[{"_id":"3536","project":[{"name":"Validation of Software Transactional Memory","_id":"78"}],"department":[{"_id":"77"}],"user_id":"29719","publication":"Software Engineering and Formal Methods","type":"book_chapter","status":"public","publisher":"Springer International Publishing","date_updated":"2022-01-06T06:59:22Z","date_created":"2018-07-11T06:19:58Z","author":[{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"last_name":"Wedel","full_name":"Wedel, Monika","first_name":"Monika"},{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"last_name":"König","full_name":"König, Jürgen","id":"22358","first_name":"Jürgen"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"title":"FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity","doi":"10.1007/978-3-319-92970-5_7","publication_identifier":{"isbn":["9783319929699","9783319929705"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","place":"Cham","year":"2018","page":"105-120","citation":{"apa":"Schellhorn, G., Wedel, M., Travkin, O., König, J., &#38; Wehrheim, H. (2018). FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity. In <i>Software Engineering and Formal Methods</i> (pp. 105–120). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">https://doi.org/10.1007/978-3-319-92970-5_7</a>","mla":"Schellhorn, Gerhard, et al. “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity.” <i>Software Engineering and Formal Methods</i>, Springer International Publishing, 2018, pp. 105–20, doi:<a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">10.1007/978-3-319-92970-5_7</a>.","bibtex":"@inbook{Schellhorn_Wedel_Travkin_König_Wehrheim_2018, place={Cham}, title={FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">10.1007/978-3-319-92970-5_7</a>}, booktitle={Software Engineering and Formal Methods}, publisher={Springer International Publishing}, author={Schellhorn, Gerhard and Wedel, Monika and Travkin, Oleg and König, Jürgen and Wehrheim, Heike}, year={2018}, pages={105–120} }","short":"G. Schellhorn, M. Wedel, O. Travkin, J. König, H. Wehrheim, in: Software Engineering and Formal Methods, Springer International Publishing, Cham, 2018, pp. 105–120.","ama":"Schellhorn G, Wedel M, Travkin O, König J, Wehrheim H. FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity. In: <i>Software Engineering and Formal Methods</i>. Cham: Springer International Publishing; 2018:105-120. doi:<a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">10.1007/978-3-319-92970-5_7</a>","chicago":"Schellhorn, Gerhard, Monika Wedel, Oleg Travkin, Jürgen König, and Heike Wehrheim. “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity.” In <i>Software Engineering and Formal Methods</i>, 105–20. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">https://doi.org/10.1007/978-3-319-92970-5_7</a>.","ieee":"G. Schellhorn, M. Wedel, O. Travkin, J. König, and H. Wehrheim, “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity,” in <i>Software Engineering and Formal Methods</i>, Cham: Springer International Publishing, 2018, pp. 105–120."}},{"author":[{"first_name":"Manuel","last_name":"Töws","id":"11315","full_name":"Töws, Manuel"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"date_updated":"2022-01-06T07:02:40Z","doi":"10.1007/978-3-030-02508-3_23","has_accepted_license":"1","publication_identifier":{"isbn":["9783030025076","9783030025083"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"435-454","citation":{"chicago":"Töws, Manuel, and Heike Wehrheim. “Information Flow Certificates.” In <i>Theoretical Aspects of Computing – ICTAC 2018</i>, 435–54. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">https://doi.org/10.1007/978-3-030-02508-3_23</a>.","ieee":"M. Töws and H. Wehrheim, “Information Flow Certificates,” in <i>Theoretical Aspects of Computing – ICTAC 2018</i>, 2018, pp. 435–454.","ama":"Töws M, Wehrheim H. Information Flow Certificates. In: <i>Theoretical Aspects of Computing – ICTAC 2018</i>. Cham: Springer International Publishing; 2018:435-454. doi:<a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">10.1007/978-3-030-02508-3_23</a>","apa":"Töws, M., &#38; Wehrheim, H. (2018). Information Flow Certificates. In <i>Theoretical Aspects of Computing – ICTAC 2018</i> (pp. 435–454). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">https://doi.org/10.1007/978-3-030-02508-3_23</a>","mla":"Töws, Manuel, and Heike Wehrheim. “Information Flow Certificates.” <i>Theoretical Aspects of Computing – ICTAC 2018</i>, Springer International Publishing, 2018, pp. 435–54, doi:<a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">10.1007/978-3-030-02508-3_23</a>.","bibtex":"@inproceedings{Töws_Wehrheim_2018, place={Cham}, title={Information Flow Certificates}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">10.1007/978-3-030-02508-3_23</a>}, booktitle={Theoretical Aspects of Computing – ICTAC 2018}, publisher={Springer International Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2018}, pages={435–454} }","short":"M. Töws, H. Wehrheim, in: Theoretical Aspects of Computing – ICTAC 2018, Springer International Publishing, Cham, 2018, pp. 435–454."},"place":"Cham","department":[{"_id":"77"}],"user_id":"477","_id":"5774","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"file_date_updated":"2018-11-26T15:11:32Z","type":"conference","status":"public","date_created":"2018-11-21T09:51:37Z","publisher":"Springer International Publishing","title":"Information Flow Certificates","year":"2018","language":[{"iso":"eng"}],"ddc":["000"],"publication":"Theoretical Aspects of Computing – ICTAC 2018","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":518016,"file_id":"5837","file_name":"Töws-Wehrheim2018_Chapter_InformationFlowCertificates.pdf","access_level":"closed","date_updated":"2018-11-26T15:11:32Z","creator":"mtoews","date_created":"2018-11-26T15:11:32Z"}],"abstract":[{"text":"Information flow analysis investigates the flow of data in applications, checking in particular for flows from private sources to public sinks. Flow- and path-sensitive analyses are, however, often too costly to be performed every time a security-critical application is run. In this paper, we propose a variant of proof carrying code for information flow security. To this end, we develop information flow (IF) certificates which get attached to programs as well as a method for IF certificate validation. We prove soundness of our technique, i.e., show it to be tamper-free. The technique is implemented within the program analysis tool CPAchecker. Our experiments confirm that the use of certificates pays off for costly analysis runs.","lang":"eng"}]},{"year":"2018","title":"Assist Users to Straightaway Suggest and Describe Experienced Problems","publisher":"Springer International Publishing","date_created":"2018-12-18T10:37:41Z","publication":"Design, User Experience, and Usability: Theory and Practice","language":[{"iso":"eng"}],"place":"Cham","citation":{"ama":"Senft B, Fischer HG, Oberthür S, Patkar N. Assist Users to Straightaway Suggest and Describe Experienced Problems. In: <i>Design, User Experience, and Usability: Theory and Practice</i>. Vol 10918. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:758-770. doi:<a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">10.1007/978-3-319-91797-9_52</a>","ieee":"B. Senft, H. G. Fischer, S. Oberthür, and N. Patkar, “Assist Users to Straightaway Suggest and Describe Experienced Problems,” in <i>Design, User Experience, and Usability: Theory and Practice</i>, vol. 10918, Cham: Springer International Publishing, 2018, pp. 758–770.","chicago":"Senft, Björn, Holger Gerhard Fischer, Simon Oberthür, and Nitish Patkar. “Assist Users to Straightaway Suggest and Describe Experienced Problems.” In <i>Design, User Experience, and Usability: Theory and Practice</i>, 10918:758–70. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">https://doi.org/10.1007/978-3-319-91797-9_52</a>.","apa":"Senft, B., Fischer, H. G., Oberthür, S., &#38; Patkar, N. (2018). Assist Users to Straightaway Suggest and Describe Experienced Problems. In <i>Design, User Experience, and Usability: Theory and Practice</i> (Vol. 10918, pp. 758–770). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">https://doi.org/10.1007/978-3-319-91797-9_52</a>","mla":"Senft, Björn, et al. “Assist Users to Straightaway Suggest and Describe Experienced Problems.” <i>Design, User Experience, and Usability: Theory and Practice</i>, vol. 10918, Springer International Publishing, 2018, pp. 758–70, doi:<a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">10.1007/978-3-319-91797-9_52</a>.","short":"B. Senft, H.G. Fischer, S. Oberthür, N. Patkar, in: Design, User Experience, and Usability: Theory and Practice, Springer International Publishing, Cham, 2018, pp. 758–770.","bibtex":"@inbook{Senft_Fischer_Oberthür_Patkar_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={Assist Users to Straightaway Suggest and Describe Experienced Problems}, volume={10918}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">10.1007/978-3-319-91797-9_52</a>}, booktitle={Design, User Experience, and Usability: Theory and Practice}, publisher={Springer International Publishing}, author={Senft, Björn and Fischer, Holger Gerhard and Oberthür, Simon and Patkar, Nitish}, year={2018}, pages={758–770}, collection={Lecture Notes in Computer Science} }"},"page":"758-770","intvolume":"     10918","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319917962","9783319917979"]},"conference":{"start_date":"2018-07-15","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2018","location":"Las Vegas, USA","end_date":"2018-07-20"},"doi":"10.1007/978-3-319-91797-9_52","date_updated":"2022-01-06T07:02:58Z","author":[{"first_name":"Björn","last_name":"Senft","id":"9109","full_name":"Senft, Björn"},{"first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard","id":"30457","last_name":"Fischer"},{"first_name":"Simon","last_name":"Oberthür","full_name":"Oberthür, Simon","id":"383"},{"last_name":"Patkar","full_name":"Patkar, Nitish","first_name":"Nitish"}],"volume":10918,"status":"public","type":"book_chapter","_id":"6253","user_id":"30457","series_title":"Lecture Notes in Computer Science","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}]},{"user_id":"30457","series_title":"Lecture Notes in Computer Science","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"_id":"6254","status":"public","editor":[{"first_name":"Aaron","last_name":"Marcus","full_name":"Marcus, Aaron"},{"first_name":"Wentao","full_name":"Wang, Wentao","last_name":"Wang"}],"type":"book_chapter","conference":{"end_date":"2018-07-20","location":"Las Vegas, USA","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2018","start_date":"2018-07-15"},"doi":"10.1007/978-3-319-91797-9_49","author":[{"id":"30457","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","first_name":"Holger Gerhard"},{"last_name":"Senft","id":"9109","full_name":"Senft, Björn","first_name":"Björn"},{"first_name":"Florian","last_name":"Rittmeier","full_name":"Rittmeier, Florian","id":"5281"},{"first_name":"Stefan","last_name":"Sauer","id":"447","full_name":"Sauer, Stefan"}],"volume":10918,"date_updated":"2022-01-06T07:02:58Z","citation":{"apa":"Fischer, H. G., Senft, B., Rittmeier, F., &#38; Sauer, S. (2018). A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In A. Marcus &#38; W. Wang (Eds.), <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i> (Vol. 10918, pp. 711–724). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">https://doi.org/10.1007/978-3-319-91797-9_49</a>","short":"H.G. Fischer, B. Senft, F. Rittmeier, S. Sauer, in: A. Marcus, W. Wang (Eds.), Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), Springer International Publishing, Cham, 2018, pp. 711–724.","mla":"Fischer, Holger Gerhard, et al. “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.” <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i>, edited by Aaron Marcus and Wentao Wang, vol. 10918, Springer International Publishing, 2018, pp. 711–24, doi:<a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">10.1007/978-3-319-91797-9_49</a>.","bibtex":"@inbook{Fischer_Senft_Rittmeier_Sauer_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems}, volume={10918}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">10.1007/978-3-319-91797-9_49</a>}, booktitle={Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn and Rittmeier, Florian and Sauer, Stefan}, editor={Marcus, Aaron and Wang, WentaoEditors}, year={2018}, pages={711–724}, collection={Lecture Notes in Computer Science} }","ama":"Fischer HG, Senft B, Rittmeier F, Sauer S. A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In: Marcus A, Wang W, eds. <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i>. Vol 10918. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:711-724. doi:<a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">10.1007/978-3-319-91797-9_49</a>","chicago":"Fischer, Holger Gerhard, Björn Senft, Florian Rittmeier, and Stefan Sauer. “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.” In <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i>, edited by Aaron Marcus and Wentao Wang, 10918:711–24. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">https://doi.org/10.1007/978-3-319-91797-9_49</a>.","ieee":"H. G. Fischer, B. Senft, F. Rittmeier, and S. Sauer, “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems,” in <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i>, vol. 10918, A. Marcus and W. Wang, Eds. Cham: Springer International Publishing, 2018, pp. 711–724."},"page":"711-724","intvolume":"     10918","place":"Cham","publication_status":"published","publication_identifier":{"isbn":["9783319917962","9783319917979"],"issn":["0302-9743","1611-3349"]},"language":[{"iso":"eng"}],"publication":"Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)","title":"A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems","date_created":"2018-12-18T10:42:39Z","publisher":"Springer International Publishing","year":"2018"},{"publication":"Discovery Science","file":[{"date_updated":"2019-01-11T11:03:50Z","date_created":"2019-01-11T11:03:50Z","creator":"ups","file_size":458972,"file_id":"6623","file_name":"Schäfer-Hüllermeier2018_Chapter_Preference-BasedReinforcementL.pdf","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"language":[{"iso":"eng"}],"ddc":["000"],"year":"2018","date_created":"2018-12-20T15:52:03Z","publisher":"Springer International Publishing","title":"Preference-Based Reinforcement Learning Using Dyad Ranking","type":"book_chapter","status":"public","department":[{"_id":"355"}],"user_id":"49109","_id":"6423","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B2","_id":"10"}],"file_date_updated":"2019-01-11T11:03:50Z","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030017705","9783030017712"]},"has_accepted_license":"1","publication_status":"published","page":"161-175","citation":{"short":"D. Schäfer, E. Hüllermeier, in: Discovery Science, Springer International Publishing, Cham, 2018, pp. 161–175.","bibtex":"@inbook{Schäfer_Hüllermeier_2018, place={Cham}, title={Preference-Based Reinforcement Learning Using Dyad Ranking}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">10.1007/978-3-030-01771-2_11</a>}, booktitle={Discovery Science}, publisher={Springer International Publishing}, author={Schäfer, Dirk and Hüllermeier, Eyke}, year={2018}, pages={161–175} }","mla":"Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning Using Dyad Ranking.” <i>Discovery Science</i>, Springer International Publishing, 2018, pp. 161–75, doi:<a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">10.1007/978-3-030-01771-2_11</a>.","apa":"Schäfer, D., &#38; Hüllermeier, E. (2018). Preference-Based Reinforcement Learning Using Dyad Ranking. In <i>Discovery Science</i> (pp. 161–175). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">https://doi.org/10.1007/978-3-030-01771-2_11</a>","ama":"Schäfer D, Hüllermeier E. Preference-Based Reinforcement Learning Using Dyad Ranking. In: <i>Discovery Science</i>. Cham: Springer International Publishing; 2018:161-175. doi:<a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">10.1007/978-3-030-01771-2_11</a>","chicago":"Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning Using Dyad Ranking.” In <i>Discovery Science</i>, 161–75. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">https://doi.org/10.1007/978-3-030-01771-2_11</a>.","ieee":"D. Schäfer and E. Hüllermeier, “Preference-Based Reinforcement Learning Using Dyad Ranking,” in <i>Discovery Science</i>, Cham: Springer International Publishing, 2018, pp. 161–175."},"place":"Cham","author":[{"first_name":"Dirk","last_name":"Schäfer","full_name":"Schäfer, Dirk"},{"full_name":"Hüllermeier, Eyke","id":"48129","last_name":"Hüllermeier","first_name":"Eyke"}],"date_updated":"2022-01-06T07:03:04Z","doi":"10.1007/978-3-030-01771-2_11"},{"status":"public","publication":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","type":"book_chapter","language":[{"iso":"eng"}],"_id":"16392","department":[{"_id":"63"}],"user_id":"15415","place":"Cham","year":"2018","citation":{"short":"B. Feldkord, M. Malatyali, F. Meyer auf der Heide, in: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Cham, 2018.","bibtex":"@inbook{Feldkord_Malatyali_Meyer auf der Heide_2018, place={Cham}, title={A Dynamic Distributed Data Structure for Top-k and k-Select Queries}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">10.1007/978-3-319-98355-4_18</a>}, booktitle={Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications}, author={Feldkord, Björn and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}, year={2018} }","mla":"Feldkord, Björn, et al. “A Dynamic Distributed Data Structure for Top-k and k-Select Queries.” <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">10.1007/978-3-319-98355-4_18</a>.","apa":"Feldkord, B., Malatyali, M., &#38; Meyer auf der Heide, F. (2018). A Dynamic Distributed Data Structure for Top-k and k-Select Queries. In <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">https://doi.org/10.1007/978-3-319-98355-4_18</a>","ama":"Feldkord B, Malatyali M, Meyer auf der Heide F. A Dynamic Distributed Data Structure for Top-k and k-Select Queries. In: <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>. Cham; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">10.1007/978-3-319-98355-4_18</a>","chicago":"Feldkord, Björn, Manuel Malatyali, and Friedhelm Meyer auf der Heide. “A Dynamic Distributed Data Structure for Top-k and k-Select Queries.” In <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>. Cham, 2018. <a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">https://doi.org/10.1007/978-3-319-98355-4_18</a>.","ieee":"B. Feldkord, M. Malatyali, and F. Meyer auf der Heide, “A Dynamic Distributed Data Structure for Top-k and k-Select Queries,” in <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>, Cham, 2018."},"publication_identifier":{"isbn":["9783319125671","9783319125688"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","title":"A Dynamic Distributed Data Structure for Top-k and k-Select Queries","doi":"10.1007/978-3-319-98355-4_18","date_updated":"2022-01-06T06:52:50Z","author":[{"first_name":"Björn","last_name":"Feldkord","full_name":"Feldkord, Björn","id":"22704"},{"first_name":"Manuel","full_name":"Malatyali, Manuel","last_name":"Malatyali"},{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_created":"2020-04-03T07:04:59Z"},{"author":[{"first_name":"Yara","full_name":"Khaluf, Yara","last_name":"Khaluf"},{"last_name":"Markarian","full_name":"Markarian, Christine","first_name":"Christine"},{"first_name":"Pieter","last_name":"Simoens","full_name":"Simoens, Pieter"},{"first_name":"Andreagiovanni","last_name":"Reina","full_name":"Reina, Andreagiovanni"}],"date_created":"2021-09-14T12:41:58Z","date_updated":"2022-01-06T06:56:19Z","doi":"10.1007/978-3-319-59930-4_12","title":"Scheduling Access to Shared Space in Multi-robot Systems","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"]},"citation":{"ieee":"Y. Khaluf, C. Markarian, P. Simoens, and A. Reina, “Scheduling Access to Shared Space in Multi-robot Systems,” 2017, doi: <a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">10.1007/978-3-319-59930-4_12</a>.","chicago":"Khaluf, Yara, Christine Markarian, Pieter Simoens, and Andreagiovanni Reina. “Scheduling Access to Shared Space in Multi-Robot Systems.” In <i>International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)</i>. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">https://doi.org/10.1007/978-3-319-59930-4_12</a>.","ama":"Khaluf Y, Markarian C, Simoens P, Reina A. Scheduling Access to Shared Space in Multi-robot Systems. In: <i>International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">10.1007/978-3-319-59930-4_12</a>","apa":"Khaluf, Y., Markarian, C., Simoens, P., &#38; Reina, A. (2017). Scheduling Access to Shared Space in Multi-robot Systems. <i>International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)</i>. <a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">https://doi.org/10.1007/978-3-319-59930-4_12</a>","bibtex":"@inproceedings{Khaluf_Markarian_Simoens_Reina_2017, place={Cham}, title={Scheduling Access to Shared Space in Multi-robot Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">10.1007/978-3-319-59930-4_12</a>}, booktitle={International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)}, author={Khaluf, Yara and Markarian, Christine and Simoens, Pieter and Reina, Andreagiovanni}, year={2017} }","short":"Y. Khaluf, C. Markarian, P. Simoens, A. Reina, in: International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017), Cham, 2017.","mla":"Khaluf, Yara, et al. “Scheduling Access to Shared Space in Multi-Robot Systems.” <i>International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">10.1007/978-3-319-59930-4_12</a>."},"place":"Cham","year":"2017","user_id":"15415","department":[{"_id":"63"}],"_id":"24398","language":[{"iso":"eng"}],"type":"conference","publication":"International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)","status":"public","abstract":[{"lang":"eng","text":"Through this study, we introduce the idea of applying scheduling techniques to allocate spatial resources that are shared among multiple robots moving in a static environment and having temporal constraints on the arrival time to destinations. To illustrate this idea, we present an exemplified algorithm that plans and assigns a motion path to each robot. The considered problem is particularly challenging because: (i) the robots share the same environment and thus the planner must take into account overlapping paths which cannot happen at the same time; (ii) there are time deadlines thus the planner must deal with temporal constraints; (iii) new requests arrive without a priori knowledge thus the planner must be able to add new paths online and adjust old plans; (iv) the robot motion is subject to noise thus the planner must be reactive to adapt to online changes. We showcase the functioning of the proposed algorithm through a set of agent-based simulations."}]},{"doi":"10.1007/978-3-319-72453-9_35","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2017/453.pdf"}],"volume":10693,"author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"full_name":"Liske, Gennadij","last_name":"Liske","first_name":"Gennadij"}],"date_updated":"2022-01-06T06:58:49Z","oa":"1","page":"438-453","intvolume":"     10693","citation":{"bibtex":"@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }","mla":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>.","short":"J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.","apa":"Blömer, J., &#38; Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>","ama":"Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>","ieee":"J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2017, vol. 10693, pp. 438–453.","chicago":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>."},"place":"Cham","has_accepted_license":"1","publication_identifier":{"isbn":["9783319724522","9783319724539"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","file_date_updated":"2018-11-02T14:52:10Z","department":[{"_id":"64"}],"user_id":"477","series_title":"Lecture Notes in Computer Science","_id":"2967","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"status":"public","type":"conference","title":"Subtleties in Security Definitions for Predicate Encryption with Public Index","date_created":"2018-06-04T12:17:48Z","publisher":"Springer International Publishing","year":"2017","language":[{"iso":"eng"}],"ddc":["000"],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T14:52:10Z","creator":"ups","date_created":"2018-11-02T14:52:10Z","file_size":463904,"access_level":"closed","file_id":"5286","file_name":"SubtletiesInSecurityDefinition.pdf"}],"publication":"Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)"},{"author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"first_name":"Peter","last_name":"Günther","full_name":"Günther, Peter"},{"first_name":"Volker","last_name":"Krummel","full_name":"Krummel, Volker"},{"first_name":"Nils","id":"13703","full_name":"Löken, Nils","last_name":"Löken"}],"date_updated":"2022-01-06T06:55:55Z","oa":"1","doi":"10.1007/978-3-319-75650-9_1","has_accepted_license":"1","publication_identifier":{"isbn":["9783319756493","9783319756509"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"3-17","citation":{"mla":"Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” <i>Foundations and Practice of Security</i>, Springer International Publishing, 2017, pp. 3–17, doi:<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>.","short":"J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.","bibtex":"@inproceedings{Blömer_Günther_Krummel_Löken_2017, place={Cham}, title={Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>}, booktitle={Foundations and Practice of Security}, publisher={Springer International Publishing}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker and Löken, Nils}, year={2017}, pages={3–17} }","apa":"Blömer, J., Günther, P., Krummel, V., &#38; Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In <i>Foundations and Practice of Security</i> (pp. 3–17). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">https://doi.org/10.1007/978-3-319-75650-9_1</a>","chicago":"Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In <i>Foundations and Practice of Security</i>, 3–17. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">https://doi.org/10.1007/978-3-319-75650-9_1</a>.","ieee":"J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in <i>Foundations and Practice of Security</i>, 2017, pp. 3–17.","ama":"Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: <i>Foundations and Practice of Security</i>. Cham: Springer International Publishing; 2017:3-17. doi:<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>"},"place":"Cham","department":[{"_id":"64"}],"user_id":"13703","_id":"2344","project":[{"name":"SFB 901 - Subproject C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901","_id":"1"},{"name":"Securing the Financial Cloud","_id":"43"}],"file_date_updated":"2018-11-08T09:53:34Z","type":"conference","status":"public","date_created":"2018-04-13T11:40:48Z","publisher":"Springer International Publishing","title":"Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations","year":"2017","language":[{"iso":"eng"}],"ddc":["000"],"publication":"Foundations and Practice of Security","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T15:04:13Z","date_created":"2018-11-02T15:04:13Z","creator":"ups","file_size":634736,"file_name":"Attribute-BasedEncryptionAsASe.pdf","file_id":"5292","access_level":"closed"},{"date_updated":"2018-11-08T09:53:34Z","date_created":"2018-11-08T09:53:34Z","creator":"nilo","file_size":522516,"file_name":"abe_aas.pdf","file_id":"5425","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}]},{"_id":"2381","user_id":"13291","department":[{"_id":"64"}],"editor":[{"last_name":"Fotakis","full_name":"Fotakis, Dimitris","first_name":"Dimitris"},{"last_name":"Pagourtzis","full_name":"Pagourtzis, Aris","first_name":"Aris"},{"first_name":"Vangelis Th.","full_name":"Paschos, Vangelis Th.","last_name":"Paschos"}],"status":"public","type":"book_chapter","conference":{"end_date":"2017-05-26","location":"Athens, Greece","name":"10th International Conference on Algorithms and Complexity","start_date":"2017-05-24"},"doi":"10.1007/978-3-319-57586-5_11","date_updated":"2022-01-06T06:56:00Z","author":[{"last_name":"Brauer","full_name":"Brauer, Sascha","id":"13291","first_name":"Sascha"}],"volume":10236,"place":"Cham","citation":{"apa":"Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In D. Fotakis, A. Pagourtzis, &#38; V. T. Paschos (Eds.), <i>Lecture Notes in Computer Science</i> (Vol. 10236, pp. 116–127). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">https://doi.org/10.1007/978-3-319-57586-5_11</a>","mla":"Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” <i>Lecture Notes in Computer Science</i>, edited by Dimitris Fotakis et al., vol. 10236, Springer International Publishing, 2017, pp. 116–27, doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>.","short":"S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.","bibtex":"@inbook{Brauer_2017, place={Cham}, title={Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems}, volume={10236}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Brauer, Sascha}, editor={Fotakis, Dimitris and Pagourtzis, Aris and Paschos, Vangelis Th.Editors}, year={2017}, pages={116–127} }","ieee":"S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems,” in <i>Lecture Notes in Computer Science</i>, vol. 10236, D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International Publishing, 2017, pp. 116–127.","chicago":"Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” In <i>Lecture Notes in Computer Science</i>, edited by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">https://doi.org/10.1007/978-3-319-57586-5_11</a>.","ama":"Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. <i>Lecture Notes in Computer Science</i>. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>"},"page":"116-127","intvolume":"     10236","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319575858","9783319575865"]},"language":[{"iso":"eng"}],"abstract":[{"text":"Metric facility location and K-means are well-known problems of combinatorial optimization. Both admit a fairly simple heuristic called single-swap, which adds, drops or swaps open facilities until it reaches a local optimum. For both problems, it is known that this algorithm produces a solution that is at most a constant factor worse than the respective global optimum. In this paper, we show that single-swap applied to the weighted metric uncapacitated facility location and weighted discrete K-means problem is tightly PLS-complete and hence has exponential worst-case running time.","lang":"eng"}],"publication":"Lecture Notes in Computer Science","title":"Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems","publisher":"Springer International Publishing","date_created":"2018-04-17T12:20:53Z","year":"2017"},{"_id":"5769","project":[{"name":"SFB 901 - Subproject B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"1","name":"SFB 901"}],"department":[{"_id":"77"}],"user_id":"477","ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-26T15:07:42Z","publication":"Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)","type":"conference","abstract":[{"text":"Information Flow Analysis (IFA) aims at detecting illegal flows of information between program entities. “Legality” is therein specified in terms of various security policies. For the analysis, this opens up two possibilities: building generic, policy independent and building specific, policy dependent IFAs. While the former needs to track all dependencies between program entities, the latter allows for a reduced and thus more efficient analysis.\r\n\r\nIn this paper, we start out by formally defining a policy independent information flow analysis. Next, we show how to specialize this IFA via policy specific variable tracking, and prove soundness of the specialization. We furthermore investigate refinement relationships between policies, allowing an IFA for one policy to be employed for its refinements. As policy refinement depends on concrete program entities, we additionally propose a precomputation of policy refinement conditions, enabling an efficient refinement check for concrete programs.","lang":"eng"}],"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"mtoews","date_created":"2018-11-26T15:07:42Z","date_updated":"2018-11-26T15:07:42Z","file_id":"5836","file_name":"Töws-Wehrheim2017_Chapter_PolicyDependentAndIndependentI.pdf","access_level":"closed","file_size":424031}],"publisher":"Springer International Publishing","date_updated":"2022-01-06T07:02:39Z","date_created":"2018-11-21T09:38:43Z","author":[{"full_name":"Töws, Manuel","id":"11315","last_name":"Töws","first_name":"Manuel"},{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"}],"title":"Policy Dependent and Independent Information Flow Analyses","doi":"10.1007/978-3-319-68690-5_22","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319686899","9783319686905"]},"has_accepted_license":"1","publication_status":"published","year":"2017","page":"362-378","citation":{"apa":"Töws, M., &#38; Wehrheim, H. (2017). Policy Dependent and Independent Information Flow Analyses. In <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i> (pp. 362–378). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">https://doi.org/10.1007/978-3-319-68690-5_22</a>","mla":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i>, Springer International Publishing, 2017, pp. 362–78, doi:<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>.","short":"M. Töws, H. Wehrheim, in: Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017), Springer International Publishing, 2017, pp. 362–378.","bibtex":"@inproceedings{Töws_Wehrheim_2017, title={Policy Dependent and Independent Information Flow Analyses}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>}, booktitle={Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)}, publisher={Springer International Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2017}, pages={362–378} }","chicago":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” In <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i>, 362–78. Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">https://doi.org/10.1007/978-3-319-68690-5_22</a>.","ieee":"M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow Analyses,” in <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i>, 2017, pp. 362–378.","ama":"Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses. In: <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i>. Springer International Publishing; 2017:362-378. doi:<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>"}},{"language":[{"iso":"eng"}],"publication":"Design, User Experience, and Usability: Theory, Methodology, and Management","title":"A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0","date_created":"2018-12-18T10:44:24Z","publisher":"Springer International Publishing","year":"2017","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"user_id":"30457","series_title":"Lecture Notes in Computer Science","_id":"6255","status":"public","type":"book_chapter","doi":"10.1007/978-3-319-58634-2_42","conference":{"location":"Vancouver, Canada","end_date":"2017-07-14","start_date":"2017-07-09","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2017"},"volume":10288,"author":[{"id":"30457","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","first_name":"Holger Gerhard"},{"full_name":"Engler, Michael","last_name":"Engler","first_name":"Michael"},{"first_name":"Stefan","last_name":"Sauer","full_name":"Sauer, Stefan","id":"447"}],"date_updated":"2022-01-06T07:02:58Z","intvolume":"     10288","page":"570-583","citation":{"ama":"Fischer HG, Engler M, Sauer S. A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In: <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i>. Vol 10288. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:570-583. doi:<a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">10.1007/978-3-319-58634-2_42</a>","chicago":"Fischer, Holger Gerhard, Michael Engler, and Stefan Sauer. “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0.” In <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i>, 10288:570–83. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">https://doi.org/10.1007/978-3-319-58634-2_42</a>.","ieee":"H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0,” in <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i>, vol. 10288, Cham: Springer International Publishing, 2017, pp. 570–583.","short":"H.G. Fischer, M. Engler, S. Sauer, in: Design, User Experience, and Usability: Theory, Methodology, and Management, Springer International Publishing, Cham, 2017, pp. 570–583.","mla":"Fischer, Holger Gerhard, et al. “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0.” <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i>, vol. 10288, Springer International Publishing, 2017, pp. 570–83, doi:<a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">10.1007/978-3-319-58634-2_42</a>.","bibtex":"@inbook{Fischer_Engler_Sauer_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0}, volume={10288}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">10.1007/978-3-319-58634-2_42</a>}, booktitle={Design, User Experience, and Usability: Theory, Methodology, and Management}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Engler, Michael and Sauer, Stefan}, year={2017}, pages={570–583}, collection={Lecture Notes in Computer Science} }","apa":"Fischer, H. G., Engler, M., &#38; Sauer, S. (2017). A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i> (Vol. 10288, pp. 570–583). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">https://doi.org/10.1007/978-3-319-58634-2_42</a>"},"place":"Cham","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319586335","9783319586342"]},"publication_status":"published"},{"external_id":{"arxiv":["arXiv:1706.03568 "]},"_id":"16461","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"type":"book_chapter","publication":"Structural Information and Communication Complexity","status":"public","date_updated":"2022-01-06T06:52:50Z","author":[{"first_name":"Pascal","last_name":"Bemmann","full_name":"Bemmann, Pascal"},{"first_name":"Felix","last_name":"Biermeier","full_name":"Biermeier, Felix"},{"first_name":"Jan","last_name":"Bürmann","full_name":"Bürmann, Jan"},{"full_name":"Kemper, Arne","last_name":"Kemper","first_name":"Arne"},{"first_name":"Till","orcid":"0000-0003-2014-4696","last_name":"Knollmann","full_name":"Knollmann, Till","id":"39241"},{"last_name":"Knorr","full_name":"Knorr, Steffen","first_name":"Steffen"},{"full_name":"Kothe, Nils","last_name":"Kothe","first_name":"Nils"},{"first_name":"Alexander","last_name":"Mäcker","id":"13536","full_name":"Mäcker, Alexander"},{"id":"41265","full_name":"Malatyali, Manuel","last_name":"Malatyali","first_name":"Manuel"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"},{"full_name":"Riechers, Sören","last_name":"Riechers","first_name":"Sören"},{"id":"30291","full_name":"Schaefer, Johannes Sebastian","last_name":"Schaefer","first_name":"Johannes Sebastian"},{"first_name":"Jannik","full_name":"Sundermeier, Jannik","id":"38705","last_name":"Sundermeier"}],"date_created":"2020-04-08T07:20:20Z","title":"Monitoring of Domain-Related Problems in Distributed Data Streams","doi":"10.1007/978-3-319-72050-0_13","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319720494","9783319720500"]},"year":"2017","place":"Cham","citation":{"ama":"Bemmann P, Biermeier F, Bürmann J, et al. Monitoring of Domain-Related Problems in Distributed Data Streams. In: <i>Structural Information and Communication Complexity</i>. ; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">10.1007/978-3-319-72050-0_13</a>","chicago":"Bemmann, Pascal, Felix Biermeier, Jan Bürmann, Arne Kemper, Till Knollmann, Steffen Knorr, Nils Kothe, et al. “Monitoring of Domain-Related Problems in Distributed Data Streams.” In <i>Structural Information and Communication Complexity</i>. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">https://doi.org/10.1007/978-3-319-72050-0_13</a>.","ieee":"P. Bemmann <i>et al.</i>, “Monitoring of Domain-Related Problems in Distributed Data Streams,” in <i>Structural Information and Communication Complexity</i>, Cham, 2017.","short":"P. Bemmann, F. Biermeier, J. Bürmann, A. Kemper, T. Knollmann, S. Knorr, N. Kothe, A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, J.S. Schaefer, J. Sundermeier, in: Structural Information and Communication Complexity, Cham, 2017.","mla":"Bemmann, Pascal, et al. “Monitoring of Domain-Related Problems in Distributed Data Streams.” <i>Structural Information and Communication Complexity</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">10.1007/978-3-319-72050-0_13</a>.","bibtex":"@inbook{Bemmann_Biermeier_Bürmann_Kemper_Knollmann_Knorr_Kothe_Mäcker_Malatyali_Meyer auf der Heide_et al._2017, place={Cham}, title={Monitoring of Domain-Related Problems in Distributed Data Streams}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">10.1007/978-3-319-72050-0_13</a>}, booktitle={Structural Information and Communication Complexity}, author={Bemmann, Pascal and Biermeier, Felix and Bürmann, Jan and Kemper, Arne and Knollmann, Till and Knorr, Steffen and Kothe, Nils and Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and et al.}, year={2017} }","apa":"Bemmann, P., Biermeier, F., Bürmann, J., Kemper, A., Knollmann, T., Knorr, S., Kothe, N., Mäcker, A., Malatyali, M., Meyer auf der Heide, F., Riechers, S., Schaefer, J. S., &#38; Sundermeier, J. (2017). Monitoring of Domain-Related Problems in Distributed Data Streams. In <i>Structural Information and Communication Complexity</i>. <a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">https://doi.org/10.1007/978-3-319-72050-0_13</a>"}},{"language":[{"iso":"eng"}],"_id":"14857","department":[{"_id":"277"}],"user_id":"1112","status":"public","publication":"Lecture Notes in Computer Science","type":"book_chapter","title":"Simulating Storage Policies for an Automated Grid-Based Warehouse System","doi":"10.1007/978-3-319-68496-3_31","date_updated":"2022-01-06T06:52:08Z","date_created":"2019-11-08T08:15:11Z","author":[{"id":"32439","full_name":"Beckschäfer, Michaela","last_name":"Beckschäfer","first_name":"Michaela"},{"full_name":"Malberg, Simon","last_name":"Malberg","first_name":"Simon"},{"last_name":"Tierney","full_name":"Tierney, Kevin","first_name":"Kevin"},{"first_name":"Christoph","full_name":"Weskamp, Christoph","last_name":"Weskamp"}],"year":"2017","place":"Cham","citation":{"bibtex":"@inbook{Beckschäfer_Malberg_Tierney_Weskamp_2017, place={Cham}, title={Simulating Storage Policies for an Automated Grid-Based Warehouse System}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">10.1007/978-3-319-68496-3_31</a>}, booktitle={Lecture Notes in Computer Science}, author={Beckschäfer, Michaela and Malberg, Simon and Tierney, Kevin and Weskamp, Christoph}, year={2017} }","short":"M. Beckschäfer, S. Malberg, K. Tierney, C. Weskamp, in: Lecture Notes in Computer Science, Cham, 2017.","mla":"Beckschäfer, Michaela, et al. “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” <i>Lecture Notes in Computer Science</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">10.1007/978-3-319-68496-3_31</a>.","apa":"Beckschäfer, M., Malberg, S., Tierney, K., &#38; Weskamp, C. (2017). Simulating Storage Policies for an Automated Grid-Based Warehouse System. In <i>Lecture Notes in Computer Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">https://doi.org/10.1007/978-3-319-68496-3_31</a>","ama":"Beckschäfer M, Malberg S, Tierney K, Weskamp C. Simulating Storage Policies for an Automated Grid-Based Warehouse System. In: <i>Lecture Notes in Computer Science</i>. Cham; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">10.1007/978-3-319-68496-3_31</a>","chicago":"Beckschäfer, Michaela, Simon Malberg, Kevin Tierney, and Christoph Weskamp. “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” In <i>Lecture Notes in Computer Science</i>. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">https://doi.org/10.1007/978-3-319-68496-3_31</a>.","ieee":"M. Beckschäfer, S. Malberg, K. Tierney, and C. Weskamp, “Simulating Storage Policies for an Automated Grid-Based Warehouse System,” in <i>Lecture Notes in Computer Science</i>, Cham, 2017."},"publication_identifier":{"isbn":["9783319684956","9783319684963"],"issn":["0302-9743","1611-3349"]},"publication_status":"published"},{"user_id":"13693","_id":"23396","language":[{"iso":"eng"}],"publication":"Theory and Practice of Model Transformation","type":"book_chapter","status":"public","date_created":"2021-08-13T20:33:08Z","author":[{"first_name":"Christopher","last_name":"Gerking","full_name":"Gerking, Christopher"},{"last_name":"Schubert","full_name":"Schubert, David","first_name":"David"},{"first_name":"Ingo","id":"13693","full_name":"Budde, Ingo","last_name":"Budde","orcid":"https://orcid.org/0000-0003-0124-6291"}],"date_updated":"2024-05-02T19:01:07Z","doi":"10.1007/978-3-319-61473-1_2","title":"Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities","publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","citation":{"short":"C. Gerking, D. Schubert, I. Budde, in: Theory and Practice of Model Transformation, Cham, 2017.","bibtex":"@inbook{Gerking_Schubert_Budde_2017, place={Cham}, title={Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">10.1007/978-3-319-61473-1_2</a>}, booktitle={Theory and Practice of Model Transformation}, author={Gerking, Christopher and Schubert, David and Budde, Ingo}, year={2017} }","mla":"Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” <i>Theory and Practice of Model Transformation</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">10.1007/978-3-319-61473-1_2</a>.","apa":"Gerking, C., Schubert, D., &#38; Budde, I. (2017). Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In <i>Theory and Practice of Model Transformation</i>. <a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">https://doi.org/10.1007/978-3-319-61473-1_2</a>","ama":"Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In: <i>Theory and Practice of Model Transformation</i>. ; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">10.1007/978-3-319-61473-1_2</a>","ieee":"C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities,” in <i>Theory and Practice of Model Transformation</i>, Cham, 2017.","chicago":"Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” In <i>Theory and Practice of Model Transformation</i>. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">https://doi.org/10.1007/978-3-319-61473-1_2</a>."},"place":"Cham","year":"2017"},{"type":"book_chapter","publication":"Lecture Notes in Computer Science","status":"public","_id":"60902","user_id":"117951","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319538617","9783319538624"]},"year":"2017","place":"Cham","citation":{"ieee":"J. Senk <i>et al.</i>, “A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC,” in <i>Lecture Notes in Computer Science</i>, Cham: Springer International Publishing, 2017.","chicago":"Senk, Johanna, Alper Yegenoglu, Olivier Amblet, Yury Brukau, Andrew Davison, David Roland Lester, Anna Lührs, et al. “A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC.” In <i>Lecture Notes in Computer Science</i>. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">https://doi.org/10.1007/978-3-319-53862-4_21</a>.","ama":"Senk J, Yegenoglu A, Amblet O, et al. A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC. In: <i>Lecture Notes in Computer Science</i>. Springer International Publishing; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">10.1007/978-3-319-53862-4_21</a>","apa":"Senk, J., Yegenoglu, A., Amblet, O., Brukau, Y., Davison, A., Lester, D. R., Lührs, A., Quaglio, P., Rostami, V., Rowley, A., Schuller, B., Stokes, A. B., van Albada, S. J., Zielasko, D., Diesmann, M., Weyers, B., Denker, M., &#38; Grün, S. (2017). A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC. In <i>Lecture Notes in Computer Science</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">https://doi.org/10.1007/978-3-319-53862-4_21</a>","short":"J. Senk, A. Yegenoglu, O. Amblet, Y. Brukau, A. Davison, D.R. Lester, A. Lührs, P. Quaglio, V. Rostami, A. Rowley, B. Schuller, A.B. Stokes, S.J. van Albada, D. Zielasko, M. Diesmann, B. Weyers, M. Denker, S. Grün, in: Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017.","mla":"Senk, Johanna, et al. “A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC.” <i>Lecture Notes in Computer Science</i>, Springer International Publishing, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">10.1007/978-3-319-53862-4_21</a>.","bibtex":"@inbook{Senk_Yegenoglu_Amblet_Brukau_Davison_Lester_Lührs_Quaglio_Rostami_Rowley_et al._2017, place={Cham}, title={A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">10.1007/978-3-319-53862-4_21</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Senk, Johanna and Yegenoglu, Alper and Amblet, Olivier and Brukau, Yury and Davison, Andrew and Lester, David Roland and Lührs, Anna and Quaglio, Pietro and Rostami, Vahid and Rowley, Andrew and et al.}, year={2017} }"},"date_updated":"2025-08-08T11:39:32Z","publisher":"Springer International Publishing","date_created":"2025-08-06T15:02:46Z","author":[{"first_name":"Johanna","last_name":"Senk","full_name":"Senk, Johanna"},{"first_name":"Alper","orcid":"0000-0001-8869-215X","last_name":"Yegenoglu","full_name":"Yegenoglu, Alper","id":"117951"},{"first_name":"Olivier","full_name":"Amblet, Olivier","last_name":"Amblet"},{"full_name":"Brukau, Yury","last_name":"Brukau","first_name":"Yury"},{"last_name":"Davison","full_name":"Davison, Andrew","first_name":"Andrew"},{"first_name":"David Roland","full_name":"Lester, David Roland","last_name":"Lester"},{"full_name":"Lührs, Anna","last_name":"Lührs","first_name":"Anna"},{"first_name":"Pietro","last_name":"Quaglio","full_name":"Quaglio, Pietro"},{"first_name":"Vahid","last_name":"Rostami","full_name":"Rostami, Vahid"},{"last_name":"Rowley","full_name":"Rowley, Andrew","first_name":"Andrew"},{"first_name":"Bernd","last_name":"Schuller","full_name":"Schuller, Bernd"},{"full_name":"Stokes, Alan Barry","last_name":"Stokes","first_name":"Alan Barry"},{"full_name":"van Albada, Sacha Jennifer","last_name":"van Albada","first_name":"Sacha Jennifer"},{"first_name":"Daniel","full_name":"Zielasko, Daniel","last_name":"Zielasko"},{"full_name":"Diesmann, Markus","last_name":"Diesmann","first_name":"Markus"},{"full_name":"Weyers, Benjamin","last_name":"Weyers","first_name":"Benjamin"},{"last_name":"Denker","full_name":"Denker, Michael","first_name":"Michael"},{"first_name":"Sonja","full_name":"Grün, Sonja","last_name":"Grün"}],"title":"A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC","doi":"10.1007/978-3-319-53862-4_21"},{"publication_status":"published","publication_identifier":{"isbn":["9783319444260","9783319444277"],"issn":["0302-9743","1611-3349"]},"citation":{"ama":"Hamann H, Valentini G, Dorigo M. Population Coding: A New Design Paradigm for Embodied Distributed Systems. In: <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. Cham; 2016. doi:<a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">10.1007/978-3-319-44427-7_15</a>","chicago":"Hamann, Heiko, Gabriele Valentini, and Marco Dorigo. “Population Coding: A New Design Paradigm for Embodied Distributed Systems.” In <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. Cham, 2016. <a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">https://doi.org/10.1007/978-3-319-44427-7_15</a>.","ieee":"H. Hamann, G. Valentini, and M. Dorigo, “Population Coding: A New Design Paradigm for Embodied Distributed Systems,” in <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016.","apa":"Hamann, H., Valentini, G., &#38; Dorigo, M. (2016). Population Coding: A New Design Paradigm for Embodied Distributed Systems. In <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">https://doi.org/10.1007/978-3-319-44427-7_15</a>","bibtex":"@inproceedings{Hamann_Valentini_Dorigo_2016, place={Cham}, title={Population Coding: A New Design Paradigm for Embodied Distributed Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">10.1007/978-3-319-44427-7_15</a>}, booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Hamann, Heiko and Valentini, Gabriele and Dorigo, Marco}, year={2016} }","mla":"Hamann, Heiko, et al. “Population Coding: A New Design Paradigm for Embodied Distributed Systems.” <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016, doi:<a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">10.1007/978-3-319-44427-7_15</a>.","short":"H. Hamann, G. Valentini, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence, ANTS 2016, Cham, 2016."},"place":"Cham","year":"2016","author":[{"first_name":"Heiko","last_name":"Hamann","full_name":"Hamann, Heiko"},{"first_name":"Gabriele","last_name":"Valentini","full_name":"Valentini, Gabriele"},{"first_name":"Marco","full_name":"Dorigo, Marco","last_name":"Dorigo"}],"date_created":"2020-10-15T09:55:35Z","date_updated":"2022-01-06T06:54:18Z","doi":"10.1007/978-3-319-44427-7_15","title":"Population Coding: A New Design Paradigm for Embodied Distributed Systems","type":"conference","publication":"10th Int. Conf. on Swarm Intelligence, ANTS 2016","status":"public","user_id":"15415","department":[{"_id":"63"},{"_id":"238"}],"_id":"20000","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"20004","department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","status":"public","publication":"10th Int. Conf. on Swarm Intelligence, ANTS 2016","type":"conference","title":"Collective Perception of Environmental Features in a Robot Swarm","doi":"10.1007/978-3-319-44427-7_6","date_updated":"2022-01-06T06:54:18Z","author":[{"first_name":"Gabriele","full_name":"Valentini, Gabriele","last_name":"Valentini"},{"full_name":"Brambilla, Davide","last_name":"Brambilla","first_name":"Davide"},{"first_name":"Heiko","full_name":"Hamann, Heiko","last_name":"Hamann"},{"full_name":"Dorigo, Marco","last_name":"Dorigo","first_name":"Marco"}],"date_created":"2020-10-15T10:22:20Z","year":"2016","citation":{"mla":"Valentini, Gabriele, et al. “Collective Perception of Environmental Features in a Robot Swarm.” <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016, doi:<a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">10.1007/978-3-319-44427-7_6</a>.","short":"G. Valentini, D. Brambilla, H. Hamann, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.","bibtex":"@inproceedings{Valentini_Brambilla_Hamann_Dorigo_2016, title={Collective Perception of Environmental Features in a Robot Swarm}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">10.1007/978-3-319-44427-7_6</a>}, booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Valentini, Gabriele and Brambilla, Davide and Hamann, Heiko and Dorigo, Marco}, year={2016} }","apa":"Valentini, G., Brambilla, D., Hamann, H., &#38; Dorigo, M. (2016). Collective Perception of Environmental Features in a Robot Swarm. In <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. <a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">https://doi.org/10.1007/978-3-319-44427-7_6</a>","chicago":"Valentini, Gabriele, Davide Brambilla, Heiko Hamann, and Marco Dorigo. “Collective Perception of Environmental Features in a Robot Swarm.” In <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016. <a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">https://doi.org/10.1007/978-3-319-44427-7_6</a>.","ieee":"G. Valentini, D. Brambilla, H. Hamann, and M. Dorigo, “Collective Perception of Environmental Features in a Robot Swarm,” in <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016.","ama":"Valentini G, Brambilla D, Hamann H, Dorigo M. Collective Perception of Environmental Features in a Robot Swarm. In: <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. ; 2016. doi:<a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">10.1007/978-3-319-44427-7_6</a>"},"publication_identifier":{"isbn":["9783319444260","9783319444277"],"issn":["0302-9743","1611-3349"]},"publication_status":"published"},{"department":[{"_id":"64"}],"user_id":"25078","_id":"2948","project":[{"_id":"43","name":"Securing the Financial Cloud"}],"publication":"Mathematical Aspects of Computer and Information Sciences","type":"book_chapter","status":"public","date_created":"2018-05-29T11:26:56Z","author":[{"last_name":"Günther","full_name":"Günther, Peter","first_name":"Peter"},{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"date_updated":"2022-01-06T06:58:48Z","publisher":"Springer International Publishing","doi":"10.1007/978-3-319-32859-1_13","title":"Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures","publication_identifier":{"isbn":["9783319328584","9783319328591"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"151-165","citation":{"chicago":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>.","ieee":"P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.","ama":"Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>","apa":"Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>","mla":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>.","bibtex":"@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>}, booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016}, pages={151–165} }","short":"P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165."},"year":"2016","place":"Cham"},{"user_id":"25078","department":[{"_id":"64"}],"_id":"2968","type":"book_chapter","publication":"Algorithm Engineering","status":"public","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"full_name":"Lammersen, Christiane","last_name":"Lammersen","first_name":"Christiane"},{"first_name":"Melanie","full_name":"Schmidt, Melanie","last_name":"Schmidt"},{"first_name":"Christian","full_name":"Sohler, Christian","last_name":"Sohler"}],"date_created":"2018-06-04T12:22:40Z","publisher":"Springer International Publishing","date_updated":"2022-01-06T06:58:49Z","doi":"10.1007/978-3-319-49487-6_3","title":"Theoretical Analysis of the k-Means Algorithm – A Survey","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319494869","9783319494876"]},"citation":{"chicago":"Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>.","ieee":"J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer International Publishing, 2016, pp. 81–116.","ama":"Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International Publishing; 2016:81-116. doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>","apa":"Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i> (pp. 81–116). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>","bibtex":"@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical Analysis of the k-Means Algorithm – A Survey}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>}, booktitle={Algorithm Engineering}, publisher={Springer International Publishing}, author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}, year={2016}, pages={81–116} }","short":"J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.","mla":"Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016, pp. 81–116, doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>."},"page":"81-116","year":"2016","place":"Cham"}]
