[{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319494869","9783319494876"]},"citation":{"apa":"Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i> (pp. 81–116). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>","bibtex":"@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical Analysis of the k-Means Algorithm – A Survey}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>}, booktitle={Algorithm Engineering}, publisher={Springer International Publishing}, author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}, year={2016}, pages={81–116} }","mla":"Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016, pp. 81–116, doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>.","short":"J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.","chicago":"Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>.","ieee":"J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer International Publishing, 2016, pp. 81–116.","ama":"Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International Publishing; 2016:81-116. doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>"},"page":"81-116","year":"2016","place":"Cham","date_created":"2018-06-04T12:22:40Z","author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"first_name":"Christiane","last_name":"Lammersen","full_name":"Lammersen, Christiane"},{"first_name":"Melanie","last_name":"Schmidt","full_name":"Schmidt, Melanie"},{"first_name":"Christian","last_name":"Sohler","full_name":"Sohler, Christian"}],"publisher":"Springer International Publishing","date_updated":"2022-01-06T06:58:49Z","doi":"10.1007/978-3-319-49487-6_3","title":"Theoretical Analysis of the k-Means Algorithm – A Survey","type":"book_chapter","publication":"Algorithm Engineering","status":"public","user_id":"25078","department":[{"_id":"64"}],"_id":"2968"},{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319317496","9783319317502"]},"publication_status":"published","year":"2016","place":"Cham","page":"296-308","citation":{"chicago":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>.","ieee":"J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International Publishing, 2016, pp. 296–308.","ama":"Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances in Knowledge Discovery and Data Mining</i>. Cham: Springer International Publishing; 2016:296-308. doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>","apa":"Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>","mla":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International Publishing, 2016, pp. 296–308, doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>.","bibtex":"@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian Mixture Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>}, booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016}, pages={296–308} }","short":"J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308."},"publisher":"Springer International Publishing","date_updated":"2022-01-06T06:58:49Z","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Kathrin","last_name":"Bujna","full_name":"Bujna, Kathrin"}],"date_created":"2018-06-04T12:27:21Z","title":"Adaptive Seeding for Gaussian Mixture Models","doi":"10.1007/978-3-319-31750-2_24","publication":"Advances in Knowledge Discovery and Data Mining","type":"book_chapter","status":"public","_id":"2970","department":[{"_id":"64"}],"user_id":"25078"},{"keyword":["Cross-Device","Integration","Android","Adapter","DSL"],"language":[{"iso":"eng"}],"publication":"Service-Oriented Computing","abstract":[{"text":"Integrating apps on mobile devices into applications running on other devices is usually difficult. For instance, using a messenger on a smartphone to share a text written on a desktop computer often ends up in a cumbersome solution to transfer the text, because many applications are not designed for such scenarios. In this paper, we present an approach enabling the integration of apps running on Android devices into applications running on other devices and even other platforms. This is achieved by specifying adapters for Android apps, which map their services to a platform-independent service interface. For this purpose, we have developed a domain-specific language to ease the specification of such mappings. Our approach is applicable without the need to modify the existing Android apps providing the service. We analyzed its feasibility by implementing our approach and by specifying mappings for several popular Android apps, e.g., phone book, camera, and file explorer.","lang":"eng"}],"publisher":"Springer International Publishing","date_created":"2018-11-26T10:21:38Z","title":"Cross-Device Integration of Android Apps","year":"2016","_id":"5825","user_id":"39928","department":[{"_id":"66"}],"type":"conference","editor":[{"full_name":"Sheng, Quan Z. ","last_name":"Sheng","first_name":"Quan Z. "},{"full_name":"Stroulia, Eleni ","last_name":"Stroulia","first_name":"Eleni "},{"first_name":"Samir ","last_name":"Tata","full_name":"Tata, Samir "},{"first_name":"Sami ","last_name":"Bhiri","full_name":"Bhiri, Sami "}],"status":"public","date_updated":"2022-01-06T07:02:43Z","author":[{"last_name":"Wolters","id":"11308","full_name":"Wolters, Dennis","first_name":"Dennis"},{"last_name":"Kirchhoff","id":"39928","full_name":"Kirchhoff, Jonas","first_name":"Jonas"},{"last_name":"Gerth","full_name":"Gerth, Christian","first_name":"Christian"},{"full_name":"Engels, Gregor","id":"107","last_name":"Engels","first_name":"Gregor"}],"doi":"10.1007/978-3-319-46295-0_11","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319462943","9783319462950"]},"place":"Cham","citation":{"chicago":"Wolters, Dennis, Jonas Kirchhoff, Christian Gerth, and Gregor Engels. “Cross-Device Integration of Android Apps.” In <i>Service-Oriented Computing</i>, edited by Quan Z.  Sheng, Eleni  Stroulia, Samir  Tata, and Sami  Bhiri, 171–85. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">https://doi.org/10.1007/978-3-319-46295-0_11</a>.","ieee":"D. Wolters, J. Kirchhoff, C. Gerth, and G. Engels, “Cross-Device Integration of Android Apps,” in <i>Service-Oriented Computing</i>, 2016, pp. 171–185.","ama":"Wolters D, Kirchhoff J, Gerth C, Engels G. Cross-Device Integration of Android Apps. In: Sheng QZ, Stroulia E, Tata S, Bhiri S, eds. <i>Service-Oriented Computing</i>. Cham: Springer International Publishing; 2016:171-185. doi:<a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">10.1007/978-3-319-46295-0_11</a>","apa":"Wolters, D., Kirchhoff, J., Gerth, C., &#38; Engels, G. (2016). Cross-Device Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, &#38; S. Bhiri (Eds.), <i>Service-Oriented Computing</i> (pp. 171–185). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">https://doi.org/10.1007/978-3-319-46295-0_11</a>","bibtex":"@inproceedings{Wolters_Kirchhoff_Gerth_Engels_2016, place={Cham}, title={Cross-Device Integration of Android Apps}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">10.1007/978-3-319-46295-0_11</a>}, booktitle={Service-Oriented Computing}, publisher={Springer International Publishing}, author={Wolters, Dennis and Kirchhoff, Jonas and Gerth, Christian and Engels, Gregor}, editor={Sheng, Quan Z.  and Stroulia, Eleni  and Tata, Samir  and Bhiri, Sami Editors}, year={2016}, pages={171–185} }","mla":"Wolters, Dennis, et al. “Cross-Device Integration of Android Apps.” <i>Service-Oriented Computing</i>, edited by Quan Z.  Sheng et al., Springer International Publishing, 2016, pp. 171–85, doi:<a href=\"https://doi.org/10.1007/978-3-319-46295-0_11\">10.1007/978-3-319-46295-0_11</a>.","short":"D. Wolters, J. Kirchhoff, C. Gerth, G. Engels, in: Q.Z. Sheng, E. Stroulia, S. Tata, S. Bhiri (Eds.), Service-Oriented Computing, Springer International Publishing, Cham, 2016, pp. 171–185."},"page":"171-185"},{"type":"book_chapter","status":"public","editor":[{"last_name":"Bogdan","full_name":"Bogdan, Christian","first_name":"Christian"}],"series_title":"Lecture Notes in Computer Science","user_id":"30457","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"_id":"6257","publication_status":"published","publication_identifier":{"isbn":["9783319449012","9783319449029"],"issn":["0302-9743","1611-3349"]},"citation":{"apa":"Fischer, H. G., &#38; Senft, B. (2016). Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In C. Bogdan (Ed.), <i>Human-Centered and Error-Resilient Systems Development</i> (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">https://doi.org/10.1007/978-3-319-44902-9_3</a>","mla":"Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.” <i>Human-Centered and Error-Resilient Systems Development</i>, edited by Christian Bogdan, vol. 9856, Springer International Publishing, 2016, pp. 30–41, doi:<a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">10.1007/978-3-319-44902-9_3</a>.","bibtex":"@inbook{Fischer_Senft_2016, place={Cham}, series={Lecture Notes in Computer Science}, title={Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows}, volume={9856}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">10.1007/978-3-319-44902-9_3</a>}, booktitle={Human-Centered and Error-Resilient Systems Development}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn}, editor={Bogdan, ChristianEditor}, year={2016}, pages={30–41}, collection={Lecture Notes in Computer Science} }","short":"H.G. Fischer, B. Senft, in: C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development, Springer International Publishing, Cham, 2016, pp. 30–41.","ieee":"H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows,” in <i>Human-Centered and Error-Resilient Systems Development</i>, vol. 9856, C. Bogdan, Ed. Cham: Springer International Publishing, 2016, pp. 30–41.","chicago":"Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.” In <i>Human-Centered and Error-Resilient Systems Development</i>, edited by Christian Bogdan, 9856:30–41. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">https://doi.org/10.1007/978-3-319-44902-9_3</a>.","ama":"Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed. <i>Human-Centered and Error-Resilient Systems Development</i>. Vol 9856. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41. doi:<a href=\"https://doi.org/10.1007/978-3-319-44902-9_3\">10.1007/978-3-319-44902-9_3</a>"},"intvolume":"      9856","page":"30-41","place":"Cham","author":[{"first_name":"Holger Gerhard","last_name":"Fischer","full_name":"Fischer, Holger Gerhard","id":"30457"},{"last_name":"Senft","id":"9109","full_name":"Senft, Björn","first_name":"Björn"}],"volume":9856,"date_updated":"2022-01-06T07:02:58Z","conference":{"location":"Stockholm, Sweden","end_date":"2016-08-31","start_date":"2016-08-29","name":"International Conference on Human-Centred Software Engineering"},"doi":"10.1007/978-3-319-44902-9_3","publication":"Human-Centered and Error-Resilient Systems Development","language":[{"iso":"eng"}],"year":"2016","date_created":"2018-12-18T10:51:10Z","publisher":"Springer International Publishing","title":"Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows"},{"date_created":"2018-06-05T07:31:39Z","author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"last_name":"Bujna","full_name":"Bujna, Kathrin","first_name":"Kathrin"}],"date_updated":"2023-01-10T13:49:50Z","publisher":"Springer International Publishing","doi":"10.1007/978-3-319-31750-2_24","title":"Adaptive Seeding for Gaussian Mixture Models","publication_status":"published","publication_identifier":{"isbn":["9783319317496","9783319317502"],"issn":["0302-9743","1611-3349"]},"citation":{"ama":"Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances in Knowledge Discovery and Data Mining</i>. Springer International Publishing; 2016:296-308. doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>","ieee":"J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International Publishing, 2016, pp. 296–308.","chicago":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>.","mla":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International Publishing, 2016, pp. 296–308, doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>.","short":"J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.","bibtex":"@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian Mixture Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>}, booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016}, pages={296–308} }","apa":"Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>"},"page":"296-308","year":"2016","place":"Cham","user_id":"25078","department":[{"_id":"64"}],"_id":"2978","type":"book_chapter","publication":"Advances in Knowledge Discovery and Data Mining","status":"public"},{"publisher":"Springer International Publishing","date_updated":"2025-08-08T11:38:15Z","date_created":"2025-08-06T15:03:16Z","author":[{"first_name":"Alper","full_name":"Yegenoglu, Alper","id":"117951","orcid":"0000-0001-8869-215X","last_name":"Yegenoglu"},{"first_name":"Pietro","full_name":"Quaglio, Pietro","last_name":"Quaglio"},{"last_name":"Torre","full_name":"Torre, Emiliano","first_name":"Emiliano"},{"last_name":"Grün","full_name":"Grün, Sonja","first_name":"Sonja"},{"first_name":"Dominik","full_name":"Endres, Dominik","last_name":"Endres"}],"title":"Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains","doi":"10.1007/978-3-319-40985-6_1","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319409849","9783319409856"]},"publication_status":"published","year":"2016","place":"Cham","citation":{"bibtex":"@inbook{Yegenoglu_Quaglio_Torre_Grün_Endres_2016, place={Cham}, title={Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">10.1007/978-3-319-40985-6_1</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Yegenoglu, Alper and Quaglio, Pietro and Torre, Emiliano and Grün, Sonja and Endres, Dominik}, year={2016} }","mla":"Yegenoglu, Alper, et al. “Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-Temporal Spike Patterns in Massively Parallel Spike Trains.” <i>Lecture Notes in Computer Science</i>, Springer International Publishing, 2016, doi:<a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">10.1007/978-3-319-40985-6_1</a>.","short":"A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, D. Endres, in: Lecture Notes in Computer Science, Springer International Publishing, Cham, 2016.","apa":"Yegenoglu, A., Quaglio, P., Torre, E., Grün, S., &#38; Endres, D. (2016). Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains. In <i>Lecture Notes in Computer Science</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">https://doi.org/10.1007/978-3-319-40985-6_1</a>","chicago":"Yegenoglu, Alper, Pietro Quaglio, Emiliano Torre, Sonja Grün, and Dominik Endres. “Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-Temporal Spike Patterns in Massively Parallel Spike Trains.” In <i>Lecture Notes in Computer Science</i>. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">https://doi.org/10.1007/978-3-319-40985-6_1</a>.","ieee":"A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, and D. Endres, “Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains,” in <i>Lecture Notes in Computer Science</i>, Cham: Springer International Publishing, 2016.","ama":"Yegenoglu A, Quaglio P, Torre E, Grün S, Endres D. Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains. In: <i>Lecture Notes in Computer Science</i>. Springer International Publishing; 2016. doi:<a href=\"https://doi.org/10.1007/978-3-319-40985-6_1\">10.1007/978-3-319-40985-6_1</a>"},"_id":"60904","user_id":"117951","language":[{"iso":"eng"}],"publication":"Lecture Notes in Computer Science","type":"book_chapter","status":"public"},{"title":"Tightly-Secure Signatures from Chameleon Hash Functions","doi":"10.1007/978-3-662-46447-2_12","main_file_link":[{"url":"https://eprint.iacr.org/2014/1021.pdf","open_access":"1"}],"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:47Z","oa":"1","date_created":"2018-05-25T12:46:08Z","author":[{"first_name":"Olivier","last_name":"Blazy","full_name":"Blazy, Olivier"},{"first_name":"Saqib","last_name":"Kakvi","id":"66268","full_name":"Kakvi, Saqib"},{"full_name":"Kiltz, Eike","last_name":"Kiltz","first_name":"Eike"},{"first_name":"Jiaxin","full_name":"Pan, Jiaxin","last_name":"Pan"}],"year":"2015","place":"Berlin, Heidelberg","page":"256-279","citation":{"ieee":"O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from Chameleon Hash Functions,” in <i>Lecture Notes in Computer Science</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.","chicago":"Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In <i>Lecture Notes in Computer Science</i>, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">https://doi.org/10.1007/978-3-662-46447-2_12</a>.","ama":"Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>","bibtex":"@inbook{Blazy_Kakvi_Kiltz_Pan_2015, place={Berlin, Heidelberg}, title={Tightly-Secure Signatures from Chameleon Hash Functions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}, year={2015}, pages={256–279} }","short":"O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.","mla":"Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.” <i>Lecture Notes in Computer Science</i>, Springer Berlin Heidelberg, 2015, pp. 256–79, doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>.","apa":"Blazy, O., Kakvi, S., Kiltz, E., &#38; Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In <i>Lecture Notes in Computer Science</i> (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">https://doi.org/10.1007/978-3-662-46447-2_12</a>"},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783662464465","9783662464472"]},"publication_status":"published","extern":"1","_id":"2921","department":[{"_id":"558"}],"user_id":"66268","status":"public","publication":"Lecture Notes in Computer Science","type":"book_chapter"},{"publication_status":"published","publication_identifier":{"isbn":["9783319298825","9783319298832"],"issn":["0302-9743","1611-3349"]},"citation":{"apa":"Altmeier, C., Mainka, C., Somorovsky, J., &#38; Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">https://doi.org/10.1007/978-3-319-29883-2_5</a>","bibtex":"@inbook{Altmeier_Mainka_Somorovsky_Schwenk_2015, place={Cham}, series={Lecture Notes in Computer Science 9481}, title={AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">10.1007/978-3-319-29883-2_5</a>}, booktitle={Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015}, author={Altmeier, Christian and Mainka, Christian and Somorovsky, Juraj and Schwenk, Jörg}, year={2015}, collection={Lecture Notes in Computer Science 9481} }","mla":"Altmeier, Christian, et al. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">10.1007/978-3-319-29883-2_5</a>.","short":"C. Altmeier, C. Mainka, J. Somorovsky, J. Schwenk, in: Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015.","ama":"Altmeier C, Mainka C, Somorovsky J, Schwenk J. AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In: <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>. Lecture Notes in Computer Science 9481. Cham; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">10.1007/978-3-319-29883-2_5</a>","ieee":"C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services,” in <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>, Cham, 2015.","chicago":"Altmeier, Christian, Christian Mainka, Juraj Somorovsky, and Jörg Schwenk. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” In <i>Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>. Lecture Notes in Computer Science 9481. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-29883-2_5\">https://doi.org/10.1007/978-3-319-29883-2_5</a>."},"year":"2015","place":"Cham","author":[{"first_name":"Christian","last_name":"Altmeier","full_name":"Altmeier, Christian"},{"full_name":"Mainka, Christian","last_name":"Mainka","first_name":"Christian"},{"id":"83504","full_name":"Somorovsky, Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_created":"2020-02-15T09:40:09Z","date_updated":"2022-01-06T06:52:39Z","conference":{"location":"Vienna"},"doi":"10.1007/978-3-319-29883-2_5","title":"AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services","type":"book_chapter","publication":"Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015","status":"public","user_id":"83504","series_title":"Lecture Notes in Computer Science 9481","_id":"15897","language":[{"iso":"eng"}]},{"citation":{"apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In <i>Computer Security -- ESORICS 2015</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>","bibtex":"@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>}, booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015} }","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015, Cham, 2015.","mla":"Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer Security -- ESORICS 2015</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>.","ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in <i>Computer Security -- ESORICS 2015</i>, Cham, 2015.","chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In <i>Computer Security -- ESORICS 2015</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>.","ama":"Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: <i>Computer Security -- ESORICS 2015</i>. Cham; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>"},"year":"2015","place":"Cham","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319241739","9783319241746"]},"main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/"}],"doi":"10.1007/978-3-319-24174-6_21","title":"Practical Invalid Curve Attacks on TLS-ECDH","date_created":"2020-02-15T09:41:17Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"},{"last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","id":"83504","first_name":"Juraj"}],"date_updated":"2022-01-06T06:52:39Z","status":"public","type":"book_chapter","publication":"Computer Security -- ESORICS 2015","extern":"1","language":[{"iso":"eng"}],"user_id":"83504","_id":"15899"},{"date_created":"2019-11-21T15:08:13Z","author":[{"first_name":"Stefan","full_name":"Böttcher, Stefan","id":"624","last_name":"Böttcher"},{"full_name":"Hartel, Rita","id":"14961","last_name":"Hartel","first_name":"Rita"},{"last_name":"Jacobs","full_name":"Jacobs, Thomas","first_name":"Thomas"},{"first_name":"Markus","last_name":"Jeromin","full_name":"Jeromin, Markus"}],"date_updated":"2022-01-06T06:52:15Z","publisher":"Springer","doi":"10.1007/978-3-319-20424-6_18","title":"ECST – Extended Context-Free Straight-Line Tree Grammars","publication_status":"published","publication_identifier":{"isbn":["9783319204239","9783319204246"],"issn":["0302-9743","1611-3349"]},"citation":{"apa":"Böttcher, S., Hartel, R., Jacobs, T., &#38; Jeromin, M. (2015). ECST – Extended Context-Free Straight-Line Tree Grammars. In <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i> (pp. 186–198). Springer. <a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">https://doi.org/10.1007/978-3-319-20424-6_18</a>","short":"S. Böttcher, R. Hartel, T. Jacobs, M. Jeromin, in: Data Science - 30th British International Conference on Databases, BICOD 2015, Springer, 2015, pp. 186–198.","mla":"Böttcher, Stefan, et al. “ECST – Extended Context-Free Straight-Line Tree Grammars.” <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>, Springer, 2015, pp. 186–98, doi:<a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">10.1007/978-3-319-20424-6_18</a>.","bibtex":"@inproceedings{Böttcher_Hartel_Jacobs_Jeromin_2015, title={ECST – Extended Context-Free Straight-Line Tree Grammars}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">10.1007/978-3-319-20424-6_18</a>}, booktitle={Data Science - 30th British International Conference on Databases, BICOD 2015}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and Jacobs, Thomas and Jeromin, Markus}, year={2015}, pages={186–198} }","ama":"Böttcher S, Hartel R, Jacobs T, Jeromin M. ECST – Extended Context-Free Straight-Line Tree Grammars. In: <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>. Springer; 2015:186-198. doi:<a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">10.1007/978-3-319-20424-6_18</a>","ieee":"S. Böttcher, R. Hartel, T. Jacobs, and M. Jeromin, “ECST – Extended Context-Free Straight-Line Tree Grammars,” in <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>, 2015, pp. 186–198.","chicago":"Böttcher, Stefan, Rita Hartel, Thomas Jacobs, and Markus Jeromin. “ECST – Extended Context-Free Straight-Line Tree Grammars.” In <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>, 186–98. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-319-20424-6_18\">https://doi.org/10.1007/978-3-319-20424-6_18</a>."},"page":"186-198","year":"2015","user_id":"14961","department":[{"_id":"69"}],"_id":"15088","language":[{"iso":"eng"}],"type":"conference","publication":"Data Science - 30th British International Conference on Databases, BICOD 2015","status":"public"},{"date_updated":"2022-01-25T18:21:15Z","author":[{"first_name":"Michaela","last_name":"Geierhos","full_name":"Geierhos, Michaela"},{"first_name":"Frederik S.","last_name":"Bäumer","full_name":"Bäumer, Frederik S."},{"full_name":"Schulze, Sabine","last_name":"Schulze","first_name":"Sabine"},{"first_name":"Caterina","last_name":"Klotz","full_name":"Klotz, Caterina"}],"date_created":"2021-10-04T19:02:33Z","title":"Understanding the Patient 2.0","doi":"10.1007/978-3-319-25591-0_12","publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","place":"Cham","year":"2015","citation":{"chicago":"Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz. “Understanding the Patient 2.0.” In <i>Modeling and Using Context</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">https://doi.org/10.1007/978-3-319-25591-0_12</a>.","ieee":"M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient 2.0,” in <i>Modeling and Using Context</i>, Cham, 2015.","ama":"Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0. In: <i>Modeling and Using Context</i>. ; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>","apa":"Geierhos, M., Bäumer, F. S., Schulze, S., &#38; Klotz, C. (2015). Understanding the Patient 2.0. In <i>Modeling and Using Context</i>. <a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">https://doi.org/10.1007/978-3-319-25591-0_12</a>","short":"M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context, Cham, 2015.","mla":"Geierhos, Michaela, et al. “Understanding the Patient 2.0.” <i>Modeling and Using Context</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>.","bibtex":"@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding the Patient 2.0}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>}, booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer, Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }"},"_id":"25338","user_id":"71124","publication":"Modeling and Using Context","type":"book_chapter","status":"public"},{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"]},"year":"2015","place":"Cham","citation":{"apa":"Geierhos, M., Bäumer, F. S., Schulze, S., &#38; Klotz, C. (2015). Understanding the Patient 2.0. In <i>Modeling and Using Context</i>. <a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">https://doi.org/10.1007/978-3-319-25591-0_12</a>","mla":"Geierhos, Michaela, et al. “Understanding the Patient 2.0.” <i>Modeling and Using Context</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>.","bibtex":"@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding the Patient 2.0}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>}, booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer, Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }","short":"M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context, Cham, 2015.","ieee":"M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient 2.0,” in <i>Modeling and Using Context</i>, Cham, 2015.","chicago":"Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz. “Understanding the Patient 2.0.” In <i>Modeling and Using Context</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">https://doi.org/10.1007/978-3-319-25591-0_12</a>.","ama":"Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0. In: <i>Modeling and Using Context</i>. ; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-25591-0_12\">10.1007/978-3-319-25591-0_12</a>"},"date_updated":"2022-01-25T18:21:13Z","date_created":"2021-10-04T18:59:54Z","author":[{"first_name":"Michaela","last_name":"Geierhos","full_name":"Geierhos, Michaela"},{"first_name":"Frederik S.","last_name":"Bäumer","full_name":"Bäumer, Frederik S."},{"first_name":"Sabine","last_name":"Schulze","full_name":"Schulze, Sabine"},{"first_name":"Caterina","last_name":"Klotz","full_name":"Klotz, Caterina"}],"title":"Understanding the Patient 2.0","doi":"10.1007/978-3-319-25591-0_12","type":"book_chapter","publication":"Modeling and Using Context","status":"public","_id":"25337","user_id":"71124"},{"place":"Cham","year":"2014","citation":{"ama":"Hamann H, Valentini G. Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins. In: <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">10.1007/978-3-319-09952-1_15</a>","chicago":"Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-Organizing Temporary Lock-Ins.” In <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">https://doi.org/10.1007/978-3-319-09952-1_15</a>.","ieee":"H. Hamann and G. Valentini, “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins,” in <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>, 2014.","mla":"Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-Organizing Temporary Lock-Ins.” <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">10.1007/978-3-319-09952-1_15</a>.","bibtex":"@inproceedings{Hamann_Valentini_2014, place={Cham}, title={Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">10.1007/978-3-319-09952-1_15</a>}, booktitle={Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)}, author={Hamann, Heiko and Valentini, Gabriele}, year={2014} }","short":"H. Hamann, G. Valentini, in: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014), Cham, 2014.","apa":"Hamann, H., &#38; Valentini, G. (2014). Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins. In <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-09952-1_15\">https://doi.org/10.1007/978-3-319-09952-1_15</a>"},"publication_identifier":{"isbn":["9783319099514","9783319099521"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","title":"Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins","doi":"10.1007/978-3-319-09952-1_15","date_updated":"2022-01-06T06:54:18Z","author":[{"full_name":"Hamann, Heiko","last_name":"Hamann","first_name":"Heiko"},{"first_name":"Gabriele","full_name":"Valentini, Gabriele","last_name":"Valentini"}],"date_created":"2020-10-15T14:13:51Z","status":"public","publication":"Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)","type":"conference","language":[{"iso":"eng"}],"_id":"20008","department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415"},{"publication":"Software Architecture","type":"book_chapter","abstract":[{"lang":"eng","text":"Real-time software-intensive embedded systems complexity, as in the automotive domain, requires rigorous Requirements Engineering (RE) approaches. Scenario-based RE formalisms like Modal Sequence Diagrams (MSDs) enable an intuitive specication and the simulative validation of functional requirements. However, the dependencies between events occurring in different MSD scenarios are implicit so that it is difficult to find causes of requirements defects, if any. The automotive architecture description language EAST-ADL addresses this problem by relying on event chains, which make dependencies between events explicit. However, EAST-ADL event chains have a low abstraction level, and their relationship to functional requirements has seldom been investigated. Based on the EAST-ADL functional architecture, we propose to use its central notion of event to conciliate both approaches. We conceived an automatic transformation from the high abstraction level requirements specified in MSDs to the low abstraction level event chains.\r\n"}],"status":"public","_id":"20982","department":[{"_id":"241"},{"_id":"662"}],"user_id":"13616","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9783319099699","9783319099705"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2014","place":"Cham","citation":{"bibtex":"@inbook{Koch_Holtmann_DeAntoni_2014, place={Cham}, title={Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>}, booktitle={Software Architecture}, author={Koch, Thorsten and Holtmann, Jörg and DeAntoni, Julien}, year={2014} }","short":"T. Koch, J. Holtmann, J. DeAntoni, in: Software Architecture, Cham, 2014.","mla":"Koch, Thorsten, et al. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” <i>Software Architecture</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>.","apa":"Koch, T., Holtmann, J., &#38; DeAntoni, J. (2014). Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In <i>Software Architecture</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">https://doi.org/10.1007/978-3-319-09970-5_14</a>","chicago":"Koch, Thorsten, Jörg Holtmann, and Julien DeAntoni. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” In <i>Software Architecture</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">https://doi.org/10.1007/978-3-319-09970-5_14</a>.","ieee":"T. Koch, J. Holtmann, and J. DeAntoni, “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications,” in <i>Software Architecture</i>, Cham, 2014.","ama":"Koch T, Holtmann J, DeAntoni J. Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In: <i>Software Architecture</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-09970-5_14\">10.1007/978-3-319-09970-5_14</a>"},"date_updated":"2022-01-06T06:54:42Z","date_created":"2021-01-13T13:34:35Z","author":[{"last_name":"Koch","id":"13616","full_name":"Koch, Thorsten","first_name":"Thorsten"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875"},{"full_name":"DeAntoni, Julien","last_name":"DeAntoni","first_name":"Julien"}],"title":"Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications","doi":"10.1007/978-3-319-09970-5_14"},{"language":[{"iso":"eng"}],"user_id":"11308","series_title":"Lecture Notes in Computer Science","department":[{"_id":"66"}],"_id":"6741","status":"public","type":"conference","publication":"12th International Conference on Business Process Management (BPM 2014)","doi":"10.1007/978-3-319-10172-9_23","title":"Use Your Best Device! Enabling Device Changes at Runtime","date_created":"2019-01-15T14:49:31Z","author":[{"last_name":"Bokermann","full_name":"Bokermann, Dennis","id":"11308","first_name":"Dennis"},{"last_name":"Gerth","full_name":"Gerth, Christian","first_name":"Christian"},{"first_name":"Gregor","id":"107","full_name":"Engels, Gregor","last_name":"Engels"}],"volume":8659,"date_updated":"2022-01-06T07:03:17Z","publisher":"Springer International Publishing","citation":{"bibtex":"@inproceedings{Bokermann_Gerth_Engels_2014, series={Lecture Notes in Computer Science}, title={Use Your Best Device! Enabling Device Changes at Runtime}, volume={8659}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">10.1007/978-3-319-10172-9_23</a>}, booktitle={12th International Conference on Business Process Management (BPM 2014)}, publisher={Springer International Publishing}, author={Bokermann, Dennis and Gerth, Christian and Engels, Gregor}, year={2014}, pages={357–365}, collection={Lecture Notes in Computer Science} }","mla":"Bokermann, Dennis, et al. “Use Your Best Device! Enabling Device Changes at Runtime.” <i>12th International Conference on Business Process Management (BPM 2014)</i>, vol. 8659, Springer International Publishing, 2014, pp. 357–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">10.1007/978-3-319-10172-9_23</a>.","short":"D. Bokermann, C. Gerth, G. Engels, in: 12th International Conference on Business Process Management (BPM 2014), Springer International Publishing, 2014, pp. 357–365.","apa":"Bokermann, D., Gerth, C., &#38; Engels, G. (2014). Use Your Best Device! Enabling Device Changes at Runtime. In <i>12th International Conference on Business Process Management (BPM 2014)</i> (Vol. 8659, pp. 357–365). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">https://doi.org/10.1007/978-3-319-10172-9_23</a>","ieee":"D. Bokermann, C. Gerth, and G. Engels, “Use Your Best Device! Enabling Device Changes at Runtime,” in <i>12th International Conference on Business Process Management (BPM 2014)</i>, 2014, vol. 8659, pp. 357–365.","chicago":"Bokermann, Dennis, Christian Gerth, and Gregor Engels. “Use Your Best Device! Enabling Device Changes at Runtime.” In <i>12th International Conference on Business Process Management (BPM 2014)</i>, 8659:357–65. Lecture Notes in Computer Science. Springer International Publishing, 2014. <a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">https://doi.org/10.1007/978-3-319-10172-9_23</a>.","ama":"Bokermann D, Gerth C, Engels G. Use Your Best Device! Enabling Device Changes at Runtime. In: <i>12th International Conference on Business Process Management (BPM 2014)</i>. Vol 8659. Lecture Notes in Computer Science. Springer International Publishing; 2014:357-365. doi:<a href=\"https://doi.org/10.1007/978-3-319-10172-9_23\">10.1007/978-3-319-10172-9_23</a>"},"page":"357-365","intvolume":"      8659","year":"2014","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319101712","9783319101729"]}},{"_id":"16870","series_title":"Lecture Notes in Computer Science","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"type":"book_editor","editor":[{"last_name":"Flocchini","full_name":"Flocchini, Paola","first_name":"Paola"},{"full_name":"Gao, Jie","last_name":"Gao","first_name":"Jie"},{"last_name":"Kranakis","full_name":"Kranakis, Evangelos","first_name":"Evangelos"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm"}],"status":"public","publisher":"Springer","date_updated":"2022-01-06T06:52:58Z","date_created":"2020-04-27T10:31:57Z","volume":8243,"title":"Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013","doi":"10.1007/978-3-642-45346-5","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642453458","9783642453465"]},"place":"Berlin, Heidelberg","year":"2014","citation":{"ama":"Flocchini P, Gao J, Kranakis E, Meyer auf der Heide F, eds. <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i>. Vol 8243. Berlin, Heidelberg: Springer; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-642-45346-5\">10.1007/978-3-642-45346-5</a>","ieee":"P. Flocchini, J. Gao, E. Kranakis, and F. Meyer auf der Heide, Eds., <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i>, vol. 8243. Berlin, Heidelberg: Springer, 2014.","chicago":"Flocchini, Paola, Jie Gao, Evangelos Kranakis, and Friedhelm Meyer auf der Heide, eds. <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i>. Vol. 8243. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-642-45346-5\">https://doi.org/10.1007/978-3-642-45346-5</a>.","mla":"Flocchini, Paola, et al., editors. <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i>. Vol. 8243, Springer, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-642-45346-5\">10.1007/978-3-642-45346-5</a>.","bibtex":"@book{Flocchini_Gao_Kranakis_Meyer auf der Heide_2014, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013}, volume={8243}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-45346-5\">10.1007/978-3-642-45346-5</a>}, publisher={Springer}, year={2014}, collection={Lecture Notes in Computer Science} }","short":"P. Flocchini, J. Gao, E. Kranakis, F. Meyer auf der Heide, eds., Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Springer, Berlin, Heidelberg, 2014.","apa":"Flocchini, P., Gao, J., Kranakis, E., &#38; Meyer auf der Heide, F. (Eds.). (2014). <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013</i> (Vol. 8243). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-642-45346-5\">https://doi.org/10.1007/978-3-642-45346-5</a>"},"intvolume":"      8243"},{"publication":"Database and Expert Systems Applications - 25th International Conference, DEXA 2014","type":"conference","status":"public","_id":"15092","department":[{"_id":"69"}],"user_id":"14961","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319100722","9783319100739"]},"publication_status":"published","place":"Cham","year":"2014","page":"122-137","citation":{"ama":"Böttcher S, Hartel R, Rabe J. Efficient XML Keyword Search Based on DAG-Compression. In: <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i>. Cham: Springer; 2014:122-137. doi:<a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">10.1007/978-3-319-10073-9_11</a>","ieee":"S. Böttcher, R. Hartel, and J. Rabe, “Efficient XML Keyword Search Based on DAG-Compression,” in <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i>, 2014, pp. 122–137.","chicago":"Böttcher, Stefan, Rita Hartel, and Jonathan Rabe. “Efficient XML Keyword Search Based on DAG-Compression.” In <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i>, 122–37. Cham: Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">https://doi.org/10.1007/978-3-319-10073-9_11</a>.","apa":"Böttcher, S., Hartel, R., &#38; Rabe, J. (2014). Efficient XML Keyword Search Based on DAG-Compression. In <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i> (pp. 122–137). Cham: Springer. <a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">https://doi.org/10.1007/978-3-319-10073-9_11</a>","bibtex":"@inproceedings{Böttcher_Hartel_Rabe_2014, place={Cham}, title={Efficient XML Keyword Search Based on DAG-Compression}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">10.1007/978-3-319-10073-9_11</a>}, booktitle={Database and Expert Systems Applications - 25th International Conference, DEXA 2014}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and Rabe, Jonathan}, year={2014}, pages={122–137} }","short":"S. Böttcher, R. Hartel, J. Rabe, in: Database and Expert Systems Applications - 25th International Conference, DEXA 2014, Springer, Cham, 2014, pp. 122–137.","mla":"Böttcher, Stefan, et al. “Efficient XML Keyword Search Based on DAG-Compression.” <i>Database and Expert Systems Applications - 25th International Conference, DEXA 2014</i>, Springer, 2014, pp. 122–37, doi:<a href=\"https://doi.org/10.1007/978-3-319-10073-9_11\">10.1007/978-3-319-10073-9_11</a>."},"date_updated":"2022-01-06T06:52:15Z","publisher":"Springer","author":[{"first_name":"Stefan","last_name":"Böttcher","id":"624","full_name":"Böttcher, Stefan"},{"last_name":"Hartel","id":"14961","full_name":"Hartel, Rita","first_name":"Rita"},{"last_name":"Rabe","full_name":"Rabe, Jonathan","first_name":"Jonathan"}],"date_created":"2019-11-21T15:19:02Z","title":"Efficient XML Keyword Search Based on DAG-Compression","doi":"10.1007/978-3-319-10073-9_11"},{"type":"book_chapter","publication":"Lecture Notes in Computer Science","status":"public","_id":"16394","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"isbn":["9783319144719","9783319144726"],"issn":["0302-9743","1611-3349"]},"year":"2014","place":"Cham","citation":{"apa":"Lukovszki, T., &#38; Meyer auf der Heide, F. (2014). Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots. In <i>Lecture Notes in Computer Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">https://doi.org/10.1007/978-3-319-14472-6_17</a>","bibtex":"@inbook{Lukovszki_Meyer auf der Heide_2014, place={Cham}, title={Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">10.1007/978-3-319-14472-6_17</a>}, booktitle={Lecture Notes in Computer Science}, author={Lukovszki, Tamás and Meyer auf der Heide, Friedhelm}, year={2014} }","short":"T. Lukovszki, F. Meyer auf der Heide, in: Lecture Notes in Computer Science, Cham, 2014.","mla":"Lukovszki, Tamás, and Friedhelm Meyer auf der Heide. “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots.” <i>Lecture Notes in Computer Science</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">10.1007/978-3-319-14472-6_17</a>.","ama":"Lukovszki T, Meyer auf der Heide F. Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots. In: <i>Lecture Notes in Computer Science</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">10.1007/978-3-319-14472-6_17</a>","chicago":"Lukovszki, Tamás, and Friedhelm Meyer auf der Heide. “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots.” In <i>Lecture Notes in Computer Science</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-14472-6_17\">https://doi.org/10.1007/978-3-319-14472-6_17</a>.","ieee":"T. Lukovszki and F. Meyer auf der Heide, “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots,” in <i>Lecture Notes in Computer Science</i>, Cham, 2014."},"date_updated":"2022-01-06T06:52:50Z","author":[{"first_name":"Tamás","full_name":"Lukovszki, Tamás","last_name":"Lukovszki"},{"first_name":"Friedhelm","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"}],"date_created":"2020-04-03T07:58:53Z","title":"Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots","doi":"10.1007/978-3-319-14472-6_17"},{"type":"book_chapter","publication":"Structural Information and Communication Complexity","status":"public","user_id":"15415","department":[{"_id":"63"}],"_id":"16395","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319096193","9783319096209"]},"citation":{"chicago":"Abshoff, Sebastian, and Friedhelm Meyer auf der Heide. “Continuous Aggregation in Dynamic Ad-Hoc Networks.” In <i>Structural Information and Communication Complexity</i>. Cham, 2014. <a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">https://doi.org/10.1007/978-3-319-09620-9_16</a>.","ieee":"S. Abshoff and F. Meyer auf der Heide, “Continuous Aggregation in Dynamic Ad-Hoc Networks,” in <i>Structural Information and Communication Complexity</i>, Cham, 2014.","ama":"Abshoff S, Meyer auf der Heide F. Continuous Aggregation in Dynamic Ad-Hoc Networks. In: <i>Structural Information and Communication Complexity</i>. Cham; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">10.1007/978-3-319-09620-9_16</a>","short":"S. Abshoff, F. Meyer auf der Heide, in: Structural Information and Communication Complexity, Cham, 2014.","bibtex":"@inbook{Abshoff_Meyer auf der Heide_2014, place={Cham}, title={Continuous Aggregation in Dynamic Ad-Hoc Networks}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">10.1007/978-3-319-09620-9_16</a>}, booktitle={Structural Information and Communication Complexity}, author={Abshoff, Sebastian and Meyer auf der Heide, Friedhelm}, year={2014} }","mla":"Abshoff, Sebastian, and Friedhelm Meyer auf der Heide. “Continuous Aggregation in Dynamic Ad-Hoc Networks.” <i>Structural Information and Communication Complexity</i>, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">10.1007/978-3-319-09620-9_16</a>.","apa":"Abshoff, S., &#38; Meyer auf der Heide, F. (2014). Continuous Aggregation in Dynamic Ad-Hoc Networks. In <i>Structural Information and Communication Complexity</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-09620-9_16\">https://doi.org/10.1007/978-3-319-09620-9_16</a>"},"place":"Cham","year":"2014","date_created":"2020-04-03T09:00:16Z","author":[{"last_name":"Abshoff","full_name":"Abshoff, Sebastian","first_name":"Sebastian"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"date_updated":"2022-01-06T06:52:50Z","doi":"10.1007/978-3-319-09620-9_16","title":"Continuous Aggregation in Dynamic Ad-Hoc Networks"},{"title":"Aggregation of Network Protocol Data Near Its Source","doi":"10.1007/978-3-642-55032-4_49","publisher":"Springer Berlin Heidelberg","date_updated":"2023-10-06T16:22:35Z","date_created":"2023-10-06T16:08:23Z","author":[{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"last_name":"Stegemann","full_name":"Stegemann, Kevin","first_name":"Kevin"},{"last_name":"Petersen","full_name":"Petersen, Dominique","first_name":"Dominique"},{"first_name":"Norbert","last_name":"Pohlmann","full_name":"Pohlmann, Norbert"}],"year":"2014","place":"Berlin, Heidelberg","citation":{"apa":"Fourné, M., Stegemann, K., Petersen, D., &#38; Pohlmann, N. (2014). Aggregation of Network Protocol Data Near Its Source. In <i>Information and Communication Technology</i>. Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">https://doi.org/10.1007/978-3-642-55032-4_49</a>","mla":"Fourné, Marcel, et al. “Aggregation of Network Protocol Data Near Its Source.” <i>Information and Communication Technology</i>, Springer Berlin Heidelberg, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>.","bibtex":"@inbook{Fourné_Stegemann_Petersen_Pohlmann_2014, place={Berlin, Heidelberg}, title={Aggregation of Network Protocol Data Near Its Source}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>}, booktitle={Information and Communication Technology}, publisher={Springer Berlin Heidelberg}, author={Fourné, Marcel and Stegemann, Kevin and Petersen, Dominique and Pohlmann, Norbert}, year={2014} }","short":"M. Fourné, K. Stegemann, D. Petersen, N. Pohlmann, in: Information and Communication Technology, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.","ama":"Fourné M, Stegemann K, Petersen D, Pohlmann N. Aggregation of Network Protocol Data Near Its Source. In: <i>Information and Communication Technology</i>. Springer Berlin Heidelberg; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>","chicago":"Fourné, Marcel, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann. “Aggregation of Network Protocol Data Near Its Source.” In <i>Information and Communication Technology</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. <a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">https://doi.org/10.1007/978-3-642-55032-4_49</a>.","ieee":"M. Fourné, K. Stegemann, D. Petersen, and N. Pohlmann, “Aggregation of Network Protocol Data Near Its Source,” in <i>Information and Communication Technology</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2014."},"publication_status":"published","publication_identifier":{"isbn":["9783642550317","9783642550324"],"issn":["0302-9743","1611-3349"]},"language":[{"iso":"eng"}],"extern":"1","_id":"47839","user_id":"99291","status":"public","type":"book_chapter","publication":"Information and Communication Technology"}]
