[{"publication_status":"published","publication_identifier":{"isbn":["9783540327554","9783540327561"],"issn":["0302-9743","1611-3349"]},"citation":{"ama":"Demaine ED, Meyer auf der Heide F, Pagh R, Pǎtraşcu M. De Dictionariis Dynamicis Pauco Spatio Utentibus ({lat.} On Dynamic Dictionaries Using Little Space). In: <i>LATIN 2006: Theoretical Informatics</i>. Berlin, Heidelberg; 2006. doi:<a href=\"https://doi.org/10.1007/11682462_34\">10.1007/11682462_34</a>","chicago":"Demaine, Erik D., Friedhelm Meyer auf der Heide, Rasmus Pagh, and Mihai Pǎtraşcu. “De Dictionariis Dynamicis Pauco Spatio Utentibus ({lat.} On Dynamic Dictionaries Using Little Space).” In <i>LATIN 2006: Theoretical Informatics</i>. Berlin, Heidelberg, 2006. <a href=\"https://doi.org/10.1007/11682462_34\">https://doi.org/10.1007/11682462_34</a>.","ieee":"E. D. Demaine, F. Meyer auf der Heide, R. Pagh, and M. Pǎtraşcu, “De Dictionariis Dynamicis Pauco Spatio Utentibus ({lat.} On Dynamic Dictionaries Using Little Space),” in <i>LATIN 2006: Theoretical Informatics</i>, Berlin, Heidelberg, 2006.","bibtex":"@inbook{Demaine_Meyer auf der Heide_Pagh_Pǎtraşcu_2006, place={Berlin, Heidelberg}, title={De Dictionariis Dynamicis Pauco Spatio Utentibus ({lat.} On Dynamic Dictionaries Using Little Space)}, DOI={<a href=\"https://doi.org/10.1007/11682462_34\">10.1007/11682462_34</a>}, booktitle={LATIN 2006: Theoretical Informatics}, author={Demaine, Erik D. and Meyer auf der Heide, Friedhelm and Pagh, Rasmus and Pǎtraşcu, Mihai}, year={2006} }","short":"E.D. Demaine, F. Meyer auf der Heide, R. Pagh, M. Pǎtraşcu, in: LATIN 2006: Theoretical Informatics, Berlin, Heidelberg, 2006.","mla":"Demaine, Erik D., et al. “De Dictionariis Dynamicis Pauco Spatio Utentibus ({lat.} On Dynamic Dictionaries Using Little Space).” <i>LATIN 2006: Theoretical Informatics</i>, 2006, doi:<a href=\"https://doi.org/10.1007/11682462_34\">10.1007/11682462_34</a>.","apa":"Demaine, E. D., Meyer auf der Heide, F., Pagh, R., &#38; Pǎtraşcu, M. (2006). De Dictionariis Dynamicis Pauco Spatio Utentibus ({lat.} On Dynamic Dictionaries Using Little Space). In <i>LATIN 2006: Theoretical Informatics</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11682462_34\">https://doi.org/10.1007/11682462_34</a>"},"year":"2006","place":"Berlin, Heidelberg","author":[{"last_name":"Demaine","full_name":"Demaine, Erik D.","first_name":"Erik D."},{"first_name":"Friedhelm","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"},{"full_name":"Pagh, Rasmus","last_name":"Pagh","first_name":"Rasmus"},{"first_name":"Mihai","last_name":"Pǎtraşcu","full_name":"Pǎtraşcu, Mihai"}],"date_created":"2020-04-08T09:36:10Z","date_updated":"2022-01-06T06:52:50Z","doi":"10.1007/11682462_34","title":"De Dictionariis Dynamicis Pauco Spatio Utentibus ({lat.} On Dynamic Dictionaries Using Little Space)","type":"book_chapter","publication":"LATIN 2006: Theoretical Informatics","status":"public","user_id":"15415","department":[{"_id":"63"}],"_id":"16472","language":[{"iso":"eng"}]},{"year":"2006","place":"Berlin, Heidelberg","citation":{"ama":"Dynia M, Kutyłowski J, Meyer auf der Heide F, Schindelhauer C. Smart Robot Teams Exploring Sparse Trees. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg; 2006. doi:<a href=\"https://doi.org/10.1007/11821069_29\">10.1007/11821069_29</a>","chicago":"Dynia, M., J. Kutyłowski, Friedhelm Meyer auf der Heide, and Christian Schindelhauer. “Smart Robot Teams Exploring Sparse Trees.” In <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg, 2006. <a href=\"https://doi.org/10.1007/11821069_29\">https://doi.org/10.1007/11821069_29</a>.","ieee":"M. Dynia, J. Kutyłowski, F. Meyer auf der Heide, and C. Schindelhauer, “Smart Robot Teams Exploring Sparse Trees,” in <i>Lecture Notes in Computer Science</i>, Berlin, Heidelberg, 2006.","bibtex":"@inbook{Dynia_Kutyłowski_Meyer auf der Heide_Schindelhauer_2006, place={Berlin, Heidelberg}, title={Smart Robot Teams Exploring Sparse Trees}, DOI={<a href=\"https://doi.org/10.1007/11821069_29\">10.1007/11821069_29</a>}, booktitle={Lecture Notes in Computer Science}, author={Dynia, M. and Kutyłowski, J. and Meyer auf der Heide, Friedhelm and Schindelhauer, Christian}, year={2006} }","short":"M. Dynia, J. Kutyłowski, F. Meyer auf der Heide, C. Schindelhauer, in: Lecture Notes in Computer Science, Berlin, Heidelberg, 2006.","mla":"Dynia, M., et al. “Smart Robot Teams Exploring Sparse Trees.” <i>Lecture Notes in Computer Science</i>, 2006, doi:<a href=\"https://doi.org/10.1007/11821069_29\">10.1007/11821069_29</a>.","apa":"Dynia, M., Kutyłowski, J., Meyer auf der Heide, F., &#38; Schindelhauer, C. (2006). Smart Robot Teams Exploring Sparse Trees. In <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11821069_29\">https://doi.org/10.1007/11821069_29</a>"},"publication_status":"published","publication_identifier":{"isbn":["9783540377917","9783540377931"],"issn":["0302-9743","1611-3349"]},"title":"Smart Robot Teams Exploring Sparse Trees","doi":"10.1007/11821069_29","date_updated":"2022-01-06T06:52:50Z","date_created":"2020-04-08T09:38:28Z","author":[{"first_name":"M.","last_name":"Dynia","full_name":"Dynia, M."},{"full_name":"Kutyłowski, J.","last_name":"Kutyłowski","first_name":"J."},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"},{"last_name":"Schindelhauer","full_name":"Schindelhauer, Christian","first_name":"Christian"}],"status":"public","type":"book_chapter","publication":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"_id":"16473","user_id":"15415","department":[{"_id":"63"}]},{"doi":"10.1007/11788911_27","title":"DTD-Driven Structure Preserving XML Compression","date_created":"2019-11-22T09:21:07Z","author":[{"id":"624","full_name":"Böttcher, Stefan","last_name":"Böttcher","first_name":"Stefan"},{"first_name":"Rita","full_name":"Steinmetz, Rita","id":"14961","last_name":"Steinmetz"}],"date_updated":"2022-01-06T06:52:16Z","citation":{"apa":"Böttcher, S., &#38; Steinmetz, R. (2006). DTD-Driven Structure Preserving XML Compression. In <i>Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23</i> (pp. 266–269). Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11788911_27\">https://doi.org/10.1007/11788911_27</a>","mla":"Böttcher, Stefan, and Rita Steinmetz. “DTD-Driven Structure Preserving XML Compression.” <i>Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23</i>, 2006, pp. 266–69, doi:<a href=\"https://doi.org/10.1007/11788911_27\">10.1007/11788911_27</a>.","bibtex":"@inproceedings{Böttcher_Steinmetz_2006, place={Berlin, Heidelberg}, title={DTD-Driven Structure Preserving XML Compression}, DOI={<a href=\"https://doi.org/10.1007/11788911_27\">10.1007/11788911_27</a>}, booktitle={Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23}, author={Böttcher, Stefan and Steinmetz, Rita}, year={2006}, pages={266–269} }","short":"S. Böttcher, R. Steinmetz, in: Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23, Berlin, Heidelberg, 2006, pp. 266–269.","ama":"Böttcher S, Steinmetz R. DTD-Driven Structure Preserving XML Compression. In: <i>Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23</i>. Berlin, Heidelberg; 2006:266-269. doi:<a href=\"https://doi.org/10.1007/11788911_27\">10.1007/11788911_27</a>","chicago":"Böttcher, Stefan, and Rita Steinmetz. “DTD-Driven Structure Preserving XML Compression.” In <i>Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23</i>, 266–69. Berlin, Heidelberg, 2006. <a href=\"https://doi.org/10.1007/11788911_27\">https://doi.org/10.1007/11788911_27</a>.","ieee":"S. Böttcher and R. Steinmetz, “DTD-Driven Structure Preserving XML Compression,” in <i>Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23</i>, 2006, pp. 266–269."},"page":"266-269","place":"Berlin, Heidelberg","year":"2006","publication_status":"published","publication_identifier":{"isbn":["9783540359692","9783540359715"],"issn":["0302-9743","1611-3349"]},"language":[{"iso":"eng"}],"user_id":"14961","department":[{"_id":"69"}],"_id":"15150","status":"public","type":"conference","publication":"Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23"},{"status":"public","type":"conference","publication":"Secure Data Management, Third VLDB Workshop, SDM 2006","language":[{"iso":"eng"}],"_id":"15152","user_id":"14961","department":[{"_id":"69"}],"year":"2006","citation":{"apa":"Böttcher, S., &#38; Steinmetz, R. (2006). Information Disclosure by XPath Queries. In <i>Secure Data Management, Third VLDB Workshop, SDM 2006</i> (pp. 160–174). Springer. <a href=\"https://doi.org/10.1007/11844662_12\">https://doi.org/10.1007/11844662_12</a>","short":"S. Böttcher, R. Steinmetz, in: Secure Data Management, Third VLDB Workshop, SDM 2006, Springer, 2006, pp. 160–174.","bibtex":"@inproceedings{Böttcher_Steinmetz_2006, title={Information Disclosure by XPath Queries}, DOI={<a href=\"https://doi.org/10.1007/11844662_12\">10.1007/11844662_12</a>}, booktitle={Secure Data Management, Third VLDB Workshop, SDM 2006}, publisher={Springer}, author={Böttcher, Stefan and Steinmetz, Rita}, year={2006}, pages={160–174} }","mla":"Böttcher, Stefan, and Rita Steinmetz. “Information Disclosure by XPath Queries.” <i>Secure Data Management, Third VLDB Workshop, SDM 2006</i>, Springer, 2006, pp. 160–74, doi:<a href=\"https://doi.org/10.1007/11844662_12\">10.1007/11844662_12</a>.","ama":"Böttcher S, Steinmetz R. Information Disclosure by XPath Queries. In: <i>Secure Data Management, Third VLDB Workshop, SDM 2006</i>. Springer; 2006:160-174. doi:<a href=\"https://doi.org/10.1007/11844662_12\">10.1007/11844662_12</a>","ieee":"S. Böttcher and R. Steinmetz, “Information Disclosure by XPath Queries,” in <i>Secure Data Management, Third VLDB Workshop, SDM 2006</i>, 2006, pp. 160–174.","chicago":"Böttcher, Stefan, and Rita Steinmetz. “Information Disclosure by XPath Queries.” In <i>Secure Data Management, Third VLDB Workshop, SDM 2006</i>, 160–74. Springer, 2006. <a href=\"https://doi.org/10.1007/11844662_12\">https://doi.org/10.1007/11844662_12</a>."},"page":"160-174","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540389842","9783540389873"]},"title":"Information Disclosure by XPath Queries","doi":"10.1007/11844662_12","date_updated":"2022-01-06T06:52:16Z","publisher":"Springer","author":[{"first_name":"Stefan","full_name":"Böttcher, Stefan","id":"624","last_name":"Böttcher"},{"full_name":"Steinmetz, Rita","id":"14961","last_name":"Steinmetz","first_name":"Rita"}],"date_created":"2019-11-22T09:22:46Z"},{"type":"book_chapter","publication":"Information Security and Cryptology – ICISC 2006","status":"public","_id":"53181","user_id":"81636","language":[{"iso":"eng"}],"extern":"1","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540491125","9783540491149"]},"place":"Berlin, Heidelberg","year":"2006","citation":{"bibtex":"@inbook{Geiselmann_Januszewski_Köpfer_Pelzl_Steinwandt_2006, place={Berlin, Heidelberg}, title={A Simpler Sieving Device: Combining ECM and TWIRL}, DOI={<a href=\"https://doi.org/10.1007/11927587_12\">10.1007/11927587_12</a>}, booktitle={Information Security and Cryptology – ICISC 2006}, publisher={Springer Berlin Heidelberg}, author={Geiselmann, Willi and Januszewski, Fabian and Köpfer, Hubert and Pelzl, Jan and Steinwandt, Rainer}, year={2006} }","short":"W. Geiselmann, F. Januszewski, H. Köpfer, J. Pelzl, R. Steinwandt, in: Information Security and Cryptology – ICISC 2006, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006.","mla":"Geiselmann, Willi, et al. “A Simpler Sieving Device: Combining ECM and TWIRL.” <i>Information Security and Cryptology – ICISC 2006</i>, Springer Berlin Heidelberg, 2006, doi:<a href=\"https://doi.org/10.1007/11927587_12\">10.1007/11927587_12</a>.","apa":"Geiselmann, W., Januszewski, F., Köpfer, H., Pelzl, J., &#38; Steinwandt, R. (2006). A Simpler Sieving Device: Combining ECM and TWIRL. In <i>Information Security and Cryptology – ICISC 2006</i>. Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11927587_12\">https://doi.org/10.1007/11927587_12</a>","chicago":"Geiselmann, Willi, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, and Rainer Steinwandt. “A Simpler Sieving Device: Combining ECM and TWIRL.” In <i>Information Security and Cryptology – ICISC 2006</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. <a href=\"https://doi.org/10.1007/11927587_12\">https://doi.org/10.1007/11927587_12</a>.","ieee":"W. Geiselmann, F. Januszewski, H. Köpfer, J. Pelzl, and R. Steinwandt, “A Simpler Sieving Device: Combining ECM and TWIRL,” in <i>Information Security and Cryptology – ICISC 2006</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.","ama":"Geiselmann W, Januszewski F, Köpfer H, Pelzl J, Steinwandt R. A Simpler Sieving Device: Combining ECM and TWIRL. In: <i>Information Security and Cryptology – ICISC 2006</i>. Springer Berlin Heidelberg; 2006. doi:<a href=\"https://doi.org/10.1007/11927587_12\">10.1007/11927587_12</a>"},"date_updated":"2024-04-03T17:11:55Z","publisher":"Springer Berlin Heidelberg","author":[{"full_name":"Geiselmann, Willi","last_name":"Geiselmann","first_name":"Willi"},{"full_name":"Januszewski, Fabian","id":"81636","last_name":"Januszewski","first_name":"Fabian"},{"first_name":"Hubert","full_name":"Köpfer, Hubert","last_name":"Köpfer"},{"first_name":"Jan","full_name":"Pelzl, Jan","last_name":"Pelzl"},{"full_name":"Steinwandt, Rainer","last_name":"Steinwandt","first_name":"Rainer"}],"date_created":"2024-04-03T16:36:47Z","title":"A Simpler Sieving Device: Combining ECM and TWIRL","doi":"10.1007/11927587_12"},{"publication_status":"published","publication_identifier":{"isbn":["9783540360759","9783540360766"],"issn":["0302-9743","1611-3349"]},"related_material":{"link":[{"url":"https://www.researchgate.net/profile/Juergen-Klueners/publication/221451567_Cohen-Lenstra_Heuristics_of_Quadratic_Number_Fields/links/0a85e53298eaed8777000000/Cohen-Lenstra-Heuristics-of-Quadratic-Number-Fields.pdf?origin=publication_detail","relation":"confirmation"}]},"year":"2006","place":"Berlin, Heidelberg","citation":{"apa":"Fouvry, É., &#38; Klüners, J. (2006). Cohen–Lenstra Heuristics of Quadratic Number Fields. In <i>Lecture Notes in Computer Science</i>. Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11792086_4\">https://doi.org/10.1007/11792086_4</a>","short":"É. Fouvry, J. Klüners, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006.","mla":"Fouvry, Étienne, and Jürgen Klüners. “Cohen–Lenstra Heuristics of Quadratic Number Fields.” <i>Lecture Notes in Computer Science</i>, Springer Berlin Heidelberg, 2006, doi:<a href=\"https://doi.org/10.1007/11792086_4\">10.1007/11792086_4</a>.","bibtex":"@inbook{Fouvry_Klüners_2006, place={Berlin, Heidelberg}, title={Cohen–Lenstra Heuristics of Quadratic Number Fields}, DOI={<a href=\"https://doi.org/10.1007/11792086_4\">10.1007/11792086_4</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Fouvry, Étienne and Klüners, Jürgen}, year={2006} }","ieee":"É. Fouvry and J. Klüners, “Cohen–Lenstra Heuristics of Quadratic Number Fields,” in <i>Lecture Notes in Computer Science</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.","chicago":"Fouvry, Étienne, and Jürgen Klüners. “Cohen–Lenstra Heuristics of Quadratic Number Fields.” In <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. <a href=\"https://doi.org/10.1007/11792086_4\">https://doi.org/10.1007/11792086_4</a>.","ama":"Fouvry É, Klüners J. Cohen–Lenstra Heuristics of Quadratic Number Fields. In: <i>Lecture Notes in Computer Science</i>. Springer Berlin Heidelberg; 2006. doi:<a href=\"https://doi.org/10.1007/11792086_4\">10.1007/11792086_4</a>"},"publisher":"Springer Berlin Heidelberg","date_updated":"2023-03-06T09:13:15Z","date_created":"2023-01-11T09:46:47Z","author":[{"last_name":"Fouvry","full_name":"Fouvry, Étienne","first_name":"Étienne"},{"first_name":"Jürgen","id":"21202","full_name":"Klüners, Jürgen","last_name":"Klüners"}],"title":"Cohen–Lenstra Heuristics of Quadratic Number Fields","doi":"10.1007/11792086_4","type":"book_chapter","publication":"Lecture Notes in Computer Science","abstract":[{"lang":"eng","text":"We establish a link between some heuristic asymptotic formulas (due to Cohen and Lenstra) concerning the moments of the p–part of the class groups of quadratic fields and formulas giving the frequency of the values of the p–rank of these class groups."}],"status":"public","_id":"35958","user_id":"93826","department":[{"_id":"102"}],"language":[{"iso":"eng"}]},{"_id":"19835","department":[{"_id":"63"}],"user_id":"15415","language":[{"iso":"eng"}],"publication":"Proc. of 4th International Conference on Ad-Hoc, Mobile & Wireless Networks (ADHOC-NOW 2005)","type":"conference","abstract":[{"lang":"eng","text":"The Hierarchical Layer Graph (HL graph) is a promising network topology for wireless networks with<br>variable transmission ranges. It was introduced and analyzed by Meyer auf der Heide et al. 2004.<br>In this paper we present a distributed, localized and resource-efficient algorithm for constructing this graph. The qualtiy of the HL graph depends on the domination radius and the publication radius, which affect the amount of interference in the network. These parameters also determine whether the HL graph is a c-spanner, which implies an energy-efficient topology. We investigate the performance on randomly distributed node sets and show that the restrictions on these parameters derived from a worst case analysis are not so tight using realistic settings.<br><br>Here, we present the results of our extensive experimental evaluation, measuring congestion, dilation and energy. Congestion includes the load that is induced by interfering edges. We distinguish between congestion and realistic congestion where we also take the signal-to-interference ratio into account. <br>Our experiments show that the HL graph contains energy-efficient paths as well as paths with a few number of hops while preserving a low congestion."}],"status":"public","date_updated":"2022-01-06T06:54:13Z","volume":3738,"date_created":"2020-10-01T11:31:14Z","author":[{"first_name":"Stefan","full_name":"Rührup, Stefan","last_name":"Rührup"},{"first_name":"Christian","full_name":"Schindelhauer, Christian","last_name":"Schindelhauer"},{"first_name":"Klaus","full_name":"Volbert, Klaus","last_name":"Volbert"}],"title":"Performance Analysis of the Hierarchical Layer Graph for Wireless Networks","doi":"10.1007/11561354_21","publication_identifier":{"isbn":["9783540291329","9783540320869"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2005","intvolume":"      3738","page":"244-257","citation":{"chicago":"Rührup, Stefan, Christian Schindelhauer, and Klaus Volbert. “Performance Analysis of the Hierarchical Layer Graph for Wireless Networks.” In <i>Proc. of 4th International Conference on Ad-Hoc, Mobile &#38; Wireless Networks (ADHOC-NOW 2005)</i>, 3738:244–57, 2005. <a href=\"https://doi.org/10.1007/11561354_21\">https://doi.org/10.1007/11561354_21</a>.","ieee":"S. Rührup, C. Schindelhauer, and K. Volbert, “Performance Analysis of the Hierarchical Layer Graph for Wireless Networks,” in <i>Proc. of 4th International Conference on Ad-Hoc, Mobile &#38; Wireless Networks (ADHOC-NOW 2005)</i>, 2005, vol. 3738, pp. 244–257.","ama":"Rührup S, Schindelhauer C, Volbert K. Performance Analysis of the Hierarchical Layer Graph for Wireless Networks. In: <i>Proc. of 4th International Conference on Ad-Hoc, Mobile &#38; Wireless Networks (ADHOC-NOW 2005)</i>. Vol 3738. ; 2005:244-257. doi:<a href=\"https://doi.org/10.1007/11561354_21\">10.1007/11561354_21</a>","apa":"Rührup, S., Schindelhauer, C., &#38; Volbert, K. (2005). Performance Analysis of the Hierarchical Layer Graph for Wireless Networks. In <i>Proc. of 4th International Conference on Ad-Hoc, Mobile &#38; Wireless Networks (ADHOC-NOW 2005)</i> (Vol. 3738, pp. 244–257). <a href=\"https://doi.org/10.1007/11561354_21\">https://doi.org/10.1007/11561354_21</a>","short":"S. Rührup, C. Schindelhauer, K. Volbert, in: Proc. of 4th International Conference on Ad-Hoc, Mobile &#38; Wireless Networks (ADHOC-NOW 2005), 2005, pp. 244–257.","bibtex":"@inproceedings{Rührup_Schindelhauer_Volbert_2005, title={Performance Analysis of the Hierarchical Layer Graph for Wireless Networks}, volume={3738}, DOI={<a href=\"https://doi.org/10.1007/11561354_21\">10.1007/11561354_21</a>}, booktitle={Proc. of 4th International Conference on Ad-Hoc, Mobile &#38; Wireless Networks (ADHOC-NOW 2005)}, author={Rührup, Stefan and Schindelhauer, Christian and Volbert, Klaus}, year={2005}, pages={244–257} }","mla":"Rührup, Stefan, et al. “Performance Analysis of the Hierarchical Layer Graph for Wireless Networks.” <i>Proc. of 4th International Conference on Ad-Hoc, Mobile &#38; Wireless Networks (ADHOC-NOW 2005)</i>, vol. 3738, 2005, pp. 244–57, doi:<a href=\"https://doi.org/10.1007/11561354_21\">10.1007/11561354_21</a>."}},{"_id":"19836","department":[{"_id":"63"}],"series_title":"3738","user_id":"15415","language":[{"iso":"eng"}],"publication":"Proc. of 4th International Conference on Ad-Hoc Networks & Wireless (ADHOC-NOW 2005)","type":"book_chapter","status":"public","date_updated":"2022-01-06T06:54:13Z","author":[{"first_name":"Christian","last_name":"Schindelhauer","full_name":"Schindelhauer, Christian"},{"first_name":"Kerstin","full_name":"Voß, Kerstin","last_name":"Voß"}],"date_created":"2020-10-01T11:36:30Z","title":"Probability Distributions for Channel Utilisation","doi":"10.1007/11561354_23","publication_identifier":{"isbn":["9783540291329","9783540320869"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2005","page":"271-284","citation":{"ieee":"C. Schindelhauer and K. Voß, “Probability Distributions for Channel Utilisation,” in <i>Proc. of 4th International Conference on Ad-Hoc Networks &#38; Wireless (ADHOC-NOW 2005)</i>, 2005, pp. 271–284.","chicago":"Schindelhauer, Christian, and Kerstin Voß. “Probability Distributions for Channel Utilisation.” In <i>Proc. of 4th International Conference on Ad-Hoc Networks &#38; Wireless (ADHOC-NOW 2005)</i>, 271–84. 3738, 2005. <a href=\"https://doi.org/10.1007/11561354_23\">https://doi.org/10.1007/11561354_23</a>.","ama":"Schindelhauer C, Voß K. Probability Distributions for Channel Utilisation. In: <i>Proc. of 4th International Conference on Ad-Hoc Networks &#38; Wireless (ADHOC-NOW 2005)</i>. 3738. ; 2005:271-284. doi:<a href=\"https://doi.org/10.1007/11561354_23\">10.1007/11561354_23</a>","apa":"Schindelhauer, C., &#38; Voß, K. (2005). Probability Distributions for Channel Utilisation. In <i>Proc. of 4th International Conference on Ad-Hoc Networks &#38; Wireless (ADHOC-NOW 2005)</i> (pp. 271–284). <a href=\"https://doi.org/10.1007/11561354_23\">https://doi.org/10.1007/11561354_23</a>","short":"C. Schindelhauer, K. Voß, in: Proc. of 4th International Conference on Ad-Hoc Networks &#38; Wireless (ADHOC-NOW 2005), 2005, pp. 271–284.","mla":"Schindelhauer, Christian, and Kerstin Voß. “Probability Distributions for Channel Utilisation.” <i>Proc. of 4th International Conference on Ad-Hoc Networks &#38; Wireless (ADHOC-NOW 2005)</i>, 2005, pp. 271–84, doi:<a href=\"https://doi.org/10.1007/11561354_23\">10.1007/11561354_23</a>.","bibtex":"@inbook{Schindelhauer_Voß_2005, series={3738}, title={Probability Distributions for Channel Utilisation}, DOI={<a href=\"https://doi.org/10.1007/11561354_23\">10.1007/11561354_23</a>}, booktitle={Proc. of 4th International Conference on Ad-Hoc Networks &#38; Wireless (ADHOC-NOW 2005)}, author={Schindelhauer, Christian and Voß, Kerstin}, year={2005}, pages={271–284}, collection={3738} }"}},{"publication":"Proceedings of the 4th International Conference on Networking","type":"conference","status":"public","_id":"19912","department":[{"_id":"63"},{"_id":"58"}],"user_id":"15415","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540253389","9783540319573"]},"publication_status":"published","year":"2005","place":"Berlin, Heidelberg","page":"800-810","intvolume":"      3421","citation":{"chicago":"Loeser, Chris, Gunnar Schomaker, André Brinkmann, Mario Vodisek, and Michael Heidebuer. “Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts.” In <i>Proceedings of the 4th International Conference on Networking</i>, 3421:800–810. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/978-3-540-31957-3_90\">https://doi.org/10.1007/978-3-540-31957-3_90</a>.","ieee":"C. Loeser, G. Schomaker, A. Brinkmann, M. Vodisek, and M. Heidebuer, “Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts,” in <i>Proceedings of the 4th International Conference on Networking</i>, 2005, vol. 3421, pp. 800–810.","ama":"Loeser C, Schomaker G, Brinkmann A, Vodisek M, Heidebuer M. Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts. In: <i>Proceedings of the 4th International Conference on Networking</i>. Vol 3421. Berlin, Heidelberg; 2005:800-810. doi:<a href=\"https://doi.org/10.1007/978-3-540-31957-3_90\">10.1007/978-3-540-31957-3_90</a>","apa":"Loeser, C., Schomaker, G., Brinkmann, A., Vodisek, M., &#38; Heidebuer, M. (2005). Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts. In <i>Proceedings of the 4th International Conference on Networking</i> (Vol. 3421, pp. 800–810). Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-31957-3_90\">https://doi.org/10.1007/978-3-540-31957-3_90</a>","bibtex":"@inproceedings{Loeser_Schomaker_Brinkmann_Vodisek_Heidebuer_2005, place={Berlin, Heidelberg}, title={Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts}, volume={3421}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-31957-3_90\">10.1007/978-3-540-31957-3_90</a>}, booktitle={Proceedings of the 4th International Conference on Networking}, author={Loeser, Chris and Schomaker, Gunnar and Brinkmann, André and Vodisek, Mario and Heidebuer, Michael}, year={2005}, pages={800–810} }","mla":"Loeser, Chris, et al. “Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts.” <i>Proceedings of the 4th International Conference on Networking</i>, vol. 3421, 2005, pp. 800–10, doi:<a href=\"https://doi.org/10.1007/978-3-540-31957-3_90\">10.1007/978-3-540-31957-3_90</a>.","short":"C. Loeser, G. Schomaker, A. Brinkmann, M. Vodisek, M. Heidebuer, in: Proceedings of the 4th International Conference on Networking, Berlin, Heidelberg, 2005, pp. 800–810."},"date_updated":"2022-01-06T06:54:14Z","volume":3421,"date_created":"2020-10-06T10:36:14Z","author":[{"full_name":"Loeser, Chris","last_name":"Loeser","first_name":"Chris"},{"first_name":"Gunnar","last_name":"Schomaker","full_name":"Schomaker, Gunnar"},{"first_name":"André","last_name":"Brinkmann","full_name":"Brinkmann, André"},{"first_name":"Mario","full_name":"Vodisek, Mario","last_name":"Vodisek"},{"last_name":"Heidebuer","full_name":"Heidebuer, Michael","first_name":"Michael"}],"title":"Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts","doi":"10.1007/978-3-540-31957-3_90"},{"ddc":["000"],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":333655,"file_name":"toolkit.pdf","file_id":"3008","access_level":"closed","date_updated":"2018-06-05T08:18:20Z","date_created":"2018-06-05T08:18:20Z","creator":"feidens"}],"publication":"EUROCRYPT 2005","title":"A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers","date_created":"2018-06-05T08:16:47Z","publisher":"Springer Berlin Heidelberg","year":"2005","file_date_updated":"2018-06-05T08:18:20Z","department":[{"_id":"64"}],"series_title":"Lecture Notes in Computer Science","user_id":"25078","_id":"3006","status":"public","type":"book_chapter","doi":"10.1007/11426639_15","author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"full_name":"May, Alexander","last_name":"May","first_name":"Alexander"}],"date_updated":"2022-01-06T06:58:50Z","page":"251-267","citation":{"ieee":"J. Blömer and A. May, “A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers,” in <i>EUROCRYPT 2005</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 251–267.","chicago":"Blömer, Johannes, and Alexander May. “A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers.” In <i>EUROCRYPT 2005</i>, 251–67. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11426639_15\">https://doi.org/10.1007/11426639_15</a>.","ama":"Blömer J, May A. A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. In: <i>EUROCRYPT 2005</i>. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:251-267. doi:<a href=\"https://doi.org/10.1007/11426639_15\">10.1007/11426639_15</a>","bibtex":"@inbook{Blömer_May_2005, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers}, DOI={<a href=\"https://doi.org/10.1007/11426639_15\">10.1007/11426639_15</a>}, booktitle={EUROCRYPT 2005}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2005}, pages={251–267}, collection={Lecture Notes in Computer Science} }","mla":"Blömer, Johannes, and Alexander May. “A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers.” <i>EUROCRYPT 2005</i>, Springer Berlin Heidelberg, 2005, pp. 251–67, doi:<a href=\"https://doi.org/10.1007/11426639_15\">10.1007/11426639_15</a>.","short":"J. Blömer, A. May, in: EUROCRYPT 2005, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 251–267.","apa":"Blömer, J., &#38; May, A. (2005). A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. In <i>EUROCRYPT 2005</i> (pp. 251–267). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11426639_15\">https://doi.org/10.1007/11426639_15</a>"},"place":"Berlin, Heidelberg","has_accepted_license":"1","publication_identifier":{"isbn":["9783540259107","9783540320555"],"issn":["0302-9743","1611-3349"]},"publication_status":"published"},{"type":"book_chapter","publication":"EUROCRYPT 2005","status":"public","_id":"3010","user_id":"25078","series_title":"LNCS","department":[{"_id":"64"}],"publication_status":"published","publication_identifier":{"isbn":["9783540259107","9783540320555"],"issn":["0302-9743","1611-3349"]},"place":"Berlin, Heidelberg","year":"2005","citation":{"ama":"Ernst M, Jochemsz E, May A, de Weger B. Partial Key Exposure Attacks on RSA up to Full Size Exponents. In: <i>EUROCRYPT 2005</i>. LNCS. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:371-386. doi:<a href=\"https://doi.org/10.1007/11426639_22\">10.1007/11426639_22</a>","chicago":"Ernst, Matthias, Ellen Jochemsz, Alexander May, and Benne de Weger. “Partial Key Exposure Attacks on RSA up to Full Size Exponents.” In <i>EUROCRYPT 2005</i>, 371–86. LNCS. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11426639_22\">https://doi.org/10.1007/11426639_22</a>.","ieee":"M. Ernst, E. Jochemsz, A. May, and B. de Weger, “Partial Key Exposure Attacks on RSA up to Full Size Exponents,” in <i>EUROCRYPT 2005</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 371–386.","apa":"Ernst, M., Jochemsz, E., May, A., &#38; de Weger, B. (2005). Partial Key Exposure Attacks on RSA up to Full Size Exponents. In <i>EUROCRYPT 2005</i> (pp. 371–386). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11426639_22\">https://doi.org/10.1007/11426639_22</a>","bibtex":"@inbook{Ernst_Jochemsz_May_de Weger_2005, place={Berlin, Heidelberg}, series={LNCS}, title={Partial Key Exposure Attacks on RSA up to Full Size Exponents}, DOI={<a href=\"https://doi.org/10.1007/11426639_22\">10.1007/11426639_22</a>}, booktitle={EUROCRYPT 2005}, publisher={Springer Berlin Heidelberg}, author={Ernst, Matthias and Jochemsz, Ellen and May, Alexander and de Weger, Benne}, year={2005}, pages={371–386}, collection={LNCS} }","mla":"Ernst, Matthias, et al. “Partial Key Exposure Attacks on RSA up to Full Size Exponents.” <i>EUROCRYPT 2005</i>, Springer Berlin Heidelberg, 2005, pp. 371–86, doi:<a href=\"https://doi.org/10.1007/11426639_22\">10.1007/11426639_22</a>.","short":"M. Ernst, E. Jochemsz, A. May, B. de Weger, in: EUROCRYPT 2005, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 371–386."},"page":"371-386","publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:51Z","date_created":"2018-06-05T08:19:48Z","author":[{"first_name":"Matthias","full_name":"Ernst, Matthias","last_name":"Ernst"},{"first_name":"Ellen","full_name":"Jochemsz, Ellen","last_name":"Jochemsz"},{"full_name":"May, Alexander","last_name":"May","first_name":"Alexander"},{"full_name":"de Weger, Benne","last_name":"de Weger","first_name":"Benne"}],"title":"Partial Key Exposure Attacks on RSA up to Full Size Exponents","doi":"10.1007/11426639_22"},{"publication":"Algorithms – ESA 2005","type":"book_chapter","status":"public","department":[{"_id":"63"},{"_id":"26"}],"user_id":"15415","_id":"26991","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","citation":{"apa":"Rührup, S., &#38; Schindelhauer, C. (2005). Online Routing in Faulty Meshes with Sub-linear Comparative Time and Traffic Ratio. In <i>Algorithms – ESA 2005</i>. <a href=\"https://doi.org/10.1007/11561071_5\">https://doi.org/10.1007/11561071_5</a>","short":"S. Rührup, C. Schindelhauer, in: Algorithms – ESA 2005, Berlin, Heidelberg, 2005.","bibtex":"@inbook{Rührup_Schindelhauer_2005, place={Berlin, Heidelberg}, title={Online Routing in Faulty Meshes with Sub-linear Comparative Time and Traffic Ratio}, DOI={<a href=\"https://doi.org/10.1007/11561071_5\">10.1007/11561071_5</a>}, booktitle={Algorithms – ESA 2005}, author={Rührup, Stefan and Schindelhauer, Christian}, year={2005} }","mla":"Rührup, Stefan, and Christian Schindelhauer. “Online Routing in Faulty Meshes with Sub-Linear Comparative Time and Traffic Ratio.” <i>Algorithms – ESA 2005</i>, 2005, doi:<a href=\"https://doi.org/10.1007/11561071_5\">10.1007/11561071_5</a>.","ama":"Rührup S, Schindelhauer C. Online Routing in Faulty Meshes with Sub-linear Comparative Time and Traffic Ratio. In: <i>Algorithms – ESA 2005</i>. ; 2005. doi:<a href=\"https://doi.org/10.1007/11561071_5\">10.1007/11561071_5</a>","chicago":"Rührup, Stefan, and Christian Schindelhauer. “Online Routing in Faulty Meshes with Sub-Linear Comparative Time and Traffic Ratio.” In <i>Algorithms – ESA 2005</i>. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11561071_5\">https://doi.org/10.1007/11561071_5</a>.","ieee":"S. Rührup and C. Schindelhauer, “Online Routing in Faulty Meshes with Sub-linear Comparative Time and Traffic Ratio,” in <i>Algorithms – ESA 2005</i>, Berlin, Heidelberg, 2005."},"place":"Berlin, Heidelberg","year":"2005","date_created":"2021-10-28T10:22:39Z","author":[{"full_name":"Rührup, Stefan","last_name":"Rührup","first_name":"Stefan"},{"full_name":"Schindelhauer, Christian","last_name":"Schindelhauer","first_name":"Christian"}],"date_updated":"2022-01-06T06:57:31Z","doi":"10.1007/11561071_5","title":"Online Routing in Faulty Meshes with Sub-linear Comparative Time and Traffic Ratio"},{"date_created":"2020-09-01T11:53:19Z","author":[{"first_name":"Mihai","last_name":"Bădoiu","full_name":"Bădoiu, Mihai"},{"first_name":"Artur","last_name":"Czumaj","full_name":"Czumaj, Artur"},{"first_name":"Piotr","last_name":"Indyk","full_name":"Indyk, Piotr"},{"last_name":"Sohler","full_name":"Sohler, Christian","first_name":"Christian"}],"date_updated":"2022-01-06T06:53:52Z","doi":"10.1007/11523468_70","title":"Facility Location in Sublinear Time","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540275800","9783540316916"]},"citation":{"chicago":"Bădoiu, Mihai, Artur Czumaj, Piotr Indyk, and Christian Sohler. “Facility Location in Sublinear Time.” In <i>Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP)</i>, 866–77. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11523468_70\">https://doi.org/10.1007/11523468_70</a>.","ieee":"M. Bădoiu, A. Czumaj, P. Indyk, and C. Sohler, “Facility Location in Sublinear Time,” in <i>Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP)</i>, 2005, pp. 866–877.","ama":"Bădoiu M, Czumaj A, Indyk P, Sohler C. Facility Location in Sublinear Time. In: <i>Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP)</i>. Berlin, Heidelberg; 2005:866-877. doi:<a href=\"https://doi.org/10.1007/11523468_70\">10.1007/11523468_70</a>","apa":"Bădoiu, M., Czumaj, A., Indyk, P., &#38; Sohler, C. (2005). Facility Location in Sublinear Time. In <i>Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP)</i> (pp. 866–877). Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11523468_70\">https://doi.org/10.1007/11523468_70</a>","short":"M. Bădoiu, A. Czumaj, P. Indyk, C. Sohler, in: Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP), Berlin, Heidelberg, 2005, pp. 866–877.","bibtex":"@inproceedings{Bădoiu_Czumaj_Indyk_Sohler_2005, place={Berlin, Heidelberg}, title={Facility Location in Sublinear Time}, DOI={<a href=\"https://doi.org/10.1007/11523468_70\">10.1007/11523468_70</a>}, booktitle={Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP)}, author={Bădoiu, Mihai and Czumaj, Artur and Indyk, Piotr and Sohler, Christian}, year={2005}, pages={866–877} }","mla":"Bădoiu, Mihai, et al. “Facility Location in Sublinear Time.” <i>Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP)</i>, 2005, pp. 866–77, doi:<a href=\"https://doi.org/10.1007/11523468_70\">10.1007/11523468_70</a>."},"page":"866-877","year":"2005","place":"Berlin, Heidelberg","user_id":"15415","department":[{"_id":"63"}],"_id":"18768","language":[{"iso":"eng"}],"type":"conference","publication":"Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP)","status":"public"},{"title":"Online Occlusion Culling","doi":"10.1007/11561071_67","date_updated":"2022-01-06T06:53:53Z","publisher":"Springer","author":[{"first_name":"Gereon","last_name":"Frahling","full_name":"Frahling, Gereon"},{"full_name":"Krokowski, Jens","last_name":"Krokowski","first_name":"Jens"}],"date_created":"2020-09-02T13:26:52Z","volume":3669,"year":"2005","place":"Berlin, Heidelberg","citation":{"short":"G. Frahling, J. Krokowski, in: Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005), Springer, Berlin, Heidelberg, 2005, pp. 758–769.","mla":"Frahling, Gereon, and Jens Krokowski. “Online Occlusion Culling.” <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i>, vol. 3669, Springer, 2005, pp. 758–69, doi:<a href=\"https://doi.org/10.1007/11561071_67\">10.1007/11561071_67</a>.","bibtex":"@inproceedings{Frahling_Krokowski_2005, place={Berlin, Heidelberg}, title={Online Occlusion Culling}, volume={3669}, DOI={<a href=\"https://doi.org/10.1007/11561071_67\">10.1007/11561071_67</a>}, booktitle={Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)}, publisher={Springer}, author={Frahling, Gereon and Krokowski, Jens}, year={2005}, pages={758–769} }","apa":"Frahling, G., &#38; Krokowski, J. (2005). Online Occlusion Culling. In <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i> (Vol. 3669, pp. 758–769). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/11561071_67\">https://doi.org/10.1007/11561071_67</a>","chicago":"Frahling, Gereon, and Jens Krokowski. “Online Occlusion Culling.” In <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i>, 3669:758–69. Berlin, Heidelberg: Springer, 2005. <a href=\"https://doi.org/10.1007/11561071_67\">https://doi.org/10.1007/11561071_67</a>.","ieee":"G. Frahling and J. Krokowski, “Online Occlusion Culling,” in <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i>, 2005, vol. 3669, pp. 758–769.","ama":"Frahling G, Krokowski J. Online Occlusion Culling. In: <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i>. Vol 3669. Berlin, Heidelberg: Springer; 2005:758-769. doi:<a href=\"https://doi.org/10.1007/11561071_67\">10.1007/11561071_67</a>"},"page":"758-769","intvolume":"      3669","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540291183","9783540319511"]},"language":[{"iso":"eng"}],"_id":"18867","user_id":"15415","department":[{"_id":"63"}],"abstract":[{"lang":"eng","text":"Modern computer graphics systems are able to render sophisticated 3D szenes consisting of millions of polygons. In this paper we address the problem of occlusion culling. Aila, Miettinen, and Nordlund suggested to implement a FIFO buffer on graphics cards which is able to delay the polygons before drawing them. When one of the polygons within the buffer is occluded or masked by another polygon arriving later from the application, the rendering engine can drop the occluded one without rendering, saving important rendering time.<br>We introduce a theoretical online model to analyse these problems in theory using competitive analysis. For different cost measures addressed we invent the first competitive algorithms for online occlusion culling. Our implementation shows that these algorithms outperform known ones for real 3D scenes as well."}],"status":"public","type":"conference","publication":"Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)"},{"department":[{"_id":"63"}],"user_id":"15415","_id":"18912","language":[{"iso":"eng"}],"publication":"Proc. of the European Conference in Parallel Processing (Euro-Par)","type":"conference","status":"public","abstract":[{"lang":"eng","text":"We consider Dynamic Page Migration (DPM) problem, one of the fundamental subproblems of data management in dynamically changing networks. We investigate a hybrid scenario, where access patterns to the shared object are dictated by an adversary, and each processor performs a random walk in X. We extend the previous results of [4]: we develop algorithms for the case where X is a ring, and prove that with high probability they achieve a competitive ratio of O~(min{D−−√4,n}), where D is the size of the shared object and n is the number of nodes in the network. These results hold also for any d-dimensional torus or mesh with diameter at least Ω~(D−−√)."}],"author":[{"first_name":"Marcin","last_name":"Bienkowski","full_name":"Bienkowski, Marcin"},{"first_name":"Miroslaw","last_name":"Korzeniowski","full_name":"Korzeniowski, Miroslaw"}],"date_created":"2020-09-03T07:56:58Z","date_updated":"2022-01-06T06:53:54Z","doi":"10.1007/11549468_105","title":"Dynamic Page Migration Under Brownian Motion","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540287001","9783540319252"]},"publication_status":"published","citation":{"chicago":"Bienkowski, Marcin, and Miroslaw Korzeniowski. “Dynamic Page Migration Under Brownian Motion.” In <i>Proc. of the European Conference in Parallel Processing (Euro-Par)</i>. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11549468_105\">https://doi.org/10.1007/11549468_105</a>.","ieee":"M. Bienkowski and M. Korzeniowski, “Dynamic Page Migration Under Brownian Motion,” in <i>Proc. of the European Conference in Parallel Processing (Euro-Par)</i>, 2005.","ama":"Bienkowski M, Korzeniowski M. Dynamic Page Migration Under Brownian Motion. In: <i>Proc. of the European Conference in Parallel Processing (Euro-Par)</i>. Berlin, Heidelberg; 2005. doi:<a href=\"https://doi.org/10.1007/11549468_105\">10.1007/11549468_105</a>","mla":"Bienkowski, Marcin, and Miroslaw Korzeniowski. “Dynamic Page Migration Under Brownian Motion.” <i>Proc. of the European Conference in Parallel Processing (Euro-Par)</i>, 2005, doi:<a href=\"https://doi.org/10.1007/11549468_105\">10.1007/11549468_105</a>.","bibtex":"@inproceedings{Bienkowski_Korzeniowski_2005, place={Berlin, Heidelberg}, title={Dynamic Page Migration Under Brownian Motion}, DOI={<a href=\"https://doi.org/10.1007/11549468_105\">10.1007/11549468_105</a>}, booktitle={Proc. of the European Conference in Parallel Processing (Euro-Par)}, author={Bienkowski, Marcin and Korzeniowski, Miroslaw}, year={2005} }","short":"M. Bienkowski, M. Korzeniowski, in: Proc. of the European Conference in Parallel Processing (Euro-Par), Berlin, Heidelberg, 2005.","apa":"Bienkowski, M., &#38; Korzeniowski, M. (2005). Dynamic Page Migration Under Brownian Motion. In <i>Proc. of the European Conference in Parallel Processing (Euro-Par)</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11549468_105\">https://doi.org/10.1007/11549468_105</a>"},"place":"Berlin, Heidelberg","year":"2005"},{"title":"Bucket Game with Applications to Set Multicover and Dynamic Page Migration","publisher":"Springer ","date_created":"2020-09-03T08:11:11Z","year":"2005","language":[{"iso":"eng"}],"abstract":[{"text":"We present a simple two-person Bucket Game, based on throwing balls into buckets, and we<br>discuss possible players' strategies.<br><br>We use these strategies to create an approximation algorithm for a generalization of<br>the well known Set Cover problem, where we need to cover each element by at least $k$ sets.<br>Furthermore, we apply these strategies to construct a randomized algorithm for Dynamic Page Migration <br>problem achieving the optimal competitive ratio against an oblivious adversary.","lang":"eng"}],"publication":"Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)","doi":"10.1007/11561071_72","date_updated":"2022-01-06T06:53:54Z","volume":3669,"author":[{"last_name":"Bienkowski","full_name":"Bienkowski, Marcin","first_name":"Marcin"},{"full_name":"Byrka, Jarosław","last_name":"Byrka","first_name":"Jarosław"}],"place":"Berlin, Heidelberg","intvolume":"      3669","page":"815-826","citation":{"chicago":"Bienkowski, Marcin, and Jarosław Byrka. “Bucket Game with Applications to Set Multicover and Dynamic Page Migration.” In <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i>, 3669:815–26. Berlin, Heidelberg: Springer , 2005. <a href=\"https://doi.org/10.1007/11561071_72\">https://doi.org/10.1007/11561071_72</a>.","ieee":"M. Bienkowski and J. Byrka, “Bucket Game with Applications to Set Multicover and Dynamic Page Migration,” in <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i>, 2005, vol. 3669, pp. 815–826.","ama":"Bienkowski M, Byrka J. Bucket Game with Applications to Set Multicover and Dynamic Page Migration. In: <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i>. Vol 3669. Berlin, Heidelberg: Springer ; 2005:815-826. doi:<a href=\"https://doi.org/10.1007/11561071_72\">10.1007/11561071_72</a>","short":"M. Bienkowski, J. Byrka, in: Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005), Springer , Berlin, Heidelberg, 2005, pp. 815–826.","bibtex":"@inproceedings{Bienkowski_Byrka_2005, place={Berlin, Heidelberg}, title={Bucket Game with Applications to Set Multicover and Dynamic Page Migration}, volume={3669}, DOI={<a href=\"https://doi.org/10.1007/11561071_72\">10.1007/11561071_72</a>}, booktitle={Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)}, publisher={Springer }, author={Bienkowski, Marcin and Byrka, Jarosław}, year={2005}, pages={815–826} }","mla":"Bienkowski, Marcin, and Jarosław Byrka. “Bucket Game with Applications to Set Multicover and Dynamic Page Migration.” <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i>, vol. 3669, Springer , 2005, pp. 815–26, doi:<a href=\"https://doi.org/10.1007/11561071_72\">10.1007/11561071_72</a>.","apa":"Bienkowski, M., &#38; Byrka, J. (2005). Bucket Game with Applications to Set Multicover and Dynamic Page Migration. In <i>Proc. of the 13th Annual European Symposium on Algorithms (ESA 2005)</i> (Vol. 3669, pp. 815–826). Berlin, Heidelberg: Springer . <a href=\"https://doi.org/10.1007/11561071_72\">https://doi.org/10.1007/11561071_72</a>"},"publication_identifier":{"isbn":["9783540291183","9783540319511"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","_id":"18915","department":[{"_id":"63"}],"user_id":"15415","status":"public","type":"conference"},{"place":"Berlin, Heidelberg","intvolume":"      3420","page":"413-420","citation":{"ieee":"M. Bienkowski, A. Brinkmann, M. Korzeniowski, and O. Orhan, “Cube Connected Cycles Based Bluetooth Scatternet Formation,” in <i>Proceedings of the 4th International Conference on Networking</i>, 2005, vol. 3420, pp. 413–420.","chicago":"Bienkowski, Marcin, André Brinkmann, Miroslaw Korzeniowski, and Orhan Orhan. “Cube Connected Cycles Based Bluetooth Scatternet Formation.” In <i>Proceedings of the 4th International Conference on Networking</i>, 3420:413–20.  Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2005. <a href=\"https://doi.org/10.1007/978-3-540-31956-6_49\">https://doi.org/10.1007/978-3-540-31956-6_49</a>.","ama":"Bienkowski M, Brinkmann A, Korzeniowski M, Orhan O. Cube Connected Cycles Based Bluetooth Scatternet Formation. In: <i>Proceedings of the 4th International Conference on Networking</i>. Vol 3420.  Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2005:413-420. doi:<a href=\"https://doi.org/10.1007/978-3-540-31956-6_49\">10.1007/978-3-540-31956-6_49</a>","apa":"Bienkowski, M., Brinkmann, A., Korzeniowski, M., &#38; Orhan, O. (2005). Cube Connected Cycles Based Bluetooth Scatternet Formation. In <i>Proceedings of the 4th International Conference on Networking</i> (Vol. 3420, pp. 413–420). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-540-31956-6_49\">https://doi.org/10.1007/978-3-540-31956-6_49</a>","short":"M. Bienkowski, A. Brinkmann, M. Korzeniowski, O. Orhan, in: Proceedings of the 4th International Conference on Networking, Springer, Berlin, Heidelberg, 2005, pp. 413–420.","bibtex":"@inproceedings{Bienkowski_Brinkmann_Korzeniowski_Orhan_2005, place={Berlin, Heidelberg}, series={ Lecture Notes in Computer Science}, title={Cube Connected Cycles Based Bluetooth Scatternet Formation}, volume={3420}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-31956-6_49\">10.1007/978-3-540-31956-6_49</a>}, booktitle={Proceedings of the 4th International Conference on Networking}, publisher={Springer}, author={Bienkowski, Marcin and Brinkmann, André and Korzeniowski, Miroslaw and Orhan, Orhan}, year={2005}, pages={413–420}, collection={ Lecture Notes in Computer Science} }","mla":"Bienkowski, Marcin, et al. “Cube Connected Cycles Based Bluetooth Scatternet Formation.” <i>Proceedings of the 4th International Conference on Networking</i>, vol. 3420, Springer, 2005, pp. 413–20, doi:<a href=\"https://doi.org/10.1007/978-3-540-31956-6_49\">10.1007/978-3-540-31956-6_49</a>."},"publication_identifier":{"isbn":["9783540253396","9783540319566"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","doi":"10.1007/978-3-540-31956-6_49","date_updated":"2022-01-06T06:53:54Z","volume":3420,"author":[{"last_name":"Bienkowski","full_name":"Bienkowski, Marcin","first_name":"Marcin"},{"last_name":"Brinkmann","full_name":"Brinkmann, André","first_name":"André"},{"first_name":"Miroslaw","last_name":"Korzeniowski","full_name":"Korzeniowski, Miroslaw"},{"full_name":"Orhan, Orhan","last_name":"Orhan","first_name":"Orhan"}],"status":"public","type":"conference","_id":"18924","department":[{"_id":"63"}],"series_title":" Lecture Notes in Computer Science","user_id":"15415","year":"2005","title":"Cube Connected Cycles Based Bluetooth Scatternet Formation","publisher":"Springer","date_created":"2020-09-03T09:52:33Z","abstract":[{"lang":"eng","text":"Bluetooth is a wireless communication standard developed for personal area networks (PAN) that gained popularity in the last years. It was designed to connect a few devices together, however nowadays there is a need to build larger networks. Construction and maintenance algorithms have great effect on performance of the network. We present an algorithm based on Cube Connected Cycles (CCC) topology and show how to maintain the network so that it is easily scalable. Our design guarantees good properties such as constant degree and logarithmic dilation. Besides, the construction costs are proven to be at most constant times larger than any other algorithm would need."}],"publication":"Proceedings of the 4th International Conference on Networking","language":[{"iso":"eng"}]},{"status":"public","abstract":[{"lang":"eng","text":"The dynamic page migration problem citedynamic-page-migration is defined in <br>a distributed network of $n$ mobile nodes sharing one indivisible memory page <br>of size $D$. During runtime, the nodes can both access a unit of data from<br>the page and move with a constant speed, thus changing the costs of communication.<br>The problem is to compute <em> online</em> a schedule of page movements<br>to minimize the total communication cost.<br><br>In this paper we construct and analyze the first deterministic algorithm for this problem. <br>We prove that it achieves an (up to a constant factor) optimal competitive ratio <br>$O(n cdot sqrtD)$. We show that the randomization of this algorithm <br>improves this ratio to $O(sqrtD cdot log n)$ (against an oblivious adversary). <br>This substantially improves an $O(n cdot sqrtD)$ upper bound from citedynamic-page-migration.<br>We also give an almost matching lower bound of $Omega(sqrtD cdot sqrtlog n)$ for this problem."}],"type":"conference","publication":"Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","user_id":"15415","department":[{"_id":"63"}],"_id":"18925","citation":{"short":"M. Bienkowski, M. Dynia, M. Korzeniowski, in: Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS), 2005, pp. 365–376.","bibtex":"@inproceedings{Bienkowski_Dynia_Korzeniowski_2005, series={Lecture Notes in Computer Science}, title={Improved Algorithms for Dynamic Page Migration}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">10.1007/978-3-540-31856-9_30</a>}, booktitle={Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)}, author={Bienkowski, Marcin and Dynia, Miroslaw and Korzeniowski, Miroslaw}, year={2005}, pages={365–376}, collection={Lecture Notes in Computer Science} }","mla":"Bienkowski, Marcin, et al. “Improved Algorithms for Dynamic Page Migration.” <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i>, 2005, pp. 365–76, doi:<a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">10.1007/978-3-540-31856-9_30</a>.","apa":"Bienkowski, M., Dynia, M., &#38; Korzeniowski, M. (2005). Improved Algorithms for Dynamic Page Migration. In <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i> (pp. 365–376). <a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">https://doi.org/10.1007/978-3-540-31856-9_30</a>","ama":"Bienkowski M, Dynia M, Korzeniowski M. Improved Algorithms for Dynamic Page Migration. In: <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i>. Lecture Notes in Computer Science. ; 2005:365-376. doi:<a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">10.1007/978-3-540-31856-9_30</a>","chicago":"Bienkowski, Marcin, Miroslaw Dynia, and Miroslaw Korzeniowski. “Improved Algorithms for Dynamic Page Migration.” In <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i>, 365–76. Lecture Notes in Computer Science, 2005. <a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">https://doi.org/10.1007/978-3-540-31856-9_30</a>.","ieee":"M. Bienkowski, M. Dynia, and M. Korzeniowski, “Improved Algorithms for Dynamic Page Migration,” in <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i>, 2005, pp. 365–376."},"page":"365-376","year":"2005","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540249986","9783540318569"]},"doi":"10.1007/978-3-540-31856-9_30","title":"Improved Algorithms for Dynamic Page Migration","date_created":"2020-09-03T10:01:03Z","author":[{"first_name":"Marcin","full_name":"Bienkowski, Marcin","last_name":"Bienkowski"},{"first_name":"Miroslaw","full_name":"Dynia, Miroslaw","last_name":"Dynia"},{"full_name":"Korzeniowski, Miroslaw","last_name":"Korzeniowski","first_name":"Miroslaw"}],"date_updated":"2022-01-06T06:53:54Z"},{"_id":"17988","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"type":"book_chapter","publication":"Fundamentals of Computation Theory","status":"public","date_updated":"2022-01-06T06:53:24Z","author":[{"first_name":"Sven","last_name":"Köhler","full_name":"Köhler, Sven"},{"full_name":"Schindelhauer, Christian","last_name":"Schindelhauer","first_name":"Christian"},{"full_name":"Ziegler, Martin","last_name":"Ziegler","first_name":"Martin"}],"date_created":"2020-08-14T13:44:48Z","title":"On Approximating Real-World Halting Problems","doi":"10.1007/11537311_40","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540281931","9783540318736"]},"year":"2005","place":"Berlin, Heidelberg","citation":{"ama":"Köhler S, Schindelhauer C, Ziegler M. On Approximating Real-World Halting Problems. In: <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg; 2005. doi:<a href=\"https://doi.org/10.1007/11537311_40\">10.1007/11537311_40</a>","ieee":"S. Köhler, C. Schindelhauer, and M. Ziegler, “On Approximating Real-World Halting Problems,” in <i>Fundamentals of Computation Theory</i>, Berlin, Heidelberg, 2005.","chicago":"Köhler, Sven, Christian Schindelhauer, and Martin Ziegler. “On Approximating Real-World Halting Problems.” In <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11537311_40\">https://doi.org/10.1007/11537311_40</a>.","apa":"Köhler, S., Schindelhauer, C., &#38; Ziegler, M. (2005). On Approximating Real-World Halting Problems. In <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11537311_40\">https://doi.org/10.1007/11537311_40</a>","bibtex":"@inbook{Köhler_Schindelhauer_Ziegler_2005, place={Berlin, Heidelberg}, title={On Approximating Real-World Halting Problems}, DOI={<a href=\"https://doi.org/10.1007/11537311_40\">10.1007/11537311_40</a>}, booktitle={Fundamentals of Computation Theory}, author={Köhler, Sven and Schindelhauer, Christian and Ziegler, Martin}, year={2005} }","short":"S. Köhler, C. Schindelhauer, M. Ziegler, in: Fundamentals of Computation Theory, Berlin, Heidelberg, 2005.","mla":"Köhler, Sven, et al. “On Approximating Real-World Halting Problems.” <i>Fundamentals of Computation Theory</i>, 2005, doi:<a href=\"https://doi.org/10.1007/11537311_40\">10.1007/11537311_40</a>."}},{"publication_status":"published","publication_identifier":{"isbn":["9783540281931","9783540318736"],"issn":["0302-9743","1611-3349"]},"citation":{"bibtex":"@inbook{Meer_Ziegler_2005, place={Berlin, Heidelberg}, title={An Explicit Solution to Post’s Problem over the Reals}, DOI={<a href=\"https://doi.org/10.1007/11537311_41\">10.1007/11537311_41</a>}, booktitle={Fundamentals of Computation Theory}, author={Meer, Klaus and Ziegler, Martin}, year={2005} }","mla":"Meer, Klaus, and Martin Ziegler. “An Explicit Solution to Post’s Problem over the Reals.” <i>Fundamentals of Computation Theory</i>, 2005, doi:<a href=\"https://doi.org/10.1007/11537311_41\">10.1007/11537311_41</a>.","short":"K. Meer, M. Ziegler, in: Fundamentals of Computation Theory, Berlin, Heidelberg, 2005.","apa":"Meer, K., &#38; Ziegler, M. (2005). An Explicit Solution to Post’s Problem over the Reals. In <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11537311_41\">https://doi.org/10.1007/11537311_41</a>","ama":"Meer K, Ziegler M. An Explicit Solution to Post’s Problem over the Reals. In: <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg; 2005. doi:<a href=\"https://doi.org/10.1007/11537311_41\">10.1007/11537311_41</a>","ieee":"K. Meer and M. Ziegler, “An Explicit Solution to Post’s Problem over the Reals,” in <i>Fundamentals of Computation Theory</i>, Berlin, Heidelberg, 2005.","chicago":"Meer, Klaus, and Martin Ziegler. “An Explicit Solution to Post’s Problem over the Reals.” In <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11537311_41\">https://doi.org/10.1007/11537311_41</a>."},"year":"2005","place":"Berlin, Heidelberg","author":[{"last_name":"Meer","full_name":"Meer, Klaus","first_name":"Klaus"},{"first_name":"Martin","last_name":"Ziegler","full_name":"Ziegler, Martin"}],"date_created":"2020-08-14T13:46:23Z","date_updated":"2022-01-06T06:53:24Z","doi":"10.1007/11537311_41","title":"An Explicit Solution to Post’s Problem over the Reals","type":"book_chapter","publication":"Fundamentals of Computation Theory","status":"public","user_id":"15415","department":[{"_id":"63"}],"_id":"17989","language":[{"iso":"eng"}]}]
