[{"publication":"Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)","type":"conference","status":"public","abstract":[{"text":"The dynamic page migration problem citedynamic-page-migration is defined in <br>a distributed network of $n$ mobile nodes sharing one indivisible memory page <br>of size $D$. During runtime, the nodes can both access a unit of data from<br>the page and move with a constant speed, thus changing the costs of communication.<br>The problem is to compute <em> online</em> a schedule of page movements<br>to minimize the total communication cost.<br><br>In this paper we construct and analyze the first deterministic algorithm for this problem. <br>We prove that it achieves an (up to a constant factor) optimal competitive ratio <br>$O(n cdot sqrtD)$. We show that the randomization of this algorithm <br>improves this ratio to $O(sqrtD cdot log n)$ (against an oblivious adversary). <br>This substantially improves an $O(n cdot sqrtD)$ upper bound from citedynamic-page-migration.<br>We also give an almost matching lower bound of $Omega(sqrtD cdot sqrtlog n)$ for this problem.","lang":"eng"}],"department":[{"_id":"63"}],"user_id":"15415","series_title":"Lecture Notes in Computer Science","_id":"18925","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9783540249986","9783540318569"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"365-376","citation":{"short":"M. Bienkowski, M. Dynia, M. Korzeniowski, in: Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS), 2005, pp. 365–376.","bibtex":"@inproceedings{Bienkowski_Dynia_Korzeniowski_2005, series={Lecture Notes in Computer Science}, title={Improved Algorithms for Dynamic Page Migration}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">10.1007/978-3-540-31856-9_30</a>}, booktitle={Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)}, author={Bienkowski, Marcin and Dynia, Miroslaw and Korzeniowski, Miroslaw}, year={2005}, pages={365–376}, collection={Lecture Notes in Computer Science} }","mla":"Bienkowski, Marcin, et al. “Improved Algorithms for Dynamic Page Migration.” <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i>, 2005, pp. 365–76, doi:<a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">10.1007/978-3-540-31856-9_30</a>.","apa":"Bienkowski, M., Dynia, M., &#38; Korzeniowski, M. (2005). Improved Algorithms for Dynamic Page Migration. In <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i> (pp. 365–376). <a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">https://doi.org/10.1007/978-3-540-31856-9_30</a>","ama":"Bienkowski M, Dynia M, Korzeniowski M. Improved Algorithms for Dynamic Page Migration. In: <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i>. Lecture Notes in Computer Science. ; 2005:365-376. doi:<a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">10.1007/978-3-540-31856-9_30</a>","ieee":"M. Bienkowski, M. Dynia, and M. Korzeniowski, “Improved Algorithms for Dynamic Page Migration,” in <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i>, 2005, pp. 365–376.","chicago":"Bienkowski, Marcin, Miroslaw Dynia, and Miroslaw Korzeniowski. “Improved Algorithms for Dynamic Page Migration.” In <i>Proc. of the 22nd Symposium on Theoretical Aspects of Computer Science (STACS)</i>, 365–76. Lecture Notes in Computer Science, 2005. <a href=\"https://doi.org/10.1007/978-3-540-31856-9_30\">https://doi.org/10.1007/978-3-540-31856-9_30</a>."},"year":"2005","author":[{"first_name":"Marcin","full_name":"Bienkowski, Marcin","last_name":"Bienkowski"},{"first_name":"Miroslaw","full_name":"Dynia, Miroslaw","last_name":"Dynia"},{"first_name":"Miroslaw","last_name":"Korzeniowski","full_name":"Korzeniowski, Miroslaw"}],"date_created":"2020-09-03T10:01:03Z","date_updated":"2022-01-06T06:53:54Z","doi":"10.1007/978-3-540-31856-9_30","title":"Improved Algorithms for Dynamic Page Migration"},{"title":"On Approximating Real-World Halting Problems","doi":"10.1007/11537311_40","date_updated":"2022-01-06T06:53:24Z","author":[{"last_name":"Köhler","full_name":"Köhler, Sven","first_name":"Sven"},{"last_name":"Schindelhauer","full_name":"Schindelhauer, Christian","first_name":"Christian"},{"first_name":"Martin","last_name":"Ziegler","full_name":"Ziegler, Martin"}],"date_created":"2020-08-14T13:44:48Z","year":"2005","place":"Berlin, Heidelberg","citation":{"short":"S. Köhler, C. Schindelhauer, M. Ziegler, in: Fundamentals of Computation Theory, Berlin, Heidelberg, 2005.","bibtex":"@inbook{Köhler_Schindelhauer_Ziegler_2005, place={Berlin, Heidelberg}, title={On Approximating Real-World Halting Problems}, DOI={<a href=\"https://doi.org/10.1007/11537311_40\">10.1007/11537311_40</a>}, booktitle={Fundamentals of Computation Theory}, author={Köhler, Sven and Schindelhauer, Christian and Ziegler, Martin}, year={2005} }","mla":"Köhler, Sven, et al. “On Approximating Real-World Halting Problems.” <i>Fundamentals of Computation Theory</i>, 2005, doi:<a href=\"https://doi.org/10.1007/11537311_40\">10.1007/11537311_40</a>.","apa":"Köhler, S., Schindelhauer, C., &#38; Ziegler, M. (2005). On Approximating Real-World Halting Problems. In <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11537311_40\">https://doi.org/10.1007/11537311_40</a>","ama":"Köhler S, Schindelhauer C, Ziegler M. On Approximating Real-World Halting Problems. In: <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg; 2005. doi:<a href=\"https://doi.org/10.1007/11537311_40\">10.1007/11537311_40</a>","ieee":"S. Köhler, C. Schindelhauer, and M. Ziegler, “On Approximating Real-World Halting Problems,” in <i>Fundamentals of Computation Theory</i>, Berlin, Heidelberg, 2005.","chicago":"Köhler, Sven, Christian Schindelhauer, and Martin Ziegler. “On Approximating Real-World Halting Problems.” In <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11537311_40\">https://doi.org/10.1007/11537311_40</a>."},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540281931","9783540318736"]},"publication_status":"published","language":[{"iso":"eng"}],"_id":"17988","department":[{"_id":"63"}],"user_id":"15415","status":"public","publication":"Fundamentals of Computation Theory","type":"book_chapter"},{"status":"public","type":"book_chapter","publication":"Fundamentals of Computation Theory","language":[{"iso":"eng"}],"_id":"17989","user_id":"15415","department":[{"_id":"63"}],"place":"Berlin, Heidelberg","year":"2005","citation":{"chicago":"Meer, Klaus, and Martin Ziegler. “An Explicit Solution to Post’s Problem over the Reals.” In <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11537311_41\">https://doi.org/10.1007/11537311_41</a>.","ieee":"K. Meer and M. Ziegler, “An Explicit Solution to Post’s Problem over the Reals,” in <i>Fundamentals of Computation Theory</i>, Berlin, Heidelberg, 2005.","ama":"Meer K, Ziegler M. An Explicit Solution to Post’s Problem over the Reals. In: <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg; 2005. doi:<a href=\"https://doi.org/10.1007/11537311_41\">10.1007/11537311_41</a>","apa":"Meer, K., &#38; Ziegler, M. (2005). An Explicit Solution to Post’s Problem over the Reals. In <i>Fundamentals of Computation Theory</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11537311_41\">https://doi.org/10.1007/11537311_41</a>","short":"K. Meer, M. Ziegler, in: Fundamentals of Computation Theory, Berlin, Heidelberg, 2005.","mla":"Meer, Klaus, and Martin Ziegler. “An Explicit Solution to Post’s Problem over the Reals.” <i>Fundamentals of Computation Theory</i>, 2005, doi:<a href=\"https://doi.org/10.1007/11537311_41\">10.1007/11537311_41</a>.","bibtex":"@inbook{Meer_Ziegler_2005, place={Berlin, Heidelberg}, title={An Explicit Solution to Post’s Problem over the Reals}, DOI={<a href=\"https://doi.org/10.1007/11537311_41\">10.1007/11537311_41</a>}, booktitle={Fundamentals of Computation Theory}, author={Meer, Klaus and Ziegler, Martin}, year={2005} }"},"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540281931","9783540318736"]},"title":"An Explicit Solution to Post’s Problem over the Reals","doi":"10.1007/11537311_41","date_updated":"2022-01-06T06:53:24Z","date_created":"2020-08-14T13:46:23Z","author":[{"last_name":"Meer","full_name":"Meer, Klaus","first_name":"Klaus"},{"first_name":"Martin","last_name":"Ziegler","full_name":"Ziegler, Martin"}]},{"publisher":"Springer","date_updated":"2022-01-06T06:53:28Z","author":[{"first_name":"Martin","last_name":"Ziegler","full_name":"Ziegler, Martin"}],"date_created":"2020-08-25T12:38:49Z","volume":3526,"title":"Computability and Continuity on the Real Arithmetic Hierarchy and the Power of Type-2 Nondeterminism","doi":"10.1007/11494645_68","publication_status":"published","publication_identifier":{"isbn":["9783540261797","9783540322665"],"issn":["0302-9743","1611-3349"]},"year":"2005","citation":{"bibtex":"@inproceedings{Ziegler_2005, title={Computability and Continuity on the Real Arithmetic Hierarchy and the Power of Type-2 Nondeterminism}, volume={3526}, DOI={<a href=\"https://doi.org/10.1007/11494645_68\">10.1007/11494645_68</a>}, booktitle={Proc. CiE 2005: New Computational Paradigms}, publisher={Springer}, author={Ziegler, Martin}, year={2005}, pages={562–571} }","short":"M. Ziegler, in: Proc. CiE 2005: New Computational Paradigms, Springer, 2005, pp. 562–571.","mla":"Ziegler, Martin. “Computability and Continuity on the Real Arithmetic Hierarchy and the Power of Type-2 Nondeterminism.” <i>Proc. CiE 2005: New Computational Paradigms</i>, vol. 3526, Springer, 2005, pp. 562–71, doi:<a href=\"https://doi.org/10.1007/11494645_68\">10.1007/11494645_68</a>.","apa":"Ziegler, M. (2005). Computability and Continuity on the Real Arithmetic Hierarchy and the Power of Type-2 Nondeterminism. In <i>Proc. CiE 2005: New Computational Paradigms</i> (Vol. 3526, pp. 562–571). Springer. <a href=\"https://doi.org/10.1007/11494645_68\">https://doi.org/10.1007/11494645_68</a>","ama":"Ziegler M. Computability and Continuity on the Real Arithmetic Hierarchy and the Power of Type-2 Nondeterminism. In: <i>Proc. CiE 2005: New Computational Paradigms</i>. Vol 3526. Springer; 2005:562-571. doi:<a href=\"https://doi.org/10.1007/11494645_68\">10.1007/11494645_68</a>","chicago":"Ziegler, Martin. “Computability and Continuity on the Real Arithmetic Hierarchy and the Power of Type-2 Nondeterminism.” In <i>Proc. CiE 2005: New Computational Paradigms</i>, 3526:562–71. Springer, 2005. <a href=\"https://doi.org/10.1007/11494645_68\">https://doi.org/10.1007/11494645_68</a>.","ieee":"M. Ziegler, “Computability and Continuity on the Real Arithmetic Hierarchy and the Power of Type-2 Nondeterminism,” in <i>Proc. CiE 2005: New Computational Paradigms</i>, 2005, vol. 3526, pp. 562–571."},"intvolume":"      3526","page":"562-571","_id":"18280","user_id":"15415","department":[{"_id":"63"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Proc. CiE 2005: New Computational Paradigms","abstract":[{"text":"The sometimes so-called Main Theorem of Recursive Analysis implies that any computable real function is necessarily continuous. We consider three relaxations of this common notion of real computability for the purpose of treating also discontinuous functions f:R->R:<br>*) non-deterministic computation;<br>*) relativized computation, specifically given access to oracles like 0' or 0'';<br>*) encoding input x and/or output y=f(x) in weaker ways according to the Real Arithmetic Hierarchy.<br>It turns out that, among these approaches, only the first one provides the required power.","lang":"eng"}],"status":"public"},{"language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"}],"_id":"16468","status":"public","type":"book_chapter","publication":"Peer-to-Peer Systems IV","doi":"10.1007/11558989_20","title":"Dynamic Load Balancing in Distributed Hash Tables","date_created":"2020-04-08T09:18:56Z","author":[{"last_name":"Bienkowski","full_name":"Bienkowski, Marcin","first_name":"Marcin"},{"first_name":"Miroslaw","last_name":"Korzeniowski","full_name":"Korzeniowski, Miroslaw"},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_updated":"2022-01-06T06:52:50Z","citation":{"apa":"Bienkowski, M., Korzeniowski, M., &#38; Meyer auf der Heide, F. (2005). Dynamic Load Balancing in Distributed Hash Tables. In <i>Peer-to-Peer Systems IV</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11558989_20\">https://doi.org/10.1007/11558989_20</a>","short":"M. Bienkowski, M. Korzeniowski, F. Meyer auf der Heide, in: Peer-to-Peer Systems IV, Berlin, Heidelberg, 2005.","mla":"Bienkowski, Marcin, et al. “Dynamic Load Balancing in Distributed Hash Tables.” <i>Peer-to-Peer Systems IV</i>, 2005, doi:<a href=\"https://doi.org/10.1007/11558989_20\">10.1007/11558989_20</a>.","bibtex":"@inbook{Bienkowski_Korzeniowski_Meyer auf der Heide_2005, place={Berlin, Heidelberg}, title={Dynamic Load Balancing in Distributed Hash Tables}, DOI={<a href=\"https://doi.org/10.1007/11558989_20\">10.1007/11558989_20</a>}, booktitle={Peer-to-Peer Systems IV}, author={Bienkowski, Marcin and Korzeniowski, Miroslaw and Meyer auf der Heide, Friedhelm}, year={2005} }","chicago":"Bienkowski, Marcin, Miroslaw Korzeniowski, and Friedhelm Meyer auf der Heide. “Dynamic Load Balancing in Distributed Hash Tables.” In <i>Peer-to-Peer Systems IV</i>. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11558989_20\">https://doi.org/10.1007/11558989_20</a>.","ieee":"M. Bienkowski, M. Korzeniowski, and F. Meyer auf der Heide, “Dynamic Load Balancing in Distributed Hash Tables,” in <i>Peer-to-Peer Systems IV</i>, Berlin, Heidelberg, 2005.","ama":"Bienkowski M, Korzeniowski M, Meyer auf der Heide F. Dynamic Load Balancing in Distributed Hash Tables. In: <i>Peer-to-Peer Systems IV</i>. Berlin, Heidelberg; 2005. doi:<a href=\"https://doi.org/10.1007/11558989_20\">10.1007/11558989_20</a>"},"place":"Berlin, Heidelberg","year":"2005","publication_status":"published","publication_identifier":{"isbn":["9783540290681","9783540319061"],"issn":["0302-9743","1611-3349"]}},{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540287025","9783540318675"]},"publication_status":"published","place":"Berlin, Heidelberg","year":"2005","citation":{"ama":"Bienkowski M, Meyer auf der Heide F. Page Migration in Dynamic Networks. In: <i>Mathematical Foundations of Computer Science 2005</i>. Berlin, Heidelberg; 2005. doi:<a href=\"https://doi.org/10.1007/11549345_1\">10.1007/11549345_1</a>","ieee":"M. Bienkowski and F. Meyer auf der Heide, “Page Migration in Dynamic Networks,” in <i>Mathematical Foundations of Computer Science 2005</i>, Berlin, Heidelberg, 2005.","chicago":"Bienkowski, Marcin, and Friedhelm Meyer auf der Heide. “Page Migration in Dynamic Networks.” In <i>Mathematical Foundations of Computer Science 2005</i>. Berlin, Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11549345_1\">https://doi.org/10.1007/11549345_1</a>.","apa":"Bienkowski, M., &#38; Meyer auf der Heide, F. (2005). Page Migration in Dynamic Networks. In <i>Mathematical Foundations of Computer Science 2005</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/11549345_1\">https://doi.org/10.1007/11549345_1</a>","bibtex":"@inbook{Bienkowski_Meyer auf der Heide_2005, place={Berlin, Heidelberg}, title={Page Migration in Dynamic Networks}, DOI={<a href=\"https://doi.org/10.1007/11549345_1\">10.1007/11549345_1</a>}, booktitle={Mathematical Foundations of Computer Science 2005}, author={Bienkowski, Marcin and Meyer auf der Heide, Friedhelm}, year={2005} }","mla":"Bienkowski, Marcin, and Friedhelm Meyer auf der Heide. “Page Migration in Dynamic Networks.” <i>Mathematical Foundations of Computer Science 2005</i>, 2005, doi:<a href=\"https://doi.org/10.1007/11549345_1\">10.1007/11549345_1</a>.","short":"M. Bienkowski, F. Meyer auf der Heide, in: Mathematical Foundations of Computer Science 2005, Berlin, Heidelberg, 2005."},"date_updated":"2022-01-06T06:52:50Z","date_created":"2020-04-08T09:23:36Z","author":[{"full_name":"Bienkowski, Marcin","last_name":"Bienkowski","first_name":"Marcin"},{"first_name":"Friedhelm","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"}],"title":"Page Migration in Dynamic Networks","doi":"10.1007/11549345_1","publication":"Mathematical Foundations of Computer Science 2005","type":"book_chapter","status":"public","_id":"16469","department":[{"_id":"63"}],"user_id":"15415","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"16470","user_id":"15415","department":[{"_id":"63"}],"abstract":[{"lang":"eng","text":"We present a web computing library (PUBWCL) in Java that allows to execute strongly coupled, massively parallel algorithms in the bulk-synchronous (BSP) style on PCs distributed over the internet whose owners are willing to donate their unused computation power.\r\nPUBWCL is realized as a peer-to-peer system and features migration and restoration of BSP processes executed on it.\r\nThe use of Java guarantees a high level of security and makes PUBWCL platform independent. In order to estimate the loss of efficiency inherent in such a Java-based system, we have compared it to our C-based PUB-Library.\r\n"}],"status":"public","type":"conference","publication":"Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)","title":"A Web Computing Environment for Parallel Algorithms in Java","doi":"10.1007/11752578_96","date_updated":"2022-01-06T06:52:50Z","date_created":"2020-04-08T09:25:44Z","author":[{"first_name":"Olaf","full_name":"Bonorden, Olaf","last_name":"Bonorden"},{"full_name":"Gehweiler, Joachim","last_name":"Gehweiler","first_name":"Joachim"},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"year":"2005","citation":{"apa":"Bonorden, O., Gehweiler, J., &#38; Meyer auf der Heide, F. (2005). A Web Computing Environment for Parallel Algorithms in Java. In <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i> (pp. 801–808). <a href=\"https://doi.org/10.1007/11752578_96\">https://doi.org/10.1007/11752578_96</a>","short":"O. Bonorden, J. Gehweiler, F. Meyer auf der Heide, in: Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM), 2005, pp. 801–808.","mla":"Bonorden, Olaf, et al. “A Web Computing Environment for Parallel Algorithms in Java.” <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 2005, pp. 801–08, doi:<a href=\"https://doi.org/10.1007/11752578_96\">10.1007/11752578_96</a>.","bibtex":"@inproceedings{Bonorden_Gehweiler_Meyer auf der Heide_2005, title={A Web Computing Environment for Parallel Algorithms in Java}, DOI={<a href=\"https://doi.org/10.1007/11752578_96\">10.1007/11752578_96</a>}, booktitle={Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)}, author={Bonorden, Olaf and Gehweiler, Joachim and Meyer auf der Heide, Friedhelm}, year={2005}, pages={801–808} }","ama":"Bonorden O, Gehweiler J, Meyer auf der Heide F. A Web Computing Environment for Parallel Algorithms in Java. In: <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>. ; 2005:801-808. doi:<a href=\"https://doi.org/10.1007/11752578_96\">10.1007/11752578_96</a>","ieee":"O. Bonorden, J. Gehweiler, and F. Meyer auf der Heide, “A Web Computing Environment for Parallel Algorithms in Java,” in <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 2005, pp. 801–808.","chicago":"Bonorden, Olaf, Joachim Gehweiler, and Friedhelm Meyer auf der Heide. “A Web Computing Environment for Parallel Algorithms in Java.” In <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 801–8, 2005. <a href=\"https://doi.org/10.1007/11752578_96\">https://doi.org/10.1007/11752578_96</a>."},"page":"801-808","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540341413","9783540341420"]}},{"citation":{"ama":"Bonorden O, Gehweiler J, Meyer auf der Heide F. Load Balancing Strategies in a Web Computing Environment. In: <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>. ; 2005:839-846. doi:<a href=\"https://doi.org/10.1007/11752578_101\">10.1007/11752578_101</a>","chicago":"Bonorden, Olaf, Joachim Gehweiler, and Friedhelm Meyer auf der Heide. “Load Balancing Strategies in a Web Computing Environment.” In <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 839–46, 2005. <a href=\"https://doi.org/10.1007/11752578_101\">https://doi.org/10.1007/11752578_101</a>.","ieee":"O. Bonorden, J. Gehweiler, and F. Meyer auf der Heide, “Load Balancing Strategies in a Web Computing Environment,” in <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 2005, pp. 839–846.","short":"O. Bonorden, J. Gehweiler, F. Meyer auf der Heide, in: Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM), 2005, pp. 839–846.","bibtex":"@inproceedings{Bonorden_Gehweiler_Meyer auf der Heide_2005, title={Load Balancing Strategies in a Web Computing Environment}, DOI={<a href=\"https://doi.org/10.1007/11752578_101\">10.1007/11752578_101</a>}, booktitle={Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)}, author={Bonorden, Olaf and Gehweiler, Joachim and Meyer auf der Heide, Friedhelm}, year={2005}, pages={839–846} }","mla":"Bonorden, Olaf, et al. “Load Balancing Strategies in a Web Computing Environment.” <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 2005, pp. 839–46, doi:<a href=\"https://doi.org/10.1007/11752578_101\">10.1007/11752578_101</a>.","apa":"Bonorden, O., Gehweiler, J., &#38; Meyer auf der Heide, F. (2005). Load Balancing Strategies in a Web Computing Environment. In <i>Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i> (pp. 839–846). <a href=\"https://doi.org/10.1007/11752578_101\">https://doi.org/10.1007/11752578_101</a>"},"page":"839-846","year":"2005","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540341413","9783540341420"]},"doi":"10.1007/11752578_101","title":"Load Balancing Strategies in a Web Computing Environment","date_created":"2020-04-08T09:30:12Z","author":[{"first_name":"Olaf","last_name":"Bonorden","full_name":"Bonorden, Olaf"},{"full_name":"Gehweiler, Joachim","last_name":"Gehweiler","first_name":"Joachim"},{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_updated":"2022-01-06T06:52:50Z","status":"public","abstract":[{"lang":"eng","text":"We compare different load balancing strategies for Bulk-Synchronous Parallel (BSP) programs in a web computing environment. In order to handle the influence of the fluctuating available computation power, we classify the external work load.\r\n\r\nWe evaluate the load balancing algorithms using our web computing library for BSP programs in Java (PUBWCL). Thereby we simulated the external work load in order to have repeatable testing conditions.\r\n\r\nWith the best performing load balancing strategy we could save 39% of the execution time averaged and even up to 50% in particular cases."}],"type":"conference","publication":"Proceeedings of 6th International Conference on Parallel Processing and Applied Mathematics (PPAM)","language":[{"iso":"eng"}],"user_id":"15415","department":[{"_id":"63"}],"_id":"16471"},{"publication_identifier":{"isbn":["9783540287988","9783540319740"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2005","page":"143-154","citation":{"mla":"Böttcher, Stefan, and Rita Steinmetz. “Detecting Privacy Violations in Sensitive XML Databases.” <i>Secure Data Management, Second VLDB Workshop, SDM 2005</i>, Springer, 2005, pp. 143–54, doi:<a href=\"https://doi.org/10.1007/11552338_10\">10.1007/11552338_10</a>.","bibtex":"@inproceedings{Böttcher_Steinmetz_2005, title={Detecting Privacy Violations in Sensitive XML Databases}, DOI={<a href=\"https://doi.org/10.1007/11552338_10\">10.1007/11552338_10</a>}, booktitle={Secure Data Management, Second VLDB Workshop, SDM 2005}, publisher={Springer}, author={Böttcher, Stefan and Steinmetz, Rita}, year={2005}, pages={143–154} }","short":"S. Böttcher, R. Steinmetz, in: Secure Data Management, Second VLDB Workshop, SDM 2005, Springer, 2005, pp. 143–154.","apa":"Böttcher, S., &#38; Steinmetz, R. (2005). Detecting Privacy Violations in Sensitive XML Databases. In <i>Secure Data Management, Second VLDB Workshop, SDM 2005</i> (pp. 143–154). Springer. <a href=\"https://doi.org/10.1007/11552338_10\">https://doi.org/10.1007/11552338_10</a>","ama":"Böttcher S, Steinmetz R. Detecting Privacy Violations in Sensitive XML Databases. In: <i>Secure Data Management, Second VLDB Workshop, SDM 2005</i>. Springer; 2005:143-154. doi:<a href=\"https://doi.org/10.1007/11552338_10\">10.1007/11552338_10</a>","ieee":"S. Böttcher and R. Steinmetz, “Detecting Privacy Violations in Sensitive XML Databases,” in <i>Secure Data Management, Second VLDB Workshop, SDM 2005</i>, 2005, pp. 143–154.","chicago":"Böttcher, Stefan, and Rita Steinmetz. “Detecting Privacy Violations in Sensitive XML Databases.” In <i>Secure Data Management, Second VLDB Workshop, SDM 2005</i>, 143–54. Springer, 2005. <a href=\"https://doi.org/10.1007/11552338_10\">https://doi.org/10.1007/11552338_10</a>."},"publisher":"Springer","date_updated":"2022-01-06T06:52:16Z","author":[{"first_name":"Stefan","last_name":"Böttcher","full_name":"Böttcher, Stefan","id":"624"},{"last_name":"Steinmetz","full_name":"Steinmetz, Rita","id":"14961","first_name":"Rita"}],"date_created":"2019-11-22T09:27:24Z","title":"Detecting Privacy Violations in Sensitive XML Databases","doi":"10.1007/11552338_10","publication":"Secure Data Management, Second VLDB Workshop, SDM 2005","type":"conference","status":"public","_id":"15156","department":[{"_id":"69"}],"user_id":"14961","language":[{"iso":"eng"}]},{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540230922","9783540302179"]},"publication_status":"published","year":"2004","place":"Berlin, Heidelberg","citation":{"mla":"Briest, Patrick, et al. “The Ising Model: Simple Evolutionary Algorithms as Adaptation Schemes.” <i>Parallel Problem Solving from Nature - PPSN VIII</i>, 2004, doi:<a href=\"https://doi.org/10.1007/978-3-540-30217-9_4\">10.1007/978-3-540-30217-9_4</a>.","short":"P. Briest, D. Brockhoff, B. Degener, M. Englert, C. Gunia, O. Heering, T. Jansen, M. Leifhelm, K. Plociennik, H. Röglin, A. Schweer, D. Sudholt, S. Tannenbaum, I. Wegener, in: Parallel Problem Solving from Nature - PPSN VIII, Berlin, Heidelberg, 2004.","bibtex":"@inproceedings{Briest_Brockhoff_Degener_Englert_Gunia_Heering_Jansen_Leifhelm_Plociennik_Röglin_et al._2004, place={Berlin, Heidelberg}, title={The Ising Model: Simple Evolutionary Algorithms as Adaptation Schemes}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-30217-9_4\">10.1007/978-3-540-30217-9_4</a>}, booktitle={Parallel Problem Solving from Nature - PPSN VIII}, author={Briest, Patrick and Brockhoff, Dimo and Degener, Bastian and Englert, Matthias and Gunia, Christian and Heering, Oliver and Jansen, Thomas and Leifhelm, Michael and Plociennik, Kai and Röglin, Heiko and et al.}, year={2004} }","apa":"Briest, P., Brockhoff, D., Degener, B., Englert, M., Gunia, C., Heering, O., … Wegener, I. (2004). The Ising Model: Simple Evolutionary Algorithms as Adaptation Schemes. In <i>Parallel Problem Solving from Nature - PPSN VIII</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-30217-9_4\">https://doi.org/10.1007/978-3-540-30217-9_4</a>","ama":"Briest P, Brockhoff D, Degener B, et al. The Ising Model: Simple Evolutionary Algorithms as Adaptation Schemes. In: <i>Parallel Problem Solving from Nature - PPSN VIII</i>. Berlin, Heidelberg; 2004. doi:<a href=\"https://doi.org/10.1007/978-3-540-30217-9_4\">10.1007/978-3-540-30217-9_4</a>","ieee":"P. Briest <i>et al.</i>, “The Ising Model: Simple Evolutionary Algorithms as Adaptation Schemes,” in <i>Parallel Problem Solving from Nature - PPSN VIII</i>, 2004.","chicago":"Briest, Patrick, Dimo Brockhoff, Bastian Degener, Matthias Englert, Christian Gunia, Oliver Heering, Thomas Jansen, et al. “The Ising Model: Simple Evolutionary Algorithms as Adaptation Schemes.” In <i>Parallel Problem Solving from Nature - PPSN VIII</i>. Berlin, Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-30217-9_4\">https://doi.org/10.1007/978-3-540-30217-9_4</a>."},"date_updated":"2022-01-06T06:54:10Z","date_created":"2020-09-25T10:41:37Z","author":[{"first_name":"Patrick","last_name":"Briest","full_name":"Briest, Patrick"},{"full_name":"Brockhoff, Dimo","last_name":"Brockhoff","first_name":"Dimo"},{"first_name":"Bastian","full_name":"Degener, Bastian","last_name":"Degener"},{"last_name":"Englert","full_name":"Englert, Matthias","first_name":"Matthias"},{"last_name":"Gunia","full_name":"Gunia, Christian","first_name":"Christian"},{"first_name":"Oliver","last_name":"Heering","full_name":"Heering, Oliver"},{"last_name":"Jansen","full_name":"Jansen, Thomas","first_name":"Thomas"},{"first_name":"Michael","last_name":"Leifhelm","full_name":"Leifhelm, Michael"},{"first_name":"Kai","last_name":"Plociennik","full_name":"Plociennik, Kai"},{"full_name":"Röglin, Heiko","last_name":"Röglin","first_name":"Heiko"},{"full_name":"Schweer, Andrea","last_name":"Schweer","first_name":"Andrea"},{"first_name":"Dirk","last_name":"Sudholt","full_name":"Sudholt, Dirk"},{"first_name":"Stefan","full_name":"Tannenbaum, Stefan","last_name":"Tannenbaum"},{"last_name":"Wegener","full_name":"Wegener, Ingo","first_name":"Ingo"}],"title":"The Ising Model: Simple Evolutionary Algorithms as Adaptation Schemes","doi":"10.1007/978-3-540-30217-9_4","publication":"Parallel Problem Solving from Nature - PPSN VIII","type":"conference","status":"public","_id":"19692","department":[{"_id":"63"}],"user_id":"15415","language":[{"iso":"eng"}]},{"place":"Berlin, Heidelberg","year":"2004","page":"69-83","citation":{"apa":"Blömer, J., Guajardo, J., &#38; Krummel, V. (2004). Provably Secure Masking of AES. In <i>Selected Areas in Cryptography</i> (pp. 69–83). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">https://doi.org/10.1007/978-3-540-30564-4_5</a>","mla":"Blömer, Johannes, et al. “Provably Secure Masking of AES.” <i>Selected Areas in Cryptography</i>, Springer Berlin Heidelberg, 2004, pp. 69–83, doi:<a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">10.1007/978-3-540-30564-4_5</a>.","short":"J. Blömer, J. Guajardo, V. Krummel, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 69–83.","bibtex":"@inbook{Blömer_Guajardo_Krummel_2004, place={Berlin, Heidelberg}, title={Provably Secure Masking of AES}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">10.1007/978-3-540-30564-4_5</a>}, booktitle={Selected Areas in Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Guajardo, Jorge and Krummel, Volker}, year={2004}, pages={69–83} }","chicago":"Blömer, Johannes, Jorge Guajardo, and Volker Krummel. “Provably Secure Masking of AES.” In <i>Selected Areas in Cryptography</i>, 69–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">https://doi.org/10.1007/978-3-540-30564-4_5</a>.","ieee":"J. Blömer, J. Guajardo, and V. Krummel, “Provably Secure Masking of AES,” in <i>Selected Areas in Cryptography</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 69–83.","ama":"Blömer J, Guajardo J, Krummel V. Provably Secure Masking of AES. In: <i>Selected Areas in Cryptography</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:69-83. doi:<a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">10.1007/978-3-540-30564-4_5</a>"},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540243274","9783540305644"]},"publication_status":"published","title":"Provably Secure Masking of AES","doi":"10.1007/978-3-540-30564-4_5","date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"full_name":"Guajardo, Jorge","last_name":"Guajardo","first_name":"Jorge"},{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"date_created":"2018-06-05T08:20:20Z","status":"public","publication":"Selected Areas in Cryptography","type":"book_chapter","_id":"3011","department":[{"_id":"64"}],"user_id":"25078"},{"publication":"Public Key Cryptography – PKC 2004","type":"book_chapter","status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-06-05T08:21:31Z","creator":"feidens","date_created":"2018-06-05T08:21:31Z","file_size":198120,"file_name":"keys.pdf","access_level":"closed","file_id":"3013"}],"_id":"3012","department":[{"_id":"64"}],"user_id":"25078","ddc":["000"],"file_date_updated":"2018-06-05T08:21:31Z","has_accepted_license":"1","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540210184","9783540246329"]},"publication_status":"published","year":"2004","place":"Berlin, Heidelberg","page":"1-13","citation":{"ama":"Blömer J, May A. A Generalized Wiener Attack on RSA. In: <i>Public Key Cryptography – PKC 2004</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:1-13. doi:<a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">10.1007/978-3-540-24632-9_1</a>","ieee":"J. Blömer and A. May, “A Generalized Wiener Attack on RSA,” in <i>Public Key Cryptography – PKC 2004</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 1–13.","chicago":"Blömer, Johannes, and Alexander May. “A Generalized Wiener Attack on RSA.” In <i>Public Key Cryptography – PKC 2004</i>, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">https://doi.org/10.1007/978-3-540-24632-9_1</a>.","apa":"Blömer, J., &#38; May, A. (2004). A Generalized Wiener Attack on RSA. In <i>Public Key Cryptography – PKC 2004</i> (pp. 1–13). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">https://doi.org/10.1007/978-3-540-24632-9_1</a>","short":"J. Blömer, A. May, in: Public Key Cryptography – PKC 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 1–13.","mla":"Blömer, Johannes, and Alexander May. “A Generalized Wiener Attack on RSA.” <i>Public Key Cryptography – PKC 2004</i>, Springer Berlin Heidelberg, 2004, pp. 1–13, doi:<a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">10.1007/978-3-540-24632-9_1</a>.","bibtex":"@inbook{Blömer_May_2004, place={Berlin, Heidelberg}, title={A Generalized Wiener Attack on RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">10.1007/978-3-540-24632-9_1</a>}, booktitle={Public Key Cryptography – PKC 2004}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2004}, pages={1–13} }"},"date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","date_created":"2018-06-05T08:20:59Z","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Alexander","full_name":"May, Alexander","last_name":"May"}],"title":"A Generalized Wiener Attack on RSA","doi":"10.1007/978-3-540-24632-9_1"},{"citation":{"ama":"May A. Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q. In: <i>Public Key Cryptography – PKC 2004</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:218-230. doi:<a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">10.1007/978-3-540-24632-9_16</a>","ieee":"A. May, “Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q,” in <i>Public Key Cryptography – PKC 2004</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 218–230.","chicago":"May, Alexander. “Secret Exponent Attacks on RSA-Type Schemes with Moduli N=p^{r}q.” In <i>Public Key Cryptography – PKC 2004</i>, 218–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">https://doi.org/10.1007/978-3-540-24632-9_16</a>.","bibtex":"@inbook{May_2004, place={Berlin, Heidelberg}, title={Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">10.1007/978-3-540-24632-9_16</a>}, booktitle={Public Key Cryptography – PKC 2004}, publisher={Springer Berlin Heidelberg}, author={May, Alexander}, year={2004}, pages={218–230} }","mla":"May, Alexander. “Secret Exponent Attacks on RSA-Type Schemes with Moduli N=p^{r}q.” <i>Public Key Cryptography – PKC 2004</i>, Springer Berlin Heidelberg, 2004, pp. 218–30, doi:<a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">10.1007/978-3-540-24632-9_16</a>.","short":"A. May, in: Public Key Cryptography – PKC 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 218–230.","apa":"May, A. (2004). Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q. In <i>Public Key Cryptography – PKC 2004</i> (pp. 218–230). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">https://doi.org/10.1007/978-3-540-24632-9_16</a>"},"page":"218-230","place":"Berlin, Heidelberg","year":"2004","publication_status":"published","publication_identifier":{"isbn":["9783540210184","9783540246329"],"issn":["0302-9743","1611-3349"]},"doi":"10.1007/978-3-540-24632-9_16","title":"Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q","date_created":"2018-06-05T08:22:02Z","author":[{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","status":"public","type":"book_chapter","publication":"Public Key Cryptography – PKC 2004","user_id":"25078","department":[{"_id":"64"}],"_id":"3014"},{"_id":"3015","user_id":"25078","department":[{"_id":"64"}],"status":"public","type":"book_chapter","publication":"Advances in Cryptology – CRYPTO 2004","title":"Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring","doi":"10.1007/978-3-540-28628-8_13","date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","date_created":"2018-06-05T08:23:43Z","author":[{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"year":"2004","place":"Berlin, Heidelberg","citation":{"bibtex":"@inbook{May_2004, place={Berlin, Heidelberg}, title={Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">10.1007/978-3-540-28628-8_13</a>}, booktitle={Advances in Cryptology – CRYPTO 2004}, publisher={Springer Berlin Heidelberg}, author={May, Alexander}, year={2004}, pages={213–219} }","mla":"May, Alexander. “Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring.” <i>Advances in Cryptology – CRYPTO 2004</i>, Springer Berlin Heidelberg, 2004, pp. 213–19, doi:<a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">10.1007/978-3-540-28628-8_13</a>.","short":"A. May, in: Advances in Cryptology – CRYPTO 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 213–219.","apa":"May, A. (2004). Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In <i>Advances in Cryptology – CRYPTO 2004</i> (pp. 213–219). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">https://doi.org/10.1007/978-3-540-28628-8_13</a>","ieee":"A. May, “Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring,” in <i>Advances in Cryptology – CRYPTO 2004</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 213–219.","chicago":"May, Alexander. “Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring.” In <i>Advances in Cryptology – CRYPTO 2004</i>, 213–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">https://doi.org/10.1007/978-3-540-28628-8_13</a>.","ama":"May A. Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In: <i>Advances in Cryptology – CRYPTO 2004</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:213-219. doi:<a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">10.1007/978-3-540-28628-8_13</a>"},"page":"213-219","publication_status":"published","publication_identifier":{"isbn":["9783540226680","9783540286288"],"issn":["0302-9743","1611-3349"]}},{"type":"conference","publication":"Proceedings of the 12th European Symposium on Algorithms (ESA'04)","status":"public","abstract":[{"lang":"eng","text":"Given a point set P in the d-dimensional unit hypercube, we give upper bounds on the maximal expected number of extreme points when each point is perturbed by small random noise chosen independently for each point from the same noise distribution &#916;. Our results are parametrized by the variance of the noise distribution. For large variance we essentially consider the average case for distribution &#916; while for variance 0 we consider the worst case. Hence our results give upper bounds on the number of extreme points where our input distributions range from average case to worst case.<br>Our main contribution is a rather general lemma that can be used to obtain upper bounds on the expected number of extreme points for a large class of noise distributions. We then apply this lemma to obtain explicit bounds for random noise coming from the Gaussian normal distribution of variance &#963;² and the uniform distribution in a hypercube of side length &epsilon. For these noise distributions we show upper bounds of O( (1/ &#963; )^d * log^3/2 * d - 1 n ) and O( ( (n log n) / &#949; )^d/(d+1) ), respectively. Besides its theoretical motivation our model is also motivated by the observation that in many applications of convex hull algorithms the input data is inherently noisy, e.g. when the data comes from physical measurement or imprecise arithmetic is used."}],"user_id":"15415","department":[{"_id":"63"}],"_id":"18778","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"isbn":["9783540230250","9783540301400"],"issn":["0302-9743","1611-3349"]},"citation":{"apa":"Damerow, V., &#38; Sohler, C. (2004). Extreme Points Under Random Noise. In <i>Proceedings of the 12th European Symposium on Algorithms (ESA’04)</i>. Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-30140-0_25\">https://doi.org/10.1007/978-3-540-30140-0_25</a>","mla":"Damerow, Valentina, and Christian Sohler. “Extreme Points Under Random Noise.” <i>Proceedings of the 12th European Symposium on Algorithms (ESA’04)</i>, 2004, doi:<a href=\"https://doi.org/10.1007/978-3-540-30140-0_25\">10.1007/978-3-540-30140-0_25</a>.","short":"V. Damerow, C. Sohler, in: Proceedings of the 12th European Symposium on Algorithms (ESA’04), Berlin, Heidelberg, 2004.","bibtex":"@inproceedings{Damerow_Sohler_2004, place={Berlin, Heidelberg}, title={Extreme Points Under Random Noise}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-30140-0_25\">10.1007/978-3-540-30140-0_25</a>}, booktitle={Proceedings of the 12th European Symposium on Algorithms (ESA’04)}, author={Damerow, Valentina and Sohler, Christian}, year={2004} }","ama":"Damerow V, Sohler C. Extreme Points Under Random Noise. In: <i>Proceedings of the 12th European Symposium on Algorithms (ESA’04)</i>. Berlin, Heidelberg; 2004. doi:<a href=\"https://doi.org/10.1007/978-3-540-30140-0_25\">10.1007/978-3-540-30140-0_25</a>","ieee":"V. Damerow and C. Sohler, “Extreme Points Under Random Noise,” in <i>Proceedings of the 12th European Symposium on Algorithms (ESA’04)</i>, 2004.","chicago":"Damerow, Valentina, and Christian Sohler. “Extreme Points Under Random Noise.” In <i>Proceedings of the 12th European Symposium on Algorithms (ESA’04)</i>. Berlin, Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-30140-0_25\">https://doi.org/10.1007/978-3-540-30140-0_25</a>."},"place":"Berlin, Heidelberg","year":"2004","author":[{"full_name":"Damerow, Valentina","last_name":"Damerow","first_name":"Valentina"},{"first_name":"Christian","full_name":"Sohler, Christian","last_name":"Sohler"}],"date_created":"2020-09-01T12:26:47Z","date_updated":"2022-01-06T06:53:52Z","doi":"10.1007/978-3-540-30140-0_25","title":"Extreme Points Under Random Noise"},{"publication":"Proc. 12th Annual Symposium on Algorithms (ESA'04)","abstract":[{"text":"We generalize univariate multipoint evaluation of polynomials of degree n at sublinear amortized cost per point. More precisely, it is shown how to evaluate a bivariate polynomial p of maximum degree less than n, specified by its n^2 coefficients, simultaneously at n^2 given points using a total of O(n^2.667) arithmetic operations. In terms of the input size N being quadratic in n, this amounts to an amortized cost of O(N^0.334) per point.","lang":"eng"}],"language":[{"iso":"eng"}],"year":"2004","date_created":"2020-08-25T11:25:11Z","publisher":"Springer","title":"Fast Multipoint Evaluation of Bivariate Polynomials","type":"conference","status":"public","department":[{"_id":"63"}],"user_id":"15415","_id":"18263","publication_identifier":{"isbn":["9783540230250","9783540301400"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"544-555","intvolume":"      3221","citation":{"ama":"Nüsken M, Ziegler M. Fast Multipoint Evaluation of Bivariate Polynomials. In: <i>Proc. 12th Annual Symposium on Algorithms (ESA’04)</i>. Vol 3221. Berlin, Heidelberg: Springer; 2004:544-555. doi:<a href=\"https://doi.org/10.1007/978-3-540-30140-0_49\">10.1007/978-3-540-30140-0_49</a>","chicago":"Nüsken, Michael, and Martin Ziegler. “Fast Multipoint Evaluation of Bivariate Polynomials.” In <i>Proc. 12th Annual Symposium on Algorithms (ESA’04)</i>, 3221:544–55. Berlin, Heidelberg: Springer, 2004. <a href=\"https://doi.org/10.1007/978-3-540-30140-0_49\">https://doi.org/10.1007/978-3-540-30140-0_49</a>.","ieee":"M. Nüsken and M. Ziegler, “Fast Multipoint Evaluation of Bivariate Polynomials,” in <i>Proc. 12th Annual Symposium on Algorithms (ESA’04)</i>, 2004, vol. 3221, pp. 544–555.","bibtex":"@inproceedings{Nüsken_Ziegler_2004, place={Berlin, Heidelberg}, title={Fast Multipoint Evaluation of Bivariate Polynomials}, volume={3221}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-30140-0_49\">10.1007/978-3-540-30140-0_49</a>}, booktitle={Proc. 12th Annual Symposium on Algorithms (ESA’04)}, publisher={Springer}, author={Nüsken, Michael and Ziegler, Martin}, year={2004}, pages={544–555} }","mla":"Nüsken, Michael, and Martin Ziegler. “Fast Multipoint Evaluation of Bivariate Polynomials.” <i>Proc. 12th Annual Symposium on Algorithms (ESA’04)</i>, vol. 3221, Springer, 2004, pp. 544–55, doi:<a href=\"https://doi.org/10.1007/978-3-540-30140-0_49\">10.1007/978-3-540-30140-0_49</a>.","short":"M. Nüsken, M. Ziegler, in: Proc. 12th Annual Symposium on Algorithms (ESA’04), Springer, Berlin, Heidelberg, 2004, pp. 544–555.","apa":"Nüsken, M., &#38; Ziegler, M. (2004). Fast Multipoint Evaluation of Bivariate Polynomials. In <i>Proc. 12th Annual Symposium on Algorithms (ESA’04)</i> (Vol. 3221, pp. 544–555). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-540-30140-0_49\">https://doi.org/10.1007/978-3-540-30140-0_49</a>"},"place":"Berlin, Heidelberg","volume":3221,"author":[{"full_name":"Nüsken, Michael","last_name":"Nüsken","first_name":"Michael"},{"full_name":"Ziegler, Martin","last_name":"Ziegler","first_name":"Martin"}],"date_updated":"2022-01-06T06:53:28Z","doi":"10.1007/978-3-540-30140-0_49"},{"abstract":[{"text":"For $c in REAL$, a $c$-spanner is a subgraph of a complete Euclidean graph satisfying that between any two vertices there exists a path of weighted length at most $c$ times their geometric distance. Based on this property to approximate a complete weighted graph, sparse spanners have found many applications, e.g., in FPTAS, geometric searching, and radio networks. For geometric searching, it turned out to suffice whether the radius rather than the length of some path between any two vertices is bounded relatively to their geometric distance; this is the defining property of weak spanners. Finally regarding radio network applications, a power spanner accounts for the total energy afforded for a wireless transmission with the requirement that the sum of the squares of the lengths of some path between any two planar vertices must be bounded relatively to the square of their geometric distance (or higher powers up to 6 or even 8).<br><br>While it is known that any $c$-spanner is also both a weak $C_1$-spanner and a $C_2$-power spanner (for appropriate $C_1,C_2$ depending only on $c$ but not on the graph under consideration), we show that the converse fails: There exists a family of $c_1$-power spanners that are no weak $C$-spanners and also a family of weak $c_2$-spanners that are no $C$-spanners for any fixed $C$ (and thus no uniform spanners, either). However the deepest result of the present work reveals that, surprisingly, any weak spanner is also a uniform power spanner. We further generalize the latter notion by considering $(c,delta)$-power spanners where the sum of the $delta$-th powers of the lengths has to be bounded; so $(cdot,2)$-power spanners coincide with the usual power spanners and $(cdot,1)$-power spanners are classical spanners. Interestingly, these $(cdot,delta)$-power spanners form a strict hierarchy where the above results still hold for any $deltageq2$; some even hold for $delta>1$ while counterexamples reveal others to fail for $delta<2$. In fact we show that in general every self-similar curve of fractal dimension $d>delta$ is no $(C,delta)$-power spanner for any fixed $C$. ","lang":"eng"}],"publication":"Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC'04)","language":[{"iso":"eng"}],"year":"2004","title":"Spanners, Weak Spanners, and Power Spanners for Wireless Networks","publisher":"Springer ","date_created":"2020-08-25T12:30:19Z","status":"public","type":"conference","_id":"18279","user_id":"15415","department":[{"_id":"63"}],"place":"Berlin, Heidelberg","citation":{"bibtex":"@inproceedings{Schindelhauer_Volbert_Ziegler_2004, place={Berlin, Heidelberg}, title={Spanners, Weak Spanners, and Power Spanners for Wireless Networks}, volume={3341}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-30551-4_69\">10.1007/978-3-540-30551-4_69</a>}, booktitle={Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC’04)}, publisher={Springer }, author={Schindelhauer, Christian and Volbert, Klaus and Ziegler, Martin}, year={2004}, pages={805–821} }","short":"C. Schindelhauer, K. Volbert, M. Ziegler, in: Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC’04), Springer , Berlin, Heidelberg, 2004, pp. 805–821.","mla":"Schindelhauer, Christian, et al. “Spanners, Weak Spanners, and Power Spanners for Wireless Networks.” <i>Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC’04)</i>, vol. 3341, Springer , 2004, pp. 805–21, doi:<a href=\"https://doi.org/10.1007/978-3-540-30551-4_69\">10.1007/978-3-540-30551-4_69</a>.","apa":"Schindelhauer, C., Volbert, K., &#38; Ziegler, M. (2004). Spanners, Weak Spanners, and Power Spanners for Wireless Networks. In <i>Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC’04)</i> (Vol. 3341, pp. 805–821). Berlin, Heidelberg: Springer . <a href=\"https://doi.org/10.1007/978-3-540-30551-4_69\">https://doi.org/10.1007/978-3-540-30551-4_69</a>","ama":"Schindelhauer C, Volbert K, Ziegler M. Spanners, Weak Spanners, and Power Spanners for Wireless Networks. In: <i>Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC’04)</i>. Vol 3341. Berlin, Heidelberg: Springer ; 2004:805-821. doi:<a href=\"https://doi.org/10.1007/978-3-540-30551-4_69\">10.1007/978-3-540-30551-4_69</a>","chicago":"Schindelhauer, Christian, Klaus Volbert, and Martin Ziegler. “Spanners, Weak Spanners, and Power Spanners for Wireless Networks.” In <i>Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC’04)</i>, 3341:805–21. Berlin, Heidelberg: Springer , 2004. <a href=\"https://doi.org/10.1007/978-3-540-30551-4_69\">https://doi.org/10.1007/978-3-540-30551-4_69</a>.","ieee":"C. Schindelhauer, K. Volbert, and M. Ziegler, “Spanners, Weak Spanners, and Power Spanners for Wireless Networks,” in <i>Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC’04)</i>, 2004, vol. 3341, pp. 805–821."},"intvolume":"      3341","page":"805-821","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540241317","9783540305514"]},"doi":"10.1007/978-3-540-30551-4_69","date_updated":"2022-01-06T06:53:28Z","author":[{"first_name":"Christian","last_name":"Schindelhauer","full_name":"Schindelhauer, Christian"},{"last_name":"Volbert","full_name":"Volbert, Klaus","first_name":"Klaus"},{"first_name":"Martin","full_name":"Ziegler, Martin","last_name":"Ziegler"}],"volume":3341},{"intvolume":"      3221","citation":{"ama":"Bansal V, Meyer auf der Heide F, Sohler C. Labeling Smart Dust. In: <i>12th Annual European Symposium on Algorithms (ESA 2004)</i>. Vol 3221. Lecture Notes in Computer Science. Berlin, Heidelberg; 2004. doi:<a href=\"https://doi.org/10.1007/978-3-540-30140-0_9\">10.1007/978-3-540-30140-0_9</a>","chicago":"Bansal, Vikas, Friedhelm Meyer auf der Heide, and Christian Sohler. “Labeling Smart Dust.” In <i>12th Annual European Symposium on Algorithms (ESA 2004)</i>, Vol. 3221. Lecture Notes in Computer Science. Berlin, Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-30140-0_9\">https://doi.org/10.1007/978-3-540-30140-0_9</a>.","ieee":"V. Bansal, F. Meyer auf der Heide, and C. Sohler, “Labeling Smart Dust,” in <i>12th Annual European Symposium on Algorithms (ESA 2004)</i>, 2004, vol. 3221.","mla":"Bansal, Vikas, et al. “Labeling Smart Dust.” <i>12th Annual European Symposium on Algorithms (ESA 2004)</i>, vol. 3221, 2004, doi:<a href=\"https://doi.org/10.1007/978-3-540-30140-0_9\">10.1007/978-3-540-30140-0_9</a>.","bibtex":"@inproceedings{Bansal_Meyer auf der Heide_Sohler_2004, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Labeling Smart Dust}, volume={3221}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-30140-0_9\">10.1007/978-3-540-30140-0_9</a>}, booktitle={12th Annual European Symposium on Algorithms (ESA 2004)}, author={Bansal, Vikas and Meyer auf der Heide, Friedhelm and Sohler, Christian}, year={2004}, collection={Lecture Notes in Computer Science} }","short":"V. Bansal, F. Meyer auf der Heide, C. Sohler, in: 12th Annual European Symposium on Algorithms (ESA 2004), Berlin, Heidelberg, 2004.","apa":"Bansal, V., Meyer auf der Heide, F., &#38; Sohler, C. (2004). Labeling Smart Dust. In <i>12th Annual European Symposium on Algorithms (ESA 2004)</i> (Vol. 3221). Berlin, Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-30140-0_9\">https://doi.org/10.1007/978-3-540-30140-0_9</a>"},"year":"2004","place":"Berlin, Heidelberg","publication_identifier":{"isbn":["9783540230250","9783540301400"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","doi":"10.1007/978-3-540-30140-0_9","title":"Labeling Smart Dust","volume":3221,"author":[{"first_name":"Vikas","last_name":"Bansal","full_name":"Bansal, Vikas"},{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","first_name":"Friedhelm"},{"last_name":"Sohler","full_name":"Sohler, Christian","first_name":"Christian"}],"date_created":"2020-04-08T11:07:57Z","date_updated":"2022-01-06T06:52:50Z","status":"public","abstract":[{"text":"Given n distinct points p1, p2, ... , pn in the plane, the map labeling\r\nproblem with four squares is to place n axis-parallel equi-sized squares Q1, ... ,Qn\r\nof maximum possible size such that pi is a corner of Qi and no two squares overlap.\r\nThis problem is NP-hard and no algorithm with approximation ratio better\r\nthan 1/2 exists unless P = NP [10].\r\nIn this paper, we consider a scenario where we want to visualize the information\r\ngathered by smart dust, i.e. by a large set of simple devices, each consisting of\r\na sensor and a sender that can gather sensor data and send it to a central station.\r\nOur task is to label (the positions of) these sensors in a way described by the\r\nlabeling problem above. Since these devices are not positioned accurately (for\r\nexample, they might be dropped from an airplane), this gives rise to consider the\r\nmap labeling problem under the assumption, that the positions of the points are\r\nnot fixed precisely, but perturbed by random noise. In other words, we consider\r\nthe smoothed complexity of the map labeling problem. We present an algorithm\r\nthat, under such an assumption and Gaussian random noise with sufficiently large\r\nvariance, has linear smoothed complexity.","lang":"eng"}],"publication":"12th Annual European Symposium on Algorithms (ESA 2004)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"63"}],"user_id":"15415","series_title":"Lecture Notes in Computer Science","_id":"16474"},{"citation":{"ieee":"H. Walder and M. Platzner, “A Runtime Environment for Reconfigurable Hardware Operating Systems,” in <i>Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL)</i>, 2004, pp. 831–835.","chicago":"Walder, Herbert, and Marco Platzner. “A Runtime Environment for Reconfigurable Hardware Operating Systems.” In <i>Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL)</i>, 831–35. Berlin, Heidelberg: Springer, 2004. <a href=\"https://doi.org/10.1007/978-3-540-30117-2_84\">https://doi.org/10.1007/978-3-540-30117-2_84</a>.","ama":"Walder H, Platzner M. A Runtime Environment for Reconfigurable Hardware Operating Systems. In: <i>Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL)</i>. Berlin, Heidelberg: Springer; 2004:831-835. doi:<a href=\"https://doi.org/10.1007/978-3-540-30117-2_84\">10.1007/978-3-540-30117-2_84</a>","apa":"Walder, H., &#38; Platzner, M. (2004). A Runtime Environment for Reconfigurable Hardware Operating Systems. In <i>Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL)</i> (pp. 831–835). Berlin, Heidelberg: Springer. <a href=\"https://doi.org/10.1007/978-3-540-30117-2_84\">https://doi.org/10.1007/978-3-540-30117-2_84</a>","mla":"Walder, Herbert, and Marco Platzner. “A Runtime Environment for Reconfigurable Hardware Operating Systems.” <i>Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL)</i>, Springer, 2004, pp. 831–35, doi:<a href=\"https://doi.org/10.1007/978-3-540-30117-2_84\">10.1007/978-3-540-30117-2_84</a>.","short":"H. Walder, M. Platzner, in: Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL), Springer, Berlin, Heidelberg, 2004, pp. 831–835.","bibtex":"@inproceedings{Walder_Platzner_2004, place={Berlin, Heidelberg}, title={A Runtime Environment for Reconfigurable Hardware Operating Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-30117-2_84\">10.1007/978-3-540-30117-2_84</a>}, booktitle={Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL)}, publisher={Springer}, author={Walder, Herbert and Platzner, Marco}, year={2004}, pages={831–835} }"},"page":"831-835","year":"2004","place":"Berlin, Heidelberg","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540229896","9783540301172"]},"doi":"10.1007/978-3-540-30117-2_84","title":"A Runtime Environment for Reconfigurable Hardware Operating Systems","author":[{"first_name":"Herbert","last_name":"Walder","full_name":"Walder, Herbert"},{"first_name":"Marco","id":"398","full_name":"Platzner, Marco","last_name":"Platzner"}],"date_created":"2019-10-04T21:28:56Z","publisher":"Springer","date_updated":"2022-01-06T06:51:40Z","status":"public","type":"conference","publication":"Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL)","language":[{"iso":"eng"}],"extern":"1","user_id":"398","department":[{"_id":"78"}],"_id":"13618"},{"type":"book_chapter","publication":"Advances in Cryptology - CRYPTO 2003","status":"public","user_id":"25078","department":[{"_id":"64"}],"_id":"3016","publication_status":"published","publication_identifier":{"isbn":["9783540406747","9783540451464"],"issn":["0302-9743","1611-3349"]},"citation":{"ieee":"J. Blömer and A. May, “New Partial Key Exposure Attacks on RSA,” in <i>Advances in Cryptology - CRYPTO 2003</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, pp. 27–43.","chicago":"Blömer, Johannes, and Alexander May. “New Partial Key Exposure Attacks on RSA.” In <i>Advances in Cryptology - CRYPTO 2003</i>, 27–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. <a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">https://doi.org/10.1007/978-3-540-45146-4_2</a>.","ama":"Blömer J, May A. New Partial Key Exposure Attacks on RSA. In: <i>Advances in Cryptology - CRYPTO 2003</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2003:27-43. doi:<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>","apa":"Blömer, J., &#38; May, A. (2003). New Partial Key Exposure Attacks on RSA. In <i>Advances in Cryptology - CRYPTO 2003</i> (pp. 27–43). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">https://doi.org/10.1007/978-3-540-45146-4_2</a>","mla":"Blömer, Johannes, and Alexander May. “New Partial Key Exposure Attacks on RSA.” <i>Advances in Cryptology - CRYPTO 2003</i>, Springer Berlin Heidelberg, 2003, pp. 27–43, doi:<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>.","bibtex":"@inbook{Blömer_May_2003, place={Berlin, Heidelberg}, title={New Partial Key Exposure Attacks on RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>}, booktitle={Advances in Cryptology - CRYPTO 2003}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2003}, pages={27–43} }","short":"J. Blömer, A. May, in: Advances in Cryptology - CRYPTO 2003, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003, pp. 27–43."},"page":"27-43","year":"2003","place":"Berlin, Heidelberg","date_created":"2018-06-05T08:24:11Z","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"full_name":"May, Alexander","last_name":"May","first_name":"Alexander"}],"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:51Z","doi":"10.1007/978-3-540-45146-4_2","title":"New Partial Key Exposure Attacks on RSA"}]
