[{"title":"Policy Dependent and Independent Information Flow Analyses","doi":"10.1007/978-3-319-68690-5_22","date_updated":"2022-01-06T07:02:39Z","publisher":"Springer International Publishing","date_created":"2018-11-21T09:38:43Z","author":[{"first_name":"Manuel","id":"11315","full_name":"Töws, Manuel","last_name":"Töws"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"year":"2017","citation":{"apa":"Töws, M., &#38; Wehrheim, H. (2017). Policy Dependent and Independent Information Flow Analyses. In <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i> (pp. 362–378). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">https://doi.org/10.1007/978-3-319-68690-5_22</a>","bibtex":"@inproceedings{Töws_Wehrheim_2017, title={Policy Dependent and Independent Information Flow Analyses}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>}, booktitle={Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)}, publisher={Springer International Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2017}, pages={362–378} }","short":"M. Töws, H. Wehrheim, in: Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017), Springer International Publishing, 2017, pp. 362–378.","mla":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i>, Springer International Publishing, 2017, pp. 362–78, doi:<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>.","ama":"Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses. In: <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i>. Springer International Publishing; 2017:362-378. doi:<a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">10.1007/978-3-319-68690-5_22</a>","chicago":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” In <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i>, 362–78. Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-68690-5_22\">https://doi.org/10.1007/978-3-319-68690-5_22</a>.","ieee":"M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow Analyses,” in <i>Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)</i>, 2017, pp. 362–378."},"page":"362-378","publication_status":"published","publication_identifier":{"isbn":["9783319686899","9783319686905"],"issn":["0302-9743","1611-3349"]},"has_accepted_license":"1","ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-26T15:07:42Z","project":[{"_id":"12","name":"SFB 901 - Subproject B4"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901","_id":"1"}],"_id":"5769","user_id":"477","department":[{"_id":"77"}],"abstract":[{"lang":"eng","text":"Information Flow Analysis (IFA) aims at detecting illegal flows of information between program entities. “Legality” is therein specified in terms of various security policies. For the analysis, this opens up two possibilities: building generic, policy independent and building specific, policy dependent IFAs. While the former needs to track all dependencies between program entities, the latter allows for a reduced and thus more efficient analysis.\r\n\r\nIn this paper, we start out by formally defining a policy independent information flow analysis. Next, we show how to specialize this IFA via policy specific variable tracking, and prove soundness of the specialization. We furthermore investigate refinement relationships between policies, allowing an IFA for one policy to be employed for its refinements. As policy refinement depends on concrete program entities, we additionally propose a precomputation of policy refinement conditions, enabling an efficient refinement check for concrete programs."}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-26T15:07:42Z","date_created":"2018-11-26T15:07:42Z","creator":"mtoews","file_size":424031,"file_id":"5836","file_name":"Töws-Wehrheim2017_Chapter_PolicyDependentAndIndependentI.pdf","access_level":"closed"}],"status":"public","type":"conference","publication":"Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)"},{"year":"2017","title":"A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0","date_created":"2018-12-18T10:44:24Z","publisher":"Springer International Publishing","publication":"Design, User Experience, and Usability: Theory, Methodology, and Management","language":[{"iso":"eng"}],"citation":{"ama":"Fischer HG, Engler M, Sauer S. A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In: <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i>. Vol 10288. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:570-583. doi:<a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">10.1007/978-3-319-58634-2_42</a>","chicago":"Fischer, Holger Gerhard, Michael Engler, and Stefan Sauer. “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0.” In <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i>, 10288:570–83. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">https://doi.org/10.1007/978-3-319-58634-2_42</a>.","ieee":"H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0,” in <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i>, vol. 10288, Cham: Springer International Publishing, 2017, pp. 570–583.","mla":"Fischer, Holger Gerhard, et al. “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0.” <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i>, vol. 10288, Springer International Publishing, 2017, pp. 570–83, doi:<a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">10.1007/978-3-319-58634-2_42</a>.","short":"H.G. Fischer, M. Engler, S. Sauer, in: Design, User Experience, and Usability: Theory, Methodology, and Management, Springer International Publishing, Cham, 2017, pp. 570–583.","bibtex":"@inbook{Fischer_Engler_Sauer_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0}, volume={10288}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">10.1007/978-3-319-58634-2_42</a>}, booktitle={Design, User Experience, and Usability: Theory, Methodology, and Management}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Engler, Michael and Sauer, Stefan}, year={2017}, pages={570–583}, collection={Lecture Notes in Computer Science} }","apa":"Fischer, H. G., Engler, M., &#38; Sauer, S. (2017). A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In <i>Design, User Experience, and Usability: Theory, Methodology, and Management</i> (Vol. 10288, pp. 570–583). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-58634-2_42\">https://doi.org/10.1007/978-3-319-58634-2_42</a>"},"intvolume":"     10288","page":"570-583","place":"Cham","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319586335","9783319586342"]},"doi":"10.1007/978-3-319-58634-2_42","conference":{"location":"Vancouver, Canada","end_date":"2017-07-14","start_date":"2017-07-09","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2017"},"author":[{"id":"30457","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","first_name":"Holger Gerhard"},{"first_name":"Michael","last_name":"Engler","full_name":"Engler, Michael"},{"first_name":"Stefan","id":"447","full_name":"Sauer, Stefan","last_name":"Sauer"}],"volume":10288,"date_updated":"2022-01-06T07:02:58Z","status":"public","type":"book_chapter","series_title":"Lecture Notes in Computer Science","user_id":"30457","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"_id":"6255"},{"author":[{"first_name":"Pascal","full_name":"Bemmann, Pascal","last_name":"Bemmann"},{"full_name":"Biermeier, Felix","last_name":"Biermeier","first_name":"Felix"},{"first_name":"Jan","last_name":"Bürmann","full_name":"Bürmann, Jan"},{"first_name":"Arne","last_name":"Kemper","full_name":"Kemper, Arne"},{"first_name":"Till","full_name":"Knollmann, Till","id":"39241","orcid":"0000-0003-2014-4696","last_name":"Knollmann"},{"first_name":"Steffen","full_name":"Knorr, Steffen","last_name":"Knorr"},{"last_name":"Kothe","full_name":"Kothe, Nils","first_name":"Nils"},{"full_name":"Mäcker, Alexander","id":"13536","last_name":"Mäcker","first_name":"Alexander"},{"first_name":"Manuel","full_name":"Malatyali, Manuel","id":"41265","last_name":"Malatyali"},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"},{"first_name":"Sören","full_name":"Riechers, Sören","last_name":"Riechers"},{"first_name":"Johannes Sebastian","full_name":"Schaefer, Johannes Sebastian","id":"30291","last_name":"Schaefer"},{"first_name":"Jannik","last_name":"Sundermeier","full_name":"Sundermeier, Jannik","id":"38705"}],"date_created":"2020-04-08T07:20:20Z","date_updated":"2022-01-06T06:52:50Z","doi":"10.1007/978-3-319-72050-0_13","title":"Monitoring of Domain-Related Problems in Distributed Data Streams","publication_status":"published","publication_identifier":{"isbn":["9783319720494","9783319720500"],"issn":["0302-9743","1611-3349"]},"citation":{"ama":"Bemmann P, Biermeier F, Bürmann J, et al. Monitoring of Domain-Related Problems in Distributed Data Streams. In: <i>Structural Information and Communication Complexity</i>. ; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">10.1007/978-3-319-72050-0_13</a>","chicago":"Bemmann, Pascal, Felix Biermeier, Jan Bürmann, Arne Kemper, Till Knollmann, Steffen Knorr, Nils Kothe, et al. “Monitoring of Domain-Related Problems in Distributed Data Streams.” In <i>Structural Information and Communication Complexity</i>. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">https://doi.org/10.1007/978-3-319-72050-0_13</a>.","ieee":"P. Bemmann <i>et al.</i>, “Monitoring of Domain-Related Problems in Distributed Data Streams,” in <i>Structural Information and Communication Complexity</i>, Cham, 2017.","apa":"Bemmann, P., Biermeier, F., Bürmann, J., Kemper, A., Knollmann, T., Knorr, S., Kothe, N., Mäcker, A., Malatyali, M., Meyer auf der Heide, F., Riechers, S., Schaefer, J. S., &#38; Sundermeier, J. (2017). Monitoring of Domain-Related Problems in Distributed Data Streams. In <i>Structural Information and Communication Complexity</i>. <a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">https://doi.org/10.1007/978-3-319-72050-0_13</a>","bibtex":"@inbook{Bemmann_Biermeier_Bürmann_Kemper_Knollmann_Knorr_Kothe_Mäcker_Malatyali_Meyer auf der Heide_et al._2017, place={Cham}, title={Monitoring of Domain-Related Problems in Distributed Data Streams}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">10.1007/978-3-319-72050-0_13</a>}, booktitle={Structural Information and Communication Complexity}, author={Bemmann, Pascal and Biermeier, Felix and Bürmann, Jan and Kemper, Arne and Knollmann, Till and Knorr, Steffen and Kothe, Nils and Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and et al.}, year={2017} }","short":"P. Bemmann, F. Biermeier, J. Bürmann, A. Kemper, T. Knollmann, S. Knorr, N. Kothe, A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, J.S. Schaefer, J. Sundermeier, in: Structural Information and Communication Complexity, Cham, 2017.","mla":"Bemmann, Pascal, et al. “Monitoring of Domain-Related Problems in Distributed Data Streams.” <i>Structural Information and Communication Complexity</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-72050-0_13\">10.1007/978-3-319-72050-0_13</a>."},"place":"Cham","year":"2017","user_id":"15415","department":[{"_id":"63"}],"_id":"16461","external_id":{"arxiv":["arXiv:1706.03568 "]},"language":[{"iso":"eng"}],"type":"book_chapter","publication":"Structural Information and Communication Complexity","status":"public"},{"type":"book_chapter","publication":"Lecture Notes in Computer Science","status":"public","_id":"14857","user_id":"1112","department":[{"_id":"277"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319684956","9783319684963"]},"year":"2017","place":"Cham","citation":{"apa":"Beckschäfer, M., Malberg, S., Tierney, K., &#38; Weskamp, C. (2017). Simulating Storage Policies for an Automated Grid-Based Warehouse System. In <i>Lecture Notes in Computer Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">https://doi.org/10.1007/978-3-319-68496-3_31</a>","short":"M. Beckschäfer, S. Malberg, K. Tierney, C. Weskamp, in: Lecture Notes in Computer Science, Cham, 2017.","mla":"Beckschäfer, Michaela, et al. “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” <i>Lecture Notes in Computer Science</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">10.1007/978-3-319-68496-3_31</a>.","bibtex":"@inbook{Beckschäfer_Malberg_Tierney_Weskamp_2017, place={Cham}, title={Simulating Storage Policies for an Automated Grid-Based Warehouse System}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">10.1007/978-3-319-68496-3_31</a>}, booktitle={Lecture Notes in Computer Science}, author={Beckschäfer, Michaela and Malberg, Simon and Tierney, Kevin and Weskamp, Christoph}, year={2017} }","ama":"Beckschäfer M, Malberg S, Tierney K, Weskamp C. Simulating Storage Policies for an Automated Grid-Based Warehouse System. In: <i>Lecture Notes in Computer Science</i>. Cham; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">10.1007/978-3-319-68496-3_31</a>","chicago":"Beckschäfer, Michaela, Simon Malberg, Kevin Tierney, and Christoph Weskamp. “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” In <i>Lecture Notes in Computer Science</i>. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-68496-3_31\">https://doi.org/10.1007/978-3-319-68496-3_31</a>.","ieee":"M. Beckschäfer, S. Malberg, K. Tierney, and C. Weskamp, “Simulating Storage Policies for an Automated Grid-Based Warehouse System,” in <i>Lecture Notes in Computer Science</i>, Cham, 2017."},"date_updated":"2022-01-06T06:52:08Z","date_created":"2019-11-08T08:15:11Z","author":[{"id":"32439","full_name":"Beckschäfer, Michaela","last_name":"Beckschäfer","first_name":"Michaela"},{"first_name":"Simon","last_name":"Malberg","full_name":"Malberg, Simon"},{"last_name":"Tierney","full_name":"Tierney, Kevin","first_name":"Kevin"},{"full_name":"Weskamp, Christoph","last_name":"Weskamp","first_name":"Christoph"}],"title":"Simulating Storage Policies for an Automated Grid-Based Warehouse System","doi":"10.1007/978-3-319-68496-3_31"},{"publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","citation":{"chicago":"Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” In <i>Theory and Practice of Model Transformation</i>. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">https://doi.org/10.1007/978-3-319-61473-1_2</a>.","ieee":"C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities,” in <i>Theory and Practice of Model Transformation</i>, Cham, 2017.","ama":"Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In: <i>Theory and Practice of Model Transformation</i>. ; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">10.1007/978-3-319-61473-1_2</a>","apa":"Gerking, C., Schubert, D., &#38; Budde, I. (2017). Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In <i>Theory and Practice of Model Transformation</i>. <a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">https://doi.org/10.1007/978-3-319-61473-1_2</a>","bibtex":"@inbook{Gerking_Schubert_Budde_2017, place={Cham}, title={Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">10.1007/978-3-319-61473-1_2</a>}, booktitle={Theory and Practice of Model Transformation}, author={Gerking, Christopher and Schubert, David and Budde, Ingo}, year={2017} }","mla":"Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” <i>Theory and Practice of Model Transformation</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-61473-1_2\">10.1007/978-3-319-61473-1_2</a>.","short":"C. Gerking, D. Schubert, I. Budde, in: Theory and Practice of Model Transformation, Cham, 2017."},"year":"2017","place":"Cham","author":[{"full_name":"Gerking, Christopher","last_name":"Gerking","first_name":"Christopher"},{"first_name":"David","full_name":"Schubert, David","last_name":"Schubert"},{"first_name":"Ingo","last_name":"Budde","orcid":"https://orcid.org/0000-0003-0124-6291","id":"13693","full_name":"Budde, Ingo"}],"date_created":"2021-08-13T20:33:08Z","date_updated":"2024-05-02T19:01:07Z","doi":"10.1007/978-3-319-61473-1_2","title":"Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities","publication":"Theory and Practice of Model Transformation","type":"book_chapter","status":"public","user_id":"13693","_id":"23396","language":[{"iso":"eng"}]},{"status":"public","type":"book_chapter","publication":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"_id":"60902","user_id":"117951","year":"2017","place":"Cham","citation":{"apa":"Senk, J., Yegenoglu, A., Amblet, O., Brukau, Y., Davison, A., Lester, D. R., Lührs, A., Quaglio, P., Rostami, V., Rowley, A., Schuller, B., Stokes, A. B., van Albada, S. J., Zielasko, D., Diesmann, M., Weyers, B., Denker, M., &#38; Grün, S. (2017). A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC. In <i>Lecture Notes in Computer Science</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">https://doi.org/10.1007/978-3-319-53862-4_21</a>","mla":"Senk, Johanna, et al. “A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC.” <i>Lecture Notes in Computer Science</i>, Springer International Publishing, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">10.1007/978-3-319-53862-4_21</a>.","short":"J. Senk, A. Yegenoglu, O. Amblet, Y. Brukau, A. Davison, D.R. Lester, A. Lührs, P. Quaglio, V. Rostami, A. Rowley, B. Schuller, A.B. Stokes, S.J. van Albada, D. Zielasko, M. Diesmann, B. Weyers, M. Denker, S. Grün, in: Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017.","bibtex":"@inbook{Senk_Yegenoglu_Amblet_Brukau_Davison_Lester_Lührs_Quaglio_Rostami_Rowley_et al._2017, place={Cham}, title={A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">10.1007/978-3-319-53862-4_21</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Senk, Johanna and Yegenoglu, Alper and Amblet, Olivier and Brukau, Yury and Davison, Andrew and Lester, David Roland and Lührs, Anna and Quaglio, Pietro and Rostami, Vahid and Rowley, Andrew and et al.}, year={2017} }","chicago":"Senk, Johanna, Alper Yegenoglu, Olivier Amblet, Yury Brukau, Andrew Davison, David Roland Lester, Anna Lührs, et al. “A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC.” In <i>Lecture Notes in Computer Science</i>. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">https://doi.org/10.1007/978-3-319-53862-4_21</a>.","ieee":"J. Senk <i>et al.</i>, “A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC,” in <i>Lecture Notes in Computer Science</i>, Cham: Springer International Publishing, 2017.","ama":"Senk J, Yegenoglu A, Amblet O, et al. A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC. In: <i>Lecture Notes in Computer Science</i>. Springer International Publishing; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-53862-4_21\">10.1007/978-3-319-53862-4_21</a>"},"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319538617","9783319538624"]},"title":"A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC","doi":"10.1007/978-3-319-53862-4_21","date_updated":"2025-08-08T11:39:32Z","publisher":"Springer International Publishing","author":[{"first_name":"Johanna","last_name":"Senk","full_name":"Senk, Johanna"},{"id":"117951","full_name":"Yegenoglu, Alper","orcid":"0000-0001-8869-215X","last_name":"Yegenoglu","first_name":"Alper"},{"first_name":"Olivier","full_name":"Amblet, Olivier","last_name":"Amblet"},{"first_name":"Yury","last_name":"Brukau","full_name":"Brukau, Yury"},{"first_name":"Andrew","full_name":"Davison, Andrew","last_name":"Davison"},{"last_name":"Lester","full_name":"Lester, David Roland","first_name":"David Roland"},{"full_name":"Lührs, Anna","last_name":"Lührs","first_name":"Anna"},{"first_name":"Pietro","full_name":"Quaglio, Pietro","last_name":"Quaglio"},{"first_name":"Vahid","full_name":"Rostami, Vahid","last_name":"Rostami"},{"first_name":"Andrew","last_name":"Rowley","full_name":"Rowley, Andrew"},{"last_name":"Schuller","full_name":"Schuller, Bernd","first_name":"Bernd"},{"first_name":"Alan Barry","last_name":"Stokes","full_name":"Stokes, Alan Barry"},{"last_name":"van Albada","full_name":"van Albada, Sacha Jennifer","first_name":"Sacha Jennifer"},{"first_name":"Daniel","last_name":"Zielasko","full_name":"Zielasko, Daniel"},{"first_name":"Markus","last_name":"Diesmann","full_name":"Diesmann, Markus"},{"first_name":"Benjamin","full_name":"Weyers, Benjamin","last_name":"Weyers"},{"first_name":"Michael","full_name":"Denker, Michael","last_name":"Denker"},{"last_name":"Grün","full_name":"Grün, Sonja","first_name":"Sonja"}],"date_created":"2025-08-06T15:02:46Z"},{"status":"public","type":"conference","publication":"10th Int. Conf. on Swarm Intelligence, ANTS 2016","language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"},{"_id":"238"}],"_id":"20000","citation":{"chicago":"Hamann, Heiko, Gabriele Valentini, and Marco Dorigo. “Population Coding: A New Design Paradigm for Embodied Distributed Systems.” In <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. Cham, 2016. <a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">https://doi.org/10.1007/978-3-319-44427-7_15</a>.","ieee":"H. Hamann, G. Valentini, and M. Dorigo, “Population Coding: A New Design Paradigm for Embodied Distributed Systems,” in <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016.","ama":"Hamann H, Valentini G, Dorigo M. Population Coding: A New Design Paradigm for Embodied Distributed Systems. In: <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. Cham; 2016. doi:<a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">10.1007/978-3-319-44427-7_15</a>","apa":"Hamann, H., Valentini, G., &#38; Dorigo, M. (2016). Population Coding: A New Design Paradigm for Embodied Distributed Systems. In <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">https://doi.org/10.1007/978-3-319-44427-7_15</a>","mla":"Hamann, Heiko, et al. “Population Coding: A New Design Paradigm for Embodied Distributed Systems.” <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016, doi:<a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">10.1007/978-3-319-44427-7_15</a>.","bibtex":"@inproceedings{Hamann_Valentini_Dorigo_2016, place={Cham}, title={Population Coding: A New Design Paradigm for Embodied Distributed Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-44427-7_15\">10.1007/978-3-319-44427-7_15</a>}, booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Hamann, Heiko and Valentini, Gabriele and Dorigo, Marco}, year={2016} }","short":"H. Hamann, G. Valentini, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence, ANTS 2016, Cham, 2016."},"year":"2016","place":"Cham","publication_status":"published","publication_identifier":{"isbn":["9783319444260","9783319444277"],"issn":["0302-9743","1611-3349"]},"doi":"10.1007/978-3-319-44427-7_15","title":"Population Coding: A New Design Paradigm for Embodied Distributed Systems","date_created":"2020-10-15T09:55:35Z","author":[{"last_name":"Hamann","full_name":"Hamann, Heiko","first_name":"Heiko"},{"last_name":"Valentini","full_name":"Valentini, Gabriele","first_name":"Gabriele"},{"first_name":"Marco","full_name":"Dorigo, Marco","last_name":"Dorigo"}],"date_updated":"2022-01-06T06:54:18Z"},{"publication":"10th Int. Conf. on Swarm Intelligence, ANTS 2016","type":"conference","status":"public","department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","_id":"20004","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319444260","9783319444277"]},"publication_status":"published","citation":{"short":"G. Valentini, D. Brambilla, H. Hamann, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.","mla":"Valentini, Gabriele, et al. “Collective Perception of Environmental Features in a Robot Swarm.” <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016, doi:<a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">10.1007/978-3-319-44427-7_6</a>.","bibtex":"@inproceedings{Valentini_Brambilla_Hamann_Dorigo_2016, title={Collective Perception of Environmental Features in a Robot Swarm}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">10.1007/978-3-319-44427-7_6</a>}, booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Valentini, Gabriele and Brambilla, Davide and Hamann, Heiko and Dorigo, Marco}, year={2016} }","apa":"Valentini, G., Brambilla, D., Hamann, H., &#38; Dorigo, M. (2016). Collective Perception of Environmental Features in a Robot Swarm. In <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. <a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">https://doi.org/10.1007/978-3-319-44427-7_6</a>","ama":"Valentini G, Brambilla D, Hamann H, Dorigo M. Collective Perception of Environmental Features in a Robot Swarm. In: <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>. ; 2016. doi:<a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">10.1007/978-3-319-44427-7_6</a>","ieee":"G. Valentini, D. Brambilla, H. Hamann, and M. Dorigo, “Collective Perception of Environmental Features in a Robot Swarm,” in <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016.","chicago":"Valentini, Gabriele, Davide Brambilla, Heiko Hamann, and Marco Dorigo. “Collective Perception of Environmental Features in a Robot Swarm.” In <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016. <a href=\"https://doi.org/10.1007/978-3-319-44427-7_6\">https://doi.org/10.1007/978-3-319-44427-7_6</a>."},"year":"2016","author":[{"full_name":"Valentini, Gabriele","last_name":"Valentini","first_name":"Gabriele"},{"first_name":"Davide","last_name":"Brambilla","full_name":"Brambilla, Davide"},{"first_name":"Heiko","last_name":"Hamann","full_name":"Hamann, Heiko"},{"first_name":"Marco","full_name":"Dorigo, Marco","last_name":"Dorigo"}],"date_created":"2020-10-15T10:22:20Z","date_updated":"2022-01-06T06:54:18Z","doi":"10.1007/978-3-319-44427-7_6","title":"Collective Perception of Environmental Features in a Robot Swarm"},{"_id":"2948","project":[{"name":"Securing the Financial Cloud","_id":"43"}],"department":[{"_id":"64"}],"user_id":"25078","status":"public","publication":"Mathematical Aspects of Computer and Information Sciences","type":"book_chapter","title":"Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures","doi":"10.1007/978-3-319-32859-1_13","publisher":"Springer International Publishing","date_updated":"2022-01-06T06:58:48Z","date_created":"2018-05-29T11:26:56Z","author":[{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"year":"2016","place":"Cham","page":"151-165","citation":{"chicago":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>.","ieee":"P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.","ama":"Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>","short":"P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.","bibtex":"@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>}, booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016}, pages={151–165} }","mla":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>.","apa":"Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>"},"publication_identifier":{"isbn":["9783319328584","9783319328591"],"issn":["0302-9743","1611-3349"]},"publication_status":"published"},{"doi":"10.1007/978-3-319-49487-6_3","title":"Theoretical Analysis of the k-Means Algorithm – A Survey","author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Christiane","last_name":"Lammersen","full_name":"Lammersen, Christiane"},{"first_name":"Melanie","full_name":"Schmidt, Melanie","last_name":"Schmidt"},{"first_name":"Christian","full_name":"Sohler, Christian","last_name":"Sohler"}],"date_created":"2018-06-04T12:22:40Z","publisher":"Springer International Publishing","date_updated":"2022-01-06T06:58:49Z","page":"81-116","citation":{"bibtex":"@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical Analysis of the k-Means Algorithm – A Survey}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>}, booktitle={Algorithm Engineering}, publisher={Springer International Publishing}, author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}, year={2016}, pages={81–116} }","mla":"Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016, pp. 81–116, doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>.","short":"J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.","apa":"Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i> (pp. 81–116). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>","ama":"Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International Publishing; 2016:81-116. doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>","ieee":"J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer International Publishing, 2016, pp. 81–116.","chicago":"Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>."},"place":"Cham","year":"2016","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319494869","9783319494876"]},"publication_status":"published","department":[{"_id":"64"}],"user_id":"25078","_id":"2968","status":"public","publication":"Algorithm Engineering","type":"book_chapter"},{"status":"public","publication":"Advances in Knowledge Discovery and Data Mining","type":"book_chapter","_id":"2970","department":[{"_id":"64"}],"user_id":"25078","year":"2016","place":"Cham","page":"296-308","citation":{"ama":"Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances in Knowledge Discovery and Data Mining</i>. Cham: Springer International Publishing; 2016:296-308. doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>","chicago":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>.","ieee":"J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International Publishing, 2016, pp. 296–308.","short":"J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.","bibtex":"@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian Mixture Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>}, booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016}, pages={296–308} }","mla":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International Publishing, 2016, pp. 296–308, doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>.","apa":"Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>"},"publication_identifier":{"isbn":["9783319317496","9783319317502"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","title":"Adaptive Seeding for Gaussian Mixture Models","doi":"10.1007/978-3-319-31750-2_24","publisher":"Springer International Publishing","date_updated":"2022-01-06T06:58:49Z","author":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"},{"first_name":"Kathrin","last_name":"Bujna","full_name":"Bujna, Kathrin"}],"date_created":"2018-06-04T12:27:21Z"},{"date_created":"2018-11-26T10:21:38Z","publisher":"Springer International Publishing","title":"Cross-Device Integration of Android Apps","year":"2016","language":[{"iso":"eng"}],"keyword":["Cross-Device","Integration","Android","Adapter","DSL"],"publication":"Service-Oriented Computing","abstract":[{"text":"Integrating apps on mobile devices into applications running on other devices is usually difficult. For instance, using a messenger on a smartphone to share a text written on a desktop computer often ends up in a cumbersome solution to transfer the text, because many applications are not designed for such scenarios. In this paper, we present an approach enabling the integration of apps running on Android devices into applications running on other devices and even other platforms. This is achieved by specifying adapters for Android apps, which map their services to a platform-independent service interface. For this purpose, we have developed a domain-specific language to ease the specification of such mappings. Our approach is applicable without the need to modify the existing Android apps providing the service. We analyzed its feasibility by implementing our approach and by specifying mappings for several popular Android apps, e.g., phone book, camera, and file explorer.","lang":"eng"}],"author":[{"full_name":"Wolters, Dennis","id":"11308","last_name":"Wolters","first_name":"Dennis"},{"last_name":"Kirchhoff","full_name":"Kirchhoff, Jonas","id":"39928","first_name":"Jonas"},{"first_name":"Christian","full_name":"Gerth, Christian","last_name":"Gerth"},{"last_name":"Engels","id":"107","full_name":"Engels, Gregor","first_name":"Gregor"}],"date_updated":"2022-01-06T07:02:43Z","doi":"10.1007/978-3-319-46295-0_11","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319462943","9783319462950"]},"publication_status":"published","page":"171-185","citation":{"mla":"Wolters, Dennis, et al. “Cross-Device Integration of Android Apps.” <i>Service-Oriented Computing</i>, edited by Quan Z.  Sheng et al., Springer International Publishing, 2016, pp. 171–85, doi:<a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">10.1007/978-3-319-46295-0_11</a>.","bibtex":"@inproceedings{Wolters_Kirchhoff_Gerth_Engels_2016, place={Cham}, title={Cross-Device Integration of Android Apps}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">10.1007/978-3-319-46295-0_11</a>}, booktitle={Service-Oriented Computing}, publisher={Springer International Publishing}, author={Wolters, Dennis and Kirchhoff, Jonas and Gerth, Christian and Engels, Gregor}, editor={Sheng, Quan Z.  and Stroulia, Eleni  and Tata, Samir  and Bhiri, Sami Editors}, year={2016}, pages={171–185} }","short":"D. Wolters, J. Kirchhoff, C. Gerth, G. Engels, in: Q.Z. Sheng, E. Stroulia, S. Tata, S. Bhiri (Eds.), Service-Oriented Computing, Springer International Publishing, Cham, 2016, pp. 171–185.","apa":"Wolters, D., Kirchhoff, J., Gerth, C., &#38; Engels, G. (2016). Cross-Device Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, &#38; S. Bhiri (Eds.), <i>Service-Oriented Computing</i> (pp. 171–185). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">https://doi.org/10.1007/978-3-319-46295-0_11</a>","chicago":"Wolters, Dennis, Jonas Kirchhoff, Christian Gerth, and Gregor Engels. “Cross-Device Integration of Android Apps.” In <i>Service-Oriented Computing</i>, edited by Quan Z.  Sheng, Eleni  Stroulia, Samir  Tata, and Sami  Bhiri, 171–85. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">https://doi.org/10.1007/978-3-319-46295-0_11</a>.","ieee":"D. Wolters, J. Kirchhoff, C. Gerth, and G. Engels, “Cross-Device Integration of Android Apps,” in <i>Service-Oriented Computing</i>, 2016, pp. 171–185.","ama":"Wolters D, Kirchhoff J, Gerth C, Engels G. Cross-Device Integration of Android Apps. In: Sheng QZ, Stroulia E, Tata S, Bhiri S, eds. <i>Service-Oriented Computing</i>. Cham: Springer International Publishing; 2016:171-185. doi:<a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">10.1007/978-3-319-46295-0_11</a>"},"place":"Cham","department":[{"_id":"66"}],"user_id":"39928","_id":"5825","type":"conference","status":"public","editor":[{"full_name":"Sheng, Quan Z. ","last_name":"Sheng","first_name":"Quan Z. "},{"last_name":"Stroulia","full_name":"Stroulia, Eleni ","first_name":"Eleni "},{"first_name":"Samir ","last_name":"Tata","full_name":"Tata, Samir "},{"last_name":"Bhiri","full_name":"Bhiri, Sami ","first_name":"Sami "}]},{"title":"Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows","publisher":"Springer International Publishing","date_created":"2018-12-18T10:51:10Z","year":"2016","language":[{"iso":"eng"}],"publication":"Human-Centered and Error-Resilient Systems Development","conference":{"end_date":"2016-08-31","location":"Stockholm, Sweden","name":"International Conference on Human-Centred Software Engineering","start_date":"2016-08-29"},"doi":"10.1007/978-3-319-44902-9_3","date_updated":"2022-01-06T07:02:58Z","volume":9856,"author":[{"first_name":"Holger Gerhard","last_name":"Fischer","full_name":"Fischer, Holger Gerhard","id":"30457"},{"last_name":"Senft","id":"9109","full_name":"Senft, Björn","first_name":"Björn"}],"place":"Cham","page":"30-41","intvolume":"      9856","citation":{"apa":"Fischer, H. G., &#38; Senft, B. (2016). Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In C. Bogdan (Ed.), <i>Human-Centered and Error-Resilient Systems Development</i> (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">https://doi.org/10.1007/978-3-319-44902-9_3</a>","bibtex":"@inbook{Fischer_Senft_2016, place={Cham}, series={Lecture Notes in Computer Science}, title={Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows}, volume={9856}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">10.1007/978-3-319-44902-9_3</a>}, booktitle={Human-Centered and Error-Resilient Systems Development}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn}, editor={Bogdan, ChristianEditor}, year={2016}, pages={30–41}, collection={Lecture Notes in Computer Science} }","short":"H.G. Fischer, B. Senft, in: C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development, Springer International Publishing, Cham, 2016, pp. 30–41.","mla":"Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.” <i>Human-Centered and Error-Resilient Systems Development</i>, edited by Christian Bogdan, vol. 9856, Springer International Publishing, 2016, pp. 30–41, doi:<a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">10.1007/978-3-319-44902-9_3</a>.","ama":"Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed. <i>Human-Centered and Error-Resilient Systems Development</i>. Vol 9856. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41. doi:<a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">10.1007/978-3-319-44902-9_3</a>","ieee":"H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows,” in <i>Human-Centered and Error-Resilient Systems Development</i>, vol. 9856, C. Bogdan, Ed. Cham: Springer International Publishing, 2016, pp. 30–41.","chicago":"Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.” In <i>Human-Centered and Error-Resilient Systems Development</i>, edited by Christian Bogdan, 9856:30–41. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">https://doi.org/10.1007/978-3-319-44902-9_3</a>."},"publication_identifier":{"isbn":["9783319449012","9783319449029"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","_id":"6257","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"user_id":"30457","series_title":"Lecture Notes in Computer Science","editor":[{"last_name":"Bogdan","full_name":"Bogdan, Christian","first_name":"Christian"}],"status":"public","type":"book_chapter"},{"title":"Adaptive Seeding for Gaussian Mixture Models","doi":"10.1007/978-3-319-31750-2_24","date_updated":"2023-01-10T13:49:50Z","publisher":"Springer International Publishing","date_created":"2018-06-05T07:31:39Z","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"full_name":"Bujna, Kathrin","last_name":"Bujna","first_name":"Kathrin"}],"place":"Cham","year":"2016","page":"296-308","citation":{"short":"J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.","bibtex":"@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian Mixture Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>}, booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016}, pages={296–308} }","mla":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International Publishing, 2016, pp. 296–308, doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>.","apa":"Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>","chicago":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>.","ieee":"J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International Publishing, 2016, pp. 296–308.","ama":"Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances in Knowledge Discovery and Data Mining</i>. Springer International Publishing; 2016:296-308. doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>"},"publication_identifier":{"isbn":["9783319317496","9783319317502"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","_id":"2978","department":[{"_id":"64"}],"user_id":"25078","status":"public","publication":"Advances in Knowledge Discovery and Data Mining","type":"book_chapter"},{"type":"book_chapter","publication":"Lecture Notes in Computer Science","status":"public","user_id":"117951","_id":"60904","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319409849","9783319409856"]},"citation":{"ieee":"A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, and D. Endres, “Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains,” in <i>Lecture Notes in Computer Science</i>, Cham: Springer International Publishing, 2016.","chicago":"Yegenoglu, Alper, Pietro Quaglio, Emiliano Torre, Sonja Grün, and Dominik Endres. “Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-Temporal Spike Patterns in Massively Parallel Spike Trains.” In <i>Lecture Notes in Computer Science</i>. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">https://doi.org/10.1007/978-3-319-40985-6_1</a>.","ama":"Yegenoglu A, Quaglio P, Torre E, Grün S, Endres D. Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains. In: <i>Lecture Notes in Computer Science</i>. Springer International Publishing; 2016. doi:<a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">10.1007/978-3-319-40985-6_1</a>","apa":"Yegenoglu, A., Quaglio, P., Torre, E., Grün, S., &#38; Endres, D. (2016). Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains. In <i>Lecture Notes in Computer Science</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">https://doi.org/10.1007/978-3-319-40985-6_1</a>","short":"A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, D. Endres, in: Lecture Notes in Computer Science, Springer International Publishing, Cham, 2016.","bibtex":"@inbook{Yegenoglu_Quaglio_Torre_Grün_Endres_2016, place={Cham}, title={Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">10.1007/978-3-319-40985-6_1</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Yegenoglu, Alper and Quaglio, Pietro and Torre, Emiliano and Grün, Sonja and Endres, Dominik}, year={2016} }","mla":"Yegenoglu, Alper, et al. “Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-Temporal Spike Patterns in Massively Parallel Spike Trains.” <i>Lecture Notes in Computer Science</i>, Springer International Publishing, 2016, doi:<a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">10.1007/978-3-319-40985-6_1</a>."},"place":"Cham","year":"2016","date_created":"2025-08-06T15:03:16Z","author":[{"first_name":"Alper","id":"117951","full_name":"Yegenoglu, Alper","orcid":"0000-0001-8869-215X","last_name":"Yegenoglu"},{"full_name":"Quaglio, Pietro","last_name":"Quaglio","first_name":"Pietro"},{"first_name":"Emiliano","full_name":"Torre, Emiliano","last_name":"Torre"},{"last_name":"Grün","full_name":"Grün, Sonja","first_name":"Sonja"},{"first_name":"Dominik","last_name":"Endres","full_name":"Endres, Dominik"}],"publisher":"Springer International Publishing","date_updated":"2025-08-08T11:38:15Z","doi":"10.1007/978-3-319-40985-6_1","title":"Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains"},{"department":[{"_id":"558"}],"user_id":"66268","_id":"2921","extern":"1","publication":"Lecture Notes in Computer Science","type":"book_chapter","status":"public","author":[{"first_name":"Olivier","last_name":"Blazy","full_name":"Blazy, Olivier"},{"first_name":"Saqib","last_name":"Kakvi","id":"66268","full_name":"Kakvi, Saqib"},{"last_name":"Kiltz","full_name":"Kiltz, Eike","first_name":"Eike"},{"last_name":"Pan","full_name":"Pan, Jiaxin","first_name":"Jiaxin"}],"date_created":"2018-05-25T12:46:08Z","date_updated":"2022-01-06T06:58:47Z","oa":"1","publisher":"Springer Berlin Heidelberg","doi":"10.1007/978-3-662-46447-2_12","main_file_link":[{"url":"https://eprint.iacr.org/2014/1021.pdf","open_access":"1"}],"title":"Tightly-Secure Signatures from Chameleon Hash Functions","publication_identifier":{"isbn":["9783662464465","9783662464472"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"256-279","citation":{"ama":"Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>","chicago":"Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In <i>Lecture Notes in Computer Science</i>, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">https://doi.org/10.1007/978-3-662-46447-2_12</a>.","ieee":"O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from Chameleon Hash Functions,” in <i>Lecture Notes in Computer Science</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.","short":"O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.","mla":"Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.” <i>Lecture Notes in Computer Science</i>, Springer Berlin Heidelberg, 2015, pp. 256–79, doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>.","bibtex":"@inbook{Blazy_Kakvi_Kiltz_Pan_2015, place={Berlin, Heidelberg}, title={Tightly-Secure Signatures from Chameleon Hash Functions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}, year={2015}, pages={256–279} }","apa":"Blazy, O., Kakvi, S., Kiltz, E., &#38; Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In <i>Lecture Notes in Computer Science</i> (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">https://doi.org/10.1007/978-3-662-46447-2_12</a>"},"year":"2015","place":"Berlin, Heidelberg"},{"conference":{"location":"Vienna"},"doi":"10.1007/978-3-319-29883-2_5","title":"AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services","date_created":"2020-02-15T09:40:09Z","author":[{"last_name":"Altmeier","full_name":"Altmeier, Christian","first_name":"Christian"},{"last_name":"Mainka","full_name":"Mainka, Christian","first_name":"Christian"},{"last_name":"Somorovsky","orcid":"0000-0002-3593-7720","id":"83504","full_name":"Somorovsky, Juraj","first_name":"Juraj"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_updated":"2022-01-06T06:52:39Z","citation":{"ama":"Altmeier C, Mainka C, Somorovsky J, Schwenk J. AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In: <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>. Lecture Notes in Computer Science 9481. Cham; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">10.1007/978-3-319-29883-2_5</a>","ieee":"C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services,” in <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>, Cham, 2015.","chicago":"Altmeier, Christian, Christian Mainka, Juraj Somorovsky, and Jörg Schwenk. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” In <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>. Lecture Notes in Computer Science 9481. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">https://doi.org/10.1007/978-3-319-29883-2_5</a>.","apa":"Altmeier, C., Mainka, C., Somorovsky, J., &#38; Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">https://doi.org/10.1007/978-3-319-29883-2_5</a>","mla":"Altmeier, Christian, et al. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">10.1007/978-3-319-29883-2_5</a>.","bibtex":"@inbook{Altmeier_Mainka_Somorovsky_Schwenk_2015, place={Cham}, series={Lecture Notes in Computer Science 9481}, title={AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">10.1007/978-3-319-29883-2_5</a>}, booktitle={Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015}, author={Altmeier, Christian and Mainka, Christian and Somorovsky, Juraj and Schwenk, Jörg}, year={2015}, collection={Lecture Notes in Computer Science 9481} }","short":"C. Altmeier, C. Mainka, J. Somorovsky, J. Schwenk, in: Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015."},"year":"2015","place":"Cham","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319298825","9783319298832"]},"language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science 9481","user_id":"83504","_id":"15897","status":"public","type":"book_chapter","publication":"Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015"},{"citation":{"ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in <i>Computer Security -- ESORICS 2015</i>, Cham, 2015.","chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In <i>Computer Security -- ESORICS 2015</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>.","ama":"Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: <i>Computer Security -- ESORICS 2015</i>. Cham; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>","apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In <i>Computer Security -- ESORICS 2015</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>","mla":"Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer Security -- ESORICS 2015</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>.","bibtex":"@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>}, booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015} }","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015, Cham, 2015."},"year":"2015","place":"Cham","publication_identifier":{"isbn":["9783319241739","9783319241746"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","doi":"10.1007/978-3-319-24174-6_21","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/"}],"title":"Practical Invalid Curve Attacks on TLS-ECDH","date_created":"2020-02-15T09:41:17Z","author":[{"last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"},{"orcid":"0000-0002-3593-7720","last_name":"Somorovsky","full_name":"Somorovsky, Juraj","id":"83504","first_name":"Juraj"}],"date_updated":"2022-01-06T06:52:39Z","status":"public","publication":"Computer Security -- ESORICS 2015","type":"book_chapter","extern":"1","language":[{"iso":"eng"}],"user_id":"83504","_id":"15899"},{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319204239","9783319204246"]},"year":"2015","citation":{"ama":"Böttcher S, Hartel R, Jacobs T, Jeromin M. ECST – Extended Context-Free Straight-Line Tree Grammars. In: <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>. Springer; 2015:186-198. doi:<a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">10.1007/978-3-319-20424-6_18</a>","ieee":"S. Böttcher, R. Hartel, T. Jacobs, and M. Jeromin, “ECST – Extended Context-Free Straight-Line Tree Grammars,” in <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>, 2015, pp. 186–198.","chicago":"Böttcher, Stefan, Rita Hartel, Thomas Jacobs, and Markus Jeromin. “ECST – Extended Context-Free Straight-Line Tree Grammars.” In <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>, 186–98. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">https://doi.org/10.1007/978-3-319-20424-6_18</a>.","apa":"Böttcher, S., Hartel, R., Jacobs, T., &#38; Jeromin, M. (2015). ECST – Extended Context-Free Straight-Line Tree Grammars. In <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i> (pp. 186–198). Springer. <a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">https://doi.org/10.1007/978-3-319-20424-6_18</a>","bibtex":"@inproceedings{Böttcher_Hartel_Jacobs_Jeromin_2015, title={ECST – Extended Context-Free Straight-Line Tree Grammars}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">10.1007/978-3-319-20424-6_18</a>}, booktitle={Data Science - 30th British International Conference on Databases, BICOD 2015}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and Jacobs, Thomas and Jeromin, Markus}, year={2015}, pages={186–198} }","short":"S. Böttcher, R. Hartel, T. Jacobs, M. Jeromin, in: Data Science - 30th British International Conference on Databases, BICOD 2015, Springer, 2015, pp. 186–198.","mla":"Böttcher, Stefan, et al. “ECST – Extended Context-Free Straight-Line Tree Grammars.” <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>, Springer, 2015, pp. 186–98, doi:<a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">10.1007/978-3-319-20424-6_18</a>."},"page":"186-198","publisher":"Springer","date_updated":"2022-01-06T06:52:15Z","date_created":"2019-11-21T15:08:13Z","author":[{"first_name":"Stefan","last_name":"Böttcher","id":"624","full_name":"Böttcher, Stefan"},{"last_name":"Hartel","full_name":"Hartel, Rita","id":"14961","first_name":"Rita"},{"first_name":"Thomas","full_name":"Jacobs, Thomas","last_name":"Jacobs"},{"last_name":"Jeromin","full_name":"Jeromin, Markus","first_name":"Markus"}],"title":"ECST – Extended Context-Free Straight-Line Tree Grammars","doi":"10.1007/978-3-319-20424-6_18","type":"conference","publication":"Data Science - 30th British International Conference on Databases, BICOD 2015","status":"public","_id":"15088","user_id":"14961","department":[{"_id":"69"}],"language":[{"iso":"eng"}]},{"_id":"25338","user_id":"71124","publication":"Modeling and Using Context","type":"book_chapter","status":"public","date_updated":"2022-01-25T18:21:15Z","date_created":"2021-10-04T19:02:33Z","author":[{"full_name":"Geierhos, Michaela","last_name":"Geierhos","first_name":"Michaela"},{"first_name":"Frederik S.","last_name":"Bäumer","full_name":"Bäumer, Frederik S."},{"full_name":"Schulze, Sabine","last_name":"Schulze","first_name":"Sabine"},{"last_name":"Klotz","full_name":"Klotz, Caterina","first_name":"Caterina"}],"title":"Understanding the Patient 2.0","doi":"10.1007/978-3-319-25591-0_12","publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","place":"Cham","year":"2015","citation":{"apa":"Geierhos, M., Bäumer, F. S., Schulze, S., &#38; Klotz, C. (2015). Understanding the Patient 2.0. In <i>Modeling and Using Context</i>. <a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">https://doi.org/10.1007/978-3-319-25591-0_12</a>","mla":"Geierhos, Michaela, et al. “Understanding the Patient 2.0.” <i>Modeling and Using Context</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>.","bibtex":"@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding the Patient 2.0}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>}, booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer, Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }","short":"M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context, Cham, 2015.","chicago":"Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz. “Understanding the Patient 2.0.” In <i>Modeling and Using Context</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">https://doi.org/10.1007/978-3-319-25591-0_12</a>.","ieee":"M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient 2.0,” in <i>Modeling and Using Context</i>, Cham, 2015.","ama":"Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0. In: <i>Modeling and Using Context</i>. ; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>"}}]
