---
_id: '5769'
abstract:
- lang: eng
  text: "Information Flow Analysis (IFA) aims at detecting illegal flows of information
    between program entities. “Legality” is therein specified in terms of various
    security policies. For the analysis, this opens up two possibilities: building
    generic, policy independent and building specific, policy dependent IFAs. While
    the former needs to track all dependencies between program entities, the latter
    allows for a reduced and thus more efficient analysis.\r\n\r\nIn this paper, we
    start out by formally defining a policy independent information flow analysis.
    Next, we show how to specialize this IFA via policy specific variable tracking,
    and prove soundness of the specialization. We furthermore investigate refinement
    relationships between policies, allowing an IFA for one policy to be employed
    for its refinements. As policy refinement depends on concrete program entities,
    we additionally propose a precomputation of policy refinement conditions, enabling
    an efficient refinement check for concrete programs."
author:
- first_name: Manuel
  full_name: Töws, Manuel
  id: '11315'
  last_name: Töws
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses.
    In: <i>Formal Methods and Software Engineering - 19th International Conference 
    on Formal Engineering Methods (ICFEM 2017)</i>. Springer International Publishing;
    2017:362-378. doi:<a href="https://doi.org/10.1007/978-3-319-68690-5_22">10.1007/978-3-319-68690-5_22</a>'
  apa: Töws, M., &#38; Wehrheim, H. (2017). Policy Dependent and Independent Information
    Flow Analyses. In <i>Formal Methods and Software Engineering - 19th International
    Conference  on Formal Engineering Methods (ICFEM 2017)</i> (pp. 362–378). Springer
    International Publishing. <a href="https://doi.org/10.1007/978-3-319-68690-5_22">https://doi.org/10.1007/978-3-319-68690-5_22</a>
  bibtex: '@inproceedings{Töws_Wehrheim_2017, title={Policy Dependent and Independent
    Information Flow Analyses}, DOI={<a href="https://doi.org/10.1007/978-3-319-68690-5_22">10.1007/978-3-319-68690-5_22</a>},
    booktitle={Formal Methods and Software Engineering - 19th International Conference 
    on Formal Engineering Methods (ICFEM 2017)}, publisher={Springer International
    Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2017}, pages={362–378}
    }'
  chicago: Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information
    Flow Analyses.” In <i>Formal Methods and Software Engineering - 19th International
    Conference  on Formal Engineering Methods (ICFEM 2017)</i>, 362–78. Springer International
    Publishing, 2017. <a href="https://doi.org/10.1007/978-3-319-68690-5_22">https://doi.org/10.1007/978-3-319-68690-5_22</a>.
  ieee: M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow
    Analyses,” in <i>Formal Methods and Software Engineering - 19th International
    Conference  on Formal Engineering Methods (ICFEM 2017)</i>, 2017, pp. 362–378.
  mla: Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information
    Flow Analyses.” <i>Formal Methods and Software Engineering - 19th International
    Conference  on Formal Engineering Methods (ICFEM 2017)</i>, Springer International
    Publishing, 2017, pp. 362–78, doi:<a href="https://doi.org/10.1007/978-3-319-68690-5_22">10.1007/978-3-319-68690-5_22</a>.
  short: 'M. Töws, H. Wehrheim, in: Formal Methods and Software Engineering - 19th
    International Conference  on Formal Engineering Methods (ICFEM 2017), Springer
    International Publishing, 2017, pp. 362–378.'
date_created: 2018-11-21T09:38:43Z
date_updated: 2022-01-06T07:02:39Z
ddc:
- '000'
department:
- _id: '77'
doi: 10.1007/978-3-319-68690-5_22
file:
- access_level: closed
  content_type: application/pdf
  creator: mtoews
  date_created: 2018-11-26T15:07:42Z
  date_updated: 2018-11-26T15:07:42Z
  file_id: '5836'
  file_name: Töws-Wehrheim2017_Chapter_PolicyDependentAndIndependentI.pdf
  file_size: 424031
  relation: main_file
  success: 1
file_date_updated: 2018-11-26T15:07:42Z
has_accepted_license: '1'
language:
- iso: eng
page: 362-378
project:
- _id: '12'
  name: SFB 901 - Subproject B4
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '1'
  name: SFB 901
publication: Formal Methods and Software Engineering - 19th International Conference  on
  Formal Engineering Methods (ICFEM 2017)
publication_identifier:
  isbn:
  - '9783319686899'
  - '9783319686905'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Policy Dependent and Independent Information Flow Analyses
type: conference
user_id: '477'
year: '2017'
...
---
_id: '6255'
author:
- first_name: Holger Gerhard
  full_name: Fischer, Holger Gerhard
  id: '30457'
  last_name: Fischer
- first_name: Michael
  full_name: Engler, Michael
  last_name: Engler
- first_name: Stefan
  full_name: Sauer, Stefan
  id: '447'
  last_name: Sauer
citation:
  ama: 'Fischer HG, Engler M, Sauer S. A Human-Centered Perspective on Software Quality:
    Acceptance Criteria for Work 4.0. In: <i>Design, User Experience, and Usability:
    Theory, Methodology, and Management</i>. Vol 10288. Lecture Notes in Computer
    Science. Cham: Springer International Publishing; 2017:570-583. doi:<a href="https://doi.org/10.1007/978-3-319-58634-2_42">10.1007/978-3-319-58634-2_42</a>'
  apa: 'Fischer, H. G., Engler, M., &#38; Sauer, S. (2017). A Human-Centered Perspective
    on Software Quality: Acceptance Criteria for Work 4.0. In <i>Design, User Experience,
    and Usability: Theory, Methodology, and Management</i> (Vol. 10288, pp. 570–583).
    Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-58634-2_42">https://doi.org/10.1007/978-3-319-58634-2_42</a>'
  bibtex: '@inbook{Fischer_Engler_Sauer_2017, place={Cham}, series={Lecture Notes
    in Computer Science}, title={A Human-Centered Perspective on Software Quality:
    Acceptance Criteria for Work 4.0}, volume={10288}, DOI={<a href="https://doi.org/10.1007/978-3-319-58634-2_42">10.1007/978-3-319-58634-2_42</a>},
    booktitle={Design, User Experience, and Usability: Theory, Methodology, and Management},
    publisher={Springer International Publishing}, author={Fischer, Holger Gerhard
    and Engler, Michael and Sauer, Stefan}, year={2017}, pages={570–583}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Fischer, Holger Gerhard, Michael Engler, and Stefan Sauer. “A Human-Centered
    Perspective on Software Quality: Acceptance Criteria for Work 4.0.” In <i>Design,
    User Experience, and Usability: Theory, Methodology, and Management</i>, 10288:570–83.
    Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017.
    <a href="https://doi.org/10.1007/978-3-319-58634-2_42">https://doi.org/10.1007/978-3-319-58634-2_42</a>.'
  ieee: 'H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on
    Software Quality: Acceptance Criteria for Work 4.0,” in <i>Design, User Experience,
    and Usability: Theory, Methodology, and Management</i>, vol. 10288, Cham: Springer
    International Publishing, 2017, pp. 570–583.'
  mla: 'Fischer, Holger Gerhard, et al. “A Human-Centered Perspective on Software
    Quality: Acceptance Criteria for Work 4.0.” <i>Design, User Experience, and Usability:
    Theory, Methodology, and Management</i>, vol. 10288, Springer International Publishing,
    2017, pp. 570–83, doi:<a href="https://doi.org/10.1007/978-3-319-58634-2_42">10.1007/978-3-319-58634-2_42</a>.'
  short: 'H.G. Fischer, M. Engler, S. Sauer, in: Design, User Experience, and Usability:
    Theory, Methodology, and Management, Springer International Publishing, Cham,
    2017, pp. 570–583.'
conference:
  end_date: 2017-07-14
  location: Vancouver, Canada
  name: International Conference of Design, User Experience, and Usability (DUXU)
    as part of HCI International 2017
  start_date: 2017-07-09
date_created: 2018-12-18T10:44:24Z
date_updated: 2022-01-06T07:02:58Z
department:
- _id: '66'
- _id: '534'
- _id: '221'
doi: 10.1007/978-3-319-58634-2_42
intvolume: '     10288'
language:
- iso: eng
page: 570-583
place: Cham
publication: 'Design, User Experience, and Usability: Theory, Methodology, and Management'
publication_identifier:
  isbn:
  - '9783319586335'
  - '9783319586342'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: 'A Human-Centered Perspective on Software Quality: Acceptance Criteria for
  Work 4.0'
type: book_chapter
user_id: '30457'
volume: 10288
year: '2017'
...
---
_id: '16461'
author:
- first_name: Pascal
  full_name: Bemmann, Pascal
  last_name: Bemmann
- first_name: Felix
  full_name: Biermeier, Felix
  last_name: Biermeier
- first_name: Jan
  full_name: Bürmann, Jan
  last_name: Bürmann
- first_name: Arne
  full_name: Kemper, Arne
  last_name: Kemper
- first_name: Till
  full_name: Knollmann, Till
  id: '39241'
  last_name: Knollmann
  orcid: 0000-0003-2014-4696
- first_name: Steffen
  full_name: Knorr, Steffen
  last_name: Knorr
- first_name: Nils
  full_name: Kothe, Nils
  last_name: Kothe
- first_name: Alexander
  full_name: Mäcker, Alexander
  id: '13536'
  last_name: Mäcker
- first_name: Manuel
  full_name: Malatyali, Manuel
  id: '41265'
  last_name: Malatyali
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
- first_name: Sören
  full_name: Riechers, Sören
  last_name: Riechers
- first_name: Johannes Sebastian
  full_name: Schaefer, Johannes Sebastian
  id: '30291'
  last_name: Schaefer
- first_name: Jannik
  full_name: Sundermeier, Jannik
  id: '38705'
  last_name: Sundermeier
citation:
  ama: 'Bemmann P, Biermeier F, Bürmann J, et al. Monitoring of Domain-Related Problems
    in Distributed Data Streams. In: <i>Structural Information and Communication Complexity</i>.
    ; 2017. doi:<a href="https://doi.org/10.1007/978-3-319-72050-0_13">10.1007/978-3-319-72050-0_13</a>'
  apa: Bemmann, P., Biermeier, F., Bürmann, J., Kemper, A., Knollmann, T., Knorr,
    S., Kothe, N., Mäcker, A., Malatyali, M., Meyer auf der Heide, F., Riechers, S.,
    Schaefer, J. S., &#38; Sundermeier, J. (2017). Monitoring of Domain-Related Problems
    in Distributed Data Streams. In <i>Structural Information and Communication Complexity</i>.
    <a href="https://doi.org/10.1007/978-3-319-72050-0_13">https://doi.org/10.1007/978-3-319-72050-0_13</a>
  bibtex: '@inbook{Bemmann_Biermeier_Bürmann_Kemper_Knollmann_Knorr_Kothe_Mäcker_Malatyali_Meyer
    auf der Heide_et al._2017, place={Cham}, title={Monitoring of Domain-Related Problems
    in Distributed Data Streams}, DOI={<a href="https://doi.org/10.1007/978-3-319-72050-0_13">10.1007/978-3-319-72050-0_13</a>},
    booktitle={Structural Information and Communication Complexity}, author={Bemmann,
    Pascal and Biermeier, Felix and Bürmann, Jan and Kemper, Arne and Knollmann, Till
    and Knorr, Steffen and Kothe, Nils and Mäcker, Alexander and Malatyali, Manuel
    and Meyer auf der Heide, Friedhelm and et al.}, year={2017} }'
  chicago: Bemmann, Pascal, Felix Biermeier, Jan Bürmann, Arne Kemper, Till Knollmann,
    Steffen Knorr, Nils Kothe, et al. “Monitoring of Domain-Related Problems in Distributed
    Data Streams.” In <i>Structural Information and Communication Complexity</i>.
    Cham, 2017. <a href="https://doi.org/10.1007/978-3-319-72050-0_13">https://doi.org/10.1007/978-3-319-72050-0_13</a>.
  ieee: P. Bemmann <i>et al.</i>, “Monitoring of Domain-Related Problems in Distributed
    Data Streams,” in <i>Structural Information and Communication Complexity</i>,
    Cham, 2017.
  mla: Bemmann, Pascal, et al. “Monitoring of Domain-Related Problems in Distributed
    Data Streams.” <i>Structural Information and Communication Complexity</i>, 2017,
    doi:<a href="https://doi.org/10.1007/978-3-319-72050-0_13">10.1007/978-3-319-72050-0_13</a>.
  short: 'P. Bemmann, F. Biermeier, J. Bürmann, A. Kemper, T. Knollmann, S. Knorr,
    N. Kothe, A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, J.S. Schaefer,
    J. Sundermeier, in: Structural Information and Communication Complexity, Cham,
    2017.'
date_created: 2020-04-08T07:20:20Z
date_updated: 2022-01-06T06:52:50Z
department:
- _id: '63'
doi: 10.1007/978-3-319-72050-0_13
external_id:
  arxiv:
  - 'arXiv:1706.03568 '
language:
- iso: eng
place: Cham
publication: Structural Information and Communication Complexity
publication_identifier:
  isbn:
  - '9783319720494'
  - '9783319720500'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Monitoring of Domain-Related Problems in Distributed Data Streams
type: book_chapter
user_id: '15415'
year: '2017'
...
---
_id: '14857'
author:
- first_name: Michaela
  full_name: Beckschäfer, Michaela
  id: '32439'
  last_name: Beckschäfer
- first_name: Simon
  full_name: Malberg, Simon
  last_name: Malberg
- first_name: Kevin
  full_name: Tierney, Kevin
  last_name: Tierney
- first_name: Christoph
  full_name: Weskamp, Christoph
  last_name: Weskamp
citation:
  ama: 'Beckschäfer M, Malberg S, Tierney K, Weskamp C. Simulating Storage Policies
    for an Automated Grid-Based Warehouse System. In: <i>Lecture Notes in Computer
    Science</i>. Cham; 2017. doi:<a href="https://doi.org/10.1007/978-3-319-68496-3_31">10.1007/978-3-319-68496-3_31</a>'
  apa: Beckschäfer, M., Malberg, S., Tierney, K., &#38; Weskamp, C. (2017). Simulating
    Storage Policies for an Automated Grid-Based Warehouse System. In <i>Lecture Notes
    in Computer Science</i>. Cham. <a href="https://doi.org/10.1007/978-3-319-68496-3_31">https://doi.org/10.1007/978-3-319-68496-3_31</a>
  bibtex: '@inbook{Beckschäfer_Malberg_Tierney_Weskamp_2017, place={Cham}, title={Simulating
    Storage Policies for an Automated Grid-Based Warehouse System}, DOI={<a href="https://doi.org/10.1007/978-3-319-68496-3_31">10.1007/978-3-319-68496-3_31</a>},
    booktitle={Lecture Notes in Computer Science}, author={Beckschäfer, Michaela and
    Malberg, Simon and Tierney, Kevin and Weskamp, Christoph}, year={2017} }'
  chicago: Beckschäfer, Michaela, Simon Malberg, Kevin Tierney, and Christoph Weskamp.
    “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” In
    <i>Lecture Notes in Computer Science</i>. Cham, 2017. <a href="https://doi.org/10.1007/978-3-319-68496-3_31">https://doi.org/10.1007/978-3-319-68496-3_31</a>.
  ieee: M. Beckschäfer, S. Malberg, K. Tierney, and C. Weskamp, “Simulating Storage
    Policies for an Automated Grid-Based Warehouse System,” in <i>Lecture Notes in
    Computer Science</i>, Cham, 2017.
  mla: Beckschäfer, Michaela, et al. “Simulating Storage Policies for an Automated
    Grid-Based Warehouse System.” <i>Lecture Notes in Computer Science</i>, 2017,
    doi:<a href="https://doi.org/10.1007/978-3-319-68496-3_31">10.1007/978-3-319-68496-3_31</a>.
  short: 'M. Beckschäfer, S. Malberg, K. Tierney, C. Weskamp, in: Lecture Notes in
    Computer Science, Cham, 2017.'
date_created: 2019-11-08T08:15:11Z
date_updated: 2022-01-06T06:52:08Z
department:
- _id: '277'
doi: 10.1007/978-3-319-68496-3_31
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783319684956'
  - '9783319684963'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Simulating Storage Policies for an Automated Grid-Based Warehouse System
type: book_chapter
user_id: '1112'
year: '2017'
...
---
_id: '23396'
author:
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
- first_name: David
  full_name: Schubert, David
  last_name: Schubert
- first_name: Ingo
  full_name: Budde, Ingo
  id: '13693'
  last_name: Budde
  orcid: https://orcid.org/0000-0003-0124-6291
citation:
  ama: 'Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model
    Refinements by Using General-Purpose Language Facilities. In: <i>Theory and Practice
    of Model Transformation</i>. ; 2017. doi:<a href="https://doi.org/10.1007/978-3-319-61473-1_2">10.1007/978-3-319-61473-1_2</a>'
  apa: Gerking, C., Schubert, D., &#38; Budde, I. (2017). Reducing the Verbosity of
    Imperative Model Refinements by Using General-Purpose Language Facilities. In
    <i>Theory and Practice of Model Transformation</i>. <a href="https://doi.org/10.1007/978-3-319-61473-1_2">https://doi.org/10.1007/978-3-319-61473-1_2</a>
  bibtex: '@inbook{Gerking_Schubert_Budde_2017, place={Cham}, title={Reducing the
    Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities},
    DOI={<a href="https://doi.org/10.1007/978-3-319-61473-1_2">10.1007/978-3-319-61473-1_2</a>},
    booktitle={Theory and Practice of Model Transformation}, author={Gerking, Christopher
    and Schubert, David and Budde, Ingo}, year={2017} }'
  chicago: Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity
    of Imperative Model Refinements by Using General-Purpose Language Facilities.”
    In <i>Theory and Practice of Model Transformation</i>. Cham, 2017. <a href="https://doi.org/10.1007/978-3-319-61473-1_2">https://doi.org/10.1007/978-3-319-61473-1_2</a>.
  ieee: C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative
    Model Refinements by Using General-Purpose Language Facilities,” in <i>Theory
    and Practice of Model Transformation</i>, Cham, 2017.
  mla: Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements
    by Using General-Purpose Language Facilities.” <i>Theory and Practice of Model
    Transformation</i>, 2017, doi:<a href="https://doi.org/10.1007/978-3-319-61473-1_2">10.1007/978-3-319-61473-1_2</a>.
  short: 'C. Gerking, D. Schubert, I. Budde, in: Theory and Practice of Model Transformation,
    Cham, 2017.'
date_created: 2021-08-13T20:33:08Z
date_updated: 2024-05-02T19:01:07Z
doi: 10.1007/978-3-319-61473-1_2
language:
- iso: eng
place: Cham
publication: Theory and Practice of Model Transformation
publication_identifier:
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose
  Language Facilities
type: book_chapter
user_id: '13693'
year: '2017'
...
---
_id: '60902'
author:
- first_name: Johanna
  full_name: Senk, Johanna
  last_name: Senk
- first_name: Alper
  full_name: Yegenoglu, Alper
  id: '117951'
  last_name: Yegenoglu
  orcid: 0000-0001-8869-215X
- first_name: Olivier
  full_name: Amblet, Olivier
  last_name: Amblet
- first_name: Yury
  full_name: Brukau, Yury
  last_name: Brukau
- first_name: Andrew
  full_name: Davison, Andrew
  last_name: Davison
- first_name: David Roland
  full_name: Lester, David Roland
  last_name: Lester
- first_name: Anna
  full_name: Lührs, Anna
  last_name: Lührs
- first_name: Pietro
  full_name: Quaglio, Pietro
  last_name: Quaglio
- first_name: Vahid
  full_name: Rostami, Vahid
  last_name: Rostami
- first_name: Andrew
  full_name: Rowley, Andrew
  last_name: Rowley
- first_name: Bernd
  full_name: Schuller, Bernd
  last_name: Schuller
- first_name: Alan Barry
  full_name: Stokes, Alan Barry
  last_name: Stokes
- first_name: Sacha Jennifer
  full_name: van Albada, Sacha Jennifer
  last_name: van Albada
- first_name: Daniel
  full_name: Zielasko, Daniel
  last_name: Zielasko
- first_name: Markus
  full_name: Diesmann, Markus
  last_name: Diesmann
- first_name: Benjamin
  full_name: Weyers, Benjamin
  last_name: Weyers
- first_name: Michael
  full_name: Denker, Michael
  last_name: Denker
- first_name: Sonja
  full_name: Grün, Sonja
  last_name: Grün
citation:
  ama: 'Senk J, Yegenoglu A, Amblet O, et al. A Collaborative Simulation-Analysis
    Workflow for Computational Neuroscience Using HPC. In: <i>Lecture Notes in Computer
    Science</i>. Springer International Publishing; 2017. doi:<a href="https://doi.org/10.1007/978-3-319-53862-4_21">10.1007/978-3-319-53862-4_21</a>'
  apa: Senk, J., Yegenoglu, A., Amblet, O., Brukau, Y., Davison, A., Lester, D. R.,
    Lührs, A., Quaglio, P., Rostami, V., Rowley, A., Schuller, B., Stokes, A. B.,
    van Albada, S. J., Zielasko, D., Diesmann, M., Weyers, B., Denker, M., &#38; Grün,
    S. (2017). A Collaborative Simulation-Analysis Workflow for Computational Neuroscience
    Using HPC. In <i>Lecture Notes in Computer Science</i>. Springer International
    Publishing. <a href="https://doi.org/10.1007/978-3-319-53862-4_21">https://doi.org/10.1007/978-3-319-53862-4_21</a>
  bibtex: '@inbook{Senk_Yegenoglu_Amblet_Brukau_Davison_Lester_Lührs_Quaglio_Rostami_Rowley_et
    al._2017, place={Cham}, title={A Collaborative Simulation-Analysis Workflow for
    Computational Neuroscience Using HPC}, DOI={<a href="https://doi.org/10.1007/978-3-319-53862-4_21">10.1007/978-3-319-53862-4_21</a>},
    booktitle={Lecture Notes in Computer Science}, publisher={Springer International
    Publishing}, author={Senk, Johanna and Yegenoglu, Alper and Amblet, Olivier and
    Brukau, Yury and Davison, Andrew and Lester, David Roland and Lührs, Anna and
    Quaglio, Pietro and Rostami, Vahid and Rowley, Andrew and et al.}, year={2017}
    }'
  chicago: 'Senk, Johanna, Alper Yegenoglu, Olivier Amblet, Yury Brukau, Andrew Davison,
    David Roland Lester, Anna Lührs, et al. “A Collaborative Simulation-Analysis Workflow
    for Computational Neuroscience Using HPC.” In <i>Lecture Notes in Computer Science</i>.
    Cham: Springer International Publishing, 2017. <a href="https://doi.org/10.1007/978-3-319-53862-4_21">https://doi.org/10.1007/978-3-319-53862-4_21</a>.'
  ieee: 'J. Senk <i>et al.</i>, “A Collaborative Simulation-Analysis Workflow for
    Computational Neuroscience Using HPC,” in <i>Lecture Notes in Computer Science</i>,
    Cham: Springer International Publishing, 2017.'
  mla: Senk, Johanna, et al. “A Collaborative Simulation-Analysis Workflow for Computational
    Neuroscience Using HPC.” <i>Lecture Notes in Computer Science</i>, Springer International
    Publishing, 2017, doi:<a href="https://doi.org/10.1007/978-3-319-53862-4_21">10.1007/978-3-319-53862-4_21</a>.
  short: 'J. Senk, A. Yegenoglu, O. Amblet, Y. Brukau, A. Davison, D.R. Lester, A.
    Lührs, P. Quaglio, V. Rostami, A. Rowley, B. Schuller, A.B. Stokes, S.J. van Albada,
    D. Zielasko, M. Diesmann, B. Weyers, M. Denker, S. Grün, in: Lecture Notes in
    Computer Science, Springer International Publishing, Cham, 2017.'
date_created: 2025-08-06T15:02:46Z
date_updated: 2025-08-08T11:39:32Z
doi: 10.1007/978-3-319-53862-4_21
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783319538617'
  - '9783319538624'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: A Collaborative Simulation-Analysis Workflow for Computational Neuroscience
  Using HPC
type: book_chapter
user_id: '117951'
year: '2017'
...
---
_id: '20000'
author:
- first_name: Heiko
  full_name: Hamann, Heiko
  last_name: Hamann
- first_name: Gabriele
  full_name: Valentini, Gabriele
  last_name: Valentini
- first_name: Marco
  full_name: Dorigo, Marco
  last_name: Dorigo
citation:
  ama: 'Hamann H, Valentini G, Dorigo M. Population Coding: A New Design Paradigm
    for Embodied Distributed Systems. In: <i>10th Int. Conf. on Swarm Intelligence,
    ANTS 2016</i>. Cham; 2016. doi:<a href="https://doi.org/10.1007/978-3-319-44427-7_15">10.1007/978-3-319-44427-7_15</a>'
  apa: 'Hamann, H., Valentini, G., &#38; Dorigo, M. (2016). Population Coding: A New
    Design Paradigm for Embodied Distributed Systems. In <i>10th Int. Conf. on Swarm
    Intelligence, ANTS 2016</i>. Cham. <a href="https://doi.org/10.1007/978-3-319-44427-7_15">https://doi.org/10.1007/978-3-319-44427-7_15</a>'
  bibtex: '@inproceedings{Hamann_Valentini_Dorigo_2016, place={Cham}, title={Population
    Coding: A New Design Paradigm for Embodied Distributed Systems}, DOI={<a href="https://doi.org/10.1007/978-3-319-44427-7_15">10.1007/978-3-319-44427-7_15</a>},
    booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Hamann,
    Heiko and Valentini, Gabriele and Dorigo, Marco}, year={2016} }'
  chicago: 'Hamann, Heiko, Gabriele Valentini, and Marco Dorigo. “Population Coding:
    A New Design Paradigm for Embodied Distributed Systems.” In <i>10th Int. Conf.
    on Swarm Intelligence, ANTS 2016</i>. Cham, 2016. <a href="https://doi.org/10.1007/978-3-319-44427-7_15">https://doi.org/10.1007/978-3-319-44427-7_15</a>.'
  ieee: 'H. Hamann, G. Valentini, and M. Dorigo, “Population Coding: A New Design
    Paradigm for Embodied Distributed Systems,” in <i>10th Int. Conf. on Swarm Intelligence,
    ANTS 2016</i>, 2016.'
  mla: 'Hamann, Heiko, et al. “Population Coding: A New Design Paradigm for Embodied
    Distributed Systems.” <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>,
    2016, doi:<a href="https://doi.org/10.1007/978-3-319-44427-7_15">10.1007/978-3-319-44427-7_15</a>.'
  short: 'H. Hamann, G. Valentini, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence,
    ANTS 2016, Cham, 2016.'
date_created: 2020-10-15T09:55:35Z
date_updated: 2022-01-06T06:54:18Z
department:
- _id: '63'
- _id: '238'
doi: 10.1007/978-3-319-44427-7_15
language:
- iso: eng
place: Cham
publication: 10th Int. Conf. on Swarm Intelligence, ANTS 2016
publication_identifier:
  isbn:
  - '9783319444260'
  - '9783319444277'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: 'Population Coding: A New Design Paradigm for Embodied Distributed Systems'
type: conference
user_id: '15415'
year: '2016'
...
---
_id: '20004'
author:
- first_name: Gabriele
  full_name: Valentini, Gabriele
  last_name: Valentini
- first_name: Davide
  full_name: Brambilla, Davide
  last_name: Brambilla
- first_name: Heiko
  full_name: Hamann, Heiko
  last_name: Hamann
- first_name: Marco
  full_name: Dorigo, Marco
  last_name: Dorigo
citation:
  ama: 'Valentini G, Brambilla D, Hamann H, Dorigo M. Collective Perception of Environmental
    Features in a Robot Swarm. In: <i>10th Int. Conf. on Swarm Intelligence, ANTS
    2016</i>. ; 2016. doi:<a href="https://doi.org/10.1007/978-3-319-44427-7_6">10.1007/978-3-319-44427-7_6</a>'
  apa: Valentini, G., Brambilla, D., Hamann, H., &#38; Dorigo, M. (2016). Collective
    Perception of Environmental Features in a Robot Swarm. In <i>10th Int. Conf. on
    Swarm Intelligence, ANTS 2016</i>. <a href="https://doi.org/10.1007/978-3-319-44427-7_6">https://doi.org/10.1007/978-3-319-44427-7_6</a>
  bibtex: '@inproceedings{Valentini_Brambilla_Hamann_Dorigo_2016, title={Collective
    Perception of Environmental Features in a Robot Swarm}, DOI={<a href="https://doi.org/10.1007/978-3-319-44427-7_6">10.1007/978-3-319-44427-7_6</a>},
    booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Valentini,
    Gabriele and Brambilla, Davide and Hamann, Heiko and Dorigo, Marco}, year={2016}
    }'
  chicago: Valentini, Gabriele, Davide Brambilla, Heiko Hamann, and Marco Dorigo.
    “Collective Perception of Environmental Features in a Robot Swarm.” In <i>10th
    Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016. <a href="https://doi.org/10.1007/978-3-319-44427-7_6">https://doi.org/10.1007/978-3-319-44427-7_6</a>.
  ieee: G. Valentini, D. Brambilla, H. Hamann, and M. Dorigo, “Collective Perception
    of Environmental Features in a Robot Swarm,” in <i>10th Int. Conf. on Swarm Intelligence,
    ANTS 2016</i>, 2016.
  mla: Valentini, Gabriele, et al. “Collective Perception of Environmental Features
    in a Robot Swarm.” <i>10th Int. Conf. on Swarm Intelligence, ANTS 2016</i>, 2016,
    doi:<a href="https://doi.org/10.1007/978-3-319-44427-7_6">10.1007/978-3-319-44427-7_6</a>.
  short: 'G. Valentini, D. Brambilla, H. Hamann, M. Dorigo, in: 10th Int. Conf. on
    Swarm Intelligence, ANTS 2016, 2016.'
date_created: 2020-10-15T10:22:20Z
date_updated: 2022-01-06T06:54:18Z
department:
- _id: '63'
- _id: '238'
doi: 10.1007/978-3-319-44427-7_6
language:
- iso: eng
publication: 10th Int. Conf. on Swarm Intelligence, ANTS 2016
publication_identifier:
  isbn:
  - '9783319444260'
  - '9783319444277'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Collective Perception of Environmental Features in a Robot Swarm
type: conference
user_id: '15415'
year: '2016'
...
---
_id: '2948'
author:
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
citation:
  ama: 'Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based
    Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information
    Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>'
  apa: 'Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings
    on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer
    and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing.
    <a href="https://doi.org/10.1007/978-3-319-32859-1_13">https://doi.org/10.1007/978-3-319-32859-1_13</a>'
  bibtex: '@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic
    Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>},
    booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer
    International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016},
    pages={151–165} }'
  chicago: 'Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings
    on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of
    Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing,
    2016. <a href="https://doi.org/10.1007/978-3-319-32859-1_13">https://doi.org/10.1007/978-3-319-32859-1_13</a>.'
  ieee: 'P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator
    Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information
    Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.'
  mla: Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on
    Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer
    and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65,
    doi:<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>.
  short: 'P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information
    Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.'
date_created: 2018-05-29T11:26:56Z
date_updated: 2022-01-06T06:58:48Z
department:
- _id: '64'
doi: 10.1007/978-3-319-32859-1_13
page: 151-165
place: Cham
project:
- _id: '43'
  name: Securing the Financial Cloud
publication: Mathematical Aspects of Computer and Information Sciences
publication_identifier:
  isbn:
  - '9783319328584'
  - '9783319328591'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2968'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Christiane
  full_name: Lammersen, Christiane
  last_name: Lammersen
- first_name: Melanie
  full_name: Schmidt, Melanie
  last_name: Schmidt
- first_name: Christian
  full_name: Sohler, Christian
  last_name: Sohler
citation:
  ama: 'Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means
    Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International
    Publishing; 2016:81-116. doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>'
  apa: 'Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical
    Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i>
    (pp. 81–116). Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>'
  bibtex: '@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical
    Analysis of the k-Means Algorithm – A Survey}, DOI={<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>},
    booktitle={Algorithm Engineering}, publisher={Springer International Publishing},
    author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler,
    Christian}, year={2016}, pages={81–116} }'
  chicago: 'Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian
    Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm
    Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>.'
  ieee: 'J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis
    of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer
    International Publishing, 2016, pp. 81–116.'
  mla: Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A
    Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016,
    pp. 81–116, doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>.
  short: 'J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering,
    Springer International Publishing, Cham, 2016, pp. 81–116.'
date_created: 2018-06-04T12:22:40Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-49487-6_3
page: 81-116
place: Cham
publication: Algorithm Engineering
publication_identifier:
  isbn:
  - '9783319494869'
  - '9783319494876'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Theoretical Analysis of the k-Means Algorithm – A Survey
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2970'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances
    in Knowledge Discovery and Data Mining</i>. Cham: Springer International Publishing;
    2016:296-308. doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>'
  apa: 'Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture
    Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308).
    Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>'
  bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian
    Mixture Models}, DOI={<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>},
    booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer
    International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016},
    pages={296–308} }'
  chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham:
    Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>.'
  ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in
    <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International
    Publishing, 2016, pp. 296–308.'
  mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International
    Publishing, 2016, pp. 296–308, doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>.
  short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining,
    Springer International Publishing, Cham, 2016, pp. 296–308.'
date_created: 2018-06-04T12:27:21Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-31750-2_24
page: 296-308
place: Cham
publication: Advances in Knowledge Discovery and Data Mining
publication_identifier:
  isbn:
  - '9783319317496'
  - '9783319317502'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Adaptive Seeding for Gaussian Mixture Models
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '5825'
abstract:
- lang: eng
  text: Integrating apps on mobile devices into applications running on other devices
    is usually difficult. For instance, using a messenger on a smartphone to share
    a text written on a desktop computer often ends up in a cumbersome solution to
    transfer the text, because many applications are not designed for such scenarios.
    In this paper, we present an approach enabling the integration of apps running
    on Android devices into applications running on other devices and even other platforms.
    This is achieved by specifying adapters for Android apps, which map their services
    to a platform-independent service interface. For this purpose, we have developed
    a domain-specific language to ease the specification of such mappings. Our approach
    is applicable without the need to modify the existing Android apps providing the
    service. We analyzed its feasibility by implementing our approach and by specifying
    mappings for several popular Android apps, e.g., phone book, camera, and file
    explorer.
author:
- first_name: Dennis
  full_name: Wolters, Dennis
  id: '11308'
  last_name: Wolters
- first_name: Jonas
  full_name: Kirchhoff, Jonas
  id: '39928'
  last_name: Kirchhoff
- first_name: Christian
  full_name: Gerth, Christian
  last_name: Gerth
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
citation:
  ama: 'Wolters D, Kirchhoff J, Gerth C, Engels G. Cross-Device Integration of Android
    Apps. In: Sheng QZ, Stroulia E, Tata S, Bhiri S, eds. <i>Service-Oriented Computing</i>.
    Cham: Springer International Publishing; 2016:171-185. doi:<a href="https://doi.org/10.1007/978-3-319-46295-0_11">10.1007/978-3-319-46295-0_11</a>'
  apa: 'Wolters, D., Kirchhoff, J., Gerth, C., &#38; Engels, G. (2016). Cross-Device
    Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, &#38; S. Bhiri
    (Eds.), <i>Service-Oriented Computing</i> (pp. 171–185). Cham: Springer International
    Publishing. <a href="https://doi.org/10.1007/978-3-319-46295-0_11">https://doi.org/10.1007/978-3-319-46295-0_11</a>'
  bibtex: '@inproceedings{Wolters_Kirchhoff_Gerth_Engels_2016, place={Cham}, title={Cross-Device
    Integration of Android Apps}, DOI={<a href="https://doi.org/10.1007/978-3-319-46295-0_11">10.1007/978-3-319-46295-0_11</a>},
    booktitle={Service-Oriented Computing}, publisher={Springer International Publishing},
    author={Wolters, Dennis and Kirchhoff, Jonas and Gerth, Christian and Engels,
    Gregor}, editor={Sheng, Quan Z.  and Stroulia, Eleni  and Tata, Samir  and Bhiri,
    Sami Editors}, year={2016}, pages={171–185} }'
  chicago: 'Wolters, Dennis, Jonas Kirchhoff, Christian Gerth, and Gregor Engels.
    “Cross-Device Integration of Android Apps.” In <i>Service-Oriented Computing</i>,
    edited by Quan Z.  Sheng, Eleni  Stroulia, Samir  Tata, and Sami  Bhiri, 171–85.
    Cham: Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-46295-0_11">https://doi.org/10.1007/978-3-319-46295-0_11</a>.'
  ieee: D. Wolters, J. Kirchhoff, C. Gerth, and G. Engels, “Cross-Device Integration
    of Android Apps,” in <i>Service-Oriented Computing</i>, 2016, pp. 171–185.
  mla: Wolters, Dennis, et al. “Cross-Device Integration of Android Apps.” <i>Service-Oriented
    Computing</i>, edited by Quan Z.  Sheng et al., Springer International Publishing,
    2016, pp. 171–85, doi:<a href="https://doi.org/10.1007/978-3-319-46295-0_11">10.1007/978-3-319-46295-0_11</a>.
  short: 'D. Wolters, J. Kirchhoff, C. Gerth, G. Engels, in: Q.Z. Sheng, E. Stroulia,
    S. Tata, S. Bhiri (Eds.), Service-Oriented Computing, Springer International Publishing,
    Cham, 2016, pp. 171–185.'
date_created: 2018-11-26T10:21:38Z
date_updated: 2022-01-06T07:02:43Z
department:
- _id: '66'
doi: 10.1007/978-3-319-46295-0_11
editor:
- first_name: 'Quan Z. '
  full_name: 'Sheng, Quan Z. '
  last_name: Sheng
- first_name: 'Eleni '
  full_name: 'Stroulia, Eleni '
  last_name: Stroulia
- first_name: 'Samir '
  full_name: 'Tata, Samir '
  last_name: Tata
- first_name: 'Sami '
  full_name: 'Bhiri, Sami '
  last_name: Bhiri
keyword:
- Cross-Device
- Integration
- Android
- Adapter
- DSL
language:
- iso: eng
page: 171-185
place: Cham
publication: Service-Oriented Computing
publication_identifier:
  isbn:
  - '9783319462943'
  - '9783319462950'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Cross-Device Integration of Android Apps
type: conference
user_id: '39928'
year: '2016'
...
---
_id: '6257'
author:
- first_name: Holger Gerhard
  full_name: Fischer, Holger Gerhard
  id: '30457'
  last_name: Fischer
- first_name: Björn
  full_name: Senft, Björn
  id: '9109'
  last_name: Senft
citation:
  ama: 'Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure
    Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed.
    <i>Human-Centered and Error-Resilient Systems Development</i>. Vol 9856. Lecture
    Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41.
    doi:<a href="https://doi.org/10.1007/978-3-319-44902-9_3">10.1007/978-3-319-44902-9_3</a>'
  apa: 'Fischer, H. G., &#38; Senft, B. (2016). Human-Centered Software Engineering
    as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.
    In C. Bogdan (Ed.), <i>Human-Centered and Error-Resilient Systems Development</i>
    (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-44902-9_3">https://doi.org/10.1007/978-3-319-44902-9_3</a>'
  bibtex: '@inbook{Fischer_Senft_2016, place={Cham}, series={Lecture Notes in Computer
    Science}, title={Human-Centered Software Engineering as a Chance to Ensure Software
    Quality Within the Digitization of Human Workflows}, volume={9856}, DOI={<a href="https://doi.org/10.1007/978-3-319-44902-9_3">10.1007/978-3-319-44902-9_3</a>},
    booktitle={Human-Centered and Error-Resilient Systems Development}, publisher={Springer
    International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn},
    editor={Bogdan, ChristianEditor}, year={2016}, pages={30–41}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering
    as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.”
    In <i>Human-Centered and Error-Resilient Systems Development</i>, edited by Christian
    Bogdan, 9856:30–41. Lecture Notes in Computer Science. Cham: Springer International
    Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-44902-9_3">https://doi.org/10.1007/978-3-319-44902-9_3</a>.'
  ieee: 'H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance
    to Ensure Software Quality Within the Digitization of Human Workflows,” in <i>Human-Centered
    and Error-Resilient Systems Development</i>, vol. 9856, C. Bogdan, Ed. Cham: Springer
    International Publishing, 2016, pp. 30–41.'
  mla: Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering
    as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.”
    <i>Human-Centered and Error-Resilient Systems Development</i>, edited by Christian
    Bogdan, vol. 9856, Springer International Publishing, 2016, pp. 30–41, doi:<a
    href="https://doi.org/10.1007/978-3-319-44902-9_3">10.1007/978-3-319-44902-9_3</a>.
  short: 'H.G. Fischer, B. Senft, in: C. Bogdan (Ed.), Human-Centered and Error-Resilient
    Systems Development, Springer International Publishing, Cham, 2016, pp. 30–41.'
conference:
  end_date: 2016-08-31
  location: Stockholm, Sweden
  name: International Conference on Human-Centred Software Engineering
  start_date: 2016-08-29
date_created: 2018-12-18T10:51:10Z
date_updated: 2022-01-06T07:02:58Z
department:
- _id: '66'
- _id: '534'
- _id: '221'
doi: 10.1007/978-3-319-44902-9_3
editor:
- first_name: Christian
  full_name: Bogdan, Christian
  last_name: Bogdan
intvolume: '      9856'
language:
- iso: eng
page: 30-41
place: Cham
publication: Human-Centered and Error-Resilient Systems Development
publication_identifier:
  isbn:
  - '9783319449012'
  - '9783319449029'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Human-Centered Software Engineering as a Chance to Ensure Software Quality
  Within the Digitization of Human Workflows
type: book_chapter
user_id: '30457'
volume: 9856
year: '2016'
...
---
_id: '2978'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances
    in Knowledge Discovery and Data Mining</i>. Springer International Publishing;
    2016:296-308. doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>'
  apa: Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models.
    In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308). Springer
    International Publishing. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>
  bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian
    Mixture Models}, DOI={<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>},
    booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer
    International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016},
    pages={296–308} }'
  chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham:
    Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>.'
  ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in
    <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International
    Publishing, 2016, pp. 296–308.'
  mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International
    Publishing, 2016, pp. 296–308, doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>.
  short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining,
    Springer International Publishing, Cham, 2016, pp. 296–308.'
date_created: 2018-06-05T07:31:39Z
date_updated: 2023-01-10T13:49:50Z
department:
- _id: '64'
doi: 10.1007/978-3-319-31750-2_24
page: 296-308
place: Cham
publication: Advances in Knowledge Discovery and Data Mining
publication_identifier:
  isbn:
  - '9783319317496'
  - '9783319317502'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Adaptive Seeding for Gaussian Mixture Models
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '60904'
author:
- first_name: Alper
  full_name: Yegenoglu, Alper
  id: '117951'
  last_name: Yegenoglu
  orcid: 0000-0001-8869-215X
- first_name: Pietro
  full_name: Quaglio, Pietro
  last_name: Quaglio
- first_name: Emiliano
  full_name: Torre, Emiliano
  last_name: Torre
- first_name: Sonja
  full_name: Grün, Sonja
  last_name: Grün
- first_name: Dominik
  full_name: Endres, Dominik
  last_name: Endres
citation:
  ama: 'Yegenoglu A, Quaglio P, Torre E, Grün S, Endres D. Exploring the Usefulness
    of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns
    in Massively Parallel Spike Trains. In: <i>Lecture Notes in Computer Science</i>.
    Springer International Publishing; 2016. doi:<a href="https://doi.org/10.1007/978-3-319-40985-6_1">10.1007/978-3-319-40985-6_1</a>'
  apa: Yegenoglu, A., Quaglio, P., Torre, E., Grün, S., &#38; Endres, D. (2016). Exploring
    the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal
    Spike Patterns in Massively Parallel Spike Trains. In <i>Lecture Notes in Computer
    Science</i>. Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-40985-6_1">https://doi.org/10.1007/978-3-319-40985-6_1</a>
  bibtex: '@inbook{Yegenoglu_Quaglio_Torre_Grün_Endres_2016, place={Cham}, title={Exploring
    the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal
    Spike Patterns in Massively Parallel Spike Trains}, DOI={<a href="https://doi.org/10.1007/978-3-319-40985-6_1">10.1007/978-3-319-40985-6_1</a>},
    booktitle={Lecture Notes in Computer Science}, publisher={Springer International
    Publishing}, author={Yegenoglu, Alper and Quaglio, Pietro and Torre, Emiliano
    and Grün, Sonja and Endres, Dominik}, year={2016} }'
  chicago: 'Yegenoglu, Alper, Pietro Quaglio, Emiliano Torre, Sonja Grün, and Dominik
    Endres. “Exploring the Usefulness of Formal Concept Analysis for Robust Detection
    of Spatio-Temporal Spike Patterns in Massively Parallel Spike Trains.” In <i>Lecture
    Notes in Computer Science</i>. Cham: Springer International Publishing, 2016.
    <a href="https://doi.org/10.1007/978-3-319-40985-6_1">https://doi.org/10.1007/978-3-319-40985-6_1</a>.'
  ieee: 'A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, and D. Endres, “Exploring the
    Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal
    Spike Patterns in Massively Parallel Spike Trains,” in <i>Lecture Notes in Computer
    Science</i>, Cham: Springer International Publishing, 2016.'
  mla: Yegenoglu, Alper, et al. “Exploring the Usefulness of Formal Concept Analysis
    for Robust Detection of Spatio-Temporal Spike Patterns in Massively Parallel Spike
    Trains.” <i>Lecture Notes in Computer Science</i>, Springer International Publishing,
    2016, doi:<a href="https://doi.org/10.1007/978-3-319-40985-6_1">10.1007/978-3-319-40985-6_1</a>.
  short: 'A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, D. Endres, in: Lecture Notes
    in Computer Science, Springer International Publishing, Cham, 2016.'
date_created: 2025-08-06T15:03:16Z
date_updated: 2025-08-08T11:38:15Z
doi: 10.1007/978-3-319-40985-6_1
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783319409849'
  - '9783319409856'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Exploring the Usefulness of Formal Concept Analysis for Robust Detection of
  Spatio-temporal Spike Patterns in Massively Parallel Spike Trains
type: book_chapter
user_id: '117951'
year: '2016'
...
---
_id: '2921'
author:
- first_name: Olivier
  full_name: Blazy, Olivier
  last_name: Blazy
- first_name: Saqib
  full_name: Kakvi, Saqib
  id: '66268'
  last_name: Kakvi
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Jiaxin
  full_name: Pan, Jiaxin
  last_name: Pan
citation:
  ama: 'Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon
    Hash Functions. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg:
    Springer Berlin Heidelberg; 2015:256-279. doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_12">10.1007/978-3-662-46447-2_12</a>'
  apa: 'Blazy, O., Kakvi, S., Kiltz, E., &#38; Pan, J. (2015). Tightly-Secure Signatures
    from Chameleon Hash Functions. In <i>Lecture Notes in Computer Science</i> (pp.
    256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-662-46447-2_12">https://doi.org/10.1007/978-3-662-46447-2_12</a>'
  bibtex: '@inbook{Blazy_Kakvi_Kiltz_Pan_2015, place={Berlin, Heidelberg}, title={Tightly-Secure
    Signatures from Chameleon Hash Functions}, DOI={<a href="https://doi.org/10.1007/978-3-662-46447-2_12">10.1007/978-3-662-46447-2_12</a>},
    booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg},
    author={Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}, year={2015},
    pages={256–279} }'
  chicago: 'Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure
    Signatures from Chameleon Hash Functions.” In <i>Lecture Notes in Computer Science</i>,
    256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. <a href="https://doi.org/10.1007/978-3-662-46447-2_12">https://doi.org/10.1007/978-3-662-46447-2_12</a>.'
  ieee: 'O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from
    Chameleon Hash Functions,” in <i>Lecture Notes in Computer Science</i>, Berlin,
    Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.'
  mla: Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.”
    <i>Lecture Notes in Computer Science</i>, Springer Berlin Heidelberg, 2015, pp.
    256–79, doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_12">10.1007/978-3-662-46447-2_12</a>.
  short: 'O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science,
    Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.'
date_created: 2018-05-25T12:46:08Z
date_updated: 2022-01-06T06:58:47Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_12
extern: '1'
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2014/1021.pdf
oa: '1'
page: 256-279
place: Berlin, Heidelberg
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783662464465'
  - '9783662464472'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Tightly-Secure Signatures from Chameleon Hash Functions
type: book_chapter
user_id: '66268'
year: '2015'
...
---
_id: '15897'
author:
- first_name: Christian
  full_name: Altmeier, Christian
  last_name: Altmeier
- first_name: Christian
  full_name: Mainka, Christian
  last_name: Mainka
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Altmeier C, Mainka C, Somorovsky J, Schwenk J. AdIDoS – Adaptive and Intelligent
    Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In:
    <i>Data Privacy Management, and Security Assurance - 10th International Workshop,
    {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>. Lecture Notes in
    Computer Science 9481. Cham; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-29883-2_5">10.1007/978-3-319-29883-2_5</a>'
  apa: Altmeier, C., Mainka, C., Somorovsky, J., &#38; Schwenk, J. (2015). AdIDoS
    – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses
    in Web Services. In <i>Data Privacy Management, and Security Assurance - 10th
    International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>.
    Cham. <a href="https://doi.org/10.1007/978-3-319-29883-2_5">https://doi.org/10.1007/978-3-319-29883-2_5</a>
  bibtex: '@inbook{Altmeier_Mainka_Somorovsky_Schwenk_2015, place={Cham}, series={Lecture
    Notes in Computer Science 9481}, title={AdIDoS – Adaptive and Intelligent Fully-Automatic
    Detection of Denial-of-Service Weaknesses in Web Services}, DOI={<a href="https://doi.org/10.1007/978-3-319-29883-2_5">10.1007/978-3-319-29883-2_5</a>},
    booktitle={Data Privacy Management, and Security Assurance - 10th International
    Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015}, author={Altmeier,
    Christian and Mainka, Christian and Somorovsky, Juraj and Schwenk, Jörg}, year={2015},
    collection={Lecture Notes in Computer Science 9481} }'
  chicago: Altmeier, Christian, Christian Mainka, Juraj Somorovsky, and Jörg Schwenk.
    “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service
    Weaknesses in Web Services.” In <i>Data Privacy Management, and Security Assurance
    - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA}
    2015</i>. Lecture Notes in Computer Science 9481. Cham, 2015. <a href="https://doi.org/10.1007/978-3-319-29883-2_5">https://doi.org/10.1007/978-3-319-29883-2_5</a>.
  ieee: C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive
    and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web
    Services,” in <i>Data Privacy Management, and Security Assurance - 10th International
    Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>, Cham, 2015.
  mla: Altmeier, Christian, et al. “AdIDoS – Adaptive and Intelligent Fully-Automatic
    Detection of Denial-of-Service Weaknesses in Web Services.” <i>Data Privacy Management,
    and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International
    Workshop, {QASA} 2015</i>, 2015, doi:<a href="https://doi.org/10.1007/978-3-319-29883-2_5">10.1007/978-3-319-29883-2_5</a>.
  short: 'C. Altmeier, C. Mainka, J. Somorovsky, J. Schwenk, in: Data Privacy Management,
    and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International
    Workshop, {QASA} 2015, Cham, 2015.'
conference:
  location: Vienna
date_created: 2020-02-15T09:40:09Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1007/978-3-319-29883-2_5
language:
- iso: eng
place: Cham
publication: Data Privacy Management, and Security Assurance - 10th International
  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015
publication_identifier:
  isbn:
  - '9783319298825'
  - '9783319298832'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
series_title: Lecture Notes in Computer Science 9481
status: public
title: AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service
  Weaknesses in Web Services
type: book_chapter
user_id: '83504'
year: '2015'
...
---
_id: '15899'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH.
    In: <i>Computer Security -- ESORICS 2015</i>. Cham; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>'
  apa: Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve
    Attacks on TLS-ECDH. In <i>Computer Security -- ESORICS 2015</i>. Cham. <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>
  bibtex: '@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid
    Curve Attacks on TLS-ECDH}, DOI={<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>},
    booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk,
    Jörg and Somorovsky, Juraj}, year={2015} }'
  chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve
    Attacks on TLS-ECDH.” In <i>Computer Security -- ESORICS 2015</i>. Cham, 2015.
    <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>.
  ieee: T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks
    on TLS-ECDH,” in <i>Computer Security -- ESORICS 2015</i>, Cham, 2015.
  mla: Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer
    Security -- ESORICS 2015</i>, 2015, doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>.
  short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015,
    Cham, 2015.'
date_created: 2020-02-15T09:41:17Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1007/978-3-319-24174-6_21
extern: '1'
language:
- iso: eng
main_file_link:
- url: https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/
place: Cham
publication: Computer Security -- ESORICS 2015
publication_identifier:
  isbn:
  - '9783319241739'
  - '9783319241746'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Practical Invalid Curve Attacks on TLS-ECDH
type: book_chapter
user_id: '83504'
year: '2015'
...
---
_id: '15088'
author:
- first_name: Stefan
  full_name: Böttcher, Stefan
  id: '624'
  last_name: Böttcher
- first_name: Rita
  full_name: Hartel, Rita
  id: '14961'
  last_name: Hartel
- first_name: Thomas
  full_name: Jacobs, Thomas
  last_name: Jacobs
- first_name: Markus
  full_name: Jeromin, Markus
  last_name: Jeromin
citation:
  ama: 'Böttcher S, Hartel R, Jacobs T, Jeromin M. ECST – Extended Context-Free Straight-Line
    Tree Grammars. In: <i>Data Science - 30th British International Conference on
    Databases, BICOD 2015</i>. Springer; 2015:186-198. doi:<a href="https://doi.org/10.1007/978-3-319-20424-6_18">10.1007/978-3-319-20424-6_18</a>'
  apa: Böttcher, S., Hartel, R., Jacobs, T., &#38; Jeromin, M. (2015). ECST – Extended
    Context-Free Straight-Line Tree Grammars. In <i>Data Science - 30th British International
    Conference on Databases, BICOD 2015</i> (pp. 186–198). Springer. <a href="https://doi.org/10.1007/978-3-319-20424-6_18">https://doi.org/10.1007/978-3-319-20424-6_18</a>
  bibtex: '@inproceedings{Böttcher_Hartel_Jacobs_Jeromin_2015, title={ECST – Extended
    Context-Free Straight-Line Tree Grammars}, DOI={<a href="https://doi.org/10.1007/978-3-319-20424-6_18">10.1007/978-3-319-20424-6_18</a>},
    booktitle={Data Science - 30th British International Conference on Databases,
    BICOD 2015}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and
    Jacobs, Thomas and Jeromin, Markus}, year={2015}, pages={186–198} }'
  chicago: Böttcher, Stefan, Rita Hartel, Thomas Jacobs, and Markus Jeromin. “ECST
    – Extended Context-Free Straight-Line Tree Grammars.” In <i>Data Science - 30th
    British International Conference on Databases, BICOD 2015</i>, 186–98. Springer,
    2015. <a href="https://doi.org/10.1007/978-3-319-20424-6_18">https://doi.org/10.1007/978-3-319-20424-6_18</a>.
  ieee: S. Böttcher, R. Hartel, T. Jacobs, and M. Jeromin, “ECST – Extended Context-Free
    Straight-Line Tree Grammars,” in <i>Data Science - 30th British International
    Conference on Databases, BICOD 2015</i>, 2015, pp. 186–198.
  mla: Böttcher, Stefan, et al. “ECST – Extended Context-Free Straight-Line Tree Grammars.”
    <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>,
    Springer, 2015, pp. 186–98, doi:<a href="https://doi.org/10.1007/978-3-319-20424-6_18">10.1007/978-3-319-20424-6_18</a>.
  short: 'S. Böttcher, R. Hartel, T. Jacobs, M. Jeromin, in: Data Science - 30th British
    International Conference on Databases, BICOD 2015, Springer, 2015, pp. 186–198.'
date_created: 2019-11-21T15:08:13Z
date_updated: 2022-01-06T06:52:15Z
department:
- _id: '69'
doi: 10.1007/978-3-319-20424-6_18
language:
- iso: eng
page: 186-198
publication: Data Science - 30th British International Conference on Databases, BICOD
  2015
publication_identifier:
  isbn:
  - '9783319204239'
  - '9783319204246'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer
status: public
title: ECST – Extended Context-Free Straight-Line Tree Grammars
type: conference
user_id: '14961'
year: '2015'
...
---
_id: '25338'
author:
- first_name: Michaela
  full_name: Geierhos, Michaela
  last_name: Geierhos
- first_name: Frederik S.
  full_name: Bäumer, Frederik S.
  last_name: Bäumer
- first_name: Sabine
  full_name: Schulze, Sabine
  last_name: Schulze
- first_name: Caterina
  full_name: Klotz, Caterina
  last_name: Klotz
citation:
  ama: 'Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0.
    In: <i>Modeling and Using Context</i>. ; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>'
  apa: Geierhos, M., Bäumer, F. S., Schulze, S., &#38; Klotz, C. (2015). Understanding
    the Patient 2.0. In <i>Modeling and Using Context</i>. <a href="https://doi.org/10.1007/978-3-319-25591-0_12">https://doi.org/10.1007/978-3-319-25591-0_12</a>
  bibtex: '@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding
    the Patient 2.0}, DOI={<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>},
    booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer,
    Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }'
  chicago: Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz.
    “Understanding the Patient 2.0.” In <i>Modeling and Using Context</i>. Cham, 2015.
    <a href="https://doi.org/10.1007/978-3-319-25591-0_12">https://doi.org/10.1007/978-3-319-25591-0_12</a>.
  ieee: M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient
    2.0,” in <i>Modeling and Using Context</i>, Cham, 2015.
  mla: Geierhos, Michaela, et al. “Understanding the Patient 2.0.” <i>Modeling and
    Using Context</i>, 2015, doi:<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>.
  short: 'M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context,
    Cham, 2015.'
date_created: 2021-10-04T19:02:33Z
date_updated: 2022-01-25T18:21:15Z
doi: 10.1007/978-3-319-25591-0_12
place: Cham
publication: Modeling and Using Context
publication_identifier:
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Understanding the Patient 2.0
type: book_chapter
user_id: '71124'
year: '2015'
...
