[{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642400254","9783642400261"]},"publication_status":"published","page":"154-168","citation":{"ama":"Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>","ieee":"J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>.","apa":"Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>","mla":"Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.” <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg, 2013, pp. 154–68, doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>.","short":"J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.","bibtex":"@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>}, booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2013}, pages={154–168} }"},"place":"Berlin, Heidelberg","year":"2013","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"first_name":"Peter","last_name":"Günther","full_name":"Günther, Peter"},{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"date_created":"2018-06-05T07:33:22Z","publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:49Z","doi":"10.1007/978-3-642-40026-1_10","title":"Improved Side Channel Attacks on Pairing Based Cryptography","publication":"Constructive Side-Channel Analysis and Secure Design","type":"book_chapter","status":"public","department":[{"_id":"64"}],"user_id":"25078","_id":"2979"},{"title":"A Taxonomy-Based Approach towards NUI Interaction Design","date_created":"2018-12-18T12:42:33Z","publisher":"Springer Berlin Heidelberg","year":"2013","language":[{"iso":"eng"}],"publication":"Distributed, Ambient, and Pervasive Interactions","doi":"10.1007/978-3-642-39351-8_4","conference":{"name":"International Conference on Distributed, Ambient, and Pervasive Interactions (DAPI) as part of HCI International 2013","start_date":"2013-07-21","end_date":"2013-07-26","location":"Las Vegas, USA"},"volume":8028,"author":[{"first_name":"Florian","last_name":"Klompmaker","full_name":"Klompmaker, Florian"},{"first_name":"Volker","last_name":"Paelke","full_name":"Paelke, Volker"},{"last_name":"Fischer","id":"30457","full_name":"Fischer, Holger Gerhard","first_name":"Holger Gerhard"}],"date_updated":"2022-01-06T07:02:59Z","intvolume":"      8028","page":"32-41","citation":{"short":"F. Klompmaker, V. Paelke, H.G. Fischer, in: Distributed, Ambient, and Pervasive Interactions, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 32–41.","mla":"Klompmaker, Florian, et al. “A Taxonomy-Based Approach towards NUI Interaction Design.” <i>Distributed, Ambient, and Pervasive Interactions</i>, vol. 8028, Springer Berlin Heidelberg, 2013, pp. 32–41, doi:<a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">10.1007/978-3-642-39351-8_4</a>.","bibtex":"@inbook{Klompmaker_Paelke_Fischer_2013, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={A Taxonomy-Based Approach towards NUI Interaction Design}, volume={8028}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">10.1007/978-3-642-39351-8_4</a>}, booktitle={Distributed, Ambient, and Pervasive Interactions}, publisher={Springer Berlin Heidelberg}, author={Klompmaker, Florian and Paelke, Volker and Fischer, Holger Gerhard}, year={2013}, pages={32–41}, collection={Lecture Notes in Computer Science} }","apa":"Klompmaker, F., Paelke, V., &#38; Fischer, H. G. (2013). A Taxonomy-Based Approach towards NUI Interaction Design. In <i>Distributed, Ambient, and Pervasive Interactions</i> (Vol. 8028, pp. 32–41). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">https://doi.org/10.1007/978-3-642-39351-8_4</a>","ama":"Klompmaker F, Paelke V, Fischer HG. A Taxonomy-Based Approach towards NUI Interaction Design. In: <i>Distributed, Ambient, and Pervasive Interactions</i>. Vol 8028. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:32-41. doi:<a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">10.1007/978-3-642-39351-8_4</a>","ieee":"F. Klompmaker, V. Paelke, and H. G. Fischer, “A Taxonomy-Based Approach towards NUI Interaction Design,” in <i>Distributed, Ambient, and Pervasive Interactions</i>, vol. 8028, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 32–41.","chicago":"Klompmaker, Florian, Volker Paelke, and Holger Gerhard Fischer. “A Taxonomy-Based Approach towards NUI Interaction Design.” In <i>Distributed, Ambient, and Pervasive Interactions</i>, 8028:32–41. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39351-8_4\">https://doi.org/10.1007/978-3-642-39351-8_4</a>."},"place":"Berlin, Heidelberg","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642393501","9783642393518"]},"publication_status":"published","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"user_id":"30457","series_title":"Lecture Notes in Computer Science","_id":"6276","status":"public","type":"book_chapter"},{"year":"2013","title":"Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design","publisher":"Springer Berlin Heidelberg","date_created":"2018-12-18T12:44:48Z","publication":"Design, User Experience, and Usability. Design Philosophy, Methods, and Tools","language":[{"iso":"eng"}],"place":"Berlin, Heidelberg","intvolume":"      8012","page":"252-261","citation":{"chicago":"Fischer, Holger Gerhard, Benjamin Strenge, and Karsten Nebe. “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design.” In <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i>, 8012:252–61. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">https://doi.org/10.1007/978-3-642-39229-0_28</a>.","ieee":"H. G. Fischer, B. Strenge, and K. Nebe, “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design,” in <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i>, vol. 8012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 252–261.","ama":"Fischer HG, Strenge B, Nebe K. Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. In: <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i>. Vol 8012. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:252-261. doi:<a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">10.1007/978-3-642-39229-0_28</a>","apa":"Fischer, H. G., Strenge, B., &#38; Nebe, K. (2013). Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. In <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i> (Vol. 8012, pp. 252–261). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">https://doi.org/10.1007/978-3-642-39229-0_28</a>","mla":"Fischer, Holger Gerhard, et al. “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design.” <i>Design, User Experience, and Usability. Design Philosophy, Methods, and Tools</i>, vol. 8012, Springer Berlin Heidelberg, 2013, pp. 252–61, doi:<a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">10.1007/978-3-642-39229-0_28</a>.","short":"H.G. Fischer, B. Strenge, K. Nebe, in: Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 252–261.","bibtex":"@inbook{Fischer_Strenge_Nebe_2013, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design}, volume={8012}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39229-0_28\">10.1007/978-3-642-39229-0_28</a>}, booktitle={Design, User Experience, and Usability. Design Philosophy, Methods, and Tools}, publisher={Springer Berlin Heidelberg}, author={Fischer, Holger Gerhard and Strenge, Benjamin and Nebe, Karsten}, year={2013}, pages={252–261}, collection={Lecture Notes in Computer Science} }"},"publication_identifier":{"isbn":["9783642392283","9783642392290"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","conference":{"end_date":"2013-07-26","location":"Las Vegas, USA","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2013","start_date":"2013-07-21"},"doi":"10.1007/978-3-642-39229-0_28","date_updated":"2022-01-06T07:02:59Z","volume":8012,"author":[{"last_name":"Fischer","full_name":"Fischer, Holger Gerhard","id":"30457","first_name":"Holger Gerhard"},{"last_name":"Strenge","full_name":"Strenge, Benjamin","first_name":"Benjamin"},{"last_name":"Nebe","full_name":"Nebe, Karsten","first_name":"Karsten"}],"status":"public","type":"book_chapter","_id":"6279","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"series_title":"Lecture Notes in Computer Science","user_id":"30457"},{"publication_identifier":{"isbn":["9783642403125","9783642403132"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"729-740","citation":{"ieee":"T. Place, L. van Rooijen, and M. Zeitoun, “Separating Regular Languages by Piecewise Testable and Unambiguous Languages,” in <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i>, 2013, pp. 729–740.","chicago":"Place, Thomas, Lorijn van Rooijen, and Marc Zeitoun. “Separating Regular Languages by Piecewise Testable and Unambiguous Languages.” In <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i>, 729–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">https://doi.org/10.1007/978-3-642-40313-2_64</a>.","ama":"Place T, van Rooijen L, Zeitoun M. Separating Regular Languages by Piecewise Testable and Unambiguous Languages. In: <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:729-740. doi:<a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">10.1007/978-3-642-40313-2_64</a>","bibtex":"@inproceedings{Place_van Rooijen_Zeitoun_2013, place={Berlin, Heidelberg}, title={Separating Regular Languages by Piecewise Testable and Unambiguous Languages}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">10.1007/978-3-642-40313-2_64</a>}, booktitle={Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013}, publisher={Springer Berlin Heidelberg}, author={Place, Thomas and van Rooijen, Lorijn and Zeitoun, Marc}, year={2013}, pages={729–740} }","short":"T. Place, L. van Rooijen, M. Zeitoun, in: Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 729–740.","mla":"Place, Thomas, et al. “Separating Regular Languages by Piecewise Testable and Unambiguous Languages.” <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i>, Springer Berlin Heidelberg, 2013, pp. 729–40, doi:<a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">10.1007/978-3-642-40313-2_64</a>.","apa":"Place, T., van Rooijen, L., &#38; Zeitoun, M. (2013). Separating Regular Languages by Piecewise Testable and Unambiguous Languages. In <i>Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013</i> (pp. 729–740). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-40313-2_64\">https://doi.org/10.1007/978-3-642-40313-2_64</a>"},"year":"2013","place":"Berlin, Heidelberg","author":[{"first_name":"Thomas","full_name":"Place, Thomas","last_name":"Place"},{"first_name":"Lorijn","last_name":"van Rooijen","full_name":"van Rooijen, Lorijn","id":"58843"},{"full_name":"Zeitoun, Marc","last_name":"Zeitoun","first_name":"Marc"}],"date_created":"2019-01-15T10:23:36Z","date_updated":"2022-01-06T07:03:17Z","publisher":"Springer Berlin Heidelberg","doi":"10.1007/978-3-642-40313-2_64","title":"Separating Regular Languages by Piecewise Testable and Unambiguous Languages","publication":"Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013","type":"conference","status":"public","department":[{"_id":"66"}],"user_id":"58843","_id":"6732","extern":"1","language":[{"iso":"eng"}]},{"publication_identifier":{"isbn":["9783642394669","9783642394676"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2013","place":"Berlin, Heidelberg","page":"149-164","citation":{"mla":"Böttcher, Stefan, et al. “Fast Multi-Update Operations on Compressed XML Data.” <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i> Springer, 2013, pp. 149–64, doi:<a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">10.1007/978-3-642-39467-6_15</a>.","short":"S. Böttcher, R. Hartel, T. Jacobs, in: Big Data - 29th British National Conference on Databases, BNCOD 2013, Springer, Berlin, Heidelberg, 2013, pp. 149–164.","bibtex":"@inproceedings{Böttcher_Hartel_Jacobs_2013, place={Berlin, Heidelberg}, title={Fast Multi-update Operations on Compressed XML Data}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">10.1007/978-3-642-39467-6_15</a>}, booktitle={Big Data - 29th British National Conference on Databases, BNCOD 2013,}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and Jacobs, Thomas}, year={2013}, pages={149–164} }","apa":"Böttcher, S., Hartel, R., &#38; Jacobs, T. (2013). Fast Multi-update Operations on Compressed XML Data. In <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i> (pp. 149–164). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">https://doi.org/10.1007/978-3-642-39467-6_15</a>","ama":"Böttcher S, Hartel R, Jacobs T. Fast Multi-update Operations on Compressed XML Data. In: <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i>. Berlin, Heidelberg: Springer; 2013:149-164. doi:<a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">10.1007/978-3-642-39467-6_15</a>","ieee":"S. Böttcher, R. Hartel, and T. Jacobs, “Fast Multi-update Operations on Compressed XML Data,” in <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i> 2013, pp. 149–164.","chicago":"Böttcher, Stefan, Rita Hartel, and Thomas Jacobs. “Fast Multi-Update Operations on Compressed XML Data.” In <i>Big Data - 29th British National Conference on Databases, BNCOD 2013,</i> 149–64. Berlin, Heidelberg: Springer, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39467-6_15\">https://doi.org/10.1007/978-3-642-39467-6_15</a>."},"date_updated":"2022-01-06T06:52:15Z","publisher":"Springer","author":[{"first_name":"Stefan","last_name":"Böttcher","id":"624","full_name":"Böttcher, Stefan"},{"last_name":"Hartel","full_name":"Hartel, Rita","id":"14961","first_name":"Rita"},{"first_name":"Thomas","last_name":"Jacobs","full_name":"Jacobs, Thomas"}],"date_created":"2019-11-21T15:19:46Z","title":"Fast Multi-update Operations on Compressed XML Data","doi":"10.1007/978-3-642-39467-6_15","publication":"Big Data - 29th British National Conference on Databases, BNCOD 2013,","type":"conference","status":"public","_id":"15093","department":[{"_id":"69"}],"user_id":"14961","language":[{"iso":"eng"}]},{"department":[{"_id":"63"}],"user_id":"15415","_id":"16406","language":[{"iso":"eng"}],"publication":"Advances in Visual Computing","type":"book_chapter","status":"public","abstract":[{"text":"In order to evaluate the efficiency of algorithms for real-time 3D rendering, different properties like rendering time, occluded triangles, or image quality, need to be investigated. Since these properties depend on the position of the camera, usually some camera path is chosen, along which the measurements are performed. As those measurements cover only a small part of the scene, this approach hardly allows drawing conclusions regarding the algorithm's properties at arbitrary positions in the scene. The presented method allows the systematic and position-independent evaluation of rendering algorithms. It uses an adaptive sampling approach to approximate the distribution of a property (like rendering time) for all positions in the scene. This approximation can be visualized to produce an intuitive impression of the algorithm's behavior or be statistically analyzed for objectively rating and comparing algorithms. We demonstrate our method by evaluating performance aspects of a known occlusion culling algorithm.\r\n","lang":"eng"}],"author":[{"full_name":"Jähn, Claudius","last_name":"Jähn","first_name":"Claudius"},{"first_name":"Benjamin","full_name":"Eikel, Benjamin","last_name":"Eikel"},{"first_name":"Matthias","last_name":"Fischer","full_name":"Fischer, Matthias","id":"146"},{"last_name":"Petring","full_name":"Petring, Ralf","first_name":"Ralf"},{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_created":"2020-04-06T07:21:55Z","date_updated":"2022-01-06T06:52:50Z","doi":"10.1007/978-3-642-41914-0_12","title":"Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties","publication_identifier":{"isbn":["9783642419133","9783642419140"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","citation":{"chicago":"Jähn, Claudius, Benjamin Eikel, Matthias Fischer, Ralf Petring, and Friedhelm Meyer auf der Heide. “Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties.” In <i>Advances in Visual Computing</i>. Berlin, Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">https://doi.org/10.1007/978-3-642-41914-0_12</a>.","ieee":"C. Jähn, B. Eikel, M. Fischer, R. Petring, and F. Meyer auf der Heide, “Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties,” in <i>Advances in Visual Computing</i>, Berlin, Heidelberg, 2013.","ama":"Jähn C, Eikel B, Fischer M, Petring R, Meyer auf der Heide F. Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties. In: <i>Advances in Visual Computing</i>. Berlin, Heidelberg; 2013. doi:<a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">10.1007/978-3-642-41914-0_12</a>","apa":"Jähn, C., Eikel, B., Fischer, M., Petring, R., &#38; Meyer auf der Heide, F. (2013). Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties. In <i>Advances in Visual Computing</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">https://doi.org/10.1007/978-3-642-41914-0_12</a>","mla":"Jähn, Claudius, et al. “Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties.” <i>Advances in Visual Computing</i>, 2013, doi:<a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">10.1007/978-3-642-41914-0_12</a>.","bibtex":"@inbook{Jähn_Eikel_Fischer_Petring_Meyer auf der Heide_2013, place={Berlin, Heidelberg}, title={Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-41914-0_12\">10.1007/978-3-642-41914-0_12</a>}, booktitle={Advances in Visual Computing}, author={Jähn, Claudius and Eikel, Benjamin and Fischer, Matthias and Petring, Ralf and Meyer auf der Heide, Friedhelm}, year={2013} }","short":"C. Jähn, B. Eikel, M. Fischer, R. Petring, F. Meyer auf der Heide, in: Advances in Visual Computing, Berlin, Heidelberg, 2013."},"year":"2013","place":"Berlin, Heidelberg"},{"publication_identifier":{"isbn":["9783642419133","9783642419140"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2013","place":"Berlin, Heidelberg","citation":{"bibtex":"@inbook{Petring_Eikel_Jähn_Fischer_Meyer auf der Heide_2013, place={Berlin, Heidelberg}, title={Real-Time 3D Rendering of Heterogeneous Scenes}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">10.1007/978-3-642-41914-0_44</a>}, booktitle={Advances in Visual Computing}, author={Petring, Ralf and Eikel, Benjamin and Jähn, Claudius and Fischer, Matthias and Meyer auf der Heide, Friedhelm}, year={2013} }","mla":"Petring, Ralf, et al. “Real-Time 3D Rendering of Heterogeneous Scenes.” <i>Advances in Visual Computing</i>, 2013, doi:<a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">10.1007/978-3-642-41914-0_44</a>.","short":"R. Petring, B. Eikel, C. Jähn, M. Fischer, F. Meyer auf der Heide, in: Advances in Visual Computing, Berlin, Heidelberg, 2013.","apa":"Petring, R., Eikel, B., Jähn, C., Fischer, M., &#38; Meyer auf der Heide, F. (2013). Real-Time 3D Rendering of Heterogeneous Scenes. In <i>Advances in Visual Computing</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">https://doi.org/10.1007/978-3-642-41914-0_44</a>","ama":"Petring R, Eikel B, Jähn C, Fischer M, Meyer auf der Heide F. Real-Time 3D Rendering of Heterogeneous Scenes. In: <i>Advances in Visual Computing</i>. Berlin, Heidelberg; 2013. doi:<a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">10.1007/978-3-642-41914-0_44</a>","chicago":"Petring, Ralf, Benjamin Eikel, Claudius Jähn, Matthias Fischer, and Friedhelm Meyer auf der Heide. “Real-Time 3D Rendering of Heterogeneous Scenes.” In <i>Advances in Visual Computing</i>. Berlin, Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-41914-0_44\">https://doi.org/10.1007/978-3-642-41914-0_44</a>.","ieee":"R. Petring, B. Eikel, C. Jähn, M. Fischer, and F. Meyer auf der Heide, “Real-Time 3D Rendering of Heterogeneous Scenes,” in <i>Advances in Visual Computing</i>, Berlin, Heidelberg, 2013."},"date_updated":"2022-01-06T06:52:50Z","date_created":"2020-04-06T07:38:52Z","author":[{"last_name":"Petring","full_name":"Petring, Ralf","first_name":"Ralf"},{"first_name":"Benjamin","full_name":"Eikel, Benjamin","last_name":"Eikel"},{"first_name":"Claudius","full_name":"Jähn, Claudius","last_name":"Jähn"},{"last_name":"Fischer","full_name":"Fischer, Matthias","id":"146","first_name":"Matthias"},{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","first_name":"Friedhelm"}],"title":"Real-Time 3D Rendering of Heterogeneous Scenes","doi":"10.1007/978-3-642-41914-0_44","publication":"Advances in Visual Computing","type":"book_chapter","abstract":[{"text":"Many virtual 3D scenes, especially those that are large, are not structured evenly. For such heterogeneous data, there is no single algorithm that is able to render every scene type at each position fast and with the same high image quality. For a small set of scenes, this situation can be improved if different rendering algorithms are manually assigned to particular parts of the scene by an experienced user. We introduce the Multi-Algorithm-Rendering method. It automatically deploys different rendering algorithms simultaneously for a broad range of scene types. The method divides the scene into subregions and measures the behavior of different algorithms for each region in a preprocessing step. During runtime, this data is utilized to compute an estimate for the quality and running time of the available rendering algorithms from the observer's point of view. By solving an optimizing problem, the image quality can be optimized by an assignment of algorithms to regions while keeping the frame rate almost constant.\r\n","lang":"eng"}],"status":"public","_id":"16407","department":[{"_id":"63"}],"user_id":"15415","language":[{"iso":"eng"}]},{"type":"conference","publication":"Swarm Intelligence: 8th International Conference, ANTS 2012","status":"public","user_id":"15415","department":[{"_id":"63"},{"_id":"238"}],"_id":"20179","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"isbn":["9783642326493","9783642326509"],"issn":["0302-9743","1611-3349"]},"citation":{"ieee":"H. Hamann <i>et al.</i>, “Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions,” in <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i>, 2012, vol. 7461, pp. 168–179.","chicago":"Hamann, Heiko, Andreas Engelbrecht, Mauro Birattari, Marco Dorigo, Christian Blum, Thomas Stuetzle, Anders Lyhne Christensen, and Roderich Gross. “Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions.” In <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i>, 7461:168–79. Berlin, Heidelberg: Springer, 2012. <a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">https://doi.org/10.1007/978-3-642-32650-9_15</a>.","ama":"Hamann H, Engelbrecht A, Birattari M, et al. Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions. In: <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i>. Vol 7461. Berlin, Heidelberg: Springer; 2012:168-179. doi:<a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">10.1007/978-3-642-32650-9_15</a>","mla":"Hamann, Heiko, et al. “Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions.” <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i>, vol. 7461, Springer, 2012, pp. 168–79, doi:<a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">10.1007/978-3-642-32650-9_15</a>.","short":"H. Hamann, A. Engelbrecht, M. Birattari, M. Dorigo, C. Blum, T. Stuetzle, A.L. Christensen, R. Gross, in: Swarm Intelligence: 8th International Conference, ANTS 2012, Springer, Berlin, Heidelberg, 2012, pp. 168–179.","bibtex":"@inproceedings{Hamann_Engelbrecht_Birattari_Dorigo_Blum_Stuetzle_Christensen_Gross_2012, place={Berlin, Heidelberg}, title={Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions}, volume={7461}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">10.1007/978-3-642-32650-9_15</a>}, booktitle={Swarm Intelligence: 8th International Conference, ANTS 2012}, publisher={Springer}, author={Hamann, Heiko and Engelbrecht, Andreas and Birattari, Mauro and Dorigo, Marco and Blum, Christian and Stuetzle, Thomas and Christensen, Anders Lyhne and Gross, Roderich}, year={2012}, pages={168–179} }","apa":"Hamann, H., Engelbrecht, A., Birattari, M., Dorigo, M., Blum, C., Stuetzle, T., … Gross, R. (2012). Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions. In <i>Swarm Intelligence: 8th International Conference, ANTS 2012</i> (Vol. 7461, pp. 168–179). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-642-32650-9_15\">https://doi.org/10.1007/978-3-642-32650-9_15</a>"},"page":"168-179","intvolume":"      7461","year":"2012","place":"Berlin, Heidelberg","author":[{"full_name":"Hamann, Heiko","last_name":"Hamann","first_name":"Heiko"},{"first_name":"Andreas","last_name":"Engelbrecht","full_name":"Engelbrecht, Andreas"},{"full_name":"Birattari, Mauro","last_name":"Birattari","first_name":"Mauro"},{"first_name":"Marco","last_name":"Dorigo","full_name":"Dorigo, Marco"},{"last_name":"Blum","full_name":"Blum, Christian","first_name":"Christian"},{"first_name":"Thomas","last_name":"Stuetzle","full_name":"Stuetzle, Thomas"},{"first_name":"Anders Lyhne","full_name":"Christensen, Anders Lyhne","last_name":"Christensen"},{"full_name":"Gross, Roderich","last_name":"Gross","first_name":"Roderich"}],"date_created":"2020-10-22T10:00:11Z","volume":7461,"publisher":"Springer","date_updated":"2022-01-06T06:54:21Z","doi":"10.1007/978-3-642-32650-9_15","title":"Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions"},{"title":"Certifying RSA","doi":"10.1007/978-3-642-34961-4_25","date_updated":"2022-01-06T06:58:47Z","publisher":"Springer Berlin Heidelberg","author":[{"first_name":"Saqib","last_name":"Kakvi","id":"66268","full_name":"Kakvi, Saqib"},{"last_name":"Kiltz","full_name":"Kiltz, Eike","first_name":"Eike"},{"last_name":"May","full_name":"May, Alexander","first_name":"Alexander"}],"date_created":"2018-05-25T12:34:06Z","place":"Berlin, Heidelberg","year":"2012","page":"404-414","citation":{"ieee":"S. Kakvi, E. Kiltz, and A. May, “Certifying RSA,” in <i>Advances in Cryptology – ASIACRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 404–414.","chicago":"Kakvi, Saqib, Eike Kiltz, and Alexander May. “Certifying RSA.” In <i>Advances in Cryptology – ASIACRYPT 2012</i>, 404–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">https://doi.org/10.1007/978-3-642-34961-4_25</a>.","ama":"Kakvi S, Kiltz E, May A. Certifying RSA. In: <i>Advances in Cryptology – ASIACRYPT 2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>","mla":"Kakvi, Saqib, et al. “Certifying RSA.” <i>Advances in Cryptology – ASIACRYPT 2012</i>, Springer Berlin Heidelberg, 2012, pp. 404–14, doi:<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>.","bibtex":"@inbook{Kakvi_Kiltz_May_2012, place={Berlin, Heidelberg}, title={Certifying RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>}, booktitle={Advances in Cryptology – ASIACRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike and May, Alexander}, year={2012}, pages={404–414} }","short":"S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.","apa":"Kakvi, S., Kiltz, E., &#38; May, A. (2012). Certifying RSA. In <i>Advances in Cryptology – ASIACRYPT 2012</i> (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">https://doi.org/10.1007/978-3-642-34961-4_25</a>"},"publication_identifier":{"isbn":["9783642349607","9783642349614"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","extern":"1","_id":"2918","department":[{"_id":"558"}],"user_id":"25078","status":"public","publication":"Advances in Cryptology – ASIACRYPT 2012","type":"book_chapter"},{"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:47Z","author":[{"first_name":"Saqib","last_name":"Kakvi","id":"66268","full_name":"Kakvi, Saqib"},{"full_name":"Kiltz, Eike","last_name":"Kiltz","first_name":"Eike"}],"date_created":"2018-05-25T12:36:44Z","title":"Optimal Security Proofs for Full Domain Hash, Revisited","doi":"10.1007/978-3-642-29011-4_32","main_file_link":[{"url":"https://doi.org/10.1007/s00145-017-9257-9"}],"publication_identifier":{"isbn":["9783642290107","9783642290114"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","place":"Berlin, Heidelberg","year":"2012","page":"537-553","citation":{"ama":"Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: <i>Advances in Cryptology – EUROCRYPT 2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>","ieee":"S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” in <i>Advances in Cryptology – EUROCRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 537–553.","chicago":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” In <i>Advances in Cryptology – EUROCRYPT 2012</i>, 537–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">https://doi.org/10.1007/978-3-642-29011-4_32</a>.","short":"S. Kakvi, E. Kiltz, in: Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 537–553.","mla":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” <i>Advances in Cryptology – EUROCRYPT 2012</i>, Springer Berlin Heidelberg, 2012, pp. 537–53, doi:<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>.","bibtex":"@inbook{Kakvi_Kiltz_2012, place={Berlin, Heidelberg}, title={Optimal Security Proofs for Full Domain Hash, Revisited}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>}, booktitle={Advances in Cryptology – EUROCRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike}, year={2012}, pages={537–553} }","apa":"Kakvi, S., &#38; Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In <i>Advances in Cryptology – EUROCRYPT 2012</i> (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">https://doi.org/10.1007/978-3-642-29011-4_32</a>"},"_id":"2919","department":[{"_id":"558"}],"user_id":"66268","extern":"1","publication":"Advances in Cryptology – EUROCRYPT 2012","type":"book_chapter","status":"public"},{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642308499","9783642308505"]},"publication_status":"published","citation":{"apa":"Kempkes, B., &#38; Meyer auf der Heide, F. (2012). Continuous Local Strategies for Robotic Formation Problems. In <i>Experimental Algorithms</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">https://doi.org/10.1007/978-3-642-30850-5_2</a>","short":"B. Kempkes, F. Meyer auf der Heide, in: Experimental Algorithms, Berlin, Heidelberg, 2012.","mla":"Kempkes, Barbara, and Friedhelm Meyer auf der Heide. “Continuous Local Strategies for Robotic Formation Problems.” <i>Experimental Algorithms</i>, 2012, doi:<a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">10.1007/978-3-642-30850-5_2</a>.","bibtex":"@inbook{Kempkes_Meyer auf der Heide_2012, place={Berlin, Heidelberg}, title={Continuous Local Strategies for Robotic Formation Problems}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">10.1007/978-3-642-30850-5_2</a>}, booktitle={Experimental Algorithms}, author={Kempkes, Barbara and Meyer auf der Heide, Friedhelm}, year={2012} }","ieee":"B. Kempkes and F. Meyer auf der Heide, “Continuous Local Strategies for Robotic Formation Problems,” in <i>Experimental Algorithms</i>, Berlin, Heidelberg, 2012.","chicago":"Kempkes, Barbara, and Friedhelm Meyer auf der Heide. “Continuous Local Strategies for Robotic Formation Problems.” In <i>Experimental Algorithms</i>. Berlin, Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">https://doi.org/10.1007/978-3-642-30850-5_2</a>.","ama":"Kempkes B, Meyer auf der Heide F. Continuous Local Strategies for Robotic Formation Problems. In: <i>Experimental Algorithms</i>. Berlin, Heidelberg; 2012. doi:<a href=\"https://doi.org/10.1007/978-3-642-30850-5_2\">10.1007/978-3-642-30850-5_2</a>"},"year":"2012","place":"Berlin, Heidelberg","author":[{"first_name":"Barbara","last_name":"Kempkes","full_name":"Kempkes, Barbara"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523"}],"date_created":"2020-04-07T06:41:18Z","date_updated":"2022-01-06T06:52:50Z","doi":"10.1007/978-3-642-30850-5_2","title":"Continuous Local Strategies for Robotic Formation Problems","publication":"Experimental Algorithms","type":"book_chapter","status":"public","department":[{"_id":"63"}],"user_id":"15415","_id":"16445","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"16448","department":[{"_id":"63"}],"user_id":"15415","status":"public","publication":"Algorithms for Sensor Systems","type":"book_chapter","title":"Local, Self-organizing Strategies for Robotic Formation Problems","doi":"10.1007/978-3-642-28209-6_2","date_updated":"2022-01-06T06:52:50Z","author":[{"first_name":"Barbara","full_name":"Kempkes, Barbara","last_name":"Kempkes"},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_created":"2020-04-07T06:51:14Z","place":"Berlin, Heidelberg","year":"2012","citation":{"ama":"Kempkes B, Meyer auf der Heide F. Local, Self-organizing Strategies for Robotic Formation Problems. In: <i>Algorithms for Sensor Systems</i>. Berlin, Heidelberg; 2012. doi:<a href=\"https://doi.org/10.1007/978-3-642-28209-6_2\">10.1007/978-3-642-28209-6_2</a>","ieee":"B. Kempkes and F. Meyer auf der Heide, “Local, Self-organizing Strategies for Robotic Formation Problems,” in <i>Algorithms for Sensor Systems</i>, Berlin, Heidelberg, 2012.","chicago":"Kempkes, Barbara, and Friedhelm Meyer auf der Heide. “Local, Self-Organizing Strategies for Robotic Formation Problems.” In <i>Algorithms for Sensor Systems</i>. Berlin, Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-28209-6_2\">https://doi.org/10.1007/978-3-642-28209-6_2</a>.","mla":"Kempkes, Barbara, and Friedhelm Meyer auf der Heide. “Local, Self-Organizing Strategies for Robotic Formation Problems.” <i>Algorithms for Sensor Systems</i>, 2012, doi:<a href=\"https://doi.org/10.1007/978-3-642-28209-6_2\">10.1007/978-3-642-28209-6_2</a>.","bibtex":"@inbook{Kempkes_Meyer auf der Heide_2012, place={Berlin, Heidelberg}, title={Local, Self-organizing Strategies for Robotic Formation Problems}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-28209-6_2\">10.1007/978-3-642-28209-6_2</a>}, booktitle={Algorithms for Sensor Systems}, author={Kempkes, Barbara and Meyer auf der Heide, Friedhelm}, year={2012} }","short":"B. Kempkes, F. Meyer auf der Heide, in: Algorithms for Sensor Systems, Berlin, Heidelberg, 2012.","apa":"Kempkes, B., &#38; Meyer auf der Heide, F. (2012). Local, Self-organizing Strategies for Robotic Formation Problems. In <i>Algorithms for Sensor Systems</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-28209-6_2\">https://doi.org/10.1007/978-3-642-28209-6_2</a>"},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642282089","9783642282096"]},"publication_status":"published"},{"year":"2012","place":"Berlin, Heidelberg","citation":{"apa":"Baier, R., &#38; Molo, M. H. (2012). Newton’s Method and Secant Method for Set-Valued Mappings. In <i>Large-Scale Scientific Computing</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-29843-1_9\">https://doi.org/10.1007/978-3-642-29843-1_9</a>","short":"R. Baier, M.H. Molo, in: Large-Scale Scientific Computing, Berlin, Heidelberg, 2012.","bibtex":"@inbook{Baier_Molo_2012, place={Berlin, Heidelberg}, title={Newton’s Method and Secant Method for Set-Valued Mappings}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-29843-1_9\">10.1007/978-3-642-29843-1_9</a>}, booktitle={Large-Scale Scientific Computing}, author={Baier, Robert and Molo, Mirko Hessel-von}, year={2012} }","mla":"Baier, Robert, and Mirko Hessel-von Molo. “Newton’s Method and Secant Method for Set-Valued Mappings.” <i>Large-Scale Scientific Computing</i>, 2012, doi:<a href=\"https://doi.org/10.1007/978-3-642-29843-1_9\">10.1007/978-3-642-29843-1_9</a>.","ama":"Baier R, Molo MH. Newton’s Method and Secant Method for Set-Valued Mappings. In: <i>Large-Scale Scientific Computing</i>. Berlin, Heidelberg; 2012. doi:<a href=\"https://doi.org/10.1007/978-3-642-29843-1_9\">10.1007/978-3-642-29843-1_9</a>","chicago":"Baier, Robert, and Mirko Hessel-von Molo. “Newton’s Method and Secant Method for Set-Valued Mappings.” In <i>Large-Scale Scientific Computing</i>. Berlin, Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-29843-1_9\">https://doi.org/10.1007/978-3-642-29843-1_9</a>.","ieee":"R. Baier and M. H. Molo, “Newton’s Method and Secant Method for Set-Valued Mappings,” in <i>Large-Scale Scientific Computing</i>, Berlin, Heidelberg, 2012."},"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642298424","9783642298431"]},"title":"Newton’s Method and Secant Method for Set-Valued Mappings","doi":"10.1007/978-3-642-29843-1_9","date_updated":"2022-01-06T06:52:52Z","author":[{"first_name":"Robert","last_name":"Baier","full_name":"Baier, Robert"},{"full_name":"Molo, Mirko Hessel-von","last_name":"Molo","first_name":"Mirko Hessel-von"}],"date_created":"2020-04-15T07:59:49Z","status":"public","type":"book_chapter","publication":"Large-Scale Scientific Computing","_id":"16516","user_id":"15701","department":[{"_id":"101"}]},{"doi":"10.1007/978-3-642-33167-1_43","title":"Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption","author":[{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor"},{"full_name":"Schinzel, Sebastian","last_name":"Schinzel","first_name":"Sebastian"},{"first_name":"Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","id":"83504","full_name":"Somorovsky, Juraj"}],"date_created":"2020-02-15T09:31:47Z","date_updated":"2022-01-06T06:52:39Z","citation":{"apa":"Jager, T., Schinzel, S., &#38; Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In <i>Computer Security – ESORICS 2012</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">https://doi.org/10.1007/978-3-642-33167-1_43</a>","mla":"Jager, Tibor, et al. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” <i>Computer Security – ESORICS 2012</i>, 2012, doi:<a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">10.1007/978-3-642-33167-1_43</a>.","bibtex":"@inbook{Jager_Schinzel_Somorovsky_2012, place={Berlin, Heidelberg}, title={Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">10.1007/978-3-642-33167-1_43</a>}, booktitle={Computer Security – ESORICS 2012}, author={Jager, Tibor and Schinzel, Sebastian and Somorovsky, Juraj}, year={2012} }","short":"T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security – ESORICS 2012, Berlin, Heidelberg, 2012.","ieee":"T. Jager, S. Schinzel, and J. Somorovsky, “Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption,” in <i>Computer Security – ESORICS 2012</i>, Berlin, Heidelberg, 2012.","chicago":"Jager, Tibor, Sebastian Schinzel, and Juraj Somorovsky. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” In <i>Computer Security – ESORICS 2012</i>. Berlin, Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">https://doi.org/10.1007/978-3-642-33167-1_43</a>.","ama":"Jager T, Schinzel S, Somorovsky J. Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In: <i>Computer Security – ESORICS 2012</i>. Berlin, Heidelberg; 2012. doi:<a href=\"https://doi.org/10.1007/978-3-642-33167-1_43\">10.1007/978-3-642-33167-1_43</a>"},"year":"2012","place":"Berlin, Heidelberg","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642331664","9783642331671"]},"language":[{"iso":"eng"}],"user_id":"83504","_id":"15891","status":"public","type":"book_chapter","publication":"Computer Security – ESORICS 2012"},{"language":[{"iso":"eng"}],"_id":"16408","department":[{"_id":"63"}],"user_id":"15415","series_title":"Lecture Notes in Computer Science","abstract":[{"text":"We present a parallel rendering system for heterogeneous PC clusters to visualize massive models. One single, powerful visualization node is supported by a group of backend nodes with weak graphics performance. While the visualization node renders the visible objects, the backend nodes asynchronously perform visibility tests and supply the front end with visible scene objects. The visualization node stores only currently visible objects in its memory, while the scene is distributed among the backend nodes’ memory without redundancy. To efficiently compute the occlusion tests in spite of that each backend node stores only a fraction of the original geometry, we complete the scene by adding highly simplified versions of the objects stored on other nodes. We test our system with 15 backend nodes. It is able to render a ≈ 350,M polygons (≈ 8.5,GiB) large aircraft model with 20, to 30,fps and thus allows a walk-through in real-time.\r\n","lang":"eng"}],"status":"public","publication":"Advances in Visual Computing","type":"conference","title":"Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes","doi":"10.1007/978-3-642-33179-4_48","date_updated":"2022-01-06T06:52:50Z","volume":7431,"date_created":"2020-04-06T07:40:57Z","author":[{"last_name":"Suess","full_name":"Suess, Tim","first_name":"Tim"},{"full_name":"Koch, Clemens","last_name":"Koch","first_name":"Clemens"},{"first_name":"Claudius","full_name":"Jähn, Claudius","last_name":"Jähn"},{"id":"146","full_name":"Fischer, Matthias","last_name":"Fischer","first_name":"Matthias"},{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"place":"Berlin, Heidelberg","year":"2012","page":"502-512","intvolume":"      7431","citation":{"apa":"Suess, T., Koch, C., Jähn, C., Fischer, M., &#38; Meyer auf der Heide, F. (2012). Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes. <i>Advances in Visual Computing</i>, <i>7431</i>, 502–512. <a href=\"https://doi.org/10.1007/978-3-642-33179-4_48\">https://doi.org/10.1007/978-3-642-33179-4_48</a>","bibtex":"@inproceedings{Suess_Koch_Jähn_Fischer_Meyer auf der Heide_2012, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes}, volume={7431}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-33179-4_48\">10.1007/978-3-642-33179-4_48</a>}, booktitle={Advances in Visual Computing}, author={Suess, Tim and Koch, Clemens and Jähn, Claudius and Fischer, Matthias and Meyer auf der Heide, Friedhelm}, year={2012}, pages={502–512}, collection={Lecture Notes in Computer Science} }","short":"T. Suess, C. Koch, C. Jähn, M. Fischer, F. Meyer auf der Heide, in: Advances in Visual Computing, Berlin, Heidelberg, 2012, pp. 502–512.","mla":"Suess, Tim, et al. “Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes.” <i>Advances in Visual Computing</i>, vol. 7431, 2012, pp. 502–12, doi:<a href=\"https://doi.org/10.1007/978-3-642-33179-4_48\">10.1007/978-3-642-33179-4_48</a>.","ama":"Suess T, Koch C, Jähn C, Fischer M, Meyer auf der Heide F. Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes. In: <i>Advances in Visual Computing</i>. Vol 7431. Lecture Notes in Computer Science. ; 2012:502-512. doi:<a href=\"https://doi.org/10.1007/978-3-642-33179-4_48\">10.1007/978-3-642-33179-4_48</a>","ieee":"T. Suess, C. Koch, C. Jähn, M. Fischer, and F. Meyer auf der Heide, “Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes,” in <i>Advances in Visual Computing</i>, 2012, vol. 7431, pp. 502–512, doi: <a href=\"https://doi.org/10.1007/978-3-642-33179-4_48\">10.1007/978-3-642-33179-4_48</a>.","chicago":"Suess, Tim, Clemens Koch, Claudius Jähn, Matthias Fischer, and Friedhelm Meyer auf der Heide. “Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes.” In <i>Advances in Visual Computing</i>, 7431:502–12. Lecture Notes in Computer Science. Berlin, Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-33179-4_48\">https://doi.org/10.1007/978-3-642-33179-4_48</a>."},"publication_identifier":{"isbn":["9783642331787","9783642331794"],"issn":["0302-9743","1611-3349"]},"publication_status":"published"},{"language":[{"iso":"eng"}],"department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","_id":"20183","status":"public","publication":"10th European Conference on Artificial Life (ECAL'09)","type":"conference","doi":"10.1007/978-3-642-21283-3_55","title":"Evolving for Creativity: Maximizing Complexity in a Self-organized Multi-particle System","volume":5777,"date_created":"2020-10-22T12:27:11Z","author":[{"first_name":"Heiko","full_name":"Hamann, Heiko","last_name":"Hamann"},{"last_name":"Schmickl","full_name":"Schmickl, Thomas","first_name":"Thomas"},{"first_name":"Karl","full_name":"Crailsheim, Karl","last_name":"Crailsheim"}],"date_updated":"2022-01-06T06:54:21Z","intvolume":"      5777","page":"442--449","citation":{"chicago":"Hamann, Heiko, Thomas Schmickl, and Karl Crailsheim. “Evolving for Creativity: Maximizing Complexity in a Self-Organized Multi-Particle System.” In <i>10th European Conference on Artificial Life (ECAL’09)</i>, 5777:442--449, 2011. <a href=\"https://doi.org/10.1007/978-3-642-21283-3_55\">https://doi.org/10.1007/978-3-642-21283-3_55</a>.","ieee":"H. Hamann, T. Schmickl, and K. Crailsheim, “Evolving for Creativity: Maximizing Complexity in a Self-organized Multi-particle System,” in <i>10th European Conference on Artificial Life (ECAL’09)</i>, 2011, vol. 5777, pp. 442--449.","ama":"Hamann H, Schmickl T, Crailsheim K. Evolving for Creativity: Maximizing Complexity in a Self-organized Multi-particle System. In: <i>10th European Conference on Artificial Life (ECAL’09)</i>. Vol 5777. ; 2011:442--449. doi:<a href=\"https://doi.org/10.1007/978-3-642-21283-3_55\">10.1007/978-3-642-21283-3_55</a>","apa":"Hamann, H., Schmickl, T., &#38; Crailsheim, K. (2011). Evolving for Creativity: Maximizing Complexity in a Self-organized Multi-particle System. In <i>10th European Conference on Artificial Life (ECAL’09)</i> (Vol. 5777, pp. 442--449). <a href=\"https://doi.org/10.1007/978-3-642-21283-3_55\">https://doi.org/10.1007/978-3-642-21283-3_55</a>","mla":"Hamann, Heiko, et al. “Evolving for Creativity: Maximizing Complexity in a Self-Organized Multi-Particle System.” <i>10th European Conference on Artificial Life (ECAL’09)</i>, vol. 5777, 2011, pp. 442--449, doi:<a href=\"https://doi.org/10.1007/978-3-642-21283-3_55\">10.1007/978-3-642-21283-3_55</a>.","bibtex":"@inproceedings{Hamann_Schmickl_Crailsheim_2011, title={Evolving for Creativity: Maximizing Complexity in a Self-organized Multi-particle System}, volume={5777}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-21283-3_55\">10.1007/978-3-642-21283-3_55</a>}, booktitle={10th European Conference on Artificial Life (ECAL’09)}, author={Hamann, Heiko and Schmickl, Thomas and Crailsheim, Karl}, year={2011}, pages={442--449} }","short":"H. Hamann, T. Schmickl, K. Crailsheim, in: 10th European Conference on Artificial Life (ECAL’09), 2011, pp. 442--449."},"year":"2011","publication_identifier":{"isbn":["9783642212826","9783642212833"],"issn":["0302-9743","1611-3349"]},"publication_status":"published"},{"publication_status":"published","publication_identifier":{"isbn":["9783642240157","9783642240164"],"issn":["0302-9743","1611-3349"]},"year":"2011","citation":{"chicago":"Lettmann, Theodor, Michael Baumann, Markus Eberling, and Thomas Kemmerich. “Modeling Agents and Agent Systems.” <i>Transactions on Computational Collective Intelligence V</i>, 2011, 157–81. <a href=\"https://doi.org/10.1007/978-3-642-24016-4_9\">https://doi.org/10.1007/978-3-642-24016-4_9</a>.","ieee":"T. Lettmann, M. Baumann, M. Eberling, and T. Kemmerich, “Modeling Agents and Agent Systems,” <i>Transactions on Computational Collective Intelligence V</i>, pp. 157–181, 2011.","ama":"Lettmann T, Baumann M, Eberling M, Kemmerich T. Modeling Agents and Agent Systems. <i>Transactions on Computational Collective Intelligence V</i>. 2011:157-181. doi:<a href=\"https://doi.org/10.1007/978-3-642-24016-4_9\">10.1007/978-3-642-24016-4_9</a>","apa":"Lettmann, T., Baumann, M., Eberling, M., &#38; Kemmerich, T. (2011). Modeling Agents and Agent Systems. <i>Transactions on Computational Collective Intelligence V</i>, 157–181. <a href=\"https://doi.org/10.1007/978-3-642-24016-4_9\">https://doi.org/10.1007/978-3-642-24016-4_9</a>","bibtex":"@article{Lettmann_Baumann_Eberling_Kemmerich_2011, title={Modeling Agents and Agent Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-24016-4_9\">10.1007/978-3-642-24016-4_9</a>}, journal={Transactions on Computational Collective Intelligence V}, publisher={Springer Berlin Heidelberg}, author={Lettmann, Theodor and Baumann, Michael and Eberling, Markus and Kemmerich, Thomas}, year={2011}, pages={157–181} }","short":"T. Lettmann, M. Baumann, M. Eberling, T. Kemmerich, Transactions on Computational Collective Intelligence V (2011) 157–181.","mla":"Lettmann, Theodor, et al. “Modeling Agents and Agent Systems.” <i>Transactions on Computational Collective Intelligence V</i>, Springer Berlin Heidelberg, 2011, pp. 157–81, doi:<a href=\"https://doi.org/10.1007/978-3-642-24016-4_9\">10.1007/978-3-642-24016-4_9</a>."},"page":"157-181","date_updated":"2022-01-06T06:59:10Z","publisher":"Springer Berlin Heidelberg","date_created":"2018-06-25T09:22:18Z","author":[{"first_name":"Theodor","id":"315","full_name":"Lettmann, Theodor","orcid":"0000-0001-5859-2457","last_name":"Lettmann"},{"full_name":"Baumann, Michael","last_name":"Baumann","first_name":"Michael"},{"last_name":"Eberling","full_name":"Eberling, Markus","first_name":"Markus"},{"first_name":"Thomas","full_name":"Kemmerich, Thomas","last_name":"Kemmerich"}],"title":"Modeling Agents and Agent Systems","doi":"10.1007/978-3-642-24016-4_9","type":"journal_article","publication":"Transactions on Computational Collective Intelligence V","status":"public","_id":"3332","user_id":"315","language":[{"iso":"eng"}]},{"user_id":"3902","department":[{"_id":"63"}],"_id":"20709","language":[{"iso":"eng"}],"type":"book_chapter","publication":"SOFSEM 2011: Theory and Practice of Computer Science","status":"public","date_created":"2020-12-12T11:15:30Z","author":[{"first_name":"Andreas","last_name":"Cord-Landwehr","full_name":"Cord-Landwehr, Andreas"},{"first_name":"Bastian","last_name":"Degener","full_name":"Degener, Bastian"},{"first_name":"Matthias","last_name":"Fischer","full_name":"Fischer, Matthias"},{"last_name":"Hüllmann","full_name":"Hüllmann, Martina","first_name":"Martina"},{"first_name":"Barbara","full_name":"Kempkes, Barbara","last_name":"Kempkes"},{"full_name":"Klaas, Alexander","last_name":"Klaas","first_name":"Alexander"},{"full_name":"Kling, Peter","last_name":"Kling","first_name":"Peter"},{"first_name":"Sven","last_name":"Kurras","full_name":"Kurras, Sven"},{"first_name":"Marcus","full_name":"Märtens, Marcus","last_name":"Märtens"},{"first_name":"Friedhelm Meyer","last_name":"auf der Heide","full_name":"auf der Heide, Friedhelm Meyer"},{"last_name":"Raupach","full_name":"Raupach, Christoph","first_name":"Christoph"},{"first_name":"Kamil","last_name":"Swierkot","full_name":"Swierkot, Kamil"},{"last_name":"Warner","full_name":"Warner, Daniel","id":"3902","first_name":"Daniel"},{"first_name":"Christoph","full_name":"Weddemann, Christoph","last_name":"Weddemann"},{"last_name":"Wonisch","full_name":"Wonisch, Daniel","first_name":"Daniel"}],"date_updated":"2022-01-06T06:54:33Z","doi":"10.1007/978-3-642-18381-2_15","title":"Collisionless Gathering of Robots with an Extent","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642183805","9783642183812"]},"citation":{"chicago":"Cord-Landwehr, Andreas, Bastian Degener, Matthias Fischer, Martina Hüllmann, Barbara Kempkes, Alexander Klaas, Peter Kling, et al. “Collisionless Gathering of Robots with an Extent.” In <i>SOFSEM 2011: Theory and Practice of Computer Science</i>. Berlin, Heidelberg, 2011. <a href=\"https://doi.org/10.1007/978-3-642-18381-2_15\">https://doi.org/10.1007/978-3-642-18381-2_15</a>.","ieee":"A. Cord-Landwehr <i>et al.</i>, “Collisionless Gathering of Robots with an Extent,” in <i>SOFSEM 2011: Theory and Practice of Computer Science</i>, Berlin, Heidelberg, 2011.","ama":"Cord-Landwehr A, Degener B, Fischer M, et al. Collisionless Gathering of Robots with an Extent. In: <i>SOFSEM 2011: Theory and Practice of Computer Science</i>. Berlin, Heidelberg; 2011. doi:<a href=\"https://doi.org/10.1007/978-3-642-18381-2_15\">10.1007/978-3-642-18381-2_15</a>","short":"A. Cord-Landwehr, B. Degener, M. Fischer, M. Hüllmann, B. Kempkes, A. Klaas, P. Kling, S. Kurras, M. Märtens, F.M. auf der Heide, C. Raupach, K. Swierkot, D. Warner, C. Weddemann, D. Wonisch, in: SOFSEM 2011: Theory and Practice of Computer Science, Berlin, Heidelberg, 2011.","bibtex":"@inbook{Cord-Landwehr_Degener_Fischer_Hüllmann_Kempkes_Klaas_Kling_Kurras_Märtens_auf der Heide_et al._2011, place={Berlin, Heidelberg}, title={Collisionless Gathering of Robots with an Extent}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-18381-2_15\">10.1007/978-3-642-18381-2_15</a>}, booktitle={SOFSEM 2011: Theory and Practice of Computer Science}, author={Cord-Landwehr, Andreas and Degener, Bastian and Fischer, Matthias and Hüllmann, Martina and Kempkes, Barbara and Klaas, Alexander and Kling, Peter and Kurras, Sven and Märtens, Marcus and auf der Heide, Friedhelm Meyer and et al.}, year={2011} }","mla":"Cord-Landwehr, Andreas, et al. “Collisionless Gathering of Robots with an Extent.” <i>SOFSEM 2011: Theory and Practice of Computer Science</i>, 2011, doi:<a href=\"https://doi.org/10.1007/978-3-642-18381-2_15\">10.1007/978-3-642-18381-2_15</a>.","apa":"Cord-Landwehr, A., Degener, B., Fischer, M., Hüllmann, M., Kempkes, B., Klaas, A., … Wonisch, D. (2011). Collisionless Gathering of Robots with an Extent. In <i>SOFSEM 2011: Theory and Practice of Computer Science</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-18381-2_15\">https://doi.org/10.1007/978-3-642-18381-2_15</a>"},"place":"Berlin, Heidelberg","year":"2011"},{"user_id":"3902","department":[{"_id":"63"}],"_id":"20710","language":[{"iso":"eng"}],"type":"book_chapter","publication":"Automata, Languages and Programming","status":"public","author":[{"first_name":"Andreas","full_name":"Cord-Landwehr, Andreas","last_name":"Cord-Landwehr"},{"full_name":"Degener, Bastian","last_name":"Degener","first_name":"Bastian"},{"full_name":"Fischer, Matthias","last_name":"Fischer","first_name":"Matthias"},{"last_name":"Hüllmann","full_name":"Hüllmann, Martina","first_name":"Martina"},{"first_name":"Barbara","last_name":"Kempkes","full_name":"Kempkes, Barbara"},{"first_name":"Alexander","last_name":"Klaas","full_name":"Klaas, Alexander"},{"first_name":"Peter","full_name":"Kling, Peter","last_name":"Kling"},{"full_name":"Kurras, Sven","last_name":"Kurras","first_name":"Sven"},{"first_name":"Marcus","last_name":"Märtens","full_name":"Märtens, Marcus"},{"full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"},{"first_name":"Christoph","last_name":"Raupach","full_name":"Raupach, Christoph"},{"first_name":"Kamil","full_name":"Swierkot, Kamil","last_name":"Swierkot"},{"first_name":"Daniel","last_name":"Warner","full_name":"Warner, Daniel","id":"3902"},{"first_name":"Christoph","last_name":"Weddemann","full_name":"Weddemann, Christoph"},{"first_name":"Daniel","last_name":"Wonisch","full_name":"Wonisch, Daniel"}],"date_created":"2020-12-12T12:22:41Z","date_updated":"2022-01-06T06:54:33Z","doi":"10.1007/978-3-642-22012-8_52","title":"A New Approach for Analyzing Convergence Algorithms for Mobile Robots","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642220111","9783642220128"]},"citation":{"mla":"Cord-Landwehr, Andreas, et al. “A New Approach for Analyzing Convergence Algorithms for Mobile Robots.” <i>Automata, Languages and Programming</i>, 2011, doi:<a href=\"https://doi.org/10.1007/978-3-642-22012-8_52\">10.1007/978-3-642-22012-8_52</a>.","bibtex":"@inbook{Cord-Landwehr_Degener_Fischer_Hüllmann_Kempkes_Klaas_Kling_Kurras_Märtens_Meyer auf der Heide_et al._2011, place={Berlin, Heidelberg}, title={A New Approach for Analyzing Convergence Algorithms for Mobile Robots}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-22012-8_52\">10.1007/978-3-642-22012-8_52</a>}, booktitle={Automata, Languages and Programming}, author={Cord-Landwehr, Andreas and Degener, Bastian and Fischer, Matthias and Hüllmann, Martina and Kempkes, Barbara and Klaas, Alexander and Kling, Peter and Kurras, Sven and Märtens, Marcus and Meyer auf der Heide, Friedhelm and et al.}, year={2011} }","short":"A. Cord-Landwehr, B. Degener, M. Fischer, M. Hüllmann, B. Kempkes, A. Klaas, P. Kling, S. Kurras, M. Märtens, F. Meyer auf der Heide, C. Raupach, K. Swierkot, D. Warner, C. Weddemann, D. Wonisch, in: Automata, Languages and Programming, Berlin, Heidelberg, 2011.","apa":"Cord-Landwehr, A., Degener, B., Fischer, M., Hüllmann, M., Kempkes, B., Klaas, A., … Wonisch, D. (2011). A New Approach for Analyzing Convergence Algorithms for Mobile Robots. In <i>Automata, Languages and Programming</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-22012-8_52\">https://doi.org/10.1007/978-3-642-22012-8_52</a>","chicago":"Cord-Landwehr, Andreas, Bastian Degener, Matthias Fischer, Martina Hüllmann, Barbara Kempkes, Alexander Klaas, Peter Kling, et al. “A New Approach for Analyzing Convergence Algorithms for Mobile Robots.” In <i>Automata, Languages and Programming</i>. Berlin, Heidelberg, 2011. <a href=\"https://doi.org/10.1007/978-3-642-22012-8_52\">https://doi.org/10.1007/978-3-642-22012-8_52</a>.","ieee":"A. Cord-Landwehr <i>et al.</i>, “A New Approach for Analyzing Convergence Algorithms for Mobile Robots,” in <i>Automata, Languages and Programming</i>, Berlin, Heidelberg, 2011.","ama":"Cord-Landwehr A, Degener B, Fischer M, et al. A New Approach for Analyzing Convergence Algorithms for Mobile Robots. In: <i>Automata, Languages and Programming</i>. Berlin, Heidelberg; 2011. doi:<a href=\"https://doi.org/10.1007/978-3-642-22012-8_52\">10.1007/978-3-642-22012-8_52</a>"},"place":"Berlin, Heidelberg","year":"2011"},{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642216046","9783642216053"]},"citation":{"ieee":"K. Nebe, F. Klompmaker, H. Jung, and H. G. Fischer, “Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction,” in <i>Human-Computer Interaction. Interaction Techniques and Environments.</i>, vol. 6762, J. A. Jacko, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 100–109.","chicago":"Nebe, Karsten, Florian Klompmaker, Helge Jung, and Holger Gerhard Fischer. “Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction.” In <i>Human-Computer Interaction. Interaction Techniques and Environments.</i>, edited by Julie Anne Jacko, 6762:100–109. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. <a href=\"https://doi.org/10.1007/978-3-642-21605-3_11\">https://doi.org/10.1007/978-3-642-21605-3_11</a>.","ama":"Nebe K, Klompmaker F, Jung H, Fischer HG. Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction. In: Jacko JA, ed. <i>Human-Computer Interaction. Interaction Techniques and Environments.</i> Vol 6762. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011:100-109. doi:<a href=\"https://doi.org/10.1007/978-3-642-21605-3_11\">10.1007/978-3-642-21605-3_11</a>","apa":"Nebe, K., Klompmaker, F., Jung, H., &#38; Fischer, H. G. (2011). Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction. In J. A. Jacko (Ed.), <i>Human-Computer Interaction. Interaction Techniques and Environments.</i> (Vol. 6762, pp. 100–109). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-21605-3_11\">https://doi.org/10.1007/978-3-642-21605-3_11</a>","bibtex":"@inbook{Nebe_Klompmaker_Jung_Fischer_2011, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction}, volume={6762}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-21605-3_11\">10.1007/978-3-642-21605-3_11</a>}, booktitle={Human-Computer Interaction. Interaction Techniques and Environments.}, publisher={Springer Berlin Heidelberg}, author={Nebe, Karsten and Klompmaker, Florian and Jung, Helge and Fischer, Holger Gerhard}, editor={Jacko, Julie AnneEditor}, year={2011}, pages={100–109}, collection={Lecture Notes in Computer Science} }","short":"K. Nebe, F. Klompmaker, H. Jung, H.G. Fischer, in: J.A. Jacko (Ed.), Human-Computer Interaction. Interaction Techniques and Environments., Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 100–109.","mla":"Nebe, Karsten, et al. “Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction.” <i>Human-Computer Interaction. Interaction Techniques and Environments.</i>, edited by Julie Anne Jacko, vol. 6762, Springer Berlin Heidelberg, 2011, pp. 100–09, doi:<a href=\"https://doi.org/10.1007/978-3-642-21605-3_11\">10.1007/978-3-642-21605-3_11</a>."},"page":"100-109","intvolume":"      6762","place":"Berlin, Heidelberg","author":[{"last_name":"Nebe","full_name":"Nebe, Karsten","first_name":"Karsten"},{"first_name":"Florian","last_name":"Klompmaker","full_name":"Klompmaker, Florian"},{"full_name":"Jung, Helge","last_name":"Jung","first_name":"Helge"},{"first_name":"Holger Gerhard","last_name":"Fischer","id":"30457","full_name":"Fischer, Holger Gerhard"}],"volume":6762,"date_updated":"2022-01-06T07:03:00Z","conference":{"location":"Orlando, USA","end_date":"2011-07-14","start_date":"2011-07-09","name":"International Conference on Interaction Techniques and Environments as part of HCI International 2011"},"doi":"10.1007/978-3-642-21605-3_11","type":"book_chapter","status":"public","editor":[{"full_name":"Jacko, Julie Anne","last_name":"Jacko","first_name":"Julie Anne"}],"user_id":"30457","series_title":"Lecture Notes in Computer Science","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"_id":"6293","year":"2011","date_created":"2018-12-18T12:55:26Z","publisher":"Springer Berlin Heidelberg","title":"Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction","publication":"Human-Computer Interaction. Interaction Techniques and Environments.","language":[{"iso":"eng"}]}]
