[{"department":[{"_id":"28"},{"_id":"66"},{"_id":"534"}],"publication":"Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020","publisher":"Springer","author":[{"id":"53103","last_name":"Weidmann","full_name":"Weidmann, Nils","first_name":"Nils"},{"last_name":"Anjorin","first_name":"Anthony","full_name":"Anjorin, Anthony"}],"date_created":"2020-06-06T09:50:42Z","status":"public","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030452339","9783030452346"]},"editor":[{"full_name":"Wehrheim, Heike","first_name":"Heike","last_name":"Wehrheim"},{"last_name":"Cabot","first_name":"Jordi","full_name":"Cabot, Jordi"}],"place":"Cham","user_id":"53103","title":"Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming","language":[{"iso":"eng"}],"type":"conference","citation":{"chicago":"Weidmann, Nils, and Anthony Anjorin. “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming.” In Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, edited by Heike Wehrheim and Jordi Cabot. Cham: Springer, 2020. https://doi.org/10.1007/978-3-030-45234-6_16.","ama":"Weidmann N, Anjorin A. Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming. In: Wehrheim H, Cabot J, eds. Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020. Cham: Springer; 2020. doi:10.1007/978-3-030-45234-6_16","apa":"Weidmann, N., & Anjorin, A. (2020). Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming. In H. Wehrheim & J. Cabot (Eds.), Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020. Cham: Springer. https://doi.org/10.1007/978-3-030-45234-6_16","mla":"Weidmann, Nils, and Anthony Anjorin. “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming.” Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, edited by Heike Wehrheim and Jordi Cabot, Springer, 2020, doi:10.1007/978-3-030-45234-6_16.","bibtex":"@inproceedings{Weidmann_Anjorin_2020, place={Cham}, title={Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming}, DOI={10.1007/978-3-030-45234-6_16}, booktitle={Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020}, publisher={Springer}, author={Weidmann, Nils and Anjorin, Anthony}, editor={Wehrheim, Heike and Cabot, JordiEditors}, year={2020} }","short":"N. Weidmann, A. Anjorin, in: H. Wehrheim, J. Cabot (Eds.), Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, Springer, Cham, 2020.","ieee":"N. Weidmann and A. Anjorin, “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming,” in Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, Dublin, Ireland, 2020."},"year":"2020","conference":{"name":"Fundamental Approaches to Software Engineering - 23rd International Conference, FASE 2020","start_date":"2020-04-25","location":"Dublin, Ireland","end_date":"2020-04-30"},"_id":"17084","date_updated":"2022-01-06T06:53:04Z","doi":"10.1007/978-3-030-45234-6_16"},{"publication":"Advanced Information Systems Engineering","author":[{"full_name":"Schwichtenberg, Bahar","first_name":"Bahar","id":"36399","last_name":"Schwichtenberg"},{"full_name":"Schwichtenberg, Simon","first_name":"Simon","id":"13235","last_name":"Schwichtenberg"},{"first_name":"Jochen","full_name":"Küster, Jochen","last_name":"Küster"},{"first_name":"Olaf","full_name":"Zimmermann, Olaf","last_name":"Zimmermann"},{"first_name":"Gregor","full_name":"Engels, Gregor","last_name":"Engels","id":"107"}],"date_created":"2020-06-07T08:53:10Z","status":"public","publication_status":"published","publication_identifier":{"isbn":["9783030494346","9783030494353"],"issn":["0302-9743","1611-3349"]},"place":"Cham","user_id":"36399","title":"Modeling and Analyzing Architectural Diversity of Open Platforms","language":[{"iso":"eng"}],"citation":{"ieee":"B. Schwichtenberg, S. Schwichtenberg, J. Küster, O. Zimmermann, and G. Engels, “Modeling and Analyzing Architectural Diversity of Open Platforms,” in Advanced Information Systems Engineering, 2020.","short":"B. Schwichtenberg, S. Schwichtenberg, J. Küster, O. Zimmermann, G. Engels, in: Advanced Information Systems Engineering, Cham, 2020.","bibtex":"@inproceedings{Schwichtenberg_Schwichtenberg_Küster_Zimmermann_Engels_2020, place={Cham}, title={Modeling and Analyzing Architectural Diversity of Open Platforms}, DOI={10.1007/978-3-030-49435-3_3}, booktitle={Advanced Information Systems Engineering}, author={Schwichtenberg, Bahar and Schwichtenberg, Simon and Küster, Jochen and Zimmermann, Olaf and Engels, Gregor}, year={2020} }","mla":"Schwichtenberg, Bahar, et al. “Modeling and Analyzing Architectural Diversity of Open Platforms.” Advanced Information Systems Engineering, 2020, doi:10.1007/978-3-030-49435-3_3.","chicago":"Schwichtenberg, Bahar, Simon Schwichtenberg, Jochen Küster, Olaf Zimmermann, and Gregor Engels. “Modeling and Analyzing Architectural Diversity of Open Platforms.” In Advanced Information Systems Engineering. Cham, 2020. https://doi.org/10.1007/978-3-030-49435-3_3.","ama":"Schwichtenberg B, Schwichtenberg S, Küster J, Zimmermann O, Engels G. Modeling and Analyzing Architectural Diversity of Open Platforms. In: Advanced Information Systems Engineering. Cham; 2020. doi:10.1007/978-3-030-49435-3_3","apa":"Schwichtenberg, B., Schwichtenberg, S., Küster, J., Zimmermann, O., & Engels, G. (2020). Modeling and Analyzing Architectural Diversity of Open Platforms. In Advanced Information Systems Engineering. Cham. https://doi.org/10.1007/978-3-030-49435-3_3"},"type":"conference","year":"2020","date_updated":"2022-01-06T06:53:04Z","_id":"17085","doi":"10.1007/978-3-030-49435-3_3"},{"publication":"Cryptology and Network Security","publisher":"Springer-Verlag","author":[{"last_name":"Dallmeier","full_name":"Dallmeier, Fynn","first_name":"Fynn"},{"full_name":"Drees, Jan P.","first_name":"Jan P.","last_name":"Drees"},{"last_name":"Gellert","first_name":"Kai","full_name":"Gellert, Kai"},{"first_name":"Tobias","full_name":"Handirk, Tobias","last_name":"Handirk"},{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager"},{"orcid":"0000-0001-9160-9636","full_name":"Klauke, Jonas","first_name":"Jonas","id":"40915","last_name":"Klauke"},{"last_name":"Nachtigall","full_name":"Nachtigall, Simon","first_name":"Simon"},{"last_name":"Renzelmann","first_name":"Timo","full_name":"Renzelmann, Timo"},{"last_name":"Wolf","full_name":"Wolf, Rudi","first_name":"Rudi"}],"date_created":"2021-12-15T17:43:11Z","status":"public","extern":"1","abstract":[{"lang":"eng","text":"Modern cryptographic protocols, such as TLS 1.3 and QUIC, can send cryptographically protected data in “zero round-trip times (0-RTT)”, that is, without the need for a prior interactive handshake. Such protocols meet the demand for communication with minimal latency, but those currently deployed in practice achieve only rather weak security properties, as they may not achieve forward security for the first transmitted payload message and require additional countermeasures against replay attacks.Recently, 0-RTT protocols with full forward security and replay resilience have been proposed in the academic literature. These are based on puncturable encryption, which uses rather heavy building blocks, such as cryptographic pairings. Some constructions were claimed to have practical efficiency, but it is unclear how they compare concretely to protocols deployed in practice, and we currently do not have any benchmark results that new protocols can be compared with.We provide the first concrete performance analysis of a modern 0-RTT protocol with full forward security, by integrating the Bloom Filter Encryption scheme of Derler et al. (EUROCRYPT 2018) in the Chromium QUIC implementation and comparing it to Google’s original QUIC protocol. We find that for reasonable deployment parameters, the server CPU load increases approximately by a factor of eight and the memory consumption on the server increases significantly, but stays below 400 MB even for medium-scale deployments that handle up to 50K connections per day. The difference of the size of handshake messages is small enough that transmission time on the network is identical, and therefore not significant.We conclude that while current 0-RTT protocols with full forward security come with significant computational overhead, their use in practice is feasible, and may be used in applications where the increased CPU and memory load can be tolerated in exchange for full forward security and replay resilience on the cryptographic protocol level. Our results serve as a first benchmark that can be used to assess the efficiency of 0-RTT protocols potentially developed in the future.\r\n"}],"user_id":"40915","page":"211-231","citation":{"bibtex":"@inproceedings{Dallmeier_Drees_Gellert_Handirk_Jager_Klauke_Nachtigall_Renzelmann_Wolf_2020, place={Cham}, title={Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC}, DOI={10.1007/978-3-030-65411-5_11}, booktitle={Cryptology and Network Security}, publisher={Springer-Verlag}, author={Dallmeier, Fynn and Drees, Jan P. and Gellert, Kai and Handirk, Tobias and Jager, Tibor and Klauke, Jonas and Nachtigall, Simon and Renzelmann, Timo and Wolf, Rudi}, year={2020}, pages={211–231} }","mla":"Dallmeier, Fynn, et al. “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.” Cryptology and Network Security, Springer-Verlag, 2020, pp. 211–31, doi:10.1007/978-3-030-65411-5_11.","chicago":"Dallmeier, Fynn, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, and Rudi Wolf. “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.” In Cryptology and Network Security, 211–31. Cham: Springer-Verlag, 2020. https://doi.org/10.1007/978-3-030-65411-5_11.","ama":"Dallmeier F, Drees JP, Gellert K, et al. Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. In: Cryptology and Network Security. Springer-Verlag; 2020:211-231. doi:10.1007/978-3-030-65411-5_11","apa":"Dallmeier, F., Drees, J. P., Gellert, K., Handirk, T., Jager, T., Klauke, J., Nachtigall, S., Renzelmann, T., & Wolf, R. (2020). Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. Cryptology and Network Security, 211–231. https://doi.org/10.1007/978-3-030-65411-5_11","ieee":"F. Dallmeier et al., “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC,” in Cryptology and Network Security, Vienna, 2020, pp. 211–231, doi: 10.1007/978-3-030-65411-5_11.","short":"F. Dallmeier, J.P. Drees, K. Gellert, T. Handirk, T. Jager, J. Klauke, S. Nachtigall, T. Renzelmann, R. Wolf, in: Cryptology and Network Security, Springer-Verlag, Cham, 2020, pp. 211–231."},"year":"2020","type":"conference","conference":{"end_date":"2020-12-16","name":"CANS 2020","start_date":"2020-12-14","location":"Vienna"},"_id":"28997","publication_status":"published","publication_identifier":{"isbn":["9783030654108","9783030654115"],"issn":["0302-9743","1611-3349"]},"place":"Cham","title":"Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC","language":[{"iso":"eng"}],"date_updated":"2022-03-11T10:59:41Z","doi":"10.1007/978-3-030-65411-5_11"},{"_id":"20706","date_updated":"2022-04-04T09:59:49Z","doi":"10.1007/978-3-030-64823-7_21","language":[{"iso":"eng"}],"citation":{"ieee":"P. zur Heiden, “Considering Context in Design Science Research: A Systematic Literature Review,” 2020, doi: 10.1007/978-3-030-64823-7_21.","short":"P. zur Heiden, in: Designing for Digital Transformation. Co-Creating Services with Citizens and Industry, Cham, 2020.","mla":"zur Heiden, Philipp. “Considering Context in Design Science Research: A Systematic Literature Review.” Designing for Digital Transformation. Co-Creating Services with Citizens and Industry, 2020, doi:10.1007/978-3-030-64823-7_21.","bibtex":"@inproceedings{zur Heiden_2020, place={Cham}, title={Considering Context in Design Science Research: A Systematic Literature Review}, DOI={10.1007/978-3-030-64823-7_21}, booktitle={Designing for Digital Transformation. Co-Creating Services with Citizens and Industry}, author={zur Heiden, Philipp}, year={2020} }","apa":"zur Heiden, P. (2020). Considering Context in Design Science Research: A Systematic Literature Review. Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. https://doi.org/10.1007/978-3-030-64823-7_21","ama":"zur Heiden P. Considering Context in Design Science Research: A Systematic Literature Review. In: Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. ; 2020. doi:10.1007/978-3-030-64823-7_21","chicago":"Heiden, Philipp zur. “Considering Context in Design Science Research: A Systematic Literature Review.” In Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. Cham, 2020. https://doi.org/10.1007/978-3-030-64823-7_21."},"type":"conference","year":"2020","place":"Cham","user_id":"64394","title":"Considering Context in Design Science Research: A Systematic Literature Review","author":[{"first_name":"Philipp","full_name":"zur Heiden, Philipp","last_name":"zur Heiden"}],"publication":"Designing for Digital Transformation. Co-Creating Services with Citizens and Industry","status":"public","date_created":"2020-12-11T14:01:48Z","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030648220","9783030648237"]}},{"date_updated":"2023-07-03T11:43:37Z","_id":"45848","doi":"10.1007/978-3-030-39951-1_10","language":[{"iso":"eng"}],"year":"2020","citation":{"ieee":"Y. Mahmood and A. Meier, “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic,” 2020, doi: 10.1007/978-3-030-39951-1_10.","short":"Y. Mahmood, A. Meier, in: Lecture Notes in Computer Science, Springer International Publishing, Cham, 2020.","mla":"Mahmood, Yasir, and Arne Meier. “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic.” Lecture Notes in Computer Science, Springer International Publishing, 2020, doi:10.1007/978-3-030-39951-1_10.","bibtex":"@inproceedings{Mahmood_Meier_2020, place={Cham}, title={Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic}, DOI={10.1007/978-3-030-39951-1_10}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Mahmood, Yasir and Meier, Arne}, year={2020} }","apa":"Mahmood, Y., & Meier, A. (2020). Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-030-39951-1_10","ama":"Mahmood Y, Meier A. Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic. In: Lecture Notes in Computer Science. Springer International Publishing; 2020. doi:10.1007/978-3-030-39951-1_10","chicago":"Mahmood, Yasir, and Arne Meier. “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic.” In Lecture Notes in Computer Science. Cham: Springer International Publishing, 2020. https://doi.org/10.1007/978-3-030-39951-1_10."},"type":"conference","place":"Cham","user_id":"99353","title":"Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic","publisher":"Springer International Publishing","author":[{"full_name":"Mahmood, Yasir","first_name":"Yasir","last_name":"Mahmood"},{"first_name":"Arne","full_name":"Meier, Arne","last_name":"Meier"}],"publication":"Lecture Notes in Computer Science","status":"public","date_created":"2023-07-03T11:41:58Z","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030399504","9783030399511"]}},{"citation":{"mla":"Haney, Julie M., et al. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” HCI for Cybersecurity, Privacy and Trust, Springer International Publishing, 2020, doi:10.1007/978-3-030-50309-3_26.","bibtex":"@inbook{Haney_Furman_Acar_2020, place={Cham}, title={Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, DOI={10.1007/978-3-030-50309-3_26}, booktitle={HCI for Cybersecurity, Privacy and Trust}, publisher={Springer International Publishing}, author={Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin}, year={2020} }","chicago":"Haney, Julie M., Susanne M. Furman, and Yasemin Acar. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” In HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2020. https://doi.org/10.1007/978-3-030-50309-3_26.","ama":"Haney JM, Furman SM, Acar Y. Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In: HCI for Cybersecurity, Privacy and Trust. Springer International Publishing; 2020. doi:10.1007/978-3-030-50309-3_26","apa":"Haney, J. M., Furman, S. M., & Acar, Y. (2020). Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing. https://doi.org/10.1007/978-3-030-50309-3_26","ieee":"J. M. Haney, S. M. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges,” in HCI for Cybersecurity, Privacy and Trust, Cham: Springer International Publishing, 2020.","short":"J.M. Haney, S.M. Furman, Y. Acar, in: HCI for Cybersecurity, Privacy and Trust, Springer International Publishing, Cham, 2020."},"type":"book_chapter","year":"2020","language":[{"iso":"eng"}],"doi":"10.1007/978-3-030-50309-3_26","_id":"47261","date_updated":"2023-11-22T09:57:52Z","publication_identifier":{"isbn":["9783030503086","9783030503093"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","status":"public","date_created":"2023-09-22T12:59:53Z","author":[{"full_name":"Haney, Julie M.","first_name":"Julie M.","last_name":"Haney"},{"last_name":"Furman","first_name":"Susanne M.","full_name":"Furman, Susanne M."},{"full_name":"Acar, Yasemin","first_name":"Yasemin","id":"94636","last_name":"Acar"}],"publisher":"Springer International Publishing","department":[{"_id":"34"},{"_id":"740"}],"publication":"HCI for Cybersecurity, Privacy and Trust","title":"Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges","user_id":"15458","extern":"1","place":"Cham"},{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030235345","9783030235352"]},"publication_status":"published","status":"public","date_created":"2019-07-14T07:57:53Z","author":[{"last_name":"Senft","id":"9109","first_name":"Björn","full_name":"Senft, Björn"},{"first_name":"Florian","full_name":"Rittmeier, Florian","last_name":"Rittmeier","id":"5281"},{"first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","id":"30457"},{"first_name":"Simon","full_name":"Oberthür, Simon","last_name":"Oberthür","id":"383"}],"publication":"Design, User Experience, and Usability. Practice and Case Studies","department":[{"_id":"66"}],"title":"A Value-Centered Approach for Unique and Novel Software Applications","user_id":"9109","place":"Cham","year":"2019","citation":{"apa":"Senft, B., Rittmeier, F., Fischer, H. G., & Oberthür, S. (2019). A Value-Centered Approach for Unique and Novel Software Applications. In Design, User Experience, and Usability. Practice and Case Studies. Cham. https://doi.org/10.1007/978-3-030-23535-2_27","ama":"Senft B, Rittmeier F, Fischer HG, Oberthür S. A Value-Centered Approach for Unique and Novel Software Applications. In: Design, User Experience, and Usability. Practice and Case Studies. Cham; 2019. doi:10.1007/978-3-030-23535-2_27","chicago":"Senft, Björn, Florian Rittmeier, Holger Gerhard Fischer, and Simon Oberthür. “A Value-Centered Approach for Unique and Novel Software Applications.” In Design, User Experience, and Usability. Practice and Case Studies. Cham, 2019. https://doi.org/10.1007/978-3-030-23535-2_27.","mla":"Senft, Björn, et al. “A Value-Centered Approach for Unique and Novel Software Applications.” Design, User Experience, and Usability. Practice and Case Studies, 2019, doi:10.1007/978-3-030-23535-2_27.","bibtex":"@inbook{Senft_Rittmeier_Fischer_Oberthür_2019, place={Cham}, title={A Value-Centered Approach for Unique and Novel Software Applications}, DOI={10.1007/978-3-030-23535-2_27}, booktitle={Design, User Experience, and Usability. Practice and Case Studies}, author={Senft, Björn and Rittmeier, Florian and Fischer, Holger Gerhard and Oberthür, Simon}, year={2019} }","short":"B. Senft, F. Rittmeier, H.G. Fischer, S. Oberthür, in: Design, User Experience, and Usability. Practice and Case Studies, Cham, 2019.","ieee":"B. Senft, F. Rittmeier, H. G. Fischer, and S. Oberthür, “A Value-Centered Approach for Unique and Novel Software Applications,” in Design, User Experience, and Usability. Practice and Case Studies, Cham, 2019."},"type":"book_chapter","language":[{"iso":"eng"}],"doi":"10.1007/978-3-030-23535-2_27","_id":"11952","date_updated":"2022-01-06T06:51:13Z","conference":{"location":"Orlando, FL, USA","name":"21st International Conference on Human-Computer Interaction","start_date":"2019-07-26","end_date":"2019-07-31"}},{"year":"2019","type":"book_chapter","citation":{"mla":"Kuhlemann, Stefan, et al. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” Lecture Notes in Computer Science, 2019, doi:10.1007/978-3-030-30048-7_40.","bibtex":"@inbook{Kuhlemann_Sellmann_Tierney_2019, place={Cham}, title={Exploiting Counterfactuals for Scalable Stochastic Optimization}, DOI={10.1007/978-3-030-30048-7_40}, booktitle={Lecture Notes in Computer Science}, author={Kuhlemann, Stefan and Sellmann, Meinolf and Tierney, Kevin}, year={2019} }","apa":"Kuhlemann, S., Sellmann, M., & Tierney, K. (2019). Exploiting Counterfactuals for Scalable Stochastic Optimization. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-030-30048-7_40","ama":"Kuhlemann S, Sellmann M, Tierney K. Exploiting Counterfactuals for Scalable Stochastic Optimization. In: Lecture Notes in Computer Science. Cham; 2019. doi:10.1007/978-3-030-30048-7_40","chicago":"Kuhlemann, Stefan, Meinolf Sellmann, and Kevin Tierney. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” In Lecture Notes in Computer Science. Cham, 2019. https://doi.org/10.1007/978-3-030-30048-7_40.","ieee":"S. Kuhlemann, M. Sellmann, and K. Tierney, “Exploiting Counterfactuals for Scalable Stochastic Optimization,” in Lecture Notes in Computer Science, Cham, 2019.","short":"S. Kuhlemann, M. Sellmann, K. Tierney, in: Lecture Notes in Computer Science, Cham, 2019."},"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:09Z","_id":"14890","doi":"10.1007/978-3-030-30048-7_40","author":[{"full_name":"Kuhlemann, Stefan","first_name":"Stefan","id":"38910","last_name":"Kuhlemann"},{"last_name":"Sellmann","first_name":"Meinolf","full_name":"Sellmann, Meinolf"},{"last_name":"Tierney","first_name":"Kevin","full_name":"Tierney, Kevin"}],"publication":"Lecture Notes in Computer Science","department":[{"_id":"277"}],"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030300470","9783030300487"]},"publication_status":"published","status":"public","date_created":"2019-11-12T07:45:53Z","place":"Cham","title":"Exploiting Counterfactuals for Scalable Stochastic Optimization","user_id":"38910"},{"department":[{"_id":"34"},{"_id":"355"}],"publication":"Discovery Science","author":[{"first_name":"Mohsen","full_name":"Ahmadi Fahandar, Mohsen","last_name":"Ahmadi Fahandar","id":"59547"},{"id":"48129","last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","first_name":"Eyke"}],"publication_status":"published","publication_identifier":{"isbn":["9783030337773","9783030337780"],"issn":["0302-9743","1611-3349"]},"date_created":"2019-11-15T10:24:45Z","status":"public","place":"Cham","title":"Feature Selection for Analogy-Based Learning to Rank","user_id":"315","year":"2019","citation":{"ama":"Ahmadi Fahandar M, Hüllermeier E. Feature Selection for Analogy-Based Learning to Rank. In: Discovery Science. Cham; 2019. doi:10.1007/978-3-030-33778-0_22","apa":"Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Feature Selection for Analogy-Based Learning to Rank. In Discovery Science. Cham. https://doi.org/10.1007/978-3-030-33778-0_22","chicago":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” In Discovery Science. Cham, 2019. https://doi.org/10.1007/978-3-030-33778-0_22.","mla":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” Discovery Science, 2019, doi:10.1007/978-3-030-33778-0_22.","bibtex":"@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Feature Selection for Analogy-Based Learning to Rank}, DOI={10.1007/978-3-030-33778-0_22}, booktitle={Discovery Science}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }","short":"M. Ahmadi Fahandar, E. Hüllermeier, in: Discovery Science, Cham, 2019.","ieee":"M. Ahmadi Fahandar and E. Hüllermeier, “Feature Selection for Analogy-Based Learning to Rank,” in Discovery Science, Cham, 2019."},"type":"book_chapter","language":[{"iso":"eng"}],"_id":"15004","date_updated":"2022-01-06T06:52:14Z","doi":"10.1007/978-3-030-33778-0_22"},{"_id":"15005","date_updated":"2022-01-06T06:52:14Z","doi":"10.1007/978-3-030-30179-8_3","year":"2019","citation":{"ieee":"M. Ahmadi Fahandar and E. Hüllermeier, “Analogy-Based Preference Learning with Kernels,” in KI 2019: Advances in Artificial Intelligence, Cham, 2019.","short":"M. Ahmadi Fahandar, E. Hüllermeier, in: KI 2019: Advances in Artificial Intelligence, Cham, 2019.","bibtex":"@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Analogy-Based Preference Learning with Kernels}, DOI={10.1007/978-3-030-30179-8_3}, booktitle={KI 2019: Advances in Artificial Intelligence}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }","mla":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” KI 2019: Advances in Artificial Intelligence, 2019, doi:10.1007/978-3-030-30179-8_3.","chicago":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” In KI 2019: Advances in Artificial Intelligence. Cham, 2019. https://doi.org/10.1007/978-3-030-30179-8_3.","ama":"Ahmadi Fahandar M, Hüllermeier E. Analogy-Based Preference Learning with Kernels. In: KI 2019: Advances in Artificial Intelligence. Cham; 2019. doi:10.1007/978-3-030-30179-8_3","apa":"Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Analogy-Based Preference Learning with Kernels. In KI 2019: Advances in Artificial Intelligence. Cham. https://doi.org/10.1007/978-3-030-30179-8_3"},"type":"book_chapter","language":[{"iso":"eng"}],"place":"Cham","title":"Analogy-Based Preference Learning with Kernels","user_id":"315","department":[{"_id":"34"},{"_id":"355"}],"publication":"KI 2019: Advances in Artificial Intelligence","author":[{"first_name":"Mohsen","full_name":"Ahmadi Fahandar, Mohsen","last_name":"Ahmadi Fahandar","id":"59547"},{"full_name":"Hüllermeier, Eyke","first_name":"Eyke","id":"48129","last_name":"Hüllermeier"}],"publication_status":"published","publication_identifier":{"isbn":["9783030301781","9783030301798"],"issn":["0302-9743","1611-3349"]},"date_created":"2019-11-15T10:30:10Z","status":"public"}]