[{"date_updated":"2022-01-06T07:02:58Z","doi":"10.1007/978-3-319-91797-9_52","series_title":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"place":"Cham","title":"Assist Users to Straightaway Suggest and Describe Experienced Problems","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"publication_status":"published","publication_identifier":{"isbn":["9783319917962","9783319917979"],"issn":["0302-9743","1611-3349"]},"intvolume":" 10918","_id":"6253","conference":{"name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2018","start_date":"2018-07-15","location":"Las Vegas, USA","end_date":"2018-07-20"},"year":"2018","citation":{"bibtex":"@inbook{Senft_Fischer_Oberthür_Patkar_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={Assist Users to Straightaway Suggest and Describe Experienced Problems}, volume={10918}, DOI={10.1007/978-3-319-91797-9_52}, booktitle={Design, User Experience, and Usability: Theory and Practice}, publisher={Springer International Publishing}, author={Senft, Björn and Fischer, Holger Gerhard and Oberthür, Simon and Patkar, Nitish}, year={2018}, pages={758–770}, collection={Lecture Notes in Computer Science} }","mla":"Senft, Björn, et al. “Assist Users to Straightaway Suggest and Describe Experienced Problems.” Design, User Experience, and Usability: Theory and Practice, vol. 10918, Springer International Publishing, 2018, pp. 758–70, doi:10.1007/978-3-319-91797-9_52.","ama":"Senft B, Fischer HG, Oberthür S, Patkar N. Assist Users to Straightaway Suggest and Describe Experienced Problems. In: Design, User Experience, and Usability: Theory and Practice. Vol 10918. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:758-770. doi:10.1007/978-3-319-91797-9_52","apa":"Senft, B., Fischer, H. G., Oberthür, S., & Patkar, N. (2018). Assist Users to Straightaway Suggest and Describe Experienced Problems. In Design, User Experience, and Usability: Theory and Practice (Vol. 10918, pp. 758–770). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-91797-9_52","chicago":"Senft, Björn, Holger Gerhard Fischer, Simon Oberthür, and Nitish Patkar. “Assist Users to Straightaway Suggest and Describe Experienced Problems.” In Design, User Experience, and Usability: Theory and Practice, 10918:758–70. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-91797-9_52.","ieee":"B. Senft, H. G. Fischer, S. Oberthür, and N. Patkar, “Assist Users to Straightaway Suggest and Describe Experienced Problems,” in Design, User Experience, and Usability: Theory and Practice, vol. 10918, Cham: Springer International Publishing, 2018, pp. 758–770.","short":"B. Senft, H.G. Fischer, S. Oberthür, N. Patkar, in: Design, User Experience, and Usability: Theory and Practice, Springer International Publishing, Cham, 2018, pp. 758–770."},"type":"book_chapter","page":"758-770","user_id":"30457","publisher":"Springer International Publishing","author":[{"first_name":"Björn","full_name":"Senft, Björn","last_name":"Senft","id":"9109"},{"first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","id":"30457"},{"first_name":"Simon","full_name":"Oberthür, Simon","last_name":"Oberthür","id":"383"},{"first_name":"Nitish","full_name":"Patkar, Nitish","last_name":"Patkar"}],"publication":"Design, User Experience, and Usability: Theory and Practice","volume":10918,"status":"public","date_created":"2018-12-18T10:37:41Z"},{"doi":"10.1007/978-3-319-91797-9_49","date_updated":"2022-01-06T07:02:58Z","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","title":"A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems","place":"Cham","editor":[{"first_name":"Aaron","full_name":"Marcus, Aaron","last_name":"Marcus"},{"first_name":"Wentao","full_name":"Wang, Wentao","last_name":"Wang"}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319917962","9783319917979"]},"department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"intvolume":" 10918","_id":"6254","conference":{"end_date":"2018-07-20","location":"Las Vegas, USA","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2018","start_date":"2018-07-15"},"year":"2018","type":"book_chapter","citation":{"bibtex":"@inbook{Fischer_Senft_Rittmeier_Sauer_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems}, volume={10918}, DOI={10.1007/978-3-319-91797-9_49}, booktitle={Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn and Rittmeier, Florian and Sauer, Stefan}, editor={Marcus, Aaron and Wang, WentaoEditors}, year={2018}, pages={711–724}, collection={Lecture Notes in Computer Science} }","mla":"Fischer, Holger Gerhard, et al. “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.” Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), edited by Aaron Marcus and Wentao Wang, vol. 10918, Springer International Publishing, 2018, pp. 711–24, doi:10.1007/978-3-319-91797-9_49.","apa":"Fischer, H. G., Senft, B., Rittmeier, F., & Sauer, S. (2018). A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In A. Marcus & W. Wang (Eds.), Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018) (Vol. 10918, pp. 711–724). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-91797-9_49","ama":"Fischer HG, Senft B, Rittmeier F, Sauer S. A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In: Marcus A, Wang W, eds. Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018). Vol 10918. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:711-724. doi:10.1007/978-3-319-91797-9_49","chicago":"Fischer, Holger Gerhard, Björn Senft, Florian Rittmeier, and Stefan Sauer. “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.” In Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), edited by Aaron Marcus and Wentao Wang, 10918:711–24. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-91797-9_49.","ieee":"H. G. Fischer, B. Senft, F. Rittmeier, and S. Sauer, “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems,” in Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), vol. 10918, A. Marcus and W. Wang, Eds. Cham: Springer International Publishing, 2018, pp. 711–724.","short":"H.G. Fischer, B. Senft, F. Rittmeier, S. Sauer, in: A. Marcus, W. Wang (Eds.), Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), Springer International Publishing, Cham, 2018, pp. 711–724."},"page":"711-724","user_id":"30457","volume":10918,"status":"public","date_created":"2018-12-18T10:42:39Z","publisher":"Springer International Publishing","author":[{"first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","id":"30457"},{"full_name":"Senft, Björn","first_name":"Björn","id":"9109","last_name":"Senft"},{"last_name":"Rittmeier","id":"5281","first_name":"Florian","full_name":"Rittmeier, Florian"},{"last_name":"Sauer","id":"447","first_name":"Stefan","full_name":"Sauer, Stefan"}],"publication":"Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)"},{"title":"Preference-Based Reinforcement Learning Using Dyad Ranking","place":"Cham","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"10","name":"SFB 901 - Subproject B2"}],"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030017705","9783030017712"]},"publication_status":"published","department":[{"_id":"355"}],"doi":"10.1007/978-3-030-01771-2_11","date_updated":"2022-01-06T07:03:04Z","language":[{"iso":"eng"}],"user_id":"49109","ddc":["000"],"date_created":"2018-12-20T15:52:03Z","has_accepted_license":"1","status":"public","file":[{"file_id":"6623","creator":"ups","file_size":458972,"relation":"main_file","success":1,"date_updated":"2019-01-11T11:03:50Z","content_type":"application/pdf","file_name":"Schäfer-Hüllermeier2018_Chapter_Preference-BasedReinforcementL.pdf","date_created":"2019-01-11T11:03:50Z","access_level":"closed"}],"file_date_updated":"2019-01-11T11:03:50Z","publication":"Discovery Science","publisher":"Springer International Publishing","author":[{"last_name":"Schäfer","full_name":"Schäfer, Dirk","first_name":"Dirk"},{"id":"48129","last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","first_name":"Eyke"}],"_id":"6423","page":"161-175","citation":{"chicago":"Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning Using Dyad Ranking.” In Discovery Science, 161–75. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-030-01771-2_11.","apa":"Schäfer, D., & Hüllermeier, E. (2018). Preference-Based Reinforcement Learning Using Dyad Ranking. In Discovery Science (pp. 161–175). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-01771-2_11","ama":"Schäfer D, Hüllermeier E. Preference-Based Reinforcement Learning Using Dyad Ranking. In: Discovery Science. Cham: Springer International Publishing; 2018:161-175. doi:10.1007/978-3-030-01771-2_11","mla":"Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning Using Dyad Ranking.” Discovery Science, Springer International Publishing, 2018, pp. 161–75, doi:10.1007/978-3-030-01771-2_11.","bibtex":"@inbook{Schäfer_Hüllermeier_2018, place={Cham}, title={Preference-Based Reinforcement Learning Using Dyad Ranking}, DOI={10.1007/978-3-030-01771-2_11}, booktitle={Discovery Science}, publisher={Springer International Publishing}, author={Schäfer, Dirk and Hüllermeier, Eyke}, year={2018}, pages={161–175} }","short":"D. Schäfer, E. Hüllermeier, in: Discovery Science, Springer International Publishing, Cham, 2018, pp. 161–175.","ieee":"D. Schäfer and E. Hüllermeier, “Preference-Based Reinforcement Learning Using Dyad Ranking,” in Discovery Science, Cham: Springer International Publishing, 2018, pp. 161–175."},"year":"2018","type":"book_chapter"},{"place":"Cham","title":"A Dynamic Distributed Data Structure for Top-k and k-Select Queries","user_id":"15415","author":[{"last_name":"Feldkord","id":"22704","first_name":"Björn","full_name":"Feldkord, Björn"},{"first_name":"Manuel","full_name":"Malatyali, Manuel","last_name":"Malatyali"},{"full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"publication":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","department":[{"_id":"63"}],"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319125671","9783319125688"]},"publication_status":"published","status":"public","date_created":"2020-04-03T07:04:59Z","date_updated":"2022-01-06T06:52:50Z","_id":"16392","doi":"10.1007/978-3-319-98355-4_18","year":"2018","citation":{"chicago":"Feldkord, Björn, Manuel Malatyali, and Friedhelm Meyer auf der Heide. “A Dynamic Distributed Data Structure for Top-k and k-Select Queries.” In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Cham, 2018. https://doi.org/10.1007/978-3-319-98355-4_18.","apa":"Feldkord, B., Malatyali, M., & Meyer auf der Heide, F. (2018). A Dynamic Distributed Data Structure for Top-k and k-Select Queries. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Cham. https://doi.org/10.1007/978-3-319-98355-4_18","ama":"Feldkord B, Malatyali M, Meyer auf der Heide F. A Dynamic Distributed Data Structure for Top-k and k-Select Queries. In: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Cham; 2018. doi:10.1007/978-3-319-98355-4_18","bibtex":"@inbook{Feldkord_Malatyali_Meyer auf der Heide_2018, place={Cham}, title={A Dynamic Distributed Data Structure for Top-k and k-Select Queries}, DOI={10.1007/978-3-319-98355-4_18}, booktitle={Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications}, author={Feldkord, Björn and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}, year={2018} }","mla":"Feldkord, Björn, et al. “A Dynamic Distributed Data Structure for Top-k and k-Select Queries.” Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2018, doi:10.1007/978-3-319-98355-4_18.","short":"B. Feldkord, M. Malatyali, F. Meyer auf der Heide, in: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Cham, 2018.","ieee":"B. Feldkord, M. Malatyali, and F. Meyer auf der Heide, “A Dynamic Distributed Data Structure for Top-k and k-Select Queries,” in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Cham, 2018."},"type":"book_chapter","language":[{"iso":"eng"}]},{"date_created":"2021-09-14T12:41:58Z","status":"public","publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","department":[{"_id":"63"}],"publication":"International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)","author":[{"full_name":"Khaluf, Yara","first_name":"Yara","last_name":"Khaluf"},{"full_name":"Markarian, Christine","first_name":"Christine","last_name":"Markarian"},{"last_name":"Simoens","full_name":"Simoens, Pieter","first_name":"Pieter"},{"first_name":"Andreagiovanni","full_name":"Reina, Andreagiovanni","last_name":"Reina"}],"user_id":"15415","title":"Scheduling Access to Shared Space in Multi-robot Systems","abstract":[{"text":"Through this study, we introduce the idea of applying scheduling techniques to allocate spatial resources that are shared among multiple robots moving in a static environment and having temporal constraints on the arrival time to destinations. To illustrate this idea, we present an exemplified algorithm that plans and assigns a motion path to each robot. The considered problem is particularly challenging because: (i) the robots share the same environment and thus the planner must take into account overlapping paths which cannot happen at the same time; (ii) there are time deadlines thus the planner must deal with temporal constraints; (iii) new requests arrive without a priori knowledge thus the planner must be able to add new paths online and adjust old plans; (iv) the robot motion is subject to noise thus the planner must be reactive to adapt to online changes. We showcase the functioning of the proposed algorithm through a set of agent-based simulations.","lang":"eng"}],"place":"Cham","language":[{"iso":"eng"}],"year":"2017","citation":{"short":"Y. Khaluf, C. Markarian, P. Simoens, A. Reina, in: International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017), Cham, 2017.","ieee":"Y. Khaluf, C. Markarian, P. Simoens, and A. Reina, “Scheduling Access to Shared Space in Multi-robot Systems,” 2017, doi: 10.1007/978-3-319-59930-4_12.","chicago":"Khaluf, Yara, Christine Markarian, Pieter Simoens, and Andreagiovanni Reina. “Scheduling Access to Shared Space in Multi-Robot Systems.” In International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017). Cham, 2017. https://doi.org/10.1007/978-3-319-59930-4_12.","ama":"Khaluf Y, Markarian C, Simoens P, Reina A. Scheduling Access to Shared Space in Multi-robot Systems. In: International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017). ; 2017. doi:10.1007/978-3-319-59930-4_12","apa":"Khaluf, Y., Markarian, C., Simoens, P., & Reina, A. (2017). Scheduling Access to Shared Space in Multi-robot Systems. International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017). https://doi.org/10.1007/978-3-319-59930-4_12","mla":"Khaluf, Yara, et al. “Scheduling Access to Shared Space in Multi-Robot Systems.” International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017), 2017, doi:10.1007/978-3-319-59930-4_12.","bibtex":"@inproceedings{Khaluf_Markarian_Simoens_Reina_2017, place={Cham}, title={Scheduling Access to Shared Space in Multi-robot Systems}, DOI={10.1007/978-3-319-59930-4_12}, booktitle={International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)}, author={Khaluf, Yara and Markarian, Christine and Simoens, Pieter and Reina, Andreagiovanni}, year={2017} }"},"type":"conference","doi":"10.1007/978-3-319-59930-4_12","date_updated":"2022-01-06T06:56:19Z","_id":"24398"},{"language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","doi":"10.1007/978-3-319-72453-9_35","oa":"1","date_updated":"2022-01-06T06:58:49Z","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319724522","9783319724539"]},"publication_status":"published","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"64"}],"title":"Subtleties in Security Definitions for Predicate Encryption with Public Index","place":"Cham","type":"conference","year":"2017","citation":{"ieee":"J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 2017, vol. 10693, pp. 438–453.","short":"J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.","bibtex":"@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={10.1007/978-3-319-72453-9_35}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }","mla":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:10.1007/978-3-319-72453-9_35.","ama":"Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS). Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:10.1007/978-3-319-72453-9_35","apa":"Blömer, J., & Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS) (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-72453-9_35","chicago":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-72453-9_35."},"page":"438-453","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2017/453.pdf"}],"_id":"2967","intvolume":" 10693","volume":10693,"status":"public","has_accepted_license":"1","date_created":"2018-06-04T12:17:48Z","publisher":"Springer International Publishing","author":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"},{"last_name":"Liske","full_name":"Liske, Gennadij","first_name":"Gennadij"}],"file_date_updated":"2018-11-02T14:52:10Z","publication":"Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)","file":[{"file_name":"SubtletiesInSecurityDefinition.pdf","date_created":"2018-11-02T14:52:10Z","access_level":"closed","file_size":463904,"creator":"ups","file_id":"5286","date_updated":"2018-11-02T14:52:10Z","content_type":"application/pdf","success":1,"relation":"main_file"}],"ddc":["000"],"user_id":"477"},{"year":"2017","citation":{"short":"C. Gerking, D. Schubert, I. Budde, in: Theory and Practice of Model Transformation, Cham, 2017.","ieee":"C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities,” in Theory and Practice of Model Transformation, Cham, 2017.","chicago":"Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” In Theory and Practice of Model Transformation. Cham, 2017. https://doi.org/10.1007/978-3-319-61473-1_2.","ama":"Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In: Theory and Practice of Model Transformation. Cham; 2017. doi:10.1007/978-3-319-61473-1_2","apa":"Gerking, C., Schubert, D., & Budde, I. (2017). Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In Theory and Practice of Model Transformation. Cham. https://doi.org/10.1007/978-3-319-61473-1_2","mla":"Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” Theory and Practice of Model Transformation, 2017, doi:10.1007/978-3-319-61473-1_2.","bibtex":"@inbook{Gerking_Schubert_Budde_2017, place={Cham}, title={Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities}, DOI={10.1007/978-3-319-61473-1_2}, booktitle={Theory and Practice of Model Transformation}, author={Gerking, Christopher and Schubert, David and Budde, Ingo}, year={2017} }"},"type":"book_chapter","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:55:52Z","_id":"23396","doi":"10.1007/978-3-319-61473-1_2","author":[{"first_name":"Christopher","full_name":"Gerking, Christopher","last_name":"Gerking"},{"last_name":"Schubert","full_name":"Schubert, David","first_name":"David"},{"last_name":"Budde","first_name":"Ingo","full_name":"Budde, Ingo"}],"publication":"Theory and Practice of Model Transformation","publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","status":"public","date_created":"2021-08-13T20:33:08Z","place":"Cham","title":"Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities","user_id":"13693"},{"ddc":["000"],"user_id":"13703","date_created":"2018-04-13T11:40:48Z","status":"public","has_accepted_license":"1","file_date_updated":"2018-11-08T09:53:34Z","publication":"Foundations and Practice of Security","author":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"},{"last_name":"Günther","full_name":"Günther, Peter","first_name":"Peter"},{"last_name":"Krummel","full_name":"Krummel, Volker","first_name":"Volker"},{"last_name":"Löken","id":"13703","first_name":"Nils","full_name":"Löken, Nils"}],"publisher":"Springer International Publishing","file":[{"date_created":"2018-11-02T15:04:13Z","file_name":"Attribute-BasedEncryptionAsASe.pdf","access_level":"closed","file_size":634736,"creator":"ups","file_id":"5292","content_type":"application/pdf","date_updated":"2018-11-02T15:04:13Z","success":1,"relation":"main_file"},{"date_created":"2018-11-08T09:53:34Z","file_name":"abe_aas.pdf","access_level":"open_access","file_size":522516,"file_id":"5425","creator":"nilo","content_type":"application/pdf","date_updated":"2018-11-08T09:53:34Z","relation":"main_file"}],"_id":"2344","page":"3-17","type":"conference","citation":{"short":"J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.","ieee":"J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in Foundations and Practice of Security, 2017, pp. 3–17.","chicago":"Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In Foundations and Practice of Security, 3–17. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-75650-9_1.","ama":"Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1","apa":"Blömer, J., Günther, P., Krummel, V., & Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In Foundations and Practice of Security (pp. 3–17). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-75650-9_1","bibtex":"@inproceedings{Blömer_Günther_Krummel_Löken_2017, place={Cham}, title={Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations}, DOI={10.1007/978-3-319-75650-9_1}, booktitle={Foundations and Practice of Security}, publisher={Springer International Publishing}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker and Löken, Nils}, year={2017}, pages={3–17} }","mla":"Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” Foundations and Practice of Security, Springer International Publishing, 2017, pp. 3–17, doi:10.1007/978-3-319-75650-9_1."},"year":"2017","title":"Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations","place":"Cham","publication_status":"published","publication_identifier":{"isbn":["9783319756493","9783319756509"],"issn":["0302-9743","1611-3349"]},"project":[{"_id":"13","name":"SFB 901 - Subproject C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901","_id":"1"},{"name":"Securing the Financial Cloud","_id":"43"}],"department":[{"_id":"64"}],"doi":"10.1007/978-3-319-75650-9_1","oa":"1","date_updated":"2022-01-06T06:55:55Z","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"doi":"10.1007/978-3-319-57586-5_11","date_updated":"2022-01-06T06:56:00Z","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319575858","9783319575865"]},"publication_status":"published","editor":[{"first_name":"Dimitris","full_name":"Fotakis, Dimitris","last_name":"Fotakis"},{"full_name":"Pagourtzis, Aris","first_name":"Aris","last_name":"Pagourtzis"},{"last_name":"Paschos","first_name":"Vangelis Th.","full_name":"Paschos, Vangelis Th."}],"department":[{"_id":"64"}],"title":"Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems","place":"Cham","page":"116-127","year":"2017","citation":{"ama":"Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. Lecture Notes in Computer Science. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:10.1007/978-3-319-57586-5_11","apa":"Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In D. Fotakis, A. Pagourtzis, & V. T. Paschos (Eds.), Lecture Notes in Computer Science (Vol. 10236, pp. 116–127). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-57586-5_11","chicago":"Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” In Lecture Notes in Computer Science, edited by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-57586-5_11.","mla":"Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” Lecture Notes in Computer Science, edited by Dimitris Fotakis et al., vol. 10236, Springer International Publishing, 2017, pp. 116–27, doi:10.1007/978-3-319-57586-5_11.","bibtex":"@inbook{Brauer_2017, place={Cham}, title={Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems}, volume={10236}, DOI={10.1007/978-3-319-57586-5_11}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Brauer, Sascha}, editor={Fotakis, Dimitris and Pagourtzis, Aris and Paschos, Vangelis Th.Editors}, year={2017}, pages={116–127} }","short":"S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.","ieee":"S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems,” in Lecture Notes in Computer Science, vol. 10236, D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International Publishing, 2017, pp. 116–127."},"type":"book_chapter","conference":{"end_date":"2017-05-26","start_date":"2017-05-24","name":"10th International Conference on Algorithms and Complexity","location":"Athens, Greece"},"intvolume":" 10236","_id":"2381","date_created":"2018-04-17T12:20:53Z","status":"public","volume":10236,"publication":"Lecture Notes in Computer Science","author":[{"last_name":"Brauer","id":"13291","first_name":"Sascha","full_name":"Brauer, Sascha"}],"publisher":"Springer International Publishing","user_id":"13291","abstract":[{"lang":"eng","text":"Metric facility location and K-means are well-known problems of combinatorial optimization. Both admit a fairly simple heuristic called single-swap, which adds, drops or swaps open facilities until it reaches a local optimum. For both problems, it is known that this algorithm produces a solution that is at most a constant factor worse than the respective global optimum. In this paper, we show that single-swap applied to the weighted metric uncapacitated facility location and weighted discrete K-means problem is tightly PLS-complete and hence has exponential worst-case running time."}]},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:39Z","doi":"10.1007/978-3-319-68690-5_22","department":[{"_id":"77"}],"project":[{"_id":"12","name":"SFB 901 - Subproject B4"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"1","name":"SFB 901"}],"publication_identifier":{"isbn":["9783319686899","9783319686905"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","title":"Policy Dependent and Independent Information Flow Analyses","page":"362-378","type":"conference","citation":{"bibtex":"@inproceedings{Töws_Wehrheim_2017, title={Policy Dependent and Independent Information Flow Analyses}, DOI={10.1007/978-3-319-68690-5_22}, booktitle={Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017)}, publisher={Springer International Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2017}, pages={362–378} }","mla":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017), Springer International Publishing, 2017, pp. 362–78, doi:10.1007/978-3-319-68690-5_22.","apa":"Töws, M., & Wehrheim, H. (2017). Policy Dependent and Independent Information Flow Analyses. In Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017) (pp. 362–378). Springer International Publishing. https://doi.org/10.1007/978-3-319-68690-5_22","ama":"Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses. In: Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017). Springer International Publishing; 2017:362-378. doi:10.1007/978-3-319-68690-5_22","chicago":"Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” In Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017), 362–78. Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-68690-5_22.","ieee":"M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow Analyses,” in Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017), 2017, pp. 362–378.","short":"M. Töws, H. Wehrheim, in: Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017), Springer International Publishing, 2017, pp. 362–378."},"year":"2017","_id":"5769","file":[{"date_updated":"2018-11-26T15:07:42Z","content_type":"application/pdf","relation":"main_file","success":1,"file_size":424031,"creator":"mtoews","file_id":"5836","access_level":"closed","file_name":"Töws-Wehrheim2017_Chapter_PolicyDependentAndIndependentI.pdf","date_created":"2018-11-26T15:07:42Z"}],"file_date_updated":"2018-11-26T15:07:42Z","publication":"Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017)","author":[{"last_name":"Töws","id":"11315","first_name":"Manuel","full_name":"Töws, Manuel"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publisher":"Springer International Publishing","date_created":"2018-11-21T09:38:43Z","status":"public","has_accepted_license":"1","abstract":[{"text":"Information Flow Analysis (IFA) aims at detecting illegal flows of information between program entities. “Legality” is therein specified in terms of various security policies. For the analysis, this opens up two possibilities: building generic, policy independent and building specific, policy dependent IFAs. While the former needs to track all dependencies between program entities, the latter allows for a reduced and thus more efficient analysis.\r\n\r\nIn this paper, we start out by formally defining a policy independent information flow analysis. Next, we show how to specialize this IFA via policy specific variable tracking, and prove soundness of the specialization. We furthermore investigate refinement relationships between policies, allowing an IFA for one policy to be employed for its refinements. As policy refinement depends on concrete program entities, we additionally propose a precomputation of policy refinement conditions, enabling an efficient refinement check for concrete programs.","lang":"eng"}],"user_id":"477","ddc":["000"]},{"intvolume":" 10288","_id":"6255","conference":{"end_date":"2017-07-14","location":"Vancouver, Canada","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2017","start_date":"2017-07-09"},"year":"2017","citation":{"ieee":"H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0,” in Design, User Experience, and Usability: Theory, Methodology, and Management, vol. 10288, Cham: Springer International Publishing, 2017, pp. 570–583.","short":"H.G. Fischer, M. Engler, S. Sauer, in: Design, User Experience, and Usability: Theory, Methodology, and Management, Springer International Publishing, Cham, 2017, pp. 570–583.","mla":"Fischer, Holger Gerhard, et al. “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0.” Design, User Experience, and Usability: Theory, Methodology, and Management, vol. 10288, Springer International Publishing, 2017, pp. 570–83, doi:10.1007/978-3-319-58634-2_42.","bibtex":"@inbook{Fischer_Engler_Sauer_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0}, volume={10288}, DOI={10.1007/978-3-319-58634-2_42}, booktitle={Design, User Experience, and Usability: Theory, Methodology, and Management}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Engler, Michael and Sauer, Stefan}, year={2017}, pages={570–583}, collection={Lecture Notes in Computer Science} }","chicago":"Fischer, Holger Gerhard, Michael Engler, and Stefan Sauer. “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0.” In Design, User Experience, and Usability: Theory, Methodology, and Management, 10288:570–83. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-58634-2_42.","apa":"Fischer, H. G., Engler, M., & Sauer, S. (2017). A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In Design, User Experience, and Usability: Theory, Methodology, and Management (Vol. 10288, pp. 570–583). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-58634-2_42","ama":"Fischer HG, Engler M, Sauer S. A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In: Design, User Experience, and Usability: Theory, Methodology, and Management. Vol 10288. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:570-583. doi:10.1007/978-3-319-58634-2_42"},"type":"book_chapter","page":"570-583","user_id":"30457","author":[{"full_name":"Fischer, Holger Gerhard","first_name":"Holger Gerhard","id":"30457","last_name":"Fischer"},{"first_name":"Michael","full_name":"Engler, Michael","last_name":"Engler"},{"first_name":"Stefan","full_name":"Sauer, Stefan","last_name":"Sauer","id":"447"}],"publisher":"Springer International Publishing","publication":"Design, User Experience, and Usability: Theory, Methodology, and Management","status":"public","date_created":"2018-12-18T10:44:24Z","volume":10288,"date_updated":"2022-01-06T07:02:58Z","doi":"10.1007/978-3-319-58634-2_42","series_title":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"place":"Cham","title":"A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"publication_status":"published","publication_identifier":{"isbn":["9783319586335","9783319586342"],"issn":["0302-9743","1611-3349"]}},{"date_created":"2020-04-08T07:20:20Z","status":"public","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319720494","9783319720500"]},"department":[{"_id":"63"}],"publication":"Structural Information and Communication Complexity","author":[{"full_name":"Bemmann, Pascal","first_name":"Pascal","last_name":"Bemmann"},{"full_name":"Biermeier, Felix","first_name":"Felix","last_name":"Biermeier"},{"first_name":"Jan","full_name":"Bürmann, Jan","last_name":"Bürmann"},{"last_name":"Kemper","first_name":"Arne","full_name":"Kemper, Arne"},{"first_name":"Till","orcid":"0000-0003-2014-4696","full_name":"Knollmann, Till","last_name":"Knollmann","id":"39241"},{"first_name":"Steffen","full_name":"Knorr, Steffen","last_name":"Knorr"},{"last_name":"Kothe","first_name":"Nils","full_name":"Kothe, Nils"},{"full_name":"Mäcker, Alexander","first_name":"Alexander","id":"13536","last_name":"Mäcker"},{"full_name":"Malatyali, Manuel","first_name":"Manuel","id":"41265","last_name":"Malatyali"},{"id":"15523","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"},{"first_name":"Sören","full_name":"Riechers, Sören","last_name":"Riechers"},{"last_name":"Schaefer","id":"30291","first_name":"Johannes Sebastian","full_name":"Schaefer, Johannes Sebastian"},{"id":"38705","last_name":"Sundermeier","full_name":"Sundermeier, Jannik","first_name":"Jannik"}],"user_id":"15415","title":"Monitoring of Domain-Related Problems in Distributed Data Streams","external_id":{"arxiv":["arXiv:1706.03568 "]},"place":"Cham","language":[{"iso":"eng"}],"citation":{"short":"P. Bemmann, F. Biermeier, J. Bürmann, A. Kemper, T. Knollmann, S. Knorr, N. Kothe, A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, J.S. Schaefer, J. Sundermeier, in: Structural Information and Communication Complexity, Cham, 2017.","ieee":"P. Bemmann et al., “Monitoring of Domain-Related Problems in Distributed Data Streams,” in Structural Information and Communication Complexity, Cham, 2017.","chicago":"Bemmann, Pascal, Felix Biermeier, Jan Bürmann, Arne Kemper, Till Knollmann, Steffen Knorr, Nils Kothe, et al. “Monitoring of Domain-Related Problems in Distributed Data Streams.” In Structural Information and Communication Complexity. Cham, 2017. https://doi.org/10.1007/978-3-319-72050-0_13.","apa":"Bemmann, P., Biermeier, F., Bürmann, J., Kemper, A., Knollmann, T., Knorr, S., Kothe, N., Mäcker, A., Malatyali, M., Meyer auf der Heide, F., Riechers, S., Schaefer, J. S., & Sundermeier, J. (2017). Monitoring of Domain-Related Problems in Distributed Data Streams. In Structural Information and Communication Complexity. https://doi.org/10.1007/978-3-319-72050-0_13","ama":"Bemmann P, Biermeier F, Bürmann J, et al. Monitoring of Domain-Related Problems in Distributed Data Streams. In: Structural Information and Communication Complexity. ; 2017. doi:10.1007/978-3-319-72050-0_13","bibtex":"@inbook{Bemmann_Biermeier_Bürmann_Kemper_Knollmann_Knorr_Kothe_Mäcker_Malatyali_Meyer auf der Heide_et al._2017, place={Cham}, title={Monitoring of Domain-Related Problems in Distributed Data Streams}, DOI={10.1007/978-3-319-72050-0_13}, booktitle={Structural Information and Communication Complexity}, author={Bemmann, Pascal and Biermeier, Felix and Bürmann, Jan and Kemper, Arne and Knollmann, Till and Knorr, Steffen and Kothe, Nils and Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and et al.}, year={2017} }","mla":"Bemmann, Pascal, et al. “Monitoring of Domain-Related Problems in Distributed Data Streams.” Structural Information and Communication Complexity, 2017, doi:10.1007/978-3-319-72050-0_13."},"type":"book_chapter","year":"2017","doi":"10.1007/978-3-319-72050-0_13","date_updated":"2022-01-06T06:52:50Z","_id":"16461"},{"place":"Cham","title":"Simulating Storage Policies for an Automated Grid-Based Warehouse System","user_id":"1112","author":[{"last_name":"Beckschäfer","id":"32439","first_name":"Michaela","full_name":"Beckschäfer, Michaela"},{"last_name":"Malberg","full_name":"Malberg, Simon","first_name":"Simon"},{"last_name":"Tierney","full_name":"Tierney, Kevin","first_name":"Kevin"},{"first_name":"Christoph","full_name":"Weskamp, Christoph","last_name":"Weskamp"}],"publication":"Lecture Notes in Computer Science","department":[{"_id":"277"}],"publication_status":"published","publication_identifier":{"isbn":["9783319684956","9783319684963"],"issn":["0302-9743","1611-3349"]},"status":"public","date_created":"2019-11-08T08:15:11Z","date_updated":"2022-01-06T06:52:08Z","_id":"14857","doi":"10.1007/978-3-319-68496-3_31","year":"2017","type":"book_chapter","citation":{"chicago":"Beckschäfer, Michaela, Simon Malberg, Kevin Tierney, and Christoph Weskamp. “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” In Lecture Notes in Computer Science. Cham, 2017. https://doi.org/10.1007/978-3-319-68496-3_31.","apa":"Beckschäfer, M., Malberg, S., Tierney, K., & Weskamp, C. (2017). Simulating Storage Policies for an Automated Grid-Based Warehouse System. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-319-68496-3_31","ama":"Beckschäfer M, Malberg S, Tierney K, Weskamp C. Simulating Storage Policies for an Automated Grid-Based Warehouse System. In: Lecture Notes in Computer Science. Cham; 2017. doi:10.1007/978-3-319-68496-3_31","mla":"Beckschäfer, Michaela, et al. “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” Lecture Notes in Computer Science, 2017, doi:10.1007/978-3-319-68496-3_31.","bibtex":"@inbook{Beckschäfer_Malberg_Tierney_Weskamp_2017, place={Cham}, title={Simulating Storage Policies for an Automated Grid-Based Warehouse System}, DOI={10.1007/978-3-319-68496-3_31}, booktitle={Lecture Notes in Computer Science}, author={Beckschäfer, Michaela and Malberg, Simon and Tierney, Kevin and Weskamp, Christoph}, year={2017} }","short":"M. Beckschäfer, S. Malberg, K. Tierney, C. Weskamp, in: Lecture Notes in Computer Science, Cham, 2017.","ieee":"M. Beckschäfer, S. Malberg, K. Tierney, and C. Weskamp, “Simulating Storage Policies for an Automated Grid-Based Warehouse System,” in Lecture Notes in Computer Science, Cham, 2017."},"language":[{"iso":"eng"}]},{"type":"conference","citation":{"mla":"Hamann, Heiko, et al. “Population Coding: A New Design Paradigm for Embodied Distributed Systems.” 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016, doi:10.1007/978-3-319-44427-7_15.","bibtex":"@inproceedings{Hamann_Valentini_Dorigo_2016, place={Cham}, title={Population Coding: A New Design Paradigm for Embodied Distributed Systems}, DOI={10.1007/978-3-319-44427-7_15}, booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Hamann, Heiko and Valentini, Gabriele and Dorigo, Marco}, year={2016} }","chicago":"Hamann, Heiko, Gabriele Valentini, and Marco Dorigo. “Population Coding: A New Design Paradigm for Embodied Distributed Systems.” In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. Cham, 2016. https://doi.org/10.1007/978-3-319-44427-7_15.","apa":"Hamann, H., Valentini, G., & Dorigo, M. (2016). Population Coding: A New Design Paradigm for Embodied Distributed Systems. In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. Cham. https://doi.org/10.1007/978-3-319-44427-7_15","ama":"Hamann H, Valentini G, Dorigo M. Population Coding: A New Design Paradigm for Embodied Distributed Systems. In: 10th Int. Conf. on Swarm Intelligence, ANTS 2016. Cham; 2016. doi:10.1007/978-3-319-44427-7_15","ieee":"H. Hamann, G. Valentini, and M. Dorigo, “Population Coding: A New Design Paradigm for Embodied Distributed Systems,” in 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.","short":"H. Hamann, G. Valentini, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence, ANTS 2016, Cham, 2016."},"year":"2016","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:18Z","_id":"20000","doi":"10.1007/978-3-319-44427-7_15","author":[{"full_name":"Hamann, Heiko","first_name":"Heiko","last_name":"Hamann"},{"full_name":"Valentini, Gabriele","first_name":"Gabriele","last_name":"Valentini"},{"last_name":"Dorigo","first_name":"Marco","full_name":"Dorigo, Marco"}],"department":[{"_id":"63"},{"_id":"238"}],"publication":"10th Int. Conf. on Swarm Intelligence, ANTS 2016","publication_status":"published","publication_identifier":{"isbn":["9783319444260","9783319444277"],"issn":["0302-9743","1611-3349"]},"status":"public","date_created":"2020-10-15T09:55:35Z","place":"Cham","title":"Population Coding: A New Design Paradigm for Embodied Distributed Systems","user_id":"15415"},{"type":"conference","citation":{"ieee":"G. Valentini, D. Brambilla, H. Hamann, and M. Dorigo, “Collective Perception of Environmental Features in a Robot Swarm,” in 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.","short":"G. Valentini, D. Brambilla, H. Hamann, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.","bibtex":"@inproceedings{Valentini_Brambilla_Hamann_Dorigo_2016, title={Collective Perception of Environmental Features in a Robot Swarm}, DOI={10.1007/978-3-319-44427-7_6}, booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Valentini, Gabriele and Brambilla, Davide and Hamann, Heiko and Dorigo, Marco}, year={2016} }","mla":"Valentini, Gabriele, et al. “Collective Perception of Environmental Features in a Robot Swarm.” 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016, doi:10.1007/978-3-319-44427-7_6.","chicago":"Valentini, Gabriele, Davide Brambilla, Heiko Hamann, and Marco Dorigo. “Collective Perception of Environmental Features in a Robot Swarm.” In 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016. https://doi.org/10.1007/978-3-319-44427-7_6.","apa":"Valentini, G., Brambilla, D., Hamann, H., & Dorigo, M. (2016). Collective Perception of Environmental Features in a Robot Swarm. In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. https://doi.org/10.1007/978-3-319-44427-7_6","ama":"Valentini G, Brambilla D, Hamann H, Dorigo M. Collective Perception of Environmental Features in a Robot Swarm. In: 10th Int. Conf. on Swarm Intelligence, ANTS 2016. ; 2016. doi:10.1007/978-3-319-44427-7_6"},"year":"2016","language":[{"iso":"eng"}],"doi":"10.1007/978-3-319-44427-7_6","date_updated":"2022-01-06T06:54:18Z","_id":"20004","publication_status":"published","publication_identifier":{"isbn":["9783319444260","9783319444277"],"issn":["0302-9743","1611-3349"]},"status":"public","date_created":"2020-10-15T10:22:20Z","author":[{"last_name":"Valentini","first_name":"Gabriele","full_name":"Valentini, Gabriele"},{"full_name":"Brambilla, Davide","first_name":"Davide","last_name":"Brambilla"},{"last_name":"Hamann","full_name":"Hamann, Heiko","first_name":"Heiko"},{"last_name":"Dorigo","first_name":"Marco","full_name":"Dorigo, Marco"}],"publication":"10th Int. Conf. on Swarm Intelligence, ANTS 2016","department":[{"_id":"63"},{"_id":"238"}],"title":"Collective Perception of Environmental Features in a Robot Swarm","user_id":"15415"},{"author":[{"last_name":"Günther","first_name":"Peter","full_name":"Günther, Peter"},{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"publisher":"Springer International Publishing","department":[{"_id":"64"}],"publication":"Mathematical Aspects of Computer and Information Sciences","status":"public","project":[{"name":"Securing the Financial Cloud","_id":"43"}],"date_created":"2018-05-29T11:26:56Z","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319328584","9783319328591"]},"place":"Cham","user_id":"25078","title":"Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures","type":"book_chapter","year":"2016","citation":{"ieee":"P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in Mathematical Aspects of Computer and Information Sciences, Cham: Springer International Publishing, 2016, pp. 151–165.","short":"P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.","bibtex":"@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}, DOI={10.1007/978-3-319-32859-1_13}, booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016}, pages={151–165} }","mla":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, 2016, pp. 151–65, doi:10.1007/978-3-319-32859-1_13.","chicago":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In Mathematical Aspects of Computer and Information Sciences, 151–65. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-32859-1_13.","apa":"Günther, P., & Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In Mathematical Aspects of Computer and Information Sciences (pp. 151–165). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32859-1_13","ama":"Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: Mathematical Aspects of Computer and Information Sciences. Cham: Springer International Publishing; 2016:151-165. doi:10.1007/978-3-319-32859-1_13"},"page":"151-165","date_updated":"2022-01-06T06:58:48Z","_id":"2948","doi":"10.1007/978-3-319-32859-1_13"},{"doi":"10.1007/978-3-319-49487-6_3","_id":"2968","date_updated":"2022-01-06T06:58:49Z","page":"81-116","year":"2016","citation":{"short":"J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.","ieee":"J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in Algorithm Engineering, Cham: Springer International Publishing, 2016, pp. 81–116.","chicago":"Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In Algorithm Engineering, 81–116. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-49487-6_3.","ama":"Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: Algorithm Engineering. Cham: Springer International Publishing; 2016:81-116. doi:10.1007/978-3-319-49487-6_3","apa":"Blömer, J., Lammersen, C., Schmidt, M., & Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In Algorithm Engineering (pp. 81–116). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-49487-6_3","bibtex":"@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical Analysis of the k-Means Algorithm – A Survey}, DOI={10.1007/978-3-319-49487-6_3}, booktitle={Algorithm Engineering}, publisher={Springer International Publishing}, author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}, year={2016}, pages={81–116} }","mla":"Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A Survey.” Algorithm Engineering, Springer International Publishing, 2016, pp. 81–116, doi:10.1007/978-3-319-49487-6_3."},"type":"book_chapter","title":"Theoretical Analysis of the k-Means Algorithm – A Survey","user_id":"25078","place":"Cham","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319494869","9783319494876"]},"date_created":"2018-06-04T12:22:40Z","status":"public","department":[{"_id":"64"}],"publication":"Algorithm Engineering","publisher":"Springer International Publishing","author":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"},{"first_name":"Christiane","full_name":"Lammersen, Christiane","last_name":"Lammersen"},{"first_name":"Melanie","full_name":"Schmidt, Melanie","last_name":"Schmidt"},{"full_name":"Sohler, Christian","first_name":"Christian","last_name":"Sohler"}]},{"year":"2016","type":"book_chapter","citation":{"ieee":"J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in Advances in Knowledge Discovery and Data Mining, Cham: Springer International Publishing, 2016, pp. 296–308.","short":"J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.","bibtex":"@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian Mixture Models}, DOI={10.1007/978-3-319-31750-2_24}, booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016}, pages={296–308} }","mla":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” Advances in Knowledge Discovery and Data Mining, Springer International Publishing, 2016, pp. 296–308, doi:10.1007/978-3-319-31750-2_24.","ama":"Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Cham: Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24","apa":"Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24","chicago":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24."},"page":"296-308","doi":"10.1007/978-3-319-31750-2_24","date_updated":"2022-01-06T06:58:49Z","_id":"2970","publication_status":"published","publication_identifier":{"isbn":["9783319317496","9783319317502"],"issn":["0302-9743","1611-3349"]},"status":"public","date_created":"2018-06-04T12:27:21Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"},{"last_name":"Bujna","full_name":"Bujna, Kathrin","first_name":"Kathrin"}],"publisher":"Springer International Publishing","department":[{"_id":"64"}],"publication":"Advances in Knowledge Discovery and Data Mining","title":"Adaptive Seeding for Gaussian Mixture Models","user_id":"25078","place":"Cham"},{"department":[{"_id":"66"}],"editor":[{"last_name":"Sheng","first_name":"Quan Z. ","full_name":"Sheng, Quan Z. "},{"last_name":"Stroulia","first_name":"Eleni ","full_name":"Stroulia, Eleni "},{"first_name":"Samir ","full_name":"Tata, Samir ","last_name":"Tata"},{"last_name":"Bhiri","first_name":"Sami ","full_name":"Bhiri, Sami "}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319462943","9783319462950"]},"place":"Cham","title":"Cross-Device Integration of Android Apps","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:43Z","doi":"10.1007/978-3-319-46295-0_11","publisher":"Springer International Publishing","author":[{"id":"11308","last_name":"Wolters","full_name":"Wolters, Dennis","first_name":"Dennis"},{"id":"39928","last_name":"Kirchhoff","full_name":"Kirchhoff, Jonas","first_name":"Jonas"},{"first_name":"Christian","full_name":"Gerth, Christian","last_name":"Gerth"},{"full_name":"Engels, Gregor","first_name":"Gregor","id":"107","last_name":"Engels"}],"publication":"Service-Oriented Computing","keyword":["Cross-Device","Integration","Android","Adapter","DSL"],"status":"public","date_created":"2018-11-26T10:21:38Z","abstract":[{"lang":"eng","text":"Integrating apps on mobile devices into applications running on other devices is usually difficult. For instance, using a messenger on a smartphone to share a text written on a desktop computer often ends up in a cumbersome solution to transfer the text, because many applications are not designed for such scenarios. In this paper, we present an approach enabling the integration of apps running on Android devices into applications running on other devices and even other platforms. This is achieved by specifying adapters for Android apps, which map their services to a platform-independent service interface. For this purpose, we have developed a domain-specific language to ease the specification of such mappings. Our approach is applicable without the need to modify the existing Android apps providing the service. We analyzed its feasibility by implementing our approach and by specifying mappings for several popular Android apps, e.g., phone book, camera, and file explorer."}],"user_id":"39928","year":"2016","type":"conference","citation":{"short":"D. Wolters, J. Kirchhoff, C. Gerth, G. Engels, in: Q.Z. Sheng, E. Stroulia, S. Tata, S. Bhiri (Eds.), Service-Oriented Computing, Springer International Publishing, Cham, 2016, pp. 171–185.","ieee":"D. Wolters, J. Kirchhoff, C. Gerth, and G. Engels, “Cross-Device Integration of Android Apps,” in Service-Oriented Computing, 2016, pp. 171–185.","chicago":"Wolters, Dennis, Jonas Kirchhoff, Christian Gerth, and Gregor Engels. “Cross-Device Integration of Android Apps.” In Service-Oriented Computing, edited by Quan Z. Sheng, Eleni Stroulia, Samir Tata, and Sami Bhiri, 171–85. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-46295-0_11.","apa":"Wolters, D., Kirchhoff, J., Gerth, C., & Engels, G. (2016). Cross-Device Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, & S. Bhiri (Eds.), Service-Oriented Computing (pp. 171–185). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-46295-0_11","ama":"Wolters D, Kirchhoff J, Gerth C, Engels G. Cross-Device Integration of Android Apps. In: Sheng QZ, Stroulia E, Tata S, Bhiri S, eds. Service-Oriented Computing. Cham: Springer International Publishing; 2016:171-185. doi:10.1007/978-3-319-46295-0_11","bibtex":"@inproceedings{Wolters_Kirchhoff_Gerth_Engels_2016, place={Cham}, title={Cross-Device Integration of Android Apps}, DOI={10.1007/978-3-319-46295-0_11}, booktitle={Service-Oriented Computing}, publisher={Springer International Publishing}, author={Wolters, Dennis and Kirchhoff, Jonas and Gerth, Christian and Engels, Gregor}, editor={Sheng, Quan Z. and Stroulia, Eleni and Tata, Samir and Bhiri, Sami Editors}, year={2016}, pages={171–185} }","mla":"Wolters, Dennis, et al. “Cross-Device Integration of Android Apps.” Service-Oriented Computing, edited by Quan Z. Sheng et al., Springer International Publishing, 2016, pp. 171–85, doi:10.1007/978-3-319-46295-0_11."},"page":"171-185","_id":"5825"},{"conference":{"end_date":"2016-08-31","name":"International Conference on Human-Centred Software Engineering","start_date":"2016-08-29","location":"Stockholm, Sweden"},"intvolume":" 9856","_id":"6257","page":"30-41","year":"2016","citation":{"bibtex":"@inbook{Fischer_Senft_2016, place={Cham}, series={Lecture Notes in Computer Science}, title={Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows}, volume={9856}, DOI={10.1007/978-3-319-44902-9_3}, booktitle={Human-Centered and Error-Resilient Systems Development}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn}, editor={Bogdan, ChristianEditor}, year={2016}, pages={30–41}, collection={Lecture Notes in Computer Science} }","mla":"Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.” Human-Centered and Error-Resilient Systems Development, edited by Christian Bogdan, vol. 9856, Springer International Publishing, 2016, pp. 30–41, doi:10.1007/978-3-319-44902-9_3.","chicago":"Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.” In Human-Centered and Error-Resilient Systems Development, edited by Christian Bogdan, 9856:30–41. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-44902-9_3.","apa":"Fischer, H. G., & Senft, B. (2016). Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-44902-9_3","ama":"Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed. Human-Centered and Error-Resilient Systems Development. Vol 9856. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41. doi:10.1007/978-3-319-44902-9_3","ieee":"H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows,” in Human-Centered and Error-Resilient Systems Development, vol. 9856, C. Bogdan, Ed. Cham: Springer International Publishing, 2016, pp. 30–41.","short":"H.G. Fischer, B. Senft, in: C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development, Springer International Publishing, Cham, 2016, pp. 30–41."},"type":"book_chapter","user_id":"30457","volume":9856,"date_created":"2018-12-18T10:51:10Z","status":"public","publication":"Human-Centered and Error-Resilient Systems Development","author":[{"last_name":"Fischer","id":"30457","first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard"},{"id":"9109","last_name":"Senft","full_name":"Senft, Björn","first_name":"Björn"}],"publisher":"Springer International Publishing","doi":"10.1007/978-3-319-44902-9_3","date_updated":"2022-01-06T07:02:58Z","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","title":"Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows","place":"Cham","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319449012","9783319449029"]},"editor":[{"last_name":"Bogdan","full_name":"Bogdan, Christian","first_name":"Christian"}],"department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}]}]