[{"date_updated":"2022-01-25T18:21:13Z","author":[{"full_name":"Geierhos, Michaela","last_name":"Geierhos","first_name":"Michaela"},{"last_name":"Bäumer","full_name":"Bäumer, Frederik S.","first_name":"Frederik S."},{"first_name":"Sabine","last_name":"Schulze","full_name":"Schulze, Sabine"},{"last_name":"Klotz","full_name":"Klotz, Caterina","first_name":"Caterina"}],"date_created":"2021-10-04T18:59:54Z","title":"Understanding the Patient 2.0","doi":"10.1007/978-3-319-25591-0_12","publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2015","place":"Cham","citation":{"apa":"Geierhos, M., Bäumer, F. S., Schulze, S., &#38; Klotz, C. (2015). Understanding the Patient 2.0. In <i>Modeling and Using Context</i>. <a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">https://doi.org/10.1007/978-3-319-25591-0_12</a>","short":"M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context, Cham, 2015.","bibtex":"@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding the Patient 2.0}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>}, booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer, Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }","mla":"Geierhos, Michaela, et al. “Understanding the Patient 2.0.” <i>Modeling and Using Context</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>.","chicago":"Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz. “Understanding the Patient 2.0.” In <i>Modeling and Using Context</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">https://doi.org/10.1007/978-3-319-25591-0_12</a>.","ieee":"M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient 2.0,” in <i>Modeling and Using Context</i>, Cham, 2015.","ama":"Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0. In: <i>Modeling and Using Context</i>. ; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>"},"_id":"25337","user_id":"71124","publication":"Modeling and Using Context","type":"book_chapter","status":"public"},{"citation":{"bibtex":"@inproceedings{Hamann_Valentini_2014, place={Cham}, title={Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">10.1007/978-3-319-09952-1_15</a>}, booktitle={Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)}, author={Hamann, Heiko and Valentini, Gabriele}, year={2014} }","mla":"Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-Organizing Temporary Lock-Ins.” <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">10.1007/978-3-319-09952-1_15</a>.","short":"H. Hamann, G. Valentini, in: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014), Cham, 2014.","apa":"Hamann, H., &#38; Valentini, G. (2014). Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins. In <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">https://doi.org/10.1007/978-3-319-09952-1_15</a>","chicago":"Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-Organizing Temporary Lock-Ins.” In <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">https://doi.org/10.1007/978-3-319-09952-1_15</a>.","ieee":"H. Hamann and G. Valentini, “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins,” in <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>, 2014.","ama":"Hamann H, Valentini G. Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins. In: <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">10.1007/978-3-319-09952-1_15</a>"},"place":"Cham","year":"2014","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319099514","9783319099521"]},"publication_status":"published","doi":"10.1007/978-3-319-09952-1_15","title":"Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins","date_created":"2020-10-15T14:13:51Z","author":[{"last_name":"Hamann","full_name":"Hamann, Heiko","first_name":"Heiko"},{"full_name":"Valentini, Gabriele","last_name":"Valentini","first_name":"Gabriele"}],"date_updated":"2022-01-06T06:54:18Z","status":"public","publication":"Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","_id":"20008"},{"type":"book_chapter","publication":"Software Architecture","abstract":[{"lang":"eng","text":"Real-time software-intensive embedded systems complexity, as in the automotive domain, requires rigorous Requirements Engineering (RE) approaches. Scenario-based RE formalisms like Modal Sequence Diagrams (MSDs) enable an intuitive specication and the simulative validation of functional requirements. However, the dependencies between events occurring in different MSD scenarios are implicit so that it is difficult to find causes of requirements defects, if any. The automotive architecture description language EAST-ADL addresses this problem by relying on event chains, which make dependencies between events explicit. However, EAST-ADL event chains have a low abstraction level, and their relationship to functional requirements has seldom been investigated. Based on the EAST-ADL functional architecture, we propose to use its central notion of event to conciliate both approaches. We conceived an automatic transformation from the high abstraction level requirements specified in MSDs to the low abstraction level event chains.\r\n"}],"status":"public","_id":"20982","user_id":"13616","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"isbn":["9783319099699","9783319099705"],"issn":["0302-9743","1611-3349"]},"year":"2014","place":"Cham","citation":{"bibtex":"@inbook{Koch_Holtmann_DeAntoni_2014, place={Cham}, title={Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>}, booktitle={Software Architecture}, author={Koch, Thorsten and Holtmann, Jörg and DeAntoni, Julien}, year={2014} }","short":"T. Koch, J. Holtmann, J. DeAntoni, in: Software Architecture, Cham, 2014.","mla":"Koch, Thorsten, et al. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” <i>Software Architecture</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>.","apa":"Koch, T., Holtmann, J., &#38; DeAntoni, J. (2014). Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In <i>Software Architecture</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">https://doi.org/10.1007/978-3-319-09970-5_14</a>","ama":"Koch T, Holtmann J, DeAntoni J. Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In: <i>Software Architecture</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>","ieee":"T. Koch, J. Holtmann, and J. DeAntoni, “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications,” in <i>Software Architecture</i>, Cham, 2014.","chicago":"Koch, Thorsten, Jörg Holtmann, and Julien DeAntoni. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” In <i>Software Architecture</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">https://doi.org/10.1007/978-3-319-09970-5_14</a>."},"date_updated":"2022-01-06T06:54:42Z","date_created":"2021-01-13T13:34:35Z","author":[{"first_name":"Thorsten","full_name":"Koch, Thorsten","id":"13616","last_name":"Koch"},{"first_name":"Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571","id":"3875","full_name":"Holtmann, Jörg"},{"first_name":"Julien","last_name":"DeAntoni","full_name":"DeAntoni, Julien"}],"title":"Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications","doi":"10.1007/978-3-319-09970-5_14"},{"type":"conference","publication":"12th International Conference on Business Process Management (BPM 2014)","status":"public","_id":"6741","series_title":"Lecture Notes in Computer Science","user_id":"11308","department":[{"_id":"66"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"isbn":["9783319101712","9783319101729"],"issn":["0302-9743","1611-3349"]},"year":"2014","citation":{"chicago":"Bokermann, Dennis, Christian Gerth, and Gregor Engels. “Use Your Best Device! Enabling Device Changes at Runtime.” In <i>12th International Conference on Business Process Management (BPM 2014)</i>, 8659:357–65. Lecture Notes in Computer Science. Springer International Publishing, 2014. <a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">https://doi.org/10.1007/978-3-319-10172-9_23</a>.","ieee":"D. Bokermann, C. Gerth, and G. Engels, “Use Your Best Device! Enabling Device Changes at Runtime,” in <i>12th International Conference on Business Process Management (BPM 2014)</i>, 2014, vol. 8659, pp. 357–365.","ama":"Bokermann D, Gerth C, Engels G. Use Your Best Device! Enabling Device Changes at Runtime. In: <i>12th International Conference on Business Process Management (BPM 2014)</i>. Vol 8659. Lecture Notes in Computer Science. Springer International Publishing; 2014:357-365. doi:<a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">10.1007/978-3-319-10172-9_23</a>","mla":"Bokermann, Dennis, et al. “Use Your Best Device! Enabling Device Changes at Runtime.” <i>12th International Conference on Business Process Management (BPM 2014)</i>, vol. 8659, Springer International Publishing, 2014, pp. 357–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">10.1007/978-3-319-10172-9_23</a>.","bibtex":"@inproceedings{Bokermann_Gerth_Engels_2014, series={Lecture Notes in Computer Science}, title={Use Your Best Device! Enabling Device Changes at Runtime}, volume={8659}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">10.1007/978-3-319-10172-9_23</a>}, booktitle={12th International Conference on Business Process Management (BPM 2014)}, publisher={Springer International Publishing}, author={Bokermann, Dennis and Gerth, Christian and Engels, Gregor}, year={2014}, pages={357–365}, collection={Lecture Notes in Computer Science} }","short":"D. Bokermann, C. Gerth, G. Engels, in: 12th International Conference on Business Process Management (BPM 2014), Springer International Publishing, 2014, pp. 357–365.","apa":"Bokermann, D., Gerth, C., &#38; Engels, G. (2014). Use Your Best Device! Enabling Device Changes at Runtime. In <i>12th International Conference on Business Process Management (BPM 2014)</i> (Vol. 8659, pp. 357–365). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">https://doi.org/10.1007/978-3-319-10172-9_23</a>"},"intvolume":"      8659","page":"357-365","publisher":"Springer International Publishing","date_updated":"2022-01-06T07:03:17Z","author":[{"first_name":"Dennis","full_name":"Bokermann, Dennis","id":"11308","last_name":"Bokermann"},{"last_name":"Gerth","full_name":"Gerth, Christian","first_name":"Christian"},{"first_name":"Gregor","last_name":"Engels","full_name":"Engels, Gregor","id":"107"}],"date_created":"2019-01-15T14:49:31Z","volume":8659,"title":"Use Your Best Device! Enabling Device Changes at Runtime","doi":"10.1007/978-3-319-10172-9_23"},{"editor":[{"first_name":"Paola","last_name":"Flocchini","full_name":"Flocchini, Paola"},{"first_name":"Jie","last_name":"Gao","full_name":"Gao, Jie"},{"first_name":"Evangelos","full_name":"Kranakis, Evangelos","last_name":"Kranakis"},{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","first_name":"Friedhelm"}],"status":"public","type":"book_editor","language":[{"iso":"eng"}],"_id":"16870","user_id":"15415","series_title":"Lecture Notes in Computer Science","department":[{"_id":"63"}],"year":"2014","place":"Berlin, Heidelberg","citation":{"apa":"Flocchini, P., Gao, J., Kranakis, E., &#38; Meyer auf der Heide, F. (Eds.). (2014). <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i> (Vol. 8243). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-642-45346-5\">https://doi.org/10.1007/978-3-642-45346-5</a>","mla":"Flocchini, Paola, et al., editors. <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i>. Vol. 8243, Springer, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-642-45346-5\">10.1007/978-3-642-45346-5</a>.","bibtex":"@book{Flocchini_Gao_Kranakis_Meyer auf der Heide_2014, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013}, volume={8243}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-45346-5\">10.1007/978-3-642-45346-5</a>}, publisher={Springer}, year={2014}, collection={Lecture Notes in Computer Science} }","short":"P. Flocchini, J. Gao, E. Kranakis, F. Meyer auf der Heide, eds., Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Springer, Berlin, Heidelberg, 2014.","ieee":"P. Flocchini, J. Gao, E. Kranakis, and F. Meyer auf der Heide, Eds., <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i>, vol. 8243. Berlin, Heidelberg: Springer, 2014.","chicago":"Flocchini, Paola, Jie Gao, Evangelos Kranakis, and Friedhelm Meyer auf der Heide, eds. <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i>. Vol. 8243. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-642-45346-5\">https://doi.org/10.1007/978-3-642-45346-5</a>.","ama":"Flocchini P, Gao J, Kranakis E, Meyer auf der Heide F, eds. <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i>. Vol 8243. Berlin, Heidelberg: Springer; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-642-45346-5\">10.1007/978-3-642-45346-5</a>"},"intvolume":"      8243","publication_status":"published","publication_identifier":{"isbn":["9783642453458","9783642453465"],"issn":["0302-9743","1611-3349"]},"title":"Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013","doi":"10.1007/978-3-642-45346-5","date_updated":"2022-01-06T06:52:58Z","publisher":"Springer","date_created":"2020-04-27T10:31:57Z","volume":8243},{"publication":"Database and Expert Systems Applications - 25th International Conference, DEXA 2014","type":"conference","status":"public","department":[{"_id":"69"}],"user_id":"14961","_id":"15092","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319100722","9783319100739"]},"publication_status":"published","page":"122-137","citation":{"mla":"Böttcher, Stefan, et al. “Efficient XML Keyword Search Based on DAG-Compression.” <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i>, Springer, 2014, pp. 122–37, doi:<a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">10.1007/978-3-319-10073-9_11</a>.","short":"S. Böttcher, R. Hartel, J. Rabe, in: Database and Expert Systems Applications - 25th International Conference, DEXA 2014, Springer, Cham, 2014, pp. 122–137.","bibtex":"@inproceedings{Böttcher_Hartel_Rabe_2014, place={Cham}, title={Efficient XML Keyword Search Based on DAG-Compression}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">10.1007/978-3-319-10073-9_11</a>}, booktitle={Database and Expert Systems Applications - 25th International Conference, DEXA 2014}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and Rabe, Jonathan}, year={2014}, pages={122–137} }","apa":"Böttcher, S., Hartel, R., &#38; Rabe, J. (2014). Efficient XML Keyword Search Based on DAG-Compression. In <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i> (pp. 122–137). Cham: Springer. <a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">https://doi.org/10.1007/978-3-319-10073-9_11</a>","ieee":"S. Böttcher, R. Hartel, and J. Rabe, “Efficient XML Keyword Search Based on DAG-Compression,” in <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i>, 2014, pp. 122–137.","chicago":"Böttcher, Stefan, Rita Hartel, and Jonathan Rabe. “Efficient XML Keyword Search Based on DAG-Compression.” In <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i>, 122–37. Cham: Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">https://doi.org/10.1007/978-3-319-10073-9_11</a>.","ama":"Böttcher S, Hartel R, Rabe J. Efficient XML Keyword Search Based on DAG-Compression. In: <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i>. Cham: Springer; 2014:122-137. doi:<a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">10.1007/978-3-319-10073-9_11</a>"},"year":"2014","place":"Cham","author":[{"first_name":"Stefan","last_name":"Böttcher","full_name":"Böttcher, Stefan","id":"624"},{"first_name":"Rita","last_name":"Hartel","full_name":"Hartel, Rita","id":"14961"},{"last_name":"Rabe","full_name":"Rabe, Jonathan","first_name":"Jonathan"}],"date_created":"2019-11-21T15:19:02Z","date_updated":"2022-01-06T06:52:15Z","publisher":"Springer","doi":"10.1007/978-3-319-10073-9_11","title":"Efficient XML Keyword Search Based on DAG-Compression"},{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319144719","9783319144726"]},"place":"Cham","year":"2014","citation":{"chicago":"Lukovszki, Tamás, and Friedhelm Meyer auf der Heide. “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots.” In <i>Lecture Notes in Computer Science</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">https://doi.org/10.1007/978-3-319-14472-6_17</a>.","ieee":"T. Lukovszki and F. Meyer auf der Heide, “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots,” in <i>Lecture Notes in Computer Science</i>, Cham, 2014.","ama":"Lukovszki T, Meyer auf der Heide F. Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots. In: <i>Lecture Notes in Computer Science</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">10.1007/978-3-319-14472-6_17</a>","bibtex":"@inbook{Lukovszki_Meyer auf der Heide_2014, place={Cham}, title={Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">10.1007/978-3-319-14472-6_17</a>}, booktitle={Lecture Notes in Computer Science}, author={Lukovszki, Tamás and Meyer auf der Heide, Friedhelm}, year={2014} }","short":"T. Lukovszki, F. Meyer auf der Heide, in: Lecture Notes in Computer Science, Cham, 2014.","mla":"Lukovszki, Tamás, and Friedhelm Meyer auf der Heide. “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots.” <i>Lecture Notes in Computer Science</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">10.1007/978-3-319-14472-6_17</a>.","apa":"Lukovszki, T., &#38; Meyer auf der Heide, F. (2014). Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots. In <i>Lecture Notes in Computer Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">https://doi.org/10.1007/978-3-319-14472-6_17</a>"},"date_updated":"2022-01-06T06:52:50Z","date_created":"2020-04-03T07:58:53Z","author":[{"last_name":"Lukovszki","full_name":"Lukovszki, Tamás","first_name":"Tamás"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"title":"Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots","doi":"10.1007/978-3-319-14472-6_17","type":"book_chapter","publication":"Lecture Notes in Computer Science","status":"public","_id":"16394","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}]},{"doi":"10.1007/978-3-319-09620-9_16","title":"Continuous Aggregation in Dynamic Ad-Hoc Networks","author":[{"full_name":"Abshoff, Sebastian","last_name":"Abshoff","first_name":"Sebastian"},{"last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"}],"date_created":"2020-04-03T09:00:16Z","date_updated":"2022-01-06T06:52:50Z","citation":{"apa":"Abshoff, S., &#38; Meyer auf der Heide, F. (2014). Continuous Aggregation in Dynamic Ad-Hoc Networks. In <i>Structural Information and Communication Complexity</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">https://doi.org/10.1007/978-3-319-09620-9_16</a>","bibtex":"@inbook{Abshoff_Meyer auf der Heide_2014, place={Cham}, title={Continuous Aggregation in Dynamic Ad-Hoc Networks}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">10.1007/978-3-319-09620-9_16</a>}, booktitle={Structural Information and Communication Complexity}, author={Abshoff, Sebastian and Meyer auf der Heide, Friedhelm}, year={2014} }","short":"S. Abshoff, F. Meyer auf der Heide, in: Structural Information and Communication Complexity, Cham, 2014.","mla":"Abshoff, Sebastian, and Friedhelm Meyer auf der Heide. “Continuous Aggregation in Dynamic Ad-Hoc Networks.” <i>Structural Information and Communication Complexity</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">10.1007/978-3-319-09620-9_16</a>.","ama":"Abshoff S, Meyer auf der Heide F. Continuous Aggregation in Dynamic Ad-Hoc Networks. In: <i>Structural Information and Communication Complexity</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">10.1007/978-3-319-09620-9_16</a>","chicago":"Abshoff, Sebastian, and Friedhelm Meyer auf der Heide. “Continuous Aggregation in Dynamic Ad-Hoc Networks.” In <i>Structural Information and Communication Complexity</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">https://doi.org/10.1007/978-3-319-09620-9_16</a>.","ieee":"S. Abshoff and F. Meyer auf der Heide, “Continuous Aggregation in Dynamic Ad-Hoc Networks,” in <i>Structural Information and Communication Complexity</i>, Cham, 2014."},"place":"Cham","year":"2014","publication_status":"published","publication_identifier":{"isbn":["9783319096193","9783319096209"],"issn":["0302-9743","1611-3349"]},"language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"}],"_id":"16395","status":"public","type":"book_chapter","publication":"Structural Information and Communication Complexity"},{"date_created":"2023-10-06T16:08:23Z","author":[{"full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné","first_name":"Marcel"},{"full_name":"Stegemann, Kevin","last_name":"Stegemann","first_name":"Kevin"},{"first_name":"Dominique","full_name":"Petersen, Dominique","last_name":"Petersen"},{"last_name":"Pohlmann","full_name":"Pohlmann, Norbert","first_name":"Norbert"}],"publisher":"Springer Berlin Heidelberg","date_updated":"2023-10-06T16:22:35Z","doi":"10.1007/978-3-642-55032-4_49","title":"Aggregation of Network Protocol Data Near Its Source","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642550317","9783642550324"]},"publication_status":"published","citation":{"chicago":"Fourné, Marcel, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann. “Aggregation of Network Protocol Data Near Its Source.” In <i>Information and Communication Technology</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. <a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">https://doi.org/10.1007/978-3-642-55032-4_49</a>.","ieee":"M. Fourné, K. Stegemann, D. Petersen, and N. Pohlmann, “Aggregation of Network Protocol Data Near Its Source,” in <i>Information and Communication Technology</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.","ama":"Fourné M, Stegemann K, Petersen D, Pohlmann N. Aggregation of Network Protocol Data Near Its Source. In: <i>Information and Communication Technology</i>. Springer Berlin Heidelberg; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>","short":"M. Fourné, K. Stegemann, D. Petersen, N. Pohlmann, in: Information and Communication Technology, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.","bibtex":"@inbook{Fourné_Stegemann_Petersen_Pohlmann_2014, place={Berlin, Heidelberg}, title={Aggregation of Network Protocol Data Near Its Source}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>}, booktitle={Information and Communication Technology}, publisher={Springer Berlin Heidelberg}, author={Fourné, Marcel and Stegemann, Kevin and Petersen, Dominique and Pohlmann, Norbert}, year={2014} }","mla":"Fourné, Marcel, et al. “Aggregation of Network Protocol Data Near Its Source.” <i>Information and Communication Technology</i>, Springer Berlin Heidelberg, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>.","apa":"Fourné, M., Stegemann, K., Petersen, D., &#38; Pohlmann, N. (2014). Aggregation of Network Protocol Data Near Its Source. In <i>Information and Communication Technology</i>. Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">https://doi.org/10.1007/978-3-642-55032-4_49</a>"},"place":"Berlin, Heidelberg","year":"2014","user_id":"99291","_id":"47839","extern":"1","language":[{"iso":"eng"}],"publication":"Information and Communication Technology","type":"book_chapter","status":"public"},{"publication":"Constructive Side-Channel Analysis and Secure Design","type":"book_chapter","status":"public","_id":"2979","department":[{"_id":"64"}],"user_id":"25078","publication_identifier":{"isbn":["9783642400254","9783642400261"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2013","place":"Berlin, Heidelberg","page":"154-168","citation":{"apa":"Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>","mla":"Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.” <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg, 2013, pp. 154–68, doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>.","short":"J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.","bibtex":"@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>}, booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2013}, pages={154–168} }","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>.","ieee":"J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.","ama":"Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>"},"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:49Z","date_created":"2018-06-05T07:33:22Z","author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"full_name":"Liske, Gennadij","last_name":"Liske","first_name":"Gennadij"}],"title":"Improved Side Channel Attacks on Pairing Based Cryptography","doi":"10.1007/978-3-642-40026-1_10"},{"status":"public","type":"book_chapter","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"user_id":"30457","series_title":"Lecture Notes in Computer Science","_id":"6276","intvolume":"      8028","page":"32-41","citation":{"apa":"Klompmaker, F., Paelke, V., &#38; Fischer, H. G. (2013). A Taxonomy-Based Approach towards NUI Interaction Design. In <i>Distributed, Ambient, and Pervasive Interactions</i> (Vol. 8028, pp. 32–41). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">https://doi.org/10.1007/978-3-642-39351-8_4</a>","short":"F. Klompmaker, V. Paelke, H.G. Fischer, in: Distributed, Ambient, and Pervasive Interactions, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 32–41.","mla":"Klompmaker, Florian, et al. “A Taxonomy-Based Approach towards NUI Interaction Design.” <i>Distributed, Ambient, and Pervasive Interactions</i>, vol. 8028, Springer Berlin Heidelberg, 2013, pp. 32–41, doi:<a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">10.1007/978-3-642-39351-8_4</a>.","bibtex":"@inbook{Klompmaker_Paelke_Fischer_2013, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={A Taxonomy-Based Approach towards NUI Interaction Design}, volume={8028}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">10.1007/978-3-642-39351-8_4</a>}, booktitle={Distributed, Ambient, and Pervasive Interactions}, publisher={Springer Berlin Heidelberg}, author={Klompmaker, Florian and Paelke, Volker and Fischer, Holger Gerhard}, year={2013}, pages={32–41}, collection={Lecture Notes in Computer Science} }","ama":"Klompmaker F, Paelke V, Fischer HG. A Taxonomy-Based Approach towards NUI Interaction Design. In: <i>Distributed, Ambient, and Pervasive Interactions</i>. Vol 8028. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:32-41. doi:<a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">10.1007/978-3-642-39351-8_4</a>","ieee":"F. Klompmaker, V. Paelke, and H. G. Fischer, “A Taxonomy-Based Approach towards NUI Interaction Design,” in <i>Distributed, Ambient, and Pervasive Interactions</i>, vol. 8028, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 32–41.","chicago":"Klompmaker, Florian, Volker Paelke, and Holger Gerhard Fischer. “A Taxonomy-Based Approach towards NUI Interaction Design.” In <i>Distributed, Ambient, and Pervasive Interactions</i>, 8028:32–41. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">https://doi.org/10.1007/978-3-642-39351-8_4</a>."},"place":"Berlin, Heidelberg","publication_identifier":{"isbn":["9783642393501","9783642393518"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","conference":{"end_date":"2013-07-26","location":"Las Vegas, USA","name":"International Conference on Distributed, Ambient, and Pervasive Interactions (DAPI) as part of HCI International 2013","start_date":"2013-07-21"},"doi":"10.1007/978-3-642-39351-8_4","volume":8028,"author":[{"first_name":"Florian","last_name":"Klompmaker","full_name":"Klompmaker, Florian"},{"last_name":"Paelke","full_name":"Paelke, Volker","first_name":"Volker"},{"last_name":"Fischer","full_name":"Fischer, Holger Gerhard","id":"30457","first_name":"Holger Gerhard"}],"date_updated":"2022-01-06T07:02:59Z","publication":"Distributed, Ambient, and Pervasive Interactions","language":[{"iso":"eng"}],"year":"2013","title":"A Taxonomy-Based Approach towards NUI Interaction Design","date_created":"2018-12-18T12:42:33Z","publisher":"Springer Berlin Heidelberg"},{"language":[{"iso":"eng"}],"publication":"Design, User Experience, and Usability. Design Philosophy, Methods, and Tools","date_created":"2018-12-18T12:44:48Z","publisher":"Springer Berlin Heidelberg","title":"Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design","year":"2013","user_id":"30457","series_title":"Lecture Notes in Computer Science","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"_id":"6279","type":"book_chapter","status":"public","author":[{"first_name":"Holger Gerhard","last_name":"Fischer","id":"30457","full_name":"Fischer, Holger Gerhard"},{"first_name":"Benjamin","full_name":"Strenge, Benjamin","last_name":"Strenge"},{"first_name":"Karsten","last_name":"Nebe","full_name":"Nebe, Karsten"}],"volume":8012,"date_updated":"2022-01-06T07:02:59Z","conference":{"start_date":"2013-07-21","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2013","location":"Las Vegas, USA","end_date":"2013-07-26"},"doi":"10.1007/978-3-642-39229-0_28","publication_status":"published","publication_identifier":{"isbn":["9783642392283","9783642392290"],"issn":["0302-9743","1611-3349"]},"citation":{"ieee":"H. G. Fischer, B. Strenge, and K. Nebe, “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design,” in <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i>, vol. 8012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 252–261.","chicago":"Fischer, Holger Gerhard, Benjamin Strenge, and Karsten Nebe. “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design.” In <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i>, 8012:252–61. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">https://doi.org/10.1007/978-3-642-39229-0_28</a>.","ama":"Fischer HG, Strenge B, Nebe K. Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. In: <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i>. Vol 8012. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:252-261. doi:<a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">10.1007/978-3-642-39229-0_28</a>","mla":"Fischer, Holger Gerhard, et al. “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design.” <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i>, vol. 8012, Springer Berlin Heidelberg, 2013, pp. 252–61, doi:<a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">10.1007/978-3-642-39229-0_28</a>.","short":"H.G. Fischer, B. Strenge, K. Nebe, in: Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 252–261.","bibtex":"@inbook{Fischer_Strenge_Nebe_2013, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design}, volume={8012}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">10.1007/978-3-642-39229-0_28</a>}, booktitle={Design, User Experience, and Usability. Design Philosophy, Methods, and Tools}, publisher={Springer Berlin Heidelberg}, author={Fischer, Holger Gerhard and Strenge, Benjamin and Nebe, Karsten}, year={2013}, pages={252–261}, collection={Lecture Notes in Computer Science} }","apa":"Fischer, H. G., Strenge, B., &#38; Nebe, K. (2013). Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. In <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i> (Vol. 8012, pp. 252–261). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">https://doi.org/10.1007/978-3-642-39229-0_28</a>"},"intvolume":"      8012","page":"252-261","place":"Berlin, Heidelberg"},{"_id":"6732","user_id":"58843","department":[{"_id":"66"}],"extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013","status":"public","date_updated":"2022-01-06T07:03:17Z","publisher":"Springer Berlin Heidelberg","date_created":"2019-01-15T10:23:36Z","author":[{"first_name":"Thomas","last_name":"Place","full_name":"Place, Thomas"},{"last_name":"van Rooijen","full_name":"van Rooijen, Lorijn","id":"58843","first_name":"Lorijn"},{"first_name":"Marc","last_name":"Zeitoun","full_name":"Zeitoun, Marc"}],"title":"Separating Regular Languages by Piecewise Testable and Unambiguous Languages","doi":"10.1007/978-3-642-40313-2_64","publication_status":"published","publication_identifier":{"isbn":["9783642403125","9783642403132"],"issn":["0302-9743","1611-3349"]},"year":"2013","place":"Berlin, Heidelberg","citation":{"apa":"Place, T., van Rooijen, L., &#38; Zeitoun, M. (2013). Separating Regular Languages by Piecewise Testable and Unambiguous Languages. In <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i> (pp. 729–740). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">https://doi.org/10.1007/978-3-642-40313-2_64</a>","mla":"Place, Thomas, et al. “Separating Regular Languages by Piecewise Testable and Unambiguous Languages.” <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i>, Springer Berlin Heidelberg, 2013, pp. 729–40, doi:<a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">10.1007/978-3-642-40313-2_64</a>.","short":"T. Place, L. van Rooijen, M. Zeitoun, in: Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 729–740.","bibtex":"@inproceedings{Place_van Rooijen_Zeitoun_2013, place={Berlin, Heidelberg}, title={Separating Regular Languages by Piecewise Testable and Unambiguous Languages}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">10.1007/978-3-642-40313-2_64</a>}, booktitle={Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013}, publisher={Springer Berlin Heidelberg}, author={Place, Thomas and van Rooijen, Lorijn and Zeitoun, Marc}, year={2013}, pages={729–740} }","ieee":"T. Place, L. van Rooijen, and M. Zeitoun, “Separating Regular Languages by Piecewise Testable and Unambiguous Languages,” in <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i>, 2013, pp. 729–740.","chicago":"Place, Thomas, Lorijn van Rooijen, and Marc Zeitoun. “Separating Regular Languages by Piecewise Testable and Unambiguous Languages.” In <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i>, 729–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">https://doi.org/10.1007/978-3-642-40313-2_64</a>.","ama":"Place T, van Rooijen L, Zeitoun M. Separating Regular Languages by Piecewise Testable and Unambiguous Languages. In: <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:729-740. doi:<a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">10.1007/978-3-642-40313-2_64</a>"},"page":"729-740"},{"language":[{"iso":"eng"}],"user_id":"14961","department":[{"_id":"69"}],"_id":"15093","status":"public","type":"conference","publication":"Big Data - 29th British National Conference on Databases, BNCOD 2013,","doi":"10.1007/978-3-642-39467-6_15","title":"Fast Multi-update Operations on Compressed XML Data","date_created":"2019-11-21T15:19:46Z","author":[{"first_name":"Stefan","last_name":"Böttcher","full_name":"Böttcher, Stefan","id":"624"},{"last_name":"Hartel","full_name":"Hartel, Rita","id":"14961","first_name":"Rita"},{"last_name":"Jacobs","full_name":"Jacobs, Thomas","first_name":"Thomas"}],"date_updated":"2022-01-06T06:52:15Z","publisher":"Springer","citation":{"chicago":"Böttcher, Stefan, Rita Hartel, and Thomas Jacobs. “Fast Multi-Update Operations on Compressed XML Data.” In <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i> 149–64. Berlin, Heidelberg: Springer, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">https://doi.org/10.1007/978-3-642-39467-6_15</a>.","ieee":"S. Böttcher, R. Hartel, and T. Jacobs, “Fast Multi-update Operations on Compressed XML Data,” in <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i> 2013, pp. 149–164.","ama":"Böttcher S, Hartel R, Jacobs T. Fast Multi-update Operations on Compressed XML Data. In: <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i>. Berlin, Heidelberg: Springer; 2013:149-164. doi:<a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">10.1007/978-3-642-39467-6_15</a>","apa":"Böttcher, S., Hartel, R., &#38; Jacobs, T. (2013). Fast Multi-update Operations on Compressed XML Data. In <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i> (pp. 149–164). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">https://doi.org/10.1007/978-3-642-39467-6_15</a>","mla":"Böttcher, Stefan, et al. “Fast Multi-Update Operations on Compressed XML Data.” <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i> Springer, 2013, pp. 149–64, doi:<a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">10.1007/978-3-642-39467-6_15</a>.","short":"S. Böttcher, R. Hartel, T. Jacobs, in: Big Data - 29th British National Conference on Databases, BNCOD 2013, Springer, Berlin, Heidelberg, 2013, pp. 149–164.","bibtex":"@inproceedings{Böttcher_Hartel_Jacobs_2013, place={Berlin, Heidelberg}, title={Fast Multi-update Operations on Compressed XML Data}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">10.1007/978-3-642-39467-6_15</a>}, booktitle={Big Data - 29th British National Conference on Databases, BNCOD 2013,}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and Jacobs, Thomas}, year={2013}, pages={149–164} }"},"page":"149-164","year":"2013","place":"Berlin, Heidelberg","publication_status":"published","publication_identifier":{"isbn":["9783642394669","9783642394676"],"issn":["0302-9743","1611-3349"]}},{"type":"book_chapter","publication":"Advances in Visual Computing","abstract":[{"lang":"eng","text":"In order to evaluate the efficiency of algorithms for real-time 3D rendering, different properties like rendering time, occluded triangles, or image quality, need to be investigated. Since these properties depend on the position of the camera, usually some camera path is chosen, along which the measurements are performed. As those measurements cover only a small part of the scene, this approach hardly allows drawing conclusions regarding the algorithm's properties at arbitrary positions in the scene. The presented method allows the systematic and position-independent evaluation of rendering algorithms. It uses an adaptive sampling approach to approximate the distribution of a property (like rendering time) for all positions in the scene. This approximation can be visualized to produce an intuitive impression of the algorithm's behavior or be statistically analyzed for objectively rating and comparing algorithms. We demonstrate our method by evaluating performance aspects of a known occlusion culling algorithm.\r\n"}],"status":"public","_id":"16406","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"isbn":["9783642419133","9783642419140"],"issn":["0302-9743","1611-3349"]},"place":"Berlin, Heidelberg","year":"2013","citation":{"mla":"Jähn, Claudius, et al. “Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties.” <i>Advances in Visual Computing</i>, 2013, doi:<a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">10.1007/978-3-642-41914-0_12</a>.","bibtex":"@inbook{Jähn_Eikel_Fischer_Petring_Meyer auf der Heide_2013, place={Berlin, Heidelberg}, title={Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">10.1007/978-3-642-41914-0_12</a>}, booktitle={Advances in Visual Computing}, author={Jähn, Claudius and Eikel, Benjamin and Fischer, Matthias and Petring, Ralf and Meyer auf der Heide, Friedhelm}, year={2013} }","short":"C. Jähn, B. Eikel, M. Fischer, R. Petring, F. Meyer auf der Heide, in: Advances in Visual Computing, Berlin, Heidelberg, 2013.","apa":"Jähn, C., Eikel, B., Fischer, M., Petring, R., &#38; Meyer auf der Heide, F. (2013). Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties. In <i>Advances in Visual Computing</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">https://doi.org/10.1007/978-3-642-41914-0_12</a>","ieee":"C. Jähn, B. Eikel, M. Fischer, R. Petring, and F. Meyer auf der Heide, “Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties,” in <i>Advances in Visual Computing</i>, Berlin, Heidelberg, 2013.","chicago":"Jähn, Claudius, Benjamin Eikel, Matthias Fischer, Ralf Petring, and Friedhelm Meyer auf der Heide. “Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties.” In <i>Advances in Visual Computing</i>. Berlin, Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">https://doi.org/10.1007/978-3-642-41914-0_12</a>.","ama":"Jähn C, Eikel B, Fischer M, Petring R, Meyer auf der Heide F. Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties. In: <i>Advances in Visual Computing</i>. Berlin, Heidelberg; 2013. doi:<a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">10.1007/978-3-642-41914-0_12</a>"},"date_updated":"2022-01-06T06:52:50Z","date_created":"2020-04-06T07:21:55Z","author":[{"full_name":"Jähn, Claudius","last_name":"Jähn","first_name":"Claudius"},{"first_name":"Benjamin","full_name":"Eikel, Benjamin","last_name":"Eikel"},{"first_name":"Matthias","full_name":"Fischer, Matthias","id":"146","last_name":"Fischer"},{"first_name":"Ralf","last_name":"Petring","full_name":"Petring, Ralf"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"title":"Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties","doi":"10.1007/978-3-642-41914-0_12"},{"_id":"16407","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"type":"book_chapter","publication":"Advances in Visual Computing","abstract":[{"lang":"eng","text":"Many virtual 3D scenes, especially those that are large, are not structured evenly. For such heterogeneous data, there is no single algorithm that is able to render every scene type at each position fast and with the same high image quality. For a small set of scenes, this situation can be improved if different rendering algorithms are manually assigned to particular parts of the scene by an experienced user. We introduce the Multi-Algorithm-Rendering method. It automatically deploys different rendering algorithms simultaneously for a broad range of scene types. The method divides the scene into subregions and measures the behavior of different algorithms for each region in a preprocessing step. During runtime, this data is utilized to compute an estimate for the quality and running time of the available rendering algorithms from the observer's point of view. By solving an optimizing problem, the image quality can be optimized by an assignment of algorithms to regions while keeping the frame rate almost constant.\r\n"}],"status":"public","date_updated":"2022-01-06T06:52:50Z","author":[{"first_name":"Ralf","last_name":"Petring","full_name":"Petring, Ralf"},{"full_name":"Eikel, Benjamin","last_name":"Eikel","first_name":"Benjamin"},{"first_name":"Claudius","last_name":"Jähn","full_name":"Jähn, Claudius"},{"first_name":"Matthias","full_name":"Fischer, Matthias","id":"146","last_name":"Fischer"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"date_created":"2020-04-06T07:38:52Z","title":"Real-Time 3D Rendering of Heterogeneous Scenes","doi":"10.1007/978-3-642-41914-0_44","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642419133","9783642419140"]},"place":"Berlin, Heidelberg","year":"2013","citation":{"ama":"Petring R, Eikel B, Jähn C, Fischer M, Meyer auf der Heide F. Real-Time 3D Rendering of Heterogeneous Scenes. In: <i>Advances in Visual Computing</i>. Berlin, Heidelberg; 2013. doi:<a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">10.1007/978-3-642-41914-0_44</a>","chicago":"Petring, Ralf, Benjamin Eikel, Claudius Jähn, Matthias Fischer, and Friedhelm Meyer auf der Heide. “Real-Time 3D Rendering of Heterogeneous Scenes.” In <i>Advances in Visual Computing</i>. Berlin, Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">https://doi.org/10.1007/978-3-642-41914-0_44</a>.","ieee":"R. Petring, B. Eikel, C. Jähn, M. Fischer, and F. Meyer auf der Heide, “Real-Time 3D Rendering of Heterogeneous Scenes,” in <i>Advances in Visual Computing</i>, Berlin, Heidelberg, 2013.","short":"R. Petring, B. Eikel, C. Jähn, M. Fischer, F. Meyer auf der Heide, in: Advances in Visual Computing, Berlin, Heidelberg, 2013.","mla":"Petring, Ralf, et al. “Real-Time 3D Rendering of Heterogeneous Scenes.” <i>Advances in Visual Computing</i>, 2013, doi:<a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">10.1007/978-3-642-41914-0_44</a>.","bibtex":"@inbook{Petring_Eikel_Jähn_Fischer_Meyer auf der Heide_2013, place={Berlin, Heidelberg}, title={Real-Time 3D Rendering of Heterogeneous Scenes}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">10.1007/978-3-642-41914-0_44</a>}, booktitle={Advances in Visual Computing}, author={Petring, Ralf and Eikel, Benjamin and Jähn, Claudius and Fischer, Matthias and Meyer auf der Heide, Friedhelm}, year={2013} }","apa":"Petring, R., Eikel, B., Jähn, C., Fischer, M., &#38; Meyer auf der Heide, F. (2013). Real-Time 3D Rendering of Heterogeneous Scenes. In <i>Advances in Visual Computing</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">https://doi.org/10.1007/978-3-642-41914-0_44</a>"}},{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642326493","9783642326509"]},"publication_status":"published","place":"Berlin, Heidelberg","year":"2012","intvolume":"      7461","page":"168-179","citation":{"ama":"Hamann H, Engelbrecht A, Birattari M, et al. Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions. In: <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i>. Vol 7461. Berlin, Heidelberg: Springer; 2012:168-179. doi:<a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">10.1007/978-3-642-32650-9_15</a>","chicago":"Hamann, Heiko, Andreas Engelbrecht, Mauro Birattari, Marco Dorigo, Christian Blum, Thomas Stuetzle, Anders Lyhne Christensen, and Roderich Gross. “Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions.” In <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i>, 7461:168–79. Berlin, Heidelberg: Springer, 2012. <a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">https://doi.org/10.1007/978-3-642-32650-9_15</a>.","ieee":"H. Hamann <i>et al.</i>, “Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions,” in <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i>, 2012, vol. 7461, pp. 168–179.","apa":"Hamann, H., Engelbrecht, A., Birattari, M., Dorigo, M., Blum, C., Stuetzle, T., … Gross, R. (2012). Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions. In <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i> (Vol. 7461, pp. 168–179). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">https://doi.org/10.1007/978-3-642-32650-9_15</a>","short":"H. Hamann, A. Engelbrecht, M. Birattari, M. Dorigo, C. Blum, T. Stuetzle, A.L. Christensen, R. Gross, in: Swarm Intelligence: 8th International Conference, ANTS 2012, Springer, Berlin, Heidelberg, 2012, pp. 168–179.","mla":"Hamann, Heiko, et al. “Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions.” <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i>, vol. 7461, Springer, 2012, pp. 168–79, doi:<a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">10.1007/978-3-642-32650-9_15</a>.","bibtex":"@inproceedings{Hamann_Engelbrecht_Birattari_Dorigo_Blum_Stuetzle_Christensen_Gross_2012, place={Berlin, Heidelberg}, title={Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions}, volume={7461}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">10.1007/978-3-642-32650-9_15</a>}, booktitle={Swarm Intelligence: 8th International Conference, ANTS 2012}, publisher={Springer}, author={Hamann, Heiko and Engelbrecht, Andreas and Birattari, Mauro and Dorigo, Marco and Blum, Christian and Stuetzle, Thomas and Christensen, Anders Lyhne and Gross, Roderich}, year={2012}, pages={168–179} }"},"date_updated":"2022-01-06T06:54:21Z","publisher":"Springer","volume":7461,"author":[{"first_name":"Heiko","last_name":"Hamann","full_name":"Hamann, Heiko"},{"last_name":"Engelbrecht","full_name":"Engelbrecht, Andreas","first_name":"Andreas"},{"first_name":"Mauro","full_name":"Birattari, Mauro","last_name":"Birattari"},{"full_name":"Dorigo, Marco","last_name":"Dorigo","first_name":"Marco"},{"full_name":"Blum, Christian","last_name":"Blum","first_name":"Christian"},{"first_name":"Thomas","last_name":"Stuetzle","full_name":"Stuetzle, Thomas"},{"first_name":"Anders Lyhne","full_name":"Christensen, Anders Lyhne","last_name":"Christensen"},{"full_name":"Gross, Roderich","last_name":"Gross","first_name":"Roderich"}],"date_created":"2020-10-22T10:00:11Z","title":"Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions","doi":"10.1007/978-3-642-32650-9_15","publication":"Swarm Intelligence: 8th International Conference, ANTS 2012","type":"conference","status":"public","_id":"20179","department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","language":[{"iso":"eng"}]},{"place":"Berlin, Heidelberg","year":"2012","page":"404-414","citation":{"ama":"Kakvi S, Kiltz E, May A. Certifying RSA. In: <i>Advances in Cryptology – ASIACRYPT 2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>","chicago":"Kakvi, Saqib, Eike Kiltz, and Alexander May. “Certifying RSA.” In <i>Advances in Cryptology – ASIACRYPT 2012</i>, 404–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">https://doi.org/10.1007/978-3-642-34961-4_25</a>.","ieee":"S. Kakvi, E. Kiltz, and A. May, “Certifying RSA,” in <i>Advances in Cryptology – ASIACRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 404–414.","apa":"Kakvi, S., Kiltz, E., &#38; May, A. (2012). Certifying RSA. In <i>Advances in Cryptology – ASIACRYPT 2012</i> (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">https://doi.org/10.1007/978-3-642-34961-4_25</a>","short":"S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.","bibtex":"@inbook{Kakvi_Kiltz_May_2012, place={Berlin, Heidelberg}, title={Certifying RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>}, booktitle={Advances in Cryptology – ASIACRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike and May, Alexander}, year={2012}, pages={404–414} }","mla":"Kakvi, Saqib, et al. “Certifying RSA.” <i>Advances in Cryptology – ASIACRYPT 2012</i>, Springer Berlin Heidelberg, 2012, pp. 404–14, doi:<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>."},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642349607","9783642349614"]},"publication_status":"published","title":"Certifying RSA","doi":"10.1007/978-3-642-34961-4_25","date_updated":"2022-01-06T06:58:47Z","publisher":"Springer Berlin Heidelberg","date_created":"2018-05-25T12:34:06Z","author":[{"full_name":"Kakvi, Saqib","id":"66268","last_name":"Kakvi","first_name":"Saqib"},{"full_name":"Kiltz, Eike","last_name":"Kiltz","first_name":"Eike"},{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"status":"public","publication":"Advances in Cryptology – ASIACRYPT 2012","type":"book_chapter","extern":"1","_id":"2918","department":[{"_id":"558"}],"user_id":"25078"},{"_id":"2919","user_id":"66268","department":[{"_id":"558"}],"extern":"1","type":"book_chapter","publication":"Advances in Cryptology – EUROCRYPT 2012","status":"public","publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:47Z","author":[{"last_name":"Kakvi","id":"66268","full_name":"Kakvi, Saqib","first_name":"Saqib"},{"full_name":"Kiltz, Eike","last_name":"Kiltz","first_name":"Eike"}],"date_created":"2018-05-25T12:36:44Z","title":"Optimal Security Proofs for Full Domain Hash, Revisited","main_file_link":[{"url":"https://doi.org/10.1007/s00145-017-9257-9"}],"doi":"10.1007/978-3-642-29011-4_32","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642290107","9783642290114"]},"year":"2012","place":"Berlin, Heidelberg","citation":{"apa":"Kakvi, S., &#38; Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In <i>Advances in Cryptology – EUROCRYPT 2012</i> (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">https://doi.org/10.1007/978-3-642-29011-4_32</a>","short":"S. Kakvi, E. Kiltz, in: Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 537–553.","bibtex":"@inbook{Kakvi_Kiltz_2012, place={Berlin, Heidelberg}, title={Optimal Security Proofs for Full Domain Hash, Revisited}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>}, booktitle={Advances in Cryptology – EUROCRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike}, year={2012}, pages={537–553} }","mla":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” <i>Advances in Cryptology – EUROCRYPT 2012</i>, Springer Berlin Heidelberg, 2012, pp. 537–53, doi:<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>.","ieee":"S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” in <i>Advances in Cryptology – EUROCRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 537–553.","chicago":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” In <i>Advances in Cryptology – EUROCRYPT 2012</i>, 537–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">https://doi.org/10.1007/978-3-642-29011-4_32</a>.","ama":"Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: <i>Advances in Cryptology – EUROCRYPT 2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>"},"page":"537-553"},{"language":[{"iso":"eng"}],"department":[{"_id":"63"}],"user_id":"15415","_id":"16445","status":"public","publication":"Experimental Algorithms","type":"book_chapter","doi":"10.1007/978-3-642-30850-5_2","title":"Continuous Local Strategies for Robotic Formation Problems","date_created":"2020-04-07T06:41:18Z","author":[{"last_name":"Kempkes","full_name":"Kempkes, Barbara","first_name":"Barbara"},{"first_name":"Friedhelm","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"}],"date_updated":"2022-01-06T06:52:50Z","citation":{"apa":"Kempkes, B., &#38; Meyer auf der Heide, F. (2012). Continuous Local Strategies for Robotic Formation Problems. In <i>Experimental Algorithms</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">https://doi.org/10.1007/978-3-642-30850-5_2</a>","mla":"Kempkes, Barbara, and Friedhelm Meyer auf der Heide. “Continuous Local Strategies for Robotic Formation Problems.” <i>Experimental Algorithms</i>, 2012, doi:<a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">10.1007/978-3-642-30850-5_2</a>.","short":"B. Kempkes, F. Meyer auf der Heide, in: Experimental Algorithms, Berlin, Heidelberg, 2012.","bibtex":"@inbook{Kempkes_Meyer auf der Heide_2012, place={Berlin, Heidelberg}, title={Continuous Local Strategies for Robotic Formation Problems}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">10.1007/978-3-642-30850-5_2</a>}, booktitle={Experimental Algorithms}, author={Kempkes, Barbara and Meyer auf der Heide, Friedhelm}, year={2012} }","chicago":"Kempkes, Barbara, and Friedhelm Meyer auf der Heide. “Continuous Local Strategies for Robotic Formation Problems.” In <i>Experimental Algorithms</i>. Berlin, Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">https://doi.org/10.1007/978-3-642-30850-5_2</a>.","ieee":"B. Kempkes and F. Meyer auf der Heide, “Continuous Local Strategies for Robotic Formation Problems,” in <i>Experimental Algorithms</i>, Berlin, Heidelberg, 2012.","ama":"Kempkes B, Meyer auf der Heide F. Continuous Local Strategies for Robotic Formation Problems. In: <i>Experimental Algorithms</i>. Berlin, Heidelberg; 2012. doi:<a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">10.1007/978-3-642-30850-5_2</a>"},"place":"Berlin, Heidelberg","year":"2012","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642308499","9783642308505"]},"publication_status":"published"}]
