--- _id: '17084' author: - first_name: Nils full_name: Weidmann, Nils id: '53103' last_name: Weidmann - first_name: Anthony full_name: Anjorin, Anthony last_name: Anjorin citation: ama: 'Weidmann N, Anjorin A. Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming. In: Wehrheim H, Cabot J, eds. Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020. Cham: Springer; 2020. doi:10.1007/978-3-030-45234-6_16' apa: 'Weidmann, N., & Anjorin, A. (2020). Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming. In H. Wehrheim & J. Cabot (Eds.), Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020. Cham: Springer. https://doi.org/10.1007/978-3-030-45234-6_16' bibtex: '@inproceedings{Weidmann_Anjorin_2020, place={Cham}, title={Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming}, DOI={10.1007/978-3-030-45234-6_16}, booktitle={Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020}, publisher={Springer}, author={Weidmann, Nils and Anjorin, Anthony}, editor={Wehrheim, Heike and Cabot, JordiEditors}, year={2020} }' chicago: 'Weidmann, Nils, and Anthony Anjorin. “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming.” In Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, edited by Heike Wehrheim and Jordi Cabot. Cham: Springer, 2020. https://doi.org/10.1007/978-3-030-45234-6_16.' ieee: N. Weidmann and A. Anjorin, “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming,” in Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, Dublin, Ireland, 2020. mla: Weidmann, Nils, and Anthony Anjorin. “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming.” Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, edited by Heike Wehrheim and Jordi Cabot, Springer, 2020, doi:10.1007/978-3-030-45234-6_16. short: 'N. Weidmann, A. Anjorin, in: H. Wehrheim, J. Cabot (Eds.), Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, Springer, Cham, 2020.' conference: end_date: 2020-04-30 location: Dublin, Ireland name: Fundamental Approaches to Software Engineering - 23rd International Conference, FASE 2020 start_date: 2020-04-25 date_created: 2020-06-06T09:50:42Z date_updated: 2022-01-06T06:53:04Z department: - _id: '28' - _id: '66' - _id: '534' doi: 10.1007/978-3-030-45234-6_16 editor: - first_name: Heike full_name: Wehrheim, Heike last_name: Wehrheim - first_name: Jordi full_name: Cabot, Jordi last_name: Cabot language: - iso: eng place: Cham publication: Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020 publication_identifier: isbn: - '9783030452339' - '9783030452346' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer status: public title: Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming type: conference user_id: '53103' year: '2020' ... --- _id: '17085' author: - first_name: Bahar full_name: Schwichtenberg, Bahar id: '36399' last_name: Schwichtenberg - first_name: Simon full_name: Schwichtenberg, Simon id: '13235' last_name: Schwichtenberg - first_name: Jochen full_name: Küster, Jochen last_name: Küster - first_name: Olaf full_name: Zimmermann, Olaf last_name: Zimmermann - first_name: Gregor full_name: Engels, Gregor id: '107' last_name: Engels citation: ama: 'Schwichtenberg B, Schwichtenberg S, Küster J, Zimmermann O, Engels G. Modeling and Analyzing Architectural Diversity of Open Platforms. In: Advanced Information Systems Engineering. Cham; 2020. doi:10.1007/978-3-030-49435-3_3' apa: Schwichtenberg, B., Schwichtenberg, S., Küster, J., Zimmermann, O., & Engels, G. (2020). Modeling and Analyzing Architectural Diversity of Open Platforms. In Advanced Information Systems Engineering. Cham. https://doi.org/10.1007/978-3-030-49435-3_3 bibtex: '@inproceedings{Schwichtenberg_Schwichtenberg_Küster_Zimmermann_Engels_2020, place={Cham}, title={Modeling and Analyzing Architectural Diversity of Open Platforms}, DOI={10.1007/978-3-030-49435-3_3}, booktitle={Advanced Information Systems Engineering}, author={Schwichtenberg, Bahar and Schwichtenberg, Simon and Küster, Jochen and Zimmermann, Olaf and Engels, Gregor}, year={2020} }' chicago: Schwichtenberg, Bahar, Simon Schwichtenberg, Jochen Küster, Olaf Zimmermann, and Gregor Engels. “Modeling and Analyzing Architectural Diversity of Open Platforms.” In Advanced Information Systems Engineering. Cham, 2020. https://doi.org/10.1007/978-3-030-49435-3_3. ieee: B. Schwichtenberg, S. Schwichtenberg, J. Küster, O. Zimmermann, and G. Engels, “Modeling and Analyzing Architectural Diversity of Open Platforms,” in Advanced Information Systems Engineering, 2020. mla: Schwichtenberg, Bahar, et al. “Modeling and Analyzing Architectural Diversity of Open Platforms.” Advanced Information Systems Engineering, 2020, doi:10.1007/978-3-030-49435-3_3. short: 'B. Schwichtenberg, S. Schwichtenberg, J. Küster, O. Zimmermann, G. Engels, in: Advanced Information Systems Engineering, Cham, 2020.' date_created: 2020-06-07T08:53:10Z date_updated: 2022-01-06T06:53:04Z doi: 10.1007/978-3-030-49435-3_3 language: - iso: eng place: Cham publication: Advanced Information Systems Engineering publication_identifier: isbn: - '9783030494346' - '9783030494353' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Modeling and Analyzing Architectural Diversity of Open Platforms type: conference user_id: '36399' year: '2020' ... --- _id: '28997' abstract: - lang: eng text: "Modern cryptographic protocols, such as TLS 1.3 and QUIC, can send cryptographically protected data in “zero round-trip times (0-RTT)”, that is, without the need for a prior interactive handshake. Such protocols meet the demand for communication with minimal latency, but those currently deployed in practice achieve only rather weak security properties, as they may not achieve forward security for the first transmitted payload message and require additional countermeasures against replay attacks.Recently, 0-RTT protocols with full forward security and replay resilience have been proposed in the academic literature. These are based on puncturable encryption, which uses rather heavy building blocks, such as cryptographic pairings. Some constructions were claimed to have practical efficiency, but it is unclear how they compare concretely to protocols deployed in practice, and we currently do not have any benchmark results that new protocols can be compared with.We provide the first concrete performance analysis of a modern 0-RTT protocol with full forward security, by integrating the Bloom Filter Encryption scheme of Derler et al. (EUROCRYPT 2018) in the Chromium QUIC implementation and comparing it to Google’s original QUIC protocol. We find that for reasonable deployment parameters, the server CPU load increases approximately by a factor of eight and the memory consumption on the server increases significantly, but stays below 400 MB even for medium-scale deployments that handle up to 50K connections per day. The difference of the size of handshake messages is small enough that transmission time on the network is identical, and therefore not significant.We conclude that while current 0-RTT protocols with full forward security come with significant computational overhead, their use in practice is feasible, and may be used in applications where the increased CPU and memory load can be tolerated in exchange for full forward security and replay resilience on the cryptographic protocol level. Our results serve as a first benchmark that can be used to assess the efficiency of 0-RTT protocols potentially developed in the future.\r\n" author: - first_name: Fynn full_name: Dallmeier, Fynn last_name: Dallmeier - first_name: Jan P. full_name: Drees, Jan P. last_name: Drees - first_name: Kai full_name: Gellert, Kai last_name: Gellert - first_name: Tobias full_name: Handirk, Tobias last_name: Handirk - first_name: Tibor full_name: Jager, Tibor last_name: Jager - first_name: Jonas full_name: Klauke, Jonas id: '40915' last_name: Klauke orcid: 0000-0001-9160-9636 - first_name: Simon full_name: Nachtigall, Simon last_name: Nachtigall - first_name: Timo full_name: Renzelmann, Timo last_name: Renzelmann - first_name: Rudi full_name: Wolf, Rudi last_name: Wolf citation: ama: 'Dallmeier F, Drees JP, Gellert K, et al. Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. In: Cryptology and Network Security. Springer-Verlag; 2020:211-231. doi:10.1007/978-3-030-65411-5_11' apa: 'Dallmeier, F., Drees, J. P., Gellert, K., Handirk, T., Jager, T., Klauke, J., Nachtigall, S., Renzelmann, T., & Wolf, R. (2020). Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. Cryptology and Network Security, 211–231. https://doi.org/10.1007/978-3-030-65411-5_11' bibtex: '@inproceedings{Dallmeier_Drees_Gellert_Handirk_Jager_Klauke_Nachtigall_Renzelmann_Wolf_2020, place={Cham}, title={Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC}, DOI={10.1007/978-3-030-65411-5_11}, booktitle={Cryptology and Network Security}, publisher={Springer-Verlag}, author={Dallmeier, Fynn and Drees, Jan P. and Gellert, Kai and Handirk, Tobias and Jager, Tibor and Klauke, Jonas and Nachtigall, Simon and Renzelmann, Timo and Wolf, Rudi}, year={2020}, pages={211–231} }' chicago: 'Dallmeier, Fynn, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, and Rudi Wolf. “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.” In Cryptology and Network Security, 211–31. Cham: Springer-Verlag, 2020. https://doi.org/10.1007/978-3-030-65411-5_11.' ieee: 'F. Dallmeier et al., “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC,” in Cryptology and Network Security, Vienna, 2020, pp. 211–231, doi: 10.1007/978-3-030-65411-5_11.' mla: 'Dallmeier, Fynn, et al. “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.” Cryptology and Network Security, Springer-Verlag, 2020, pp. 211–31, doi:10.1007/978-3-030-65411-5_11.' short: 'F. Dallmeier, J.P. Drees, K. Gellert, T. Handirk, T. Jager, J. Klauke, S. Nachtigall, T. Renzelmann, R. Wolf, in: Cryptology and Network Security, Springer-Verlag, Cham, 2020, pp. 211–231.' conference: end_date: 2020-12-16 location: Vienna name: CANS 2020 start_date: 2020-12-14 date_created: 2021-12-15T17:43:11Z date_updated: 2022-03-11T10:59:41Z doi: 10.1007/978-3-030-65411-5_11 extern: '1' language: - iso: eng page: 211-231 place: Cham publication: Cryptology and Network Security publication_identifier: isbn: - '9783030654108' - '9783030654115' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer-Verlag status: public title: 'Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC' type: conference user_id: '40915' year: '2020' ... --- _id: '20706' author: - first_name: Philipp full_name: zur Heiden, Philipp last_name: zur Heiden citation: ama: 'zur Heiden P. Considering Context in Design Science Research: A Systematic Literature Review. In: Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. ; 2020. doi:10.1007/978-3-030-64823-7_21' apa: 'zur Heiden, P. (2020). Considering Context in Design Science Research: A Systematic Literature Review. Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. https://doi.org/10.1007/978-3-030-64823-7_21' bibtex: '@inproceedings{zur Heiden_2020, place={Cham}, title={Considering Context in Design Science Research: A Systematic Literature Review}, DOI={10.1007/978-3-030-64823-7_21}, booktitle={Designing for Digital Transformation. Co-Creating Services with Citizens and Industry}, author={zur Heiden, Philipp}, year={2020} }' chicago: 'Heiden, Philipp zur. “Considering Context in Design Science Research: A Systematic Literature Review.” In Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. Cham, 2020. https://doi.org/10.1007/978-3-030-64823-7_21.' ieee: 'P. zur Heiden, “Considering Context in Design Science Research: A Systematic Literature Review,” 2020, doi: 10.1007/978-3-030-64823-7_21.' mla: 'zur Heiden, Philipp. “Considering Context in Design Science Research: A Systematic Literature Review.” Designing for Digital Transformation. Co-Creating Services with Citizens and Industry, 2020, doi:10.1007/978-3-030-64823-7_21.' short: 'P. zur Heiden, in: Designing for Digital Transformation. Co-Creating Services with Citizens and Industry, Cham, 2020.' date_created: 2020-12-11T14:01:48Z date_updated: 2022-04-04T09:59:49Z doi: 10.1007/978-3-030-64823-7_21 language: - iso: eng place: Cham publication: Designing for Digital Transformation. Co-Creating Services with Citizens and Industry publication_identifier: isbn: - '9783030648220' - '9783030648237' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: 'Considering Context in Design Science Research: A Systematic Literature Review' type: conference user_id: '64394' year: '2020' ... --- _id: '45848' author: - first_name: Yasir full_name: Mahmood, Yasir last_name: Mahmood - first_name: Arne full_name: Meier, Arne last_name: Meier citation: ama: 'Mahmood Y, Meier A. Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic. In: Lecture Notes in Computer Science. Springer International Publishing; 2020. doi:10.1007/978-3-030-39951-1_10' apa: Mahmood, Y., & Meier, A. (2020). Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-030-39951-1_10 bibtex: '@inproceedings{Mahmood_Meier_2020, place={Cham}, title={Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic}, DOI={10.1007/978-3-030-39951-1_10}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Mahmood, Yasir and Meier, Arne}, year={2020} }' chicago: 'Mahmood, Yasir, and Arne Meier. “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic.” In Lecture Notes in Computer Science. Cham: Springer International Publishing, 2020. https://doi.org/10.1007/978-3-030-39951-1_10.' ieee: 'Y. Mahmood and A. Meier, “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic,” 2020, doi: 10.1007/978-3-030-39951-1_10.' mla: Mahmood, Yasir, and Arne Meier. “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic.” Lecture Notes in Computer Science, Springer International Publishing, 2020, doi:10.1007/978-3-030-39951-1_10. short: 'Y. Mahmood, A. Meier, in: Lecture Notes in Computer Science, Springer International Publishing, Cham, 2020.' date_created: 2023-07-03T11:41:58Z date_updated: 2023-07-03T11:43:37Z doi: 10.1007/978-3-030-39951-1_10 language: - iso: eng place: Cham publication: Lecture Notes in Computer Science publication_identifier: isbn: - '9783030399504' - '9783030399511' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic type: conference user_id: '99353' year: '2020' ... --- _id: '47261' author: - first_name: Julie M. full_name: Haney, Julie M. last_name: Haney - first_name: Susanne M. full_name: Furman, Susanne M. last_name: Furman - first_name: Yasemin full_name: Acar, Yasemin id: '94636' last_name: Acar citation: ama: 'Haney JM, Furman SM, Acar Y. Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In: HCI for Cybersecurity, Privacy and Trust. Springer International Publishing; 2020. doi:10.1007/978-3-030-50309-3_26' apa: 'Haney, J. M., Furman, S. M., & Acar, Y. (2020). Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing. https://doi.org/10.1007/978-3-030-50309-3_26' bibtex: '@inbook{Haney_Furman_Acar_2020, place={Cham}, title={Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, DOI={10.1007/978-3-030-50309-3_26}, booktitle={HCI for Cybersecurity, Privacy and Trust}, publisher={Springer International Publishing}, author={Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin}, year={2020} }' chicago: 'Haney, Julie M., Susanne M. Furman, and Yasemin Acar. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” In HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2020. https://doi.org/10.1007/978-3-030-50309-3_26.' ieee: 'J. M. Haney, S. M. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges,” in HCI for Cybersecurity, Privacy and Trust, Cham: Springer International Publishing, 2020.' mla: 'Haney, Julie M., et al. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” HCI for Cybersecurity, Privacy and Trust, Springer International Publishing, 2020, doi:10.1007/978-3-030-50309-3_26.' short: 'J.M. Haney, S.M. Furman, Y. Acar, in: HCI for Cybersecurity, Privacy and Trust, Springer International Publishing, Cham, 2020.' date_created: 2023-09-22T12:59:53Z date_updated: 2023-11-22T09:57:52Z department: - _id: '34' - _id: '740' doi: 10.1007/978-3-030-50309-3_26 extern: '1' language: - iso: eng place: Cham publication: HCI for Cybersecurity, Privacy and Trust publication_identifier: isbn: - '9783030503086' - '9783030503093' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: 'Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges' type: book_chapter user_id: '15458' year: '2020' ... --- _id: '11952' author: - first_name: Björn full_name: Senft, Björn id: '9109' last_name: Senft - first_name: Florian full_name: Rittmeier, Florian id: '5281' last_name: Rittmeier - first_name: Holger Gerhard full_name: Fischer, Holger Gerhard id: '30457' last_name: Fischer - first_name: Simon full_name: Oberthür, Simon id: '383' last_name: Oberthür citation: ama: 'Senft B, Rittmeier F, Fischer HG, Oberthür S. A Value-Centered Approach for Unique and Novel Software Applications. In: Design, User Experience, and Usability. Practice and Case Studies. Cham; 2019. doi:10.1007/978-3-030-23535-2_27' apa: Senft, B., Rittmeier, F., Fischer, H. G., & Oberthür, S. (2019). A Value-Centered Approach for Unique and Novel Software Applications. In Design, User Experience, and Usability. Practice and Case Studies. Cham. https://doi.org/10.1007/978-3-030-23535-2_27 bibtex: '@inbook{Senft_Rittmeier_Fischer_Oberthür_2019, place={Cham}, title={A Value-Centered Approach for Unique and Novel Software Applications}, DOI={10.1007/978-3-030-23535-2_27}, booktitle={Design, User Experience, and Usability. Practice and Case Studies}, author={Senft, Björn and Rittmeier, Florian and Fischer, Holger Gerhard and Oberthür, Simon}, year={2019} }' chicago: Senft, Björn, Florian Rittmeier, Holger Gerhard Fischer, and Simon Oberthür. “A Value-Centered Approach for Unique and Novel Software Applications.” In Design, User Experience, and Usability. Practice and Case Studies. Cham, 2019. https://doi.org/10.1007/978-3-030-23535-2_27. ieee: B. Senft, F. Rittmeier, H. G. Fischer, and S. Oberthür, “A Value-Centered Approach for Unique and Novel Software Applications,” in Design, User Experience, and Usability. Practice and Case Studies, Cham, 2019. mla: Senft, Björn, et al. “A Value-Centered Approach for Unique and Novel Software Applications.” Design, User Experience, and Usability. Practice and Case Studies, 2019, doi:10.1007/978-3-030-23535-2_27. short: 'B. Senft, F. Rittmeier, H.G. Fischer, S. Oberthür, in: Design, User Experience, and Usability. Practice and Case Studies, Cham, 2019.' conference: end_date: 2019-07-31 location: Orlando, FL, USA name: 21st International Conference on Human-Computer Interaction start_date: 2019-07-26 date_created: 2019-07-14T07:57:53Z date_updated: 2022-01-06T06:51:13Z department: - _id: '66' doi: 10.1007/978-3-030-23535-2_27 language: - iso: eng place: Cham publication: Design, User Experience, and Usability. Practice and Case Studies publication_identifier: isbn: - '9783030235345' - '9783030235352' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: A Value-Centered Approach for Unique and Novel Software Applications type: book_chapter user_id: '9109' year: '2019' ... --- _id: '14890' author: - first_name: Stefan full_name: Kuhlemann, Stefan id: '38910' last_name: Kuhlemann - first_name: Meinolf full_name: Sellmann, Meinolf last_name: Sellmann - first_name: Kevin full_name: Tierney, Kevin last_name: Tierney citation: ama: 'Kuhlemann S, Sellmann M, Tierney K. Exploiting Counterfactuals for Scalable Stochastic Optimization. In: Lecture Notes in Computer Science. Cham; 2019. doi:10.1007/978-3-030-30048-7_40' apa: Kuhlemann, S., Sellmann, M., & Tierney, K. (2019). Exploiting Counterfactuals for Scalable Stochastic Optimization. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-030-30048-7_40 bibtex: '@inbook{Kuhlemann_Sellmann_Tierney_2019, place={Cham}, title={Exploiting Counterfactuals for Scalable Stochastic Optimization}, DOI={10.1007/978-3-030-30048-7_40}, booktitle={Lecture Notes in Computer Science}, author={Kuhlemann, Stefan and Sellmann, Meinolf and Tierney, Kevin}, year={2019} }' chicago: Kuhlemann, Stefan, Meinolf Sellmann, and Kevin Tierney. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” In Lecture Notes in Computer Science. Cham, 2019. https://doi.org/10.1007/978-3-030-30048-7_40. ieee: S. Kuhlemann, M. Sellmann, and K. Tierney, “Exploiting Counterfactuals for Scalable Stochastic Optimization,” in Lecture Notes in Computer Science, Cham, 2019. mla: Kuhlemann, Stefan, et al. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” Lecture Notes in Computer Science, 2019, doi:10.1007/978-3-030-30048-7_40. short: 'S. Kuhlemann, M. Sellmann, K. Tierney, in: Lecture Notes in Computer Science, Cham, 2019.' date_created: 2019-11-12T07:45:53Z date_updated: 2022-01-06T06:52:09Z department: - _id: '277' doi: 10.1007/978-3-030-30048-7_40 language: - iso: eng place: Cham publication: Lecture Notes in Computer Science publication_identifier: isbn: - '9783030300470' - '9783030300487' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Exploiting Counterfactuals for Scalable Stochastic Optimization type: book_chapter user_id: '38910' year: '2019' ... --- _id: '15004' author: - first_name: Mohsen full_name: Ahmadi Fahandar, Mohsen id: '59547' last_name: Ahmadi Fahandar - first_name: Eyke full_name: Hüllermeier, Eyke id: '48129' last_name: Hüllermeier citation: ama: 'Ahmadi Fahandar M, Hüllermeier E. Feature Selection for Analogy-Based Learning to Rank. In: Discovery Science. Cham; 2019. doi:10.1007/978-3-030-33778-0_22' apa: Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Feature Selection for Analogy-Based Learning to Rank. In Discovery Science. Cham. https://doi.org/10.1007/978-3-030-33778-0_22 bibtex: '@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Feature Selection for Analogy-Based Learning to Rank}, DOI={10.1007/978-3-030-33778-0_22}, booktitle={Discovery Science}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }' chicago: Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” In Discovery Science. Cham, 2019. https://doi.org/10.1007/978-3-030-33778-0_22. ieee: M. Ahmadi Fahandar and E. Hüllermeier, “Feature Selection for Analogy-Based Learning to Rank,” in Discovery Science, Cham, 2019. mla: Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” Discovery Science, 2019, doi:10.1007/978-3-030-33778-0_22. short: 'M. Ahmadi Fahandar, E. Hüllermeier, in: Discovery Science, Cham, 2019.' date_created: 2019-11-15T10:24:45Z date_updated: 2022-01-06T06:52:14Z department: - _id: '34' - _id: '355' doi: 10.1007/978-3-030-33778-0_22 language: - iso: eng place: Cham publication: Discovery Science publication_identifier: isbn: - '9783030337773' - '9783030337780' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Feature Selection for Analogy-Based Learning to Rank type: book_chapter user_id: '315' year: '2019' ... --- _id: '15005' author: - first_name: Mohsen full_name: Ahmadi Fahandar, Mohsen id: '59547' last_name: Ahmadi Fahandar - first_name: Eyke full_name: Hüllermeier, Eyke id: '48129' last_name: Hüllermeier citation: ama: 'Ahmadi Fahandar M, Hüllermeier E. Analogy-Based Preference Learning with Kernels. In: KI 2019: Advances in Artificial Intelligence. Cham; 2019. doi:10.1007/978-3-030-30179-8_3' apa: 'Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Analogy-Based Preference Learning with Kernels. In KI 2019: Advances in Artificial Intelligence. Cham. https://doi.org/10.1007/978-3-030-30179-8_3' bibtex: '@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Analogy-Based Preference Learning with Kernels}, DOI={10.1007/978-3-030-30179-8_3}, booktitle={KI 2019: Advances in Artificial Intelligence}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }' chicago: 'Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” In KI 2019: Advances in Artificial Intelligence. Cham, 2019. https://doi.org/10.1007/978-3-030-30179-8_3.' ieee: 'M. Ahmadi Fahandar and E. Hüllermeier, “Analogy-Based Preference Learning with Kernels,” in KI 2019: Advances in Artificial Intelligence, Cham, 2019.' mla: 'Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” KI 2019: Advances in Artificial Intelligence, 2019, doi:10.1007/978-3-030-30179-8_3.' short: 'M. Ahmadi Fahandar, E. Hüllermeier, in: KI 2019: Advances in Artificial Intelligence, Cham, 2019.' date_created: 2019-11-15T10:30:10Z date_updated: 2022-01-06T06:52:14Z department: - _id: '34' - _id: '355' doi: 10.1007/978-3-030-30179-8_3 language: - iso: eng place: Cham publication: 'KI 2019: Advances in Artificial Intelligence' publication_identifier: isbn: - '9783030301781' - '9783030301798' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Analogy-Based Preference Learning with Kernels type: book_chapter user_id: '315' year: '2019' ...