}, journal={Optical and Quantum Electronics}, publisher={Springer Nature}, author={Ebers, Lena and Hammer, Manfred and Förstner, Jens}, year={2017}, pages={49:176} }","apa":"Ebers, L., Hammer, M., &#38; Förstner, J. (2017). Spiral modes supported by circular dielectric tubes and tube segments. <i>Optical and Quantum Electronics</i>, <i>49</i>(4), 49:176. <a href=\"https://doi.org/10.1007/s11082-017-1011-x\">https://doi.org/10.1007/s11082-017-1011-x</a>","chicago":"Ebers, Lena, Manfred Hammer, and Jens Förstner. “Spiral Modes Supported by Circular Dielectric Tubes and Tube Segments.” <i>Optical and Quantum Electronics</i> 49, no. 4 (2017): 49:176. <a href=\"https://doi.org/10.1007/s11082-017-1011-x\">https://doi.org/10.1007/s11082-017-1011-x</a>.","ieee":"L. Ebers, M. Hammer, and J. Förstner, “Spiral modes supported by circular dielectric tubes and tube segments,” <i>Optical and Quantum Electronics</i>, vol. 49, no. 4, p. 49:176, 2017.","ama":"Ebers L, Hammer M, Förstner J. Spiral modes supported by circular dielectric tubes and tube segments. <i>Optical and Quantum Electronics</i>. 2017;49(4):49:176. doi:<a href=\"https://doi.org/10.1007/s11082-017-1011-x\">10.1007/s11082-017-1011-x</a>"},"page":"49:176","intvolume":"        49","user_id":"158","department":[{"_id":"61"}],"project":[{"name":"TRR 142","_id":"53"},{"_id":"54","name":"TRR 142 - Project Area A"},{"name":"TRR 142 - Subproject A5","_id":"62"}],"_id":"3830","file_date_updated":"2022-01-06T06:59:38Z","article_type":"original","type":"journal_article","status":"public","urn":"38308","date_created":"2018-08-07T09:52:20Z","publisher":"Springer Nature","title":"Spiral modes supported by circular dielectric tubes and tube segments","issue":"4","year":"2017","language":[{"iso":"eng"}],"ddc":["530"],"keyword":["tet_topic_waveguide"],"publication":"Optical and Quantum Electronics","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2022-01-06T06:59:38Z","creator":"hclaudia","date_created":"2018-08-07T09:56:27Z","file_size":2379736,"file_name":"2017-03 Ebers, Hammer_Spiral modes supported by circular dielectric tubes and tube segments.pdf","access_level":"request","file_id":"3831"}],"abstract":[{"text":"The modal properties of curved dielectric slab waveguides are investigated. We\r\nconsider quasi-confined, attenuated modes that propagate at oblique angles with respect to\r\nthe axis through the center of curvature. Our analytical model describes the transition from\r\nscalar 2-D TE/TM bend modes to lossless spiral waves at near-axis propagation angles,\r\nwith a continuum of vectorial attenuated spiral modes in between. Modal solutions are\r\ncharacterized in terms of directional wavenumbers and attenuation constants. Examples for\r\nvectorial mode profiles illustrate the effects of oblique wave propagation along the curved\r\nslab segments. For the regime of lossless spiral waves, the relation with the guided modes\r\nof corresponding dielectric tubes is demonstrated.","lang":"eng"}]},{"publisher":"The Optical Society","date_created":"2018-08-07T10:13:24Z","title":"Direction-tunable enhanced emission from a subwavelength metallic double-nanoslit structure","issue":"12","year":"2017","keyword":["tet_topic_plasmonics"],"ddc":["530"],"language":[{"iso":"eng"}],"publication":"Optics Express","abstract":[{"text":"Controlling light emission out of subwavelength nanoslit/aperture structures is of great important for highly integrated photonic circuits. Here we propose a new method to achieve direction-tunable emission based on a compact metallic microcavity with double nanoslit. Our method combines the principles of Young’s interference and surface plasmon polaritons interference. We show that the direction of the far-field beam can be controlled over a wide range of angles by manipulating the frequency and relative phase of light arriving at the two slits, which holds promise for applications in the ultracompact optoelectronic devices.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","file_id":"3833","access_level":"open_access","file_name":"2017-06 Xiahong_Direction-tunable enhanced emission from a subwavelength metallic double-nanoslit structure_Optics Express.pdf","file_size":3225569,"date_created":"2018-08-07T10:17:15Z","creator":"hclaudia","date_updated":"2018-09-03T14:12:22Z"}],"date_updated":"2022-01-06T06:59:40Z","oa":"1","volume":25,"author":[{"first_name":"Xiaohong","last_name":"Song","full_name":"Song, Xiaohong"},{"first_name":"Nini","last_name":"Wang","full_name":"Wang, Nini"},{"first_name":"Ming","last_name":"Yan","full_name":"Yan, Ming"},{"first_name":"Cheng","last_name":"Lin","full_name":"Lin, Cheng"},{"last_name":"Förstner","orcid":"0000-0001-7059-9862","full_name":"Förstner, Jens","id":"158","first_name":"Jens"},{"last_name":"Yang","full_name":"Yang, Weifeng","first_name":"Weifeng"}],"doi":"10.1364/oe.25.013207","publication_identifier":{"issn":["1094-4087"]},"has_accepted_license":"1","publication_status":"published","page":"13207-13214","intvolume":"        25","citation":{"short":"X. Song, N. Wang, M. Yan, C. Lin, J. Förstner, W. Yang, Optics Express 25 (2017) 13207–13214.","mla":"Song, Xiaohong, et al. “Direction-Tunable Enhanced Emission from a Subwavelength Metallic Double-Nanoslit Structure.” <i>Optics Express</i>, vol. 25, no. 12, The Optical Society, 2017, pp. 13207–14, doi:<a href=\"https://doi.org/10.1364/oe.25.013207\">10.1364/oe.25.013207</a>.","bibtex":"@article{Song_Wang_Yan_Lin_Förstner_Yang_2017, title={Direction-tunable enhanced emission from a subwavelength metallic double-nanoslit structure}, volume={25}, DOI={<a href=\"https://doi.org/10.1364/oe.25.013207\">10.1364/oe.25.013207</a>}, number={12}, journal={Optics Express}, publisher={The Optical Society}, author={Song, Xiaohong and Wang, Nini and Yan, Ming and Lin, Cheng and Förstner, Jens and Yang, Weifeng}, year={2017}, pages={13207–13214} }","apa":"Song, X., Wang, N., Yan, M., Lin, C., Förstner, J., &#38; Yang, W. (2017). Direction-tunable enhanced emission from a subwavelength metallic double-nanoslit structure. <i>Optics Express</i>, <i>25</i>(12), 13207–13214. <a href=\"https://doi.org/10.1364/oe.25.013207\">https://doi.org/10.1364/oe.25.013207</a>","chicago":"Song, Xiaohong, Nini Wang, Ming Yan, Cheng Lin, Jens Förstner, and Weifeng Yang. “Direction-Tunable Enhanced Emission from a Subwavelength Metallic Double-Nanoslit Structure.” <i>Optics Express</i> 25, no. 12 (2017): 13207–14. <a href=\"https://doi.org/10.1364/oe.25.013207\">https://doi.org/10.1364/oe.25.013207</a>.","ieee":"X. Song, N. Wang, M. Yan, C. Lin, J. Förstner, and W. Yang, “Direction-tunable enhanced emission from a subwavelength metallic double-nanoslit structure,” <i>Optics Express</i>, vol. 25, no. 12, pp. 13207–13214, 2017.","ama":"Song X, Wang N, Yan M, Lin C, Förstner J, Yang W. Direction-tunable enhanced emission from a subwavelength metallic double-nanoslit structure. <i>Optics Express</i>. 2017;25(12):13207-13214. doi:<a href=\"https://doi.org/10.1364/oe.25.013207\">10.1364/oe.25.013207</a>"},"_id":"3832","department":[{"_id":"61"}],"user_id":"158","article_type":"original","file_date_updated":"2018-09-03T14:12:22Z","type":"journal_article","urn":"38325","status":"public"},{"publication":"Recent Trends in Computational Photonics","file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-08-16T08:05:50Z","creator":"fossie","date_updated":"2022-01-06T06:59:40Z","file_id":"3916","file_name":"Recent-Trends-in-Computational-Photonics - chapter 9 - Grynko - SHG DG.pdf","access_level":"request","file_size":2798215}],"abstract":[{"lang":"eng","text":"We apply the Discontinuous Galerkin Time Domain (DGTD) method for numerical simulations of the second harmonic generation from various metallic nanostructures. A Maxwell–Vlasov hydrodynamic model is used to describe the nonlinear effects in the motion of the excited free electrons in a metal. The results are compared with the corresponding experimental measurements for split-ring resonators and plasmonic gap antennas."}],"language":[{"iso":"eng"}],"keyword":["tet_topic_numerics","tet_topic_shg","tet_topic_meta"],"ddc":["530"],"year":"2017","date_created":"2018-08-07T10:42:30Z","publisher":"Springer International Publishing","title":"Simulation of Second Harmonic Generation from Photonic Nanostructures Using the Discontinuous Galerkin Time Domain Method","type":"book_chapter","status":"public","editor":[{"first_name":"Arti","last_name":"Agrawal","full_name":"Agrawal, Arti"}],"department":[{"_id":"61"}],"user_id":"158","_id":"3836","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"},{"name":"TRR 142","_id":"53"},{"_id":"54","name":"TRR 142 - Project Area A"},{"name":"TRR 142 - Subproject A5","_id":"62"}],"file_date_updated":"2022-01-06T06:59:40Z","has_accepted_license":"1","publication_identifier":{"isbn":["9783319554372","9783319554389"],"issn":["0342-4111","1556-1534"]},"publication_status":"published","page":"261-284","citation":{"ieee":"Y. Grynko and J. Förstner, “Simulation of Second Harmonic Generation from Photonic Nanostructures Using the Discontinuous Galerkin Time Domain Method,” in <i>Recent Trends in Computational Photonics</i>, A. Agrawal, Ed. Cham: Springer International Publishing, 2017, pp. 261–284.","chicago":"Grynko, Yevgen, and Jens Förstner. “Simulation of Second Harmonic Generation from Photonic Nanostructures Using the Discontinuous Galerkin Time Domain Method.” In <i>Recent Trends in Computational Photonics</i>, edited by Arti Agrawal, 261–84. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-55438-9_9\">https://doi.org/10.1007/978-3-319-55438-9_9</a>.","ama":"Grynko Y, Förstner J. Simulation of Second Harmonic Generation from Photonic Nanostructures Using the Discontinuous Galerkin Time Domain Method. In: Agrawal A, ed. <i>Recent Trends in Computational Photonics</i>. Cham: Springer International Publishing; 2017:261-284. doi:<a href=\"https://doi.org/10.1007/978-3-319-55438-9_9\">10.1007/978-3-319-55438-9_9</a>","apa":"Grynko, Y., &#38; Förstner, J. (2017). Simulation of Second Harmonic Generation from Photonic Nanostructures Using the Discontinuous Galerkin Time Domain Method. In A. Agrawal (Ed.), <i>Recent Trends in Computational Photonics</i> (pp. 261–284). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-55438-9_9\">https://doi.org/10.1007/978-3-319-55438-9_9</a>","bibtex":"@inbook{Grynko_Förstner_2017, place={Cham}, title={Simulation of Second Harmonic Generation from Photonic Nanostructures Using the Discontinuous Galerkin Time Domain Method}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-55438-9_9\">10.1007/978-3-319-55438-9_9</a>}, booktitle={Recent Trends in Computational Photonics}, publisher={Springer International Publishing}, author={Grynko, Yevgen and Förstner, Jens}, editor={Agrawal, ArtiEditor}, year={2017}, pages={261–284} }","mla":"Grynko, Yevgen, and Jens Förstner. “Simulation of Second Harmonic Generation from Photonic Nanostructures Using the Discontinuous Galerkin Time Domain Method.” <i>Recent Trends in Computational Photonics</i>, edited by Arti Agrawal, Springer International Publishing, 2017, pp. 261–84, doi:<a href=\"https://doi.org/10.1007/978-3-319-55438-9_9\">10.1007/978-3-319-55438-9_9</a>.","short":"Y. Grynko, J. Förstner, in: A. Agrawal (Ed.), Recent Trends in Computational Photonics, Springer International Publishing, Cham, 2017, pp. 261–284."},"place":"Cham","author":[{"id":"26059","full_name":"Grynko, Yevgen","last_name":"Grynko","first_name":"Yevgen"},{"first_name":"Jens","id":"158","full_name":"Förstner, Jens","last_name":"Förstner","orcid":"0000-0001-7059-9862"}],"date_updated":"2022-01-06T06:59:41Z","doi":"10.1007/978-3-319-55438-9_9"},{"year":"2017","date_created":"2018-06-04T12:17:48Z","publisher":"Springer International Publishing","title":"Subtleties in Security Definitions for Predicate Encryption with Public Index","publication":"Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"5286","access_level":"closed","file_name":"SubtletiesInSecurityDefinition.pdf","file_size":463904,"creator":"ups","date_created":"2018-11-02T14:52:10Z","date_updated":"2018-11-02T14:52:10Z"}],"language":[{"iso":"eng"}],"ddc":["000"],"publication_identifier":{"isbn":["9783319724522","9783319724539"],"issn":["0302-9743","1611-3349"]},"has_accepted_license":"1","publication_status":"published","page":"438-453","intvolume":"     10693","citation":{"ama":"Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>","ieee":"J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2017, vol. 10693, pp. 438–453.","chicago":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>.","apa":"Blömer, J., &#38; Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>","bibtex":"@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }","mla":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>.","short":"J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453."},"place":"Cham","volume":10693,"author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"first_name":"Gennadij","last_name":"Liske","full_name":"Liske, Gennadij"}],"date_updated":"2022-01-06T06:58:49Z","oa":"1","doi":"10.1007/978-3-319-72453-9_35","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2017/453.pdf"}],"type":"conference","status":"public","department":[{"_id":"64"}],"user_id":"477","series_title":"Lecture Notes in Computer Science","_id":"2967","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"file_date_updated":"2018-11-02T14:52:10Z"},{"publication":"Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings","type":"conference","status":"public","_id":"3109","department":[{"_id":"558"}],"user_id":"38235","year":"2017","page":"20--38","citation":{"apa":"Hale, B., Jager, T., Lauer, S., &#38; Schwenk, J. (2017). Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i> (pp. 20--38). <a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">https://doi.org/10.1007/978-3-319-61204-1_2</a>","short":"B. Hale, T. Jager, S. Lauer, J. Schwenk, in: Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38.","bibtex":"@inproceedings{Hale_Jager_Lauer_Schwenk_2017, title={Simple Security Definitions for and Constructions of 0-RTT Key Exchange}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>}, booktitle={Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, author={Hale, Britta and Jager, Tibor and Lauer, Sebastian and Schwenk, Jörg}, year={2017}, pages={20--38} }","mla":"Hale, Britta, et al. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 2017, pp. 20--38, doi:<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>.","ama":"Hale B, Jager T, Lauer S, Schwenk J. Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In: <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>. ; 2017:20--38. doi:<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>","chicago":"Hale, Britta, Tibor Jager, Sebastian Lauer, and Jörg Schwenk. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” In <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 20--38, 2017. <a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">https://doi.org/10.1007/978-3-319-61204-1_2</a>.","ieee":"B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple Security Definitions for and Constructions of 0-RTT Key Exchange,” in <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 2017, pp. 20--38."},"date_updated":"2022-01-06T06:58:56Z","date_created":"2018-06-07T09:07:59Z","author":[{"first_name":"Britta","last_name":"Hale","full_name":"Hale, Britta"},{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"last_name":"Lauer","full_name":"Lauer, Sebastian","first_name":"Sebastian"},{"full_name":"Schwenk, Jörg","last_name":"Schwenk","first_name":"Jörg"}],"title":"Simple Security Definitions for and Constructions of 0-RTT Key Exchange","doi":"10.1007/978-3-319-61204-1_2"},{"year":"2017","page":"519--548","citation":{"bibtex":"@inproceedings{Günther_Hale_Jager_Lauer_2017, title={0-RTT Key Exchange with Full Forward Secrecy}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III}, author={Günther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian}, year={2017}, pages={519--548} }","mla":"Günther, Felix, et al. “0-RTT Key Exchange with Full Forward Secrecy.” <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 2017, pp. 519--548, doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>.","short":"F. Günther, B. Hale, T. Jager, S. Lauer, in: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548.","apa":"Günther, F., Hale, B., Jager, T., &#38; Lauer, S. (2017). 0-RTT Key Exchange with Full Forward Secrecy. In <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i> (pp. 519--548). <a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">https://doi.org/10.1007/978-3-319-56617-7_18</a>","ama":"Günther F, Hale B, Jager T, Lauer S. 0-RTT Key Exchange with Full Forward Secrecy. In: <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>. ; 2017:519--548. doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>","chicago":"Günther, Felix, Britta Hale, Tibor Jager, and Sebastian Lauer. “0-RTT Key Exchange with Full Forward Secrecy.” In <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 519--548, 2017. <a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">https://doi.org/10.1007/978-3-319-56617-7_18</a>.","ieee":"F. Günther, B. Hale, T. Jager, and S. Lauer, “0-RTT Key Exchange with Full Forward Secrecy,” in <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 2017, pp. 519--548."},"title":"0-RTT Key Exchange with Full Forward Secrecy","doi":"10.1007/978-3-319-56617-7_18","date_updated":"2022-01-06T06:58:56Z","author":[{"first_name":"Felix","last_name":"Günther","full_name":"Günther, Felix"},{"first_name":"Britta","last_name":"Hale","full_name":"Hale, Britta"},{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"last_name":"Lauer","full_name":"Lauer, Sebastian","first_name":"Sebastian"}],"date_created":"2018-06-07T09:10:17Z","status":"public","publication":"Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III","type":"conference","_id":"3110","department":[{"_id":"558"}],"user_id":"38235"},{"date_created":"2018-06-07T09:11:07Z","author":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"},{"first_name":"Martijn","full_name":"Stam, Martijn","last_name":"Stam"},{"last_name":"Stanley-Oakes","full_name":"Stanley-Oakes, Ryan","first_name":"Ryan"},{"first_name":"Bogdan","full_name":"Warinschi, Bogdan","last_name":"Warinschi"}],"date_updated":"2022-01-06T06:58:56Z","doi":"10.1007/978-3-319-70500-2_14","title":"Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy","page":"409--441","citation":{"apa":"Jager, T., Stam, M., Stanley-Oakes, R., &#38; Warinschi, B. (2017). Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i> (pp. 409--441). <a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">https://doi.org/10.1007/978-3-319-70500-2_14</a>","short":"T. Jager, M. Stam, R. Stanley-Oakes, B. Warinschi, in: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441.","bibtex":"@inproceedings{Jager_Stam_Stanley-Oakes_Warinschi_2017, title={Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>}, booktitle={Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I}, author={Jager, Tibor and Stam, Martijn and Stanley-Oakes, Ryan and Warinschi, Bogdan}, year={2017}, pages={409--441} }","mla":"Jager, Tibor, et al. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 2017, pp. 409--441, doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>.","chicago":"Jager, Tibor, Martijn Stam, Ryan Stanley-Oakes, and Bogdan Warinschi. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” In <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 409--441, 2017. <a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">https://doi.org/10.1007/978-3-319-70500-2_14</a>.","ieee":"T. Jager, M. Stam, R. Stanley-Oakes, and B. Warinschi, “Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy,” in <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 2017, pp. 409--441.","ama":"Jager T, Stam M, Stanley-Oakes R, Warinschi B. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In: <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>. ; 2017:409--441. doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>"},"year":"2017","department":[{"_id":"558"}],"user_id":"38235","_id":"3111","publication":"Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I","type":"conference","status":"public"},{"_id":"3155","user_id":"29719","series_title":"Lecture Notes in Computer Science","department":[{"_id":"77"}],"editor":[{"first_name":"Zhenhua","last_name":"Duan","full_name":"Duan, Zhenhua"},{"first_name":"Luke","full_name":"Ong, Luke","last_name":"Ong"}],"status":"public","type":"conference","publication":"Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi'an, China, November 13-17, 2017, Proceedings","title":"Policy Dependent and Independent Information Flow Analyses","doi":"10.1007/978-3-319-68690-5_22","date_updated":"2022-01-06T06:59:00Z","author":[{"last_name":"Töws","full_name":"Töws, Manuel","first_name":"Manuel"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"date_created":"2018-06-13T07:35:49Z","year":"2017","citation":{"mla":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i>, edited by Zhenhua Duan and Luke Ong, 2017, pp. 362--378, doi:<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>.","bibtex":"@inproceedings{Töws_Wehrheim_2017, series={Lecture Notes in Computer Science}, title={Policy Dependent and Independent Information Flow Analyses}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>}, booktitle={Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings}, author={Töws, Manuel and Wehrheim, Heike}, editor={Duan, Zhenhua and Ong, LukeEditors}, year={2017}, pages={362--378}, collection={Lecture Notes in Computer Science} }","short":"M. Töws, H. Wehrheim, in: Z. Duan, L. Ong (Eds.), Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings, 2017, pp. 362--378.","apa":"Töws, M., &#38; Wehrheim, H. (2017). Policy Dependent and Independent Information Flow Analyses. In Z. Duan &#38; L. Ong (Eds.), <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i> (pp. 362--378). <a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">https://doi.org/10.1007/978-3-319-68690-5_22</a>","ama":"Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses. In: Duan Z, Ong L, eds. <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i>. Lecture Notes in Computer Science. ; 2017:362--378. doi:<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>","ieee":"M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow Analyses,” in <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i>, 2017, pp. 362--378.","chicago":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” In <i>Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings</i>, edited by Zhenhua Duan and Luke Ong, 362--378. Lecture Notes in Computer Science, 2017. <a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">https://doi.org/10.1007/978-3-319-68690-5_22</a>."},"page":"362--378"},{"year":"2017","page":"118--135","citation":{"apa":"König, J., &#38; Wehrheim, H. (2017). Value-Based or Conflict-Based? Opacity Definitions for STMs. In D. Van Hung &#38; D. Kapur (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i> (pp. 118--135). <a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">https://doi.org/10.1007/978-3-319-67729-3_8</a>","bibtex":"@inproceedings{König_Wehrheim_2017, series={Lecture Notes in Computer Science}, title={Value-Based or Conflict-Based? Opacity Definitions for STMs}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">10.1007/978-3-319-67729-3_8</a>}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings}, author={König, Jürgen and Wehrheim, Heike}, editor={Van Hung, Dang and Kapur, DeepakEditors}, year={2017}, pages={118--135}, collection={Lecture Notes in Computer Science} }","mla":"König, Jürgen, and Heike Wehrheim. “Value-Based or Conflict-Based? Opacity Definitions for STMs.” <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i>, edited by Dang Van Hung and Deepak Kapur, 2017, pp. 118--135, doi:<a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">10.1007/978-3-319-67729-3_8</a>.","short":"J. König, H. Wehrheim, in: D. Van Hung, D. Kapur (Eds.), Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings, 2017, pp. 118--135.","ieee":"J. König and H. Wehrheim, “Value-Based or Conflict-Based? Opacity Definitions for STMs,” in <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i>, 2017, pp. 118--135.","chicago":"König, Jürgen, and Heike Wehrheim. “Value-Based or Conflict-Based? Opacity Definitions for STMs.” In <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i>, edited by Dang Van Hung and Deepak Kapur, 118--135. Lecture Notes in Computer Science, 2017. <a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">https://doi.org/10.1007/978-3-319-67729-3_8</a>.","ama":"König J, Wehrheim H. Value-Based or Conflict-Based? Opacity Definitions for STMs. In: Van Hung D, Kapur D, eds. <i>Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings</i>. Lecture Notes in Computer Science. ; 2017:118--135. doi:<a href=\"https://doi.org/10.1007/978-3-319-67729-3_8\">10.1007/978-3-319-67729-3_8</a>"},"date_updated":"2022-01-06T06:59:00Z","date_created":"2018-06-13T07:37:18Z","author":[{"first_name":"Jürgen","last_name":"König","full_name":"König, Jürgen"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"title":"Value-Based or Conflict-Based? Opacity Definitions for STMs","doi":"10.1007/978-3-319-67729-3_8","publication":"Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings","type":"conference","editor":[{"first_name":"Dang","last_name":"Van Hung","full_name":"Van Hung, Dang"},{"first_name":"Deepak","last_name":"Kapur","full_name":"Kapur, Deepak"}],"status":"public","_id":"3156","project":[{"_id":"78","name":"Validation of Software Transactional Memory"}],"department":[{"_id":"77"}],"series_title":"Lecture Notes in Computer Science","user_id":"29719"},{"language":[{"iso":"eng"}],"_id":"27224","user_id":"44116","department":[{"_id":"9"},{"_id":"367"},{"_id":"321"}],"status":"public","type":"journal_article","publication":"Kunststoffe erfolgreich kleben","title":"Alterung von plasmabehandelten Kunststoffen – Alles eine Frage der Zeit?","date_updated":"2022-01-06T06:57:36Z","publisher":"Wiesbaden: Springer Vieweg","date_created":"2021-11-08T09:15:33Z","author":[{"first_name":"Elmar","full_name":"Moritzer, Elmar","id":"20531","last_name":"Moritzer"},{"last_name":"Krugmann","full_name":"Krugmann, J.","first_name":"J."},{"last_name":"Leister","full_name":"Leister, C.","first_name":"C."}],"year":"2017","citation":{"chicago":"Moritzer, Elmar, J. Krugmann, and C. Leister. “Alterung von Plasmabehandelten Kunststoffen – Alles Eine Frage Der Zeit?” <i>Kunststoffe Erfolgreich Kleben</i>, no. 1 (2017): 81–86.","ieee":"E. Moritzer, J. Krugmann, and C. Leister, “Alterung von plasmabehandelten Kunststoffen – Alles eine Frage der Zeit?,” <i>Kunststoffe erfolgreich kleben</i>, no. 1, pp. 81–86, 2017.","ama":"Moritzer E, Krugmann J, Leister C. Alterung von plasmabehandelten Kunststoffen – Alles eine Frage der Zeit? <i>Kunststoffe erfolgreich kleben</i>. 2017;(1):81-86.","bibtex":"@article{Moritzer_Krugmann_Leister_2017, title={Alterung von plasmabehandelten Kunststoffen – Alles eine Frage der Zeit?}, number={1}, journal={Kunststoffe erfolgreich kleben}, publisher={Wiesbaden: Springer Vieweg}, author={Moritzer, Elmar and Krugmann, J. and Leister, C.}, year={2017}, pages={81–86} }","mla":"Moritzer, Elmar, et al. “Alterung von Plasmabehandelten Kunststoffen – Alles Eine Frage Der Zeit?” <i>Kunststoffe Erfolgreich Kleben</i>, no. 1, Wiesbaden: Springer Vieweg, 2017, pp. 81–86.","short":"E. Moritzer, J. Krugmann, C. Leister, Kunststoffe Erfolgreich Kleben (2017) 81–86.","apa":"Moritzer, E., Krugmann, J., &#38; Leister, C. (2017). Alterung von plasmabehandelten Kunststoffen – Alles eine Frage der Zeit? <i>Kunststoffe Erfolgreich Kleben</i>, <i>1</i>, 81–86."},"page":"81-86","publication_identifier":{"isbn":["978-3-658-18445-2 "]},"issue":"1"},{"date_updated":"2022-01-06T06:57:36Z","publisher":"Wiesbaden: Springer Vieweg","author":[{"first_name":"Elmar","last_name":"Moritzer","full_name":"Moritzer, Elmar","id":"20531"},{"first_name":"N.","full_name":"Friedrich, N.","last_name":"Friedrich"},{"first_name":"J.","last_name":"Berger","full_name":"Berger, J."}],"date_created":"2021-11-08T09:18:01Z","title":"Laserdurchstrahlkleben von opaken Kunststoffen – Schnell und zuverlässig. ","publication_identifier":{"isbn":["978-3-658-18445-2"]},"issue":"1","year":"2017","citation":{"chicago":"Moritzer, Elmar, N. Friedrich, and J. Berger. “Laserdurchstrahlkleben von Opaken Kunststoffen – Schnell Und Zuverlässig. .” <i>Kunststoffe Erfolgreich Kleben</i>, no. 1 (2017): 213–21.","ieee":"E. Moritzer, N. Friedrich, and J. Berger, “Laserdurchstrahlkleben von opaken Kunststoffen – Schnell und zuverlässig. ,” <i>Kunststoffe erfolgreich kleben</i>, no. 1, pp. 213–221, 2017.","ama":"Moritzer E, Friedrich N, Berger J. Laserdurchstrahlkleben von opaken Kunststoffen – Schnell und zuverlässig. . <i>Kunststoffe erfolgreich kleben</i>. 2017;(1):213-221.","apa":"Moritzer, E., Friedrich, N., &#38; Berger, J. (2017). Laserdurchstrahlkleben von opaken Kunststoffen – Schnell und zuverlässig. . <i>Kunststoffe Erfolgreich Kleben</i>, <i>1</i>, 213–221.","mla":"Moritzer, Elmar, et al. “Laserdurchstrahlkleben von Opaken Kunststoffen – Schnell Und Zuverlässig. .” <i>Kunststoffe Erfolgreich Kleben</i>, no. 1, Wiesbaden: Springer Vieweg, 2017, pp. 213–21.","bibtex":"@article{Moritzer_Friedrich_Berger_2017, title={Laserdurchstrahlkleben von opaken Kunststoffen – Schnell und zuverlässig. }, number={1}, journal={Kunststoffe erfolgreich kleben}, publisher={Wiesbaden: Springer Vieweg}, author={Moritzer, Elmar and Friedrich, N. and Berger, J.}, year={2017}, pages={213–221} }","short":"E. Moritzer, N. Friedrich, J. Berger, Kunststoffe Erfolgreich Kleben (2017) 213–221."},"page":"213-221","_id":"27225","user_id":"44116","department":[{"_id":"9"},{"_id":"367"},{"_id":"321"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"Kunststoffe erfolgreich kleben","status":"public"},{"citation":{"apa":"Föcker, M., Antel, J., Ring, S., Hahn, D., Kanal, Ö., Öztürk, D., Hebebrand, J., &#38; Libuda, L. (2017). Vitamin D and mental health in children and adolescents. <i>European Child &#38; Adolescent Psychiatry</i>, 1043–1066. <a href=\"https://doi.org/10.1007/s00787-017-0949-3\">https://doi.org/10.1007/s00787-017-0949-3</a>","mla":"Föcker, Manuel, et al. “Vitamin D and Mental Health in Children and Adolescents.” <i>European Child &#38; Adolescent Psychiatry</i>, 2017, pp. 1043–66, doi:<a href=\"https://doi.org/10.1007/s00787-017-0949-3\">10.1007/s00787-017-0949-3</a>.","short":"M. Föcker, J. Antel, S. Ring, D. Hahn, Ö. Kanal, D. Öztürk, J. Hebebrand, L. Libuda, European Child &#38; Adolescent Psychiatry (2017) 1043–1066.","bibtex":"@article{Föcker_Antel_Ring_Hahn_Kanal_Öztürk_Hebebrand_Libuda_2017, title={Vitamin D and mental health in children and adolescents}, DOI={<a href=\"https://doi.org/10.1007/s00787-017-0949-3\">10.1007/s00787-017-0949-3</a>}, journal={European Child &#38; Adolescent Psychiatry}, author={Föcker, Manuel and Antel, Jochen and Ring, Stefanie and Hahn, Denise and Kanal, Özlem and Öztürk, Dana and Hebebrand, Johannes and Libuda, Lars}, year={2017}, pages={1043–1066} }","chicago":"Föcker, Manuel, Jochen Antel, Stefanie Ring, Denise Hahn, Özlem Kanal, Dana Öztürk, Johannes Hebebrand, and Lars Libuda. “Vitamin D and Mental Health in Children and Adolescents.” <i>European Child &#38; Adolescent Psychiatry</i>, 2017, 1043–66. <a href=\"https://doi.org/10.1007/s00787-017-0949-3\">https://doi.org/10.1007/s00787-017-0949-3</a>.","ieee":"M. Föcker <i>et al.</i>, “Vitamin D and mental health in children and adolescents,” <i>European Child &#38; Adolescent Psychiatry</i>, pp. 1043–1066, 2017, doi: <a href=\"https://doi.org/10.1007/s00787-017-0949-3\">10.1007/s00787-017-0949-3</a>.","ama":"Föcker M, Antel J, Ring S, et al. Vitamin D and mental health in children and adolescents. <i>European Child &#38; Adolescent Psychiatry</i>. Published online 2017:1043-1066. doi:<a href=\"https://doi.org/10.1007/s00787-017-0949-3\">10.1007/s00787-017-0949-3</a>"},"page":"1043-1066","year":"2017","publication_status":"published","publication_identifier":{"issn":["1018-8827","1435-165X"]},"doi":"10.1007/s00787-017-0949-3","title":"Vitamin D and mental health in children and adolescents","date_created":"2021-11-17T11:04:55Z","author":[{"full_name":"Föcker, Manuel","last_name":"Föcker","first_name":"Manuel"},{"first_name":"Jochen","last_name":"Antel","full_name":"Antel, Jochen"},{"full_name":"Ring, Stefanie","last_name":"Ring","first_name":"Stefanie"},{"first_name":"Denise","full_name":"Hahn, Denise","last_name":"Hahn"},{"first_name":"Özlem","last_name":"Kanal","full_name":"Kanal, Özlem"},{"full_name":"Öztürk, Dana","last_name":"Öztürk","first_name":"Dana"},{"last_name":"Hebebrand","full_name":"Hebebrand, Johannes","first_name":"Johannes"},{"first_name":"Lars","orcid":"0000-0003-1603-3133","last_name":"Libuda","full_name":"Libuda, Lars","id":"88682"}],"date_updated":"2022-01-06T06:57:40Z","status":"public","type":"journal_article","publication":"European Child & Adolescent Psychiatry","language":[{"iso":"eng"}],"user_id":"49428","department":[{"_id":"35"},{"_id":"22"},{"_id":"395"}],"_id":"27522"},{"status":"public","abstract":[{"lang":"eng","text":"<jats:title>Abstract</jats:title><jats:p>\r\nBackground Children with migration background are at particular risk for overweight. We assessed the effects of a primary school-based initiative targeted at enhancing physical activity and dietary education among children with a high proportion of migration background.</jats:p><jats:p>\r\nMethods Four 3rd and 4th grade classes (n=70 children, 77% with migration background) participated in a 10-months intervention comprising 2 additional exercise lessons weekly and 10 nutrition lessons per school year. 6 school classes (n=125 children, 65% with migration background) served as control. Before and after the intervention, an assessment of physical fitness and motor skills and questionnaires on dietary behavior and knowledge were conducted. In a subgroup (n=37), after 6 months of the intervention, daily physical activity was assessed by accelerometer-based monitoring. Differences in changes between the groups were assessed using linear regression analyses.</jats:p><jats:p>\r\nResults Changes between the 2 time points for fitness and motor skill tests (differences in standard deviation scores) were larger in the intervention than in the control group for the total mean test value (β=0.38, p&lt;0.001), driven by higher improvements in 5 of the 8 test items, i.e., obstacle race (speed) (β=0.22, p=0.049), standing long jump (strength) (β=0.35, p&lt;0.001), sit-ups (strength) (β=0.33, p=0.002), stand and reach (mobility) (β=0.22, p=0.042), and 6 min run (endurance) (β=0.40, p&lt;0.001), independently of confounders. Changes in dietary knowledge and consumption frequencies did not differ between groups.</jats:p><jats:p>\r\nConclusions Promoting guided physical activity in a primary school setting with a high proportion of children with migration background positively affected parameters of fitness and motor skills.</jats:p>"}],"type":"journal_article","publication":"Experimental and Clinical Endocrinology & Diabetes","language":[{"iso":"eng"}],"user_id":"61597","department":[{"_id":"17"},{"_id":"22"},{"_id":"571"}],"_id":"27771","citation":{"apa":"Weber, K., Spörkel, O., Mertens, M., Freese, A., Strassburger, K., Kemper, B., Bachmann, C., Diehlmann, K., Stemper, T., Buyken, A., Ketelhut, K., &#38; Müssig, K. (2017). Positive Effects of Promoting Physical Activity and Balanced Diets in a Primary School Setting with a High Proportion of Migrant School Children. <i>Experimental and Clinical Endocrinology &#38; Diabetes</i>, 554–562. <a href=\"https://doi.org/10.1055/s-0043-101918\">https://doi.org/10.1055/s-0043-101918</a>","mla":"Weber, Katharina, et al. “Positive Effects of Promoting Physical Activity and Balanced Diets in a Primary School Setting with a High Proportion of Migrant School Children.” <i>Experimental and Clinical Endocrinology &#38; Diabetes</i>, 2017, pp. 554–62, doi:<a href=\"https://doi.org/10.1055/s-0043-101918\">10.1055/s-0043-101918</a>.","bibtex":"@article{Weber_Spörkel_Mertens_Freese_Strassburger_Kemper_Bachmann_Diehlmann_Stemper_Buyken_et al._2017, title={Positive Effects of Promoting Physical Activity and Balanced Diets in a Primary School Setting with a High Proportion of Migrant School Children}, DOI={<a href=\"https://doi.org/10.1055/s-0043-101918\">10.1055/s-0043-101918</a>}, journal={Experimental and Clinical Endocrinology &#38; Diabetes}, author={Weber, Katharina and Spörkel, Olaf and Mertens, Melina and Freese, Alem and Strassburger, Klaus and Kemper, Boris and Bachmann, Clemens and Diehlmann, Knut and Stemper, Theodor and Buyken, Anette and et al.}, year={2017}, pages={554–562} }","short":"K. Weber, O. Spörkel, M. Mertens, A. Freese, K. Strassburger, B. Kemper, C. Bachmann, K. Diehlmann, T. Stemper, A. Buyken, K. Ketelhut, K. Müssig, Experimental and Clinical Endocrinology &#38; Diabetes (2017) 554–562.","ama":"Weber K, Spörkel O, Mertens M, et al. Positive Effects of Promoting Physical Activity and Balanced Diets in a Primary School Setting with a High Proportion of Migrant School Children. <i>Experimental and Clinical Endocrinology &#38; Diabetes</i>. Published online 2017:554-562. doi:<a href=\"https://doi.org/10.1055/s-0043-101918\">10.1055/s-0043-101918</a>","chicago":"Weber, Katharina, Olaf Spörkel, Melina Mertens, Alem Freese, Klaus Strassburger, Boris Kemper, Clemens Bachmann, et al. “Positive Effects of Promoting Physical Activity and Balanced Diets in a Primary School Setting with a High Proportion of Migrant School Children.” <i>Experimental and Clinical Endocrinology &#38; Diabetes</i>, 2017, 554–62. <a href=\"https://doi.org/10.1055/s-0043-101918\">https://doi.org/10.1055/s-0043-101918</a>.","ieee":"K. Weber <i>et al.</i>, “Positive Effects of Promoting Physical Activity and Balanced Diets in a Primary School Setting with a High Proportion of Migrant School Children,” <i>Experimental and Clinical Endocrinology &#38; Diabetes</i>, pp. 554–562, 2017, doi: <a href=\"https://doi.org/10.1055/s-0043-101918\">10.1055/s-0043-101918</a>."},"page":"554-562","year":"2017","publication_status":"published","publication_identifier":{"issn":["0947-7349","1439-3646"]},"doi":"10.1055/s-0043-101918","title":"Positive Effects of Promoting Physical Activity and Balanced Diets in a Primary School Setting with a High Proportion of Migrant School Children","date_created":"2021-11-23T16:59:43Z","author":[{"last_name":"Weber","full_name":"Weber, Katharina","first_name":"Katharina"},{"last_name":"Spörkel","full_name":"Spörkel, Olaf","first_name":"Olaf"},{"first_name":"Melina","last_name":"Mertens","full_name":"Mertens, Melina"},{"last_name":"Freese","full_name":"Freese, Alem","first_name":"Alem"},{"last_name":"Strassburger","full_name":"Strassburger, Klaus","first_name":"Klaus"},{"first_name":"Boris","last_name":"Kemper","full_name":"Kemper, Boris"},{"first_name":"Clemens","full_name":"Bachmann, Clemens","last_name":"Bachmann"},{"first_name":"Knut","full_name":"Diehlmann, Knut","last_name":"Diehlmann"},{"full_name":"Stemper, Theodor","last_name":"Stemper","first_name":"Theodor"},{"first_name":"Anette","last_name":"Buyken","full_name":"Buyken, Anette","id":"65985"},{"full_name":"Ketelhut, Kerstin","last_name":"Ketelhut","first_name":"Kerstin"},{"first_name":"Karsten","last_name":"Müssig","full_name":"Müssig, Karsten"}],"date_updated":"2022-01-06T06:57:44Z"},{"date_updated":"2022-01-06T06:57:45Z","author":[{"first_name":"Kerstin","last_name":"Drossel","full_name":"Drossel, Kerstin","id":"48921"},{"last_name":"Eickelmann","full_name":"Eickelmann, Birgit","id":"40387","first_name":"Birgit"}],"doi":"10.1007/978-3-319-74310-3_14","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["1868-4238","1868-422X"]},"place":"Cham","citation":{"short":"K. Drossel, B. Eickelmann, in: A. Tatnall, M. Webb (Eds.), Tomorrow’s Learning: Involving Everyone. Learning with and about Technologies and Computing, Springer International Publishing, Cham, 2017, pp. 114–124.","mla":"Drossel, Kerstin, and Birgit Eickelmann. “The Use of Tablets in Secondary Schools and Its Relationship with Computer Literacy.” <i>Tomorrow’s Learning: Involving Everyone. Learning with and about Technologies and Computing</i>, edited by Arthur Tatnall and Mary Webb, Springer International Publishing, 2017, pp. 114–24, doi:<a href=\"https://doi.org/10.1007/978-3-319-74310-3_14\">10.1007/978-3-319-74310-3_14</a>.","bibtex":"@inbook{Drossel_Eickelmann_2017, place={Cham}, title={The Use of Tablets in Secondary Schools and Its Relationship with Computer Literacy}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-74310-3_14\">10.1007/978-3-319-74310-3_14</a>}, booktitle={Tomorrow’s Learning: Involving Everyone. Learning with and about Technologies and Computing}, publisher={Springer International Publishing}, author={Drossel, Kerstin and Eickelmann, Birgit}, editor={Tatnall, Arthur and Webb, Mary}, year={2017}, pages={114–124} }","apa":"Drossel, K., &#38; Eickelmann, B. (2017). The Use of Tablets in Secondary Schools and Its Relationship with Computer Literacy. In A. Tatnall &#38; M. Webb (Eds.), <i>Tomorrow’s Learning: Involving Everyone. Learning with and about Technologies and Computing</i> (pp. 114–124). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-74310-3_14\">https://doi.org/10.1007/978-3-319-74310-3_14</a>","chicago":"Drossel, Kerstin, and Birgit Eickelmann. “The Use of Tablets in Secondary Schools and Its Relationship with Computer Literacy.” In <i>Tomorrow’s Learning: Involving Everyone. Learning with and about Technologies and Computing</i>, edited by Arthur Tatnall and Mary Webb, 114–24. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-74310-3_14\">https://doi.org/10.1007/978-3-319-74310-3_14</a>.","ieee":"K. Drossel and B. Eickelmann, “The Use of Tablets in Secondary Schools and Its Relationship with Computer Literacy,” in <i>Tomorrow’s Learning: Involving Everyone. Learning with and about Technologies and Computing</i>, A. Tatnall and M. Webb, Eds. Cham: Springer International Publishing, 2017, pp. 114–124.","ama":"Drossel K, Eickelmann B. The Use of Tablets in Secondary Schools and Its Relationship with Computer Literacy. In: Tatnall A, Webb M, eds. <i>Tomorrow’s Learning: Involving Everyone. Learning with and about Technologies and Computing</i>. Springer International Publishing; 2017:114-124. doi:<a href=\"https://doi.org/10.1007/978-3-319-74310-3_14\">10.1007/978-3-319-74310-3_14</a>"},"page":"114-124","_id":"27796","user_id":"50923","department":[{"_id":"462"}],"file_date_updated":"2021-11-25T13:37:42Z","type":"book_chapter","editor":[{"last_name":"Tatnall","full_name":"Tatnall, Arthur","first_name":"Arthur"},{"last_name":"Webb","full_name":"Webb, Mary","first_name":"Mary"}],"status":"public","publisher":"Springer International Publishing","date_created":"2021-11-25T12:03:48Z","title":"The Use of Tablets in Secondary Schools and Its Relationship with Computer Literacy","year":"2017","ddc":["370"],"language":[{"iso":"eng"}],"publication":"Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_name":"463502_1_En_14_Chapter.pdf","file_id":"27831","file_size":466147,"creator":"sschall","date_created":"2021-11-25T13:37:42Z","date_updated":"2021-11-25T13:37:42Z"}]},{"external_id":{"arxiv":["1701.07304"]},"ddc":["040"],"publication":"Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)","abstract":[{"text":"We study a model of selfish resource allocation that seeks to incorporate dependencies among resources as they exist in in modern networked environments. Our model is inspired by utility functions with constant elasticity of substitution (CES) which is a well-studied model in economics. We consider congestion games with different aggregation functions. In particular, we study $L_p$ norms and analyze the existence and complexity of (approximate) pure Nash equilibria. Additionally, we give an almost tight characterization based on monotonicity properties to describe the set of aggregation functions that guarantee the existence of pure Nash equilibria.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-21T13:05:37Z","creator":"florida","date_updated":"2018-03-21T13:05:37Z","access_level":"closed","file_id":"1566","file_name":"112-FeldottoLederSkopalik2017.pdf","file_size":264089}],"date_created":"2017-10-17T12:41:13Z","title":"Congestion Games with Complementarities","year":"2017","_id":"112","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"63"},{"_id":"541"}],"user_id":"14052","series_title":"LNCS","file_date_updated":"2018-03-21T13:05:37Z","type":"conference","status":"public","date_updated":"2022-01-06T06:50:58Z","author":[{"id":"14052","full_name":"Feldotto, Matthias","orcid":"0000-0003-1348-6516","last_name":"Feldotto","first_name":"Matthias"},{"full_name":"Leder, Lennart","last_name":"Leder","first_name":"Lennart"},{"id":"40384","full_name":"Skopalik, Alexander","last_name":"Skopalik","first_name":"Alexander"}],"doi":"10.1007/978-3-319-57586-5_19","has_accepted_license":"1","page":"222--233","citation":{"chicago":"Feldotto, Matthias, Lennart Leder, and Alexander Skopalik. “Congestion Games with Complementarities.” In <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i>, 222--233. LNCS, 2017. <a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">https://doi.org/10.1007/978-3-319-57586-5_19</a>.","ieee":"M. Feldotto, L. Leder, and A. Skopalik, “Congestion Games with Complementarities,” in <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i>, 2017, pp. 222--233.","ama":"Feldotto M, Leder L, Skopalik A. Congestion Games with Complementarities. In: <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i>. LNCS. ; 2017:222--233. doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">10.1007/978-3-319-57586-5_19</a>","short":"M. Feldotto, L. Leder, A. Skopalik, in: Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC), 2017, pp. 222--233.","mla":"Feldotto, Matthias, et al. “Congestion Games with Complementarities.” <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i>, 2017, pp. 222--233, doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">10.1007/978-3-319-57586-5_19</a>.","bibtex":"@inproceedings{Feldotto_Leder_Skopalik_2017, series={LNCS}, title={Congestion Games with Complementarities}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">10.1007/978-3-319-57586-5_19</a>}, booktitle={Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)}, author={Feldotto, Matthias and Leder, Lennart and Skopalik, Alexander}, year={2017}, pages={222--233}, collection={LNCS} }","apa":"Feldotto, M., Leder, L., &#38; Skopalik, A. (2017). Congestion Games with Complementarities. In <i>Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)</i> (pp. 222--233). <a href=\"https://doi.org/10.1007/978-3-319-57586-5_19\">https://doi.org/10.1007/978-3-319-57586-5_19</a>"}},{"status":"public","type":"conference","file_date_updated":"2018-10-31T17:01:32Z","department":[{"_id":"63"},{"_id":"541"}],"user_id":"14052","_id":"113","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}],"citation":{"short":"M. Feldotto, M. Gairing, G. Kotsialou, A. Skopalik, in: Proceedings of the 13th International Conference on Web and Internet Economics (WINE), 2017.","bibtex":"@inproceedings{Feldotto_Gairing_Kotsialou_Skopalik_2017, title={Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">10.1007/978-3-319-71924-5_14</a>}, booktitle={Proceedings of the 13th International Conference on Web and Internet Economics (WINE)}, author={Feldotto, Matthias and Gairing, Martin and Kotsialou, Grammateia and Skopalik, Alexander}, year={2017} }","mla":"Feldotto, Matthias, et al. “Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games.” <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">10.1007/978-3-319-71924-5_14</a>.","apa":"Feldotto, M., Gairing, M., Kotsialou, G., &#38; Skopalik, A. (2017). Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games. In <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>. <a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">https://doi.org/10.1007/978-3-319-71924-5_14</a>","ama":"Feldotto M, Gairing M, Kotsialou G, Skopalik A. Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games. In: <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">10.1007/978-3-319-71924-5_14</a>","ieee":"M. Feldotto, M. Gairing, G. Kotsialou, and A. Skopalik, “Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games,” in <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>, 2017.","chicago":"Feldotto, Matthias, Martin Gairing, Grammateia Kotsialou, and Alexander Skopalik. “Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games.” In <i>Proceedings of the 13th International Conference on Web and Internet Economics (WINE)</i>, 2017. <a href=\"https://doi.org/10.1007/978-3-319-71924-5_14\">https://doi.org/10.1007/978-3-319-71924-5_14</a>."},"has_accepted_license":"1","doi":"10.1007/978-3-319-71924-5_14","author":[{"orcid":"0000-0003-1348-6516","last_name":"Feldotto","id":"14052","full_name":"Feldotto, Matthias","first_name":"Matthias"},{"first_name":"Martin","last_name":"Gairing","full_name":"Gairing, Martin"},{"first_name":"Grammateia","last_name":"Kotsialou","full_name":"Kotsialou, Grammateia"},{"last_name":"Skopalik","id":"40384","full_name":"Skopalik, Alexander","first_name":"Alexander"}],"date_updated":"2022-01-06T06:50:59Z","file":[{"file_size":279055,"file_name":"Feldotto2017_Chapter_ComputingApproximatePureNashEq.pdf","access_level":"closed","file_id":"5231","date_updated":"2018-10-31T17:01:32Z","creator":"feldi","date_created":"2018-10-31T17:01:32Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"We study the computation of approximate pure Nash equilibria in Shapley value (SV) weighted congestion games, introduced in [19]. This class of games considers weighted congestion games in which Shapley values are used as an alternative (to proportional shares) for distributing the total cost of each resource among its users. We focus on the interesting subclass of such games with polynomial resource cost functions and present an algorithm that computes approximate pure Nash equilibria with a polynomial number of strategy updates. Since computing a single strategy update is hard, we apply sampling techniques which allow us to achieve polynomial running time. The algorithm builds on the algorithmic ideas of [7], however, to the best of our knowledge, this is the first algorithmic result on computation of approximate equilibria using other than proportional shares as player costs in this setting. We present a novel relation that approximates the Shapley value of a player by her proportional share and vice versa. As side results, we upper bound the approximate price of anarchy of such games and significantly improve the best known factor for computing approximate pure Nash equilibria in weighted congestion games of [7]."}],"publication":"Proceedings of the 13th International Conference on Web and Internet Economics (WINE)","language":[{"iso":"eng"}],"ddc":["000"],"external_id":{"arxiv":["1710.01634"]},"year":"2017","title":"Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games","date_created":"2017-10-17T12:41:13Z"},{"publication":"NASA Formal Methods: 9th International Symposium","abstract":[{"text":"Proof witnesses are proof artifacts showing correctness of programs wrt. safety properties. The recent past has seen a rising interest in witnesses as (a) proofs in a proof-carrying-code context, (b) certificates for the correct functioning of verification tools, or simply (c) exchange formats for (partial) verification results. As witnesses in all theses scenarios need to be stored and processed, witnesses are required to be as small as possible. However, software verification tools – the prime suppliers of witnesses – do not necessarily construct small witnesses. In this paper, we present a formal account of proof witnesses. We introduce the concept of weakenings, reducing the complexity of proof witnesses while preserving the ability of witnessing safety. We develop aweakening technique for a specific class of program analyses, and prove it to be sound. Finally, we experimentally demonstrate our weakening technique to indeed achieve a size reduction of proof witnesses.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-21T13:05:02Z","creator":"florida","date_updated":"2018-03-21T13:05:02Z","file_id":"1565","access_level":"closed","file_name":"114-chp_3A10.1007_2F978-3-319-57288-8_28.pdf","file_size":492800}],"ddc":["040"],"language":[{"iso":"eng"}],"year":"2017","date_created":"2017-10-17T12:41:13Z","title":"Compact Proof Witnesses","type":"conference","editor":[{"last_name":"Barrett","full_name":"Barrett, Clark","first_name":"Clark"},{"first_name":"Misty","last_name":"Davies","full_name":"Davies, Misty"},{"first_name":"Temesghen","full_name":"Kahsai, Temesghen","last_name":"Kahsai"}],"status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"114","user_id":"477","series_title":"Lecture Notes in Computer Science","department":[{"_id":"77"}],"file_date_updated":"2018-03-21T13:05:02Z","has_accepted_license":"1","citation":{"ieee":"M.-C. Jakobs and H. Wehrheim, “Compact Proof Witnesses,” in <i>NASA Formal Methods: 9th International Symposium</i>, 2017, pp. 389–403.","chicago":"Jakobs, Marie-Christine, and Heike Wehrheim. “Compact Proof Witnesses.” In <i>NASA Formal Methods: 9th International Symposium</i>, edited by Clark Barrett, Misty Davies, and Temesghen Kahsai, 389–403. Lecture Notes in Computer Science, 2017. <a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">https://doi.org/10.1007/978-3-319-57288-8_28</a>.","ama":"Jakobs M-C, Wehrheim H. Compact Proof Witnesses. In: Barrett C, Davies M, Kahsai T, eds. <i>NASA Formal Methods: 9th International Symposium</i>. Lecture Notes in Computer Science. ; 2017:389-403. doi:<a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">10.1007/978-3-319-57288-8_28</a>","apa":"Jakobs, M.-C., &#38; Wehrheim, H. (2017). Compact Proof Witnesses. In C. Barrett, M. Davies, &#38; T. Kahsai (Eds.), <i>NASA Formal Methods: 9th International Symposium</i> (pp. 389–403). <a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">https://doi.org/10.1007/978-3-319-57288-8_28</a>","bibtex":"@inproceedings{Jakobs_Wehrheim_2017, series={Lecture Notes in Computer Science}, title={Compact Proof Witnesses}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">10.1007/978-3-319-57288-8_28</a>}, booktitle={NASA Formal Methods: 9th International Symposium}, author={Jakobs, Marie-Christine and Wehrheim, Heike}, editor={Barrett, Clark and Davies, Misty and Kahsai, TemesghenEditors}, year={2017}, pages={389–403}, collection={Lecture Notes in Computer Science} }","mla":"Jakobs, Marie-Christine, and Heike Wehrheim. “Compact Proof Witnesses.” <i>NASA Formal Methods: 9th International Symposium</i>, edited by Clark Barrett et al., 2017, pp. 389–403, doi:<a href=\"https://doi.org/10.1007/978-3-319-57288-8_28\">10.1007/978-3-319-57288-8_28</a>.","short":"M.-C. Jakobs, H. Wehrheim, in: C. Barrett, M. Davies, T. Kahsai (Eds.), NASA Formal Methods: 9th International Symposium, 2017, pp. 389–403."},"page":"389-403","date_updated":"2022-01-06T06:51:00Z","author":[{"first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine","last_name":"Jakobs"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"doi":"10.1007/978-3-319-57288-8_28"},{"publication":"The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)","file":[{"file_name":"115-JakobsKraemerVanStraatenLettmann2017.pdf","file_id":"1564","access_level":"closed","file_size":133531,"date_created":"2018-03-21T13:04:12Z","creator":"florida","date_updated":"2018-03-21T13:04:12Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Whenever customers have to decide between different instances of the same product, they are interested in buying the best product. In contrast, companies are interested in reducing the construction effort (and usually as a consequence thereof, the quality) to gain profit. The described setting is widely known as opposed preferences in quality of the product and also applies to the context of service-oriented computing. In general, service-oriented computing emphasizes the construction of large software systems out of existing services, where services are small and self-contained pieces of software that adhere to a specified interface. Several implementations of the same interface are considered as several instances of the same service. Thereby, customers are interested in buying the best service implementation for their service composition wrt. to metrics, such as costs, energy, memory consumption, or execution time. One way to ensure the service quality is to employ certificates, which can come in different kinds: Technical certificates proving correctness can be automatically constructed by the service provider and again be automatically checked by the user. Digital certificates allow proof of the integrity of a product. Other certificates might be rolled out if service providers follow a good software construction principle, which is checked in annual audits. Whereas all of these certificates are handled differently in service markets, what they have in common is that they influence the buying decisions of customers. In this paper, we review state-of-the-art developments in certification with respect to service-oriented computing. We not only discuss how certificates are constructed and handled in service-oriented computing but also review the effects of certificates on the market from an economic perspective."}],"language":[{"iso":"eng"}],"ddc":["040"],"year":"2017","date_created":"2017-10-17T12:41:14Z","title":"Certiﬁcation Matters for Service Markets","type":"conference","status":"public","editor":[{"last_name":"Marcelo De Barros, Janusz Klink,Tadeus Uhl","full_name":"Marcelo De Barros, Janusz Klink,Tadeus Uhl, Thomas Prinz","first_name":"Thomas Prinz"}],"department":[{"_id":"77"},{"_id":"355"},{"_id":"179"}],"user_id":"477","_id":"115","project":[{"name":"SFB 901","_id":"1"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"name":"SFB 901 - Subproject B3","_id":"11"},{"name":"SFB 901 - Subproject B4","_id":"12"},{"name":"SFB 901 - Subproject A4","_id":"8"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Project Area B","_id":"3"}],"file_date_updated":"2018-03-21T13:04:12Z","has_accepted_license":"1","page":"7-12","citation":{"apa":"Jakobs, M.-C., Krämer, J., van Straaten, D., &#38; Lettmann, T. (2017). Certiﬁcation Matters for Service Markets. In T. P. Marcelo De Barros, Janusz Klink,Tadeus Uhl (Ed.), <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i> (pp. 7–12).","short":"M.-C. Jakobs, J. Krämer, D. van Straaten, T. Lettmann, in: T.P. Marcelo De Barros, Janusz Klink,Tadeus Uhl (Ed.), The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2017, pp. 7–12.","mla":"Jakobs, Marie-Christine, et al. “Certiﬁcation Matters for Service Markets.” <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, edited by Thomas Prinz Marcelo De Barros, Janusz Klink,Tadeus Uhl, 2017, pp. 7–12.","bibtex":"@inproceedings{Jakobs_Krämer_van Straaten_Lettmann_2017, title={Certiﬁcation Matters for Service Markets}, booktitle={The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)}, author={Jakobs, Marie-Christine and Krämer, Julia and van Straaten, Dirk and Lettmann, Theodor}, editor={Marcelo De Barros, Janusz Klink,Tadeus Uhl, Thomas PrinzEditor}, year={2017}, pages={7–12} }","ama":"Jakobs M-C, Krämer J, van Straaten D, Lettmann T. Certiﬁcation Matters for Service Markets. In: Marcelo De Barros, Janusz Klink,Tadeus Uhl TP, ed. <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>. ; 2017:7-12.","chicago":"Jakobs, Marie-Christine, Julia Krämer, Dirk van Straaten, and Theodor Lettmann. “Certiﬁcation Matters for Service Markets.” In <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, edited by Thomas Prinz Marcelo De Barros, Janusz Klink,Tadeus Uhl, 7–12, 2017.","ieee":"M.-C. Jakobs, J. Krämer, D. van Straaten, and T. Lettmann, “Certiﬁcation Matters for Service Markets,” in <i>The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)</i>, 2017, pp. 7–12."},"author":[{"first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine","last_name":"Jakobs"},{"full_name":"Krämer, Julia","last_name":"Krämer","first_name":"Julia"},{"first_name":"Dirk","last_name":"van Straaten","id":"10311","full_name":"van Straaten, Dirk"},{"last_name":"Lettmann","orcid":"0000-0001-5859-2457","full_name":"Lettmann, Theodor","id":"315","first_name":"Theodor"}],"date_updated":"2022-01-06T06:51:02Z"},{"publication":"Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security","abstract":[{"text":"In this paper, we present an IoT architecture which handles stream sensor data of air pollution. Particle pollution is known as a serious threat to human health. Along with developments in the use of wireless sensors and the IoT, we propose an architecture that flexibly measures and processes stream data collected in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread network of wireless sensors that can follow changes in human behavior. Apart from stating reasons for the need of such a development and its requirements, we provide a conceptual design as well as a technological design of such an architecture. The technological design consists of Kaa and Apache Storm which can collect air pollution information in real-time and solve various problems to process data such as missing data and synchronization. This enables us to add a simulation in which we provide issues that might come up when having our architecture in use. Together with these issues, we state r easons for choosing specific modules among candidates. Our architecture combines wireless sensors with the Kaa IoT framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management System among others. We even provide open-government data sets that are freely available.","lang":"eng"}],"file":[{"creator":"jkers","date_created":"2020-09-18T09:09:27Z","date_updated":"2020-09-18T09:09:27Z","access_level":"closed","file_name":"IoTBDS_2017_50_final.pdf","file_id":"19567","file_size":2612566,"content_type":"application/pdf","relation":"main_file","success":1}],"ddc":["000"],"keyword":["Wireless Sensor Network","Internet of Things","Stream Data","Air Pollution","DSMS","Real-time Data Processing"],"language":[{"iso":"eng"}],"quality_controlled":"1","year":"2017","publisher":"SCITEPRESS","date_created":"2018-01-31T14:45:21Z","title":"Internet of Things Architecture for Handling Stream Air Pollution Data","type":"conference","editor":[{"full_name":"Ramachandran, Muthu","last_name":"Ramachandran","first_name":"Muthu"},{"last_name":"Méndez Muñoz","full_name":"Méndez Muñoz, Víctor","first_name":"Víctor"},{"last_name":"Kantere","full_name":"Kantere, Verena","first_name":"Verena"},{"full_name":"Wills, Gary","last_name":"Wills","first_name":"Gary"},{"first_name":"Robert","full_name":"Walters, Robert","last_name":"Walters"},{"last_name":"Chang","full_name":"Chang, Victor","first_name":"Victor"}],"status":"public","_id":"1156","user_id":"58701","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"file_date_updated":"2020-09-18T09:09:27Z","publication_status":"published","has_accepted_license":"1","publication_identifier":{"isbn":["978-989-758-245-5"]},"place":"Setúbal, Portugal","citation":{"ama":"Kersting J, Geierhos M, Jung H, Kim T. Internet of Things Architecture for Handling Stream Air Pollution Data. In: Ramachandran M, Méndez Muñoz V, Kantere V, Wills G, Walters R, Chang V, eds. <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>. Setúbal, Portugal: SCITEPRESS; 2017:117-124. doi:<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>","ieee":"J. Kersting, M. Geierhos, H. Jung, and T. Kim, “Internet of Things Architecture for Handling Stream Air Pollution Data,” in <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, Porto, Portugal, 2017, pp. 117–124.","chicago":"Kersting, Joschka, Michaela Geierhos, Hanmin Jung, and Taehong Kim. “Internet of Things Architecture for Handling Stream Air Pollution Data.” In <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary Wills, Robert Walters, and Victor Chang, 117–24. Setúbal, Portugal: SCITEPRESS, 2017. <a href=\"https://doi.org/10.5220/0006354801170124\">https://doi.org/10.5220/0006354801170124</a>.","bibtex":"@inproceedings{Kersting_Geierhos_Jung_Kim_2017, place={Setúbal, Portugal}, title={Internet of Things Architecture for Handling Stream Air Pollution Data}, DOI={<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>}, booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}, editor={Ramachandran, Muthu and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert and Chang, VictorEditors}, year={2017}, pages={117–124} }","short":"J. Kersting, M. Geierhos, H. Jung, T. Kim, in: M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, V. Chang (Eds.), Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, SCITEPRESS, Setúbal, Portugal, 2017, pp. 117–124.","mla":"Kersting, Joschka, et al. “Internet of Things Architecture for Handling Stream Air Pollution Data.” <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran et al., SCITEPRESS, 2017, pp. 117–24, doi:<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>.","apa":"Kersting, J., Geierhos, M., Jung, H., &#38; Kim, T. (2017). Internet of Things Architecture for Handling Stream Air Pollution Data. In M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, &#38; V. Chang (Eds.), <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i> (pp. 117–124). Setúbal, Portugal: SCITEPRESS. <a href=\"https://doi.org/10.5220/0006354801170124\">https://doi.org/10.5220/0006354801170124</a>"},"page":"117-124","date_updated":"2022-01-06T06:51:03Z","author":[{"last_name":"Kersting","id":"58701","full_name":"Kersting, Joschka","first_name":"Joschka"},{"full_name":"Geierhos, Michaela","id":"42496","orcid":"0000-0002-8180-5606","last_name":"Geierhos","first_name":"Michaela"},{"full_name":"Jung, Hanmin","last_name":"Jung","first_name":"Hanmin"},{"first_name":"Taehong","full_name":"Kim, Taehong","last_name":"Kim"}],"doi":"10.5220/0006354801170124","conference":{"location":"Porto, Portugal","end_date":"2017-04-26","start_date":"2017-04-24","name":"2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017)"}}]
