---
_id: '2968'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Christiane
  full_name: Lammersen, Christiane
  last_name: Lammersen
- first_name: Melanie
  full_name: Schmidt, Melanie
  last_name: Schmidt
- first_name: Christian
  full_name: Sohler, Christian
  last_name: Sohler
citation:
  ama: 'Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means
    Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International
    Publishing; 2016:81-116. doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>'
  apa: 'Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical
    Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i>
    (pp. 81–116). Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>'
  bibtex: '@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical
    Analysis of the k-Means Algorithm – A Survey}, DOI={<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>},
    booktitle={Algorithm Engineering}, publisher={Springer International Publishing},
    author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler,
    Christian}, year={2016}, pages={81–116} }'
  chicago: 'Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian
    Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm
    Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>.'
  ieee: 'J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis
    of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer
    International Publishing, 2016, pp. 81–116.'
  mla: Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A
    Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016,
    pp. 81–116, doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>.
  short: 'J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering,
    Springer International Publishing, Cham, 2016, pp. 81–116.'
date_created: 2018-06-04T12:22:40Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-49487-6_3
page: 81-116
place: Cham
publication: Algorithm Engineering
publication_identifier:
  isbn:
  - '9783319494869'
  - '9783319494876'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Theoretical Analysis of the k-Means Algorithm – A Survey
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2970'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances
    in Knowledge Discovery and Data Mining</i>. Cham: Springer International Publishing;
    2016:296-308. doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>'
  apa: 'Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture
    Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308).
    Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>'
  bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian
    Mixture Models}, DOI={<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>},
    booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer
    International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016},
    pages={296–308} }'
  chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham:
    Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>.'
  ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in
    <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International
    Publishing, 2016, pp. 296–308.'
  mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International
    Publishing, 2016, pp. 296–308, doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>.
  short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining,
    Springer International Publishing, Cham, 2016, pp. 296–308.'
date_created: 2018-06-04T12:27:21Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-31750-2_24
page: 296-308
place: Cham
publication: Advances in Knowledge Discovery and Data Mining
publication_identifier:
  isbn:
  - '9783319317496'
  - '9783319317502'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Adaptive Seeding for Gaussian Mixture Models
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '5825'
abstract:
- lang: eng
  text: Integrating apps on mobile devices into applications running on other devices
    is usually difficult. For instance, using a messenger on a smartphone to share
    a text written on a desktop computer often ends up in a cumbersome solution to
    transfer the text, because many applications are not designed for such scenarios.
    In this paper, we present an approach enabling the integration of apps running
    on Android devices into applications running on other devices and even other platforms.
    This is achieved by specifying adapters for Android apps, which map their services
    to a platform-independent service interface. For this purpose, we have developed
    a domain-specific language to ease the specification of such mappings. Our approach
    is applicable without the need to modify the existing Android apps providing the
    service. We analyzed its feasibility by implementing our approach and by specifying
    mappings for several popular Android apps, e.g., phone book, camera, and file
    explorer.
author:
- first_name: Dennis
  full_name: Wolters, Dennis
  id: '11308'
  last_name: Wolters
- first_name: Jonas
  full_name: Kirchhoff, Jonas
  id: '39928'
  last_name: Kirchhoff
- first_name: Christian
  full_name: Gerth, Christian
  last_name: Gerth
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
citation:
  ama: 'Wolters D, Kirchhoff J, Gerth C, Engels G. Cross-Device Integration of Android
    Apps. In: Sheng QZ, Stroulia E, Tata S, Bhiri S, eds. <i>Service-Oriented Computing</i>.
    Cham: Springer International Publishing; 2016:171-185. doi:<a href="https://doi.org/10.1007/978-3-319-46295-0_11">10.1007/978-3-319-46295-0_11</a>'
  apa: 'Wolters, D., Kirchhoff, J., Gerth, C., &#38; Engels, G. (2016). Cross-Device
    Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, &#38; S. Bhiri
    (Eds.), <i>Service-Oriented Computing</i> (pp. 171–185). Cham: Springer International
    Publishing. <a href="https://doi.org/10.1007/978-3-319-46295-0_11">https://doi.org/10.1007/978-3-319-46295-0_11</a>'
  bibtex: '@inproceedings{Wolters_Kirchhoff_Gerth_Engels_2016, place={Cham}, title={Cross-Device
    Integration of Android Apps}, DOI={<a href="https://doi.org/10.1007/978-3-319-46295-0_11">10.1007/978-3-319-46295-0_11</a>},
    booktitle={Service-Oriented Computing}, publisher={Springer International Publishing},
    author={Wolters, Dennis and Kirchhoff, Jonas and Gerth, Christian and Engels,
    Gregor}, editor={Sheng, Quan Z.  and Stroulia, Eleni  and Tata, Samir  and Bhiri,
    Sami Editors}, year={2016}, pages={171–185} }'
  chicago: 'Wolters, Dennis, Jonas Kirchhoff, Christian Gerth, and Gregor Engels.
    “Cross-Device Integration of Android Apps.” In <i>Service-Oriented Computing</i>,
    edited by Quan Z.  Sheng, Eleni  Stroulia, Samir  Tata, and Sami  Bhiri, 171–85.
    Cham: Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-46295-0_11">https://doi.org/10.1007/978-3-319-46295-0_11</a>.'
  ieee: D. Wolters, J. Kirchhoff, C. Gerth, and G. Engels, “Cross-Device Integration
    of Android Apps,” in <i>Service-Oriented Computing</i>, 2016, pp. 171–185.
  mla: Wolters, Dennis, et al. “Cross-Device Integration of Android Apps.” <i>Service-Oriented
    Computing</i>, edited by Quan Z.  Sheng et al., Springer International Publishing,
    2016, pp. 171–85, doi:<a href="https://doi.org/10.1007/978-3-319-46295-0_11">10.1007/978-3-319-46295-0_11</a>.
  short: 'D. Wolters, J. Kirchhoff, C. Gerth, G. Engels, in: Q.Z. Sheng, E. Stroulia,
    S. Tata, S. Bhiri (Eds.), Service-Oriented Computing, Springer International Publishing,
    Cham, 2016, pp. 171–185.'
date_created: 2018-11-26T10:21:38Z
date_updated: 2022-01-06T07:02:43Z
department:
- _id: '66'
doi: 10.1007/978-3-319-46295-0_11
editor:
- first_name: 'Quan Z. '
  full_name: 'Sheng, Quan Z. '
  last_name: Sheng
- first_name: 'Eleni '
  full_name: 'Stroulia, Eleni '
  last_name: Stroulia
- first_name: 'Samir '
  full_name: 'Tata, Samir '
  last_name: Tata
- first_name: 'Sami '
  full_name: 'Bhiri, Sami '
  last_name: Bhiri
keyword:
- Cross-Device
- Integration
- Android
- Adapter
- DSL
language:
- iso: eng
page: 171-185
place: Cham
publication: Service-Oriented Computing
publication_identifier:
  isbn:
  - '9783319462943'
  - '9783319462950'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Cross-Device Integration of Android Apps
type: conference
user_id: '39928'
year: '2016'
...
---
_id: '6257'
author:
- first_name: Holger Gerhard
  full_name: Fischer, Holger Gerhard
  id: '30457'
  last_name: Fischer
- first_name: Björn
  full_name: Senft, Björn
  id: '9109'
  last_name: Senft
citation:
  ama: 'Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure
    Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed.
    <i>Human-Centered and Error-Resilient Systems Development</i>. Vol 9856. Lecture
    Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41.
    doi:<a href="https://doi.org/10.1007/978-3-319-44902-9_3">10.1007/978-3-319-44902-9_3</a>'
  apa: 'Fischer, H. G., &#38; Senft, B. (2016). Human-Centered Software Engineering
    as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.
    In C. Bogdan (Ed.), <i>Human-Centered and Error-Resilient Systems Development</i>
    (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-44902-9_3">https://doi.org/10.1007/978-3-319-44902-9_3</a>'
  bibtex: '@inbook{Fischer_Senft_2016, place={Cham}, series={Lecture Notes in Computer
    Science}, title={Human-Centered Software Engineering as a Chance to Ensure Software
    Quality Within the Digitization of Human Workflows}, volume={9856}, DOI={<a href="https://doi.org/10.1007/978-3-319-44902-9_3">10.1007/978-3-319-44902-9_3</a>},
    booktitle={Human-Centered and Error-Resilient Systems Development}, publisher={Springer
    International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn},
    editor={Bogdan, ChristianEditor}, year={2016}, pages={30–41}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering
    as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.”
    In <i>Human-Centered and Error-Resilient Systems Development</i>, edited by Christian
    Bogdan, 9856:30–41. Lecture Notes in Computer Science. Cham: Springer International
    Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-44902-9_3">https://doi.org/10.1007/978-3-319-44902-9_3</a>.'
  ieee: 'H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance
    to Ensure Software Quality Within the Digitization of Human Workflows,” in <i>Human-Centered
    and Error-Resilient Systems Development</i>, vol. 9856, C. Bogdan, Ed. Cham: Springer
    International Publishing, 2016, pp. 30–41.'
  mla: Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering
    as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.”
    <i>Human-Centered and Error-Resilient Systems Development</i>, edited by Christian
    Bogdan, vol. 9856, Springer International Publishing, 2016, pp. 30–41, doi:<a
    href="https://doi.org/10.1007/978-3-319-44902-9_3">10.1007/978-3-319-44902-9_3</a>.
  short: 'H.G. Fischer, B. Senft, in: C. Bogdan (Ed.), Human-Centered and Error-Resilient
    Systems Development, Springer International Publishing, Cham, 2016, pp. 30–41.'
conference:
  end_date: 2016-08-31
  location: Stockholm, Sweden
  name: International Conference on Human-Centred Software Engineering
  start_date: 2016-08-29
date_created: 2018-12-18T10:51:10Z
date_updated: 2022-01-06T07:02:58Z
department:
- _id: '66'
- _id: '534'
- _id: '221'
doi: 10.1007/978-3-319-44902-9_3
editor:
- first_name: Christian
  full_name: Bogdan, Christian
  last_name: Bogdan
intvolume: '      9856'
language:
- iso: eng
page: 30-41
place: Cham
publication: Human-Centered and Error-Resilient Systems Development
publication_identifier:
  isbn:
  - '9783319449012'
  - '9783319449029'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Human-Centered Software Engineering as a Chance to Ensure Software Quality
  Within the Digitization of Human Workflows
type: book_chapter
user_id: '30457'
volume: 9856
year: '2016'
...
---
_id: '2978'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances
    in Knowledge Discovery and Data Mining</i>. Springer International Publishing;
    2016:296-308. doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>'
  apa: Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models.
    In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308). Springer
    International Publishing. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>
  bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian
    Mixture Models}, DOI={<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>},
    booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer
    International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016},
    pages={296–308} }'
  chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham:
    Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>.'
  ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in
    <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International
    Publishing, 2016, pp. 296–308.'
  mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International
    Publishing, 2016, pp. 296–308, doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>.
  short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining,
    Springer International Publishing, Cham, 2016, pp. 296–308.'
date_created: 2018-06-05T07:31:39Z
date_updated: 2023-01-10T13:49:50Z
department:
- _id: '64'
doi: 10.1007/978-3-319-31750-2_24
page: 296-308
place: Cham
publication: Advances in Knowledge Discovery and Data Mining
publication_identifier:
  isbn:
  - '9783319317496'
  - '9783319317502'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Adaptive Seeding for Gaussian Mixture Models
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '60904'
author:
- first_name: Alper
  full_name: Yegenoglu, Alper
  id: '117951'
  last_name: Yegenoglu
  orcid: 0000-0001-8869-215X
- first_name: Pietro
  full_name: Quaglio, Pietro
  last_name: Quaglio
- first_name: Emiliano
  full_name: Torre, Emiliano
  last_name: Torre
- first_name: Sonja
  full_name: Grün, Sonja
  last_name: Grün
- first_name: Dominik
  full_name: Endres, Dominik
  last_name: Endres
citation:
  ama: 'Yegenoglu A, Quaglio P, Torre E, Grün S, Endres D. Exploring the Usefulness
    of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns
    in Massively Parallel Spike Trains. In: <i>Lecture Notes in Computer Science</i>.
    Springer International Publishing; 2016. doi:<a href="https://doi.org/10.1007/978-3-319-40985-6_1">10.1007/978-3-319-40985-6_1</a>'
  apa: Yegenoglu, A., Quaglio, P., Torre, E., Grün, S., &#38; Endres, D. (2016). Exploring
    the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal
    Spike Patterns in Massively Parallel Spike Trains. In <i>Lecture Notes in Computer
    Science</i>. Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-40985-6_1">https://doi.org/10.1007/978-3-319-40985-6_1</a>
  bibtex: '@inbook{Yegenoglu_Quaglio_Torre_Grün_Endres_2016, place={Cham}, title={Exploring
    the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal
    Spike Patterns in Massively Parallel Spike Trains}, DOI={<a href="https://doi.org/10.1007/978-3-319-40985-6_1">10.1007/978-3-319-40985-6_1</a>},
    booktitle={Lecture Notes in Computer Science}, publisher={Springer International
    Publishing}, author={Yegenoglu, Alper and Quaglio, Pietro and Torre, Emiliano
    and Grün, Sonja and Endres, Dominik}, year={2016} }'
  chicago: 'Yegenoglu, Alper, Pietro Quaglio, Emiliano Torre, Sonja Grün, and Dominik
    Endres. “Exploring the Usefulness of Formal Concept Analysis for Robust Detection
    of Spatio-Temporal Spike Patterns in Massively Parallel Spike Trains.” In <i>Lecture
    Notes in Computer Science</i>. Cham: Springer International Publishing, 2016.
    <a href="https://doi.org/10.1007/978-3-319-40985-6_1">https://doi.org/10.1007/978-3-319-40985-6_1</a>.'
  ieee: 'A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, and D. Endres, “Exploring the
    Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal
    Spike Patterns in Massively Parallel Spike Trains,” in <i>Lecture Notes in Computer
    Science</i>, Cham: Springer International Publishing, 2016.'
  mla: Yegenoglu, Alper, et al. “Exploring the Usefulness of Formal Concept Analysis
    for Robust Detection of Spatio-Temporal Spike Patterns in Massively Parallel Spike
    Trains.” <i>Lecture Notes in Computer Science</i>, Springer International Publishing,
    2016, doi:<a href="https://doi.org/10.1007/978-3-319-40985-6_1">10.1007/978-3-319-40985-6_1</a>.
  short: 'A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, D. Endres, in: Lecture Notes
    in Computer Science, Springer International Publishing, Cham, 2016.'
date_created: 2025-08-06T15:03:16Z
date_updated: 2025-08-08T11:38:15Z
doi: 10.1007/978-3-319-40985-6_1
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783319409849'
  - '9783319409856'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Exploring the Usefulness of Formal Concept Analysis for Robust Detection of
  Spatio-temporal Spike Patterns in Massively Parallel Spike Trains
type: book_chapter
user_id: '117951'
year: '2016'
...
---
_id: '2921'
author:
- first_name: Olivier
  full_name: Blazy, Olivier
  last_name: Blazy
- first_name: Saqib
  full_name: Kakvi, Saqib
  id: '66268'
  last_name: Kakvi
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Jiaxin
  full_name: Pan, Jiaxin
  last_name: Pan
citation:
  ama: 'Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon
    Hash Functions. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg:
    Springer Berlin Heidelberg; 2015:256-279. doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_12">10.1007/978-3-662-46447-2_12</a>'
  apa: 'Blazy, O., Kakvi, S., Kiltz, E., &#38; Pan, J. (2015). Tightly-Secure Signatures
    from Chameleon Hash Functions. In <i>Lecture Notes in Computer Science</i> (pp.
    256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-662-46447-2_12">https://doi.org/10.1007/978-3-662-46447-2_12</a>'
  bibtex: '@inbook{Blazy_Kakvi_Kiltz_Pan_2015, place={Berlin, Heidelberg}, title={Tightly-Secure
    Signatures from Chameleon Hash Functions}, DOI={<a href="https://doi.org/10.1007/978-3-662-46447-2_12">10.1007/978-3-662-46447-2_12</a>},
    booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg},
    author={Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}, year={2015},
    pages={256–279} }'
  chicago: 'Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure
    Signatures from Chameleon Hash Functions.” In <i>Lecture Notes in Computer Science</i>,
    256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. <a href="https://doi.org/10.1007/978-3-662-46447-2_12">https://doi.org/10.1007/978-3-662-46447-2_12</a>.'
  ieee: 'O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from
    Chameleon Hash Functions,” in <i>Lecture Notes in Computer Science</i>, Berlin,
    Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.'
  mla: Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.”
    <i>Lecture Notes in Computer Science</i>, Springer Berlin Heidelberg, 2015, pp.
    256–79, doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_12">10.1007/978-3-662-46447-2_12</a>.
  short: 'O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science,
    Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.'
date_created: 2018-05-25T12:46:08Z
date_updated: 2022-01-06T06:58:47Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_12
extern: '1'
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2014/1021.pdf
oa: '1'
page: 256-279
place: Berlin, Heidelberg
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783662464465'
  - '9783662464472'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Tightly-Secure Signatures from Chameleon Hash Functions
type: book_chapter
user_id: '66268'
year: '2015'
...
---
_id: '15897'
author:
- first_name: Christian
  full_name: Altmeier, Christian
  last_name: Altmeier
- first_name: Christian
  full_name: Mainka, Christian
  last_name: Mainka
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Altmeier C, Mainka C, Somorovsky J, Schwenk J. AdIDoS – Adaptive and Intelligent
    Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In:
    <i>Data Privacy Management, and Security Assurance - 10th International Workshop,
    {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>. Lecture Notes in
    Computer Science 9481. Cham; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-29883-2_5">10.1007/978-3-319-29883-2_5</a>'
  apa: Altmeier, C., Mainka, C., Somorovsky, J., &#38; Schwenk, J. (2015). AdIDoS
    – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses
    in Web Services. In <i>Data Privacy Management, and Security Assurance - 10th
    International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>.
    Cham. <a href="https://doi.org/10.1007/978-3-319-29883-2_5">https://doi.org/10.1007/978-3-319-29883-2_5</a>
  bibtex: '@inbook{Altmeier_Mainka_Somorovsky_Schwenk_2015, place={Cham}, series={Lecture
    Notes in Computer Science 9481}, title={AdIDoS – Adaptive and Intelligent Fully-Automatic
    Detection of Denial-of-Service Weaknesses in Web Services}, DOI={<a href="https://doi.org/10.1007/978-3-319-29883-2_5">10.1007/978-3-319-29883-2_5</a>},
    booktitle={Data Privacy Management, and Security Assurance - 10th International
    Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015}, author={Altmeier,
    Christian and Mainka, Christian and Somorovsky, Juraj and Schwenk, Jörg}, year={2015},
    collection={Lecture Notes in Computer Science 9481} }'
  chicago: Altmeier, Christian, Christian Mainka, Juraj Somorovsky, and Jörg Schwenk.
    “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service
    Weaknesses in Web Services.” In <i>Data Privacy Management, and Security Assurance
    - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA}
    2015</i>. Lecture Notes in Computer Science 9481. Cham, 2015. <a href="https://doi.org/10.1007/978-3-319-29883-2_5">https://doi.org/10.1007/978-3-319-29883-2_5</a>.
  ieee: C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive
    and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web
    Services,” in <i>Data Privacy Management, and Security Assurance - 10th International
    Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015</i>, Cham, 2015.
  mla: Altmeier, Christian, et al. “AdIDoS – Adaptive and Intelligent Fully-Automatic
    Detection of Denial-of-Service Weaknesses in Web Services.” <i>Data Privacy Management,
    and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International
    Workshop, {QASA} 2015</i>, 2015, doi:<a href="https://doi.org/10.1007/978-3-319-29883-2_5">10.1007/978-3-319-29883-2_5</a>.
  short: 'C. Altmeier, C. Mainka, J. Somorovsky, J. Schwenk, in: Data Privacy Management,
    and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International
    Workshop, {QASA} 2015, Cham, 2015.'
conference:
  location: Vienna
date_created: 2020-02-15T09:40:09Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1007/978-3-319-29883-2_5
language:
- iso: eng
place: Cham
publication: Data Privacy Management, and Security Assurance - 10th International
  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015
publication_identifier:
  isbn:
  - '9783319298825'
  - '9783319298832'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
series_title: Lecture Notes in Computer Science 9481
status: public
title: AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service
  Weaknesses in Web Services
type: book_chapter
user_id: '83504'
year: '2015'
...
---
_id: '15899'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH.
    In: <i>Computer Security -- ESORICS 2015</i>. Cham; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>'
  apa: Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve
    Attacks on TLS-ECDH. In <i>Computer Security -- ESORICS 2015</i>. Cham. <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>
  bibtex: '@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid
    Curve Attacks on TLS-ECDH}, DOI={<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>},
    booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk,
    Jörg and Somorovsky, Juraj}, year={2015} }'
  chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve
    Attacks on TLS-ECDH.” In <i>Computer Security -- ESORICS 2015</i>. Cham, 2015.
    <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>.
  ieee: T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks
    on TLS-ECDH,” in <i>Computer Security -- ESORICS 2015</i>, Cham, 2015.
  mla: Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer
    Security -- ESORICS 2015</i>, 2015, doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>.
  short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015,
    Cham, 2015.'
date_created: 2020-02-15T09:41:17Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1007/978-3-319-24174-6_21
extern: '1'
language:
- iso: eng
main_file_link:
- url: https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/
place: Cham
publication: Computer Security -- ESORICS 2015
publication_identifier:
  isbn:
  - '9783319241739'
  - '9783319241746'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Practical Invalid Curve Attacks on TLS-ECDH
type: book_chapter
user_id: '83504'
year: '2015'
...
---
_id: '15088'
author:
- first_name: Stefan
  full_name: Böttcher, Stefan
  id: '624'
  last_name: Böttcher
- first_name: Rita
  full_name: Hartel, Rita
  id: '14961'
  last_name: Hartel
- first_name: Thomas
  full_name: Jacobs, Thomas
  last_name: Jacobs
- first_name: Markus
  full_name: Jeromin, Markus
  last_name: Jeromin
citation:
  ama: 'Böttcher S, Hartel R, Jacobs T, Jeromin M. ECST – Extended Context-Free Straight-Line
    Tree Grammars. In: <i>Data Science - 30th British International Conference on
    Databases, BICOD 2015</i>. Springer; 2015:186-198. doi:<a href="https://doi.org/10.1007/978-3-319-20424-6_18">10.1007/978-3-319-20424-6_18</a>'
  apa: Böttcher, S., Hartel, R., Jacobs, T., &#38; Jeromin, M. (2015). ECST – Extended
    Context-Free Straight-Line Tree Grammars. In <i>Data Science - 30th British International
    Conference on Databases, BICOD 2015</i> (pp. 186–198). Springer. <a href="https://doi.org/10.1007/978-3-319-20424-6_18">https://doi.org/10.1007/978-3-319-20424-6_18</a>
  bibtex: '@inproceedings{Böttcher_Hartel_Jacobs_Jeromin_2015, title={ECST – Extended
    Context-Free Straight-Line Tree Grammars}, DOI={<a href="https://doi.org/10.1007/978-3-319-20424-6_18">10.1007/978-3-319-20424-6_18</a>},
    booktitle={Data Science - 30th British International Conference on Databases,
    BICOD 2015}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and
    Jacobs, Thomas and Jeromin, Markus}, year={2015}, pages={186–198} }'
  chicago: Böttcher, Stefan, Rita Hartel, Thomas Jacobs, and Markus Jeromin. “ECST
    – Extended Context-Free Straight-Line Tree Grammars.” In <i>Data Science - 30th
    British International Conference on Databases, BICOD 2015</i>, 186–98. Springer,
    2015. <a href="https://doi.org/10.1007/978-3-319-20424-6_18">https://doi.org/10.1007/978-3-319-20424-6_18</a>.
  ieee: S. Böttcher, R. Hartel, T. Jacobs, and M. Jeromin, “ECST – Extended Context-Free
    Straight-Line Tree Grammars,” in <i>Data Science - 30th British International
    Conference on Databases, BICOD 2015</i>, 2015, pp. 186–198.
  mla: Böttcher, Stefan, et al. “ECST – Extended Context-Free Straight-Line Tree Grammars.”
    <i>Data Science - 30th British International Conference on Databases, BICOD 2015</i>,
    Springer, 2015, pp. 186–98, doi:<a href="https://doi.org/10.1007/978-3-319-20424-6_18">10.1007/978-3-319-20424-6_18</a>.
  short: 'S. Böttcher, R. Hartel, T. Jacobs, M. Jeromin, in: Data Science - 30th British
    International Conference on Databases, BICOD 2015, Springer, 2015, pp. 186–198.'
date_created: 2019-11-21T15:08:13Z
date_updated: 2022-01-06T06:52:15Z
department:
- _id: '69'
doi: 10.1007/978-3-319-20424-6_18
language:
- iso: eng
page: 186-198
publication: Data Science - 30th British International Conference on Databases, BICOD
  2015
publication_identifier:
  isbn:
  - '9783319204239'
  - '9783319204246'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer
status: public
title: ECST – Extended Context-Free Straight-Line Tree Grammars
type: conference
user_id: '14961'
year: '2015'
...
---
_id: '25338'
author:
- first_name: Michaela
  full_name: Geierhos, Michaela
  last_name: Geierhos
- first_name: Frederik S.
  full_name: Bäumer, Frederik S.
  last_name: Bäumer
- first_name: Sabine
  full_name: Schulze, Sabine
  last_name: Schulze
- first_name: Caterina
  full_name: Klotz, Caterina
  last_name: Klotz
citation:
  ama: 'Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0.
    In: <i>Modeling and Using Context</i>. ; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>'
  apa: Geierhos, M., Bäumer, F. S., Schulze, S., &#38; Klotz, C. (2015). Understanding
    the Patient 2.0. In <i>Modeling and Using Context</i>. <a href="https://doi.org/10.1007/978-3-319-25591-0_12">https://doi.org/10.1007/978-3-319-25591-0_12</a>
  bibtex: '@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding
    the Patient 2.0}, DOI={<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>},
    booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer,
    Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }'
  chicago: Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz.
    “Understanding the Patient 2.0.” In <i>Modeling and Using Context</i>. Cham, 2015.
    <a href="https://doi.org/10.1007/978-3-319-25591-0_12">https://doi.org/10.1007/978-3-319-25591-0_12</a>.
  ieee: M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient
    2.0,” in <i>Modeling and Using Context</i>, Cham, 2015.
  mla: Geierhos, Michaela, et al. “Understanding the Patient 2.0.” <i>Modeling and
    Using Context</i>, 2015, doi:<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>.
  short: 'M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context,
    Cham, 2015.'
date_created: 2021-10-04T19:02:33Z
date_updated: 2022-01-25T18:21:15Z
doi: 10.1007/978-3-319-25591-0_12
place: Cham
publication: Modeling and Using Context
publication_identifier:
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Understanding the Patient 2.0
type: book_chapter
user_id: '71124'
year: '2015'
...
---
_id: '25337'
author:
- first_name: Michaela
  full_name: Geierhos, Michaela
  last_name: Geierhos
- first_name: Frederik S.
  full_name: Bäumer, Frederik S.
  last_name: Bäumer
- first_name: Sabine
  full_name: Schulze, Sabine
  last_name: Schulze
- first_name: Caterina
  full_name: Klotz, Caterina
  last_name: Klotz
citation:
  ama: 'Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0.
    In: <i>Modeling and Using Context</i>. ; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>'
  apa: Geierhos, M., Bäumer, F. S., Schulze, S., &#38; Klotz, C. (2015). Understanding
    the Patient 2.0. In <i>Modeling and Using Context</i>. <a href="https://doi.org/10.1007/978-3-319-25591-0_12">https://doi.org/10.1007/978-3-319-25591-0_12</a>
  bibtex: '@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding
    the Patient 2.0}, DOI={<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>},
    booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer,
    Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }'
  chicago: Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz.
    “Understanding the Patient 2.0.” In <i>Modeling and Using Context</i>. Cham, 2015.
    <a href="https://doi.org/10.1007/978-3-319-25591-0_12">https://doi.org/10.1007/978-3-319-25591-0_12</a>.
  ieee: M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient
    2.0,” in <i>Modeling and Using Context</i>, Cham, 2015.
  mla: Geierhos, Michaela, et al. “Understanding the Patient 2.0.” <i>Modeling and
    Using Context</i>, 2015, doi:<a href="https://doi.org/10.1007/978-3-319-25591-0_12">10.1007/978-3-319-25591-0_12</a>.
  short: 'M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context,
    Cham, 2015.'
date_created: 2021-10-04T18:59:54Z
date_updated: 2022-01-25T18:21:13Z
doi: 10.1007/978-3-319-25591-0_12
place: Cham
publication: Modeling and Using Context
publication_identifier:
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Understanding the Patient 2.0
type: book_chapter
user_id: '71124'
year: '2015'
...
---
_id: '20008'
author:
- first_name: Heiko
  full_name: Hamann, Heiko
  last_name: Hamann
- first_name: Gabriele
  full_name: Valentini, Gabriele
  last_name: Valentini
citation:
  ama: 'Hamann H, Valentini G. Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing
    Temporary Lock-ins. In: <i>Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)</i>.
    Cham; 2014. doi:<a href="https://doi.org/10.1007/978-3-319-09952-1_15">10.1007/978-3-319-09952-1_15</a>'
  apa: 'Hamann, H., &#38; Valentini, G. (2014). Swarm in a Fly Bottle: Feedback-Based
    Analysis of Self-organizing Temporary Lock-ins. In <i>Ninth Int. Conf. on Swarm
    Intelligence (ANTS 2014)</i>. Cham. <a href="https://doi.org/10.1007/978-3-319-09952-1_15">https://doi.org/10.1007/978-3-319-09952-1_15</a>'
  bibtex: '@inproceedings{Hamann_Valentini_2014, place={Cham}, title={Swarm in a Fly
    Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins}, DOI={<a
    href="https://doi.org/10.1007/978-3-319-09952-1_15">10.1007/978-3-319-09952-1_15</a>},
    booktitle={Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)}, author={Hamann,
    Heiko and Valentini, Gabriele}, year={2014} }'
  chicago: 'Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based
    Analysis of Self-Organizing Temporary Lock-Ins.” In <i>Ninth Int. Conf. on Swarm
    Intelligence (ANTS 2014)</i>. Cham, 2014. <a href="https://doi.org/10.1007/978-3-319-09952-1_15">https://doi.org/10.1007/978-3-319-09952-1_15</a>.'
  ieee: 'H. Hamann and G. Valentini, “Swarm in a Fly Bottle: Feedback-Based Analysis
    of Self-organizing Temporary Lock-ins,” in <i>Ninth Int. Conf. on Swarm Intelligence
    (ANTS 2014)</i>, 2014.'
  mla: 'Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based
    Analysis of Self-Organizing Temporary Lock-Ins.” <i>Ninth Int. Conf. on Swarm
    Intelligence (ANTS 2014)</i>, 2014, doi:<a href="https://doi.org/10.1007/978-3-319-09952-1_15">10.1007/978-3-319-09952-1_15</a>.'
  short: 'H. Hamann, G. Valentini, in: Ninth Int. Conf. on Swarm Intelligence (ANTS
    2014), Cham, 2014.'
date_created: 2020-10-15T14:13:51Z
date_updated: 2022-01-06T06:54:18Z
department:
- _id: '63'
- _id: '238'
doi: 10.1007/978-3-319-09952-1_15
language:
- iso: eng
place: Cham
publication: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)
publication_identifier:
  isbn:
  - '9783319099514'
  - '9783319099521'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: 'Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary
  Lock-ins'
type: conference
user_id: '15415'
year: '2014'
...
---
_id: '20982'
abstract:
- lang: eng
  text: "Real-time software-intensive embedded systems complexity, as in the automotive
    domain, requires rigorous Requirements Engineering (RE) approaches. Scenario-based
    RE formalisms like Modal Sequence Diagrams (MSDs) enable an intuitive specication
    and the simulative validation of functional requirements. However, the dependencies
    between events occurring in different MSD scenarios are implicit so that it is
    difficult to find causes of requirements defects, if any. The automotive architecture
    description language EAST-ADL addresses this problem by relying on event chains,
    which make dependencies between events explicit. However, EAST-ADL event chains
    have a low abstraction level, and their relationship to functional requirements
    has seldom been investigated. Based on the EAST-ADL functional architecture, we
    propose to use its central notion of event to conciliate both approaches. We conceived
    an automatic transformation from the high abstraction level requirements specified
    in MSDs to the low abstraction level event chains.\r\n"
author:
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Julien
  full_name: DeAntoni, Julien
  last_name: DeAntoni
citation:
  ama: 'Koch T, Holtmann J, DeAntoni J. Generating EAST-ADL Event Chains from Scenario-Based
    Requirements Specifications. In: <i>Software Architecture</i>. Cham; 2014. doi:<a
    href="https://doi.org/10.1007/978-3-319-09970-5_14">10.1007/978-3-319-09970-5_14</a>'
  apa: Koch, T., Holtmann, J., &#38; DeAntoni, J. (2014). Generating EAST-ADL Event
    Chains from Scenario-Based Requirements Specifications. In <i>Software Architecture</i>.
    Cham. <a href="https://doi.org/10.1007/978-3-319-09970-5_14">https://doi.org/10.1007/978-3-319-09970-5_14</a>
  bibtex: '@inbook{Koch_Holtmann_DeAntoni_2014, place={Cham}, title={Generating EAST-ADL
    Event Chains from Scenario-Based Requirements Specifications}, DOI={<a href="https://doi.org/10.1007/978-3-319-09970-5_14">10.1007/978-3-319-09970-5_14</a>},
    booktitle={Software Architecture}, author={Koch, Thorsten and Holtmann, Jörg and
    DeAntoni, Julien}, year={2014} }'
  chicago: Koch, Thorsten, Jörg Holtmann, and Julien DeAntoni. “Generating EAST-ADL
    Event Chains from Scenario-Based Requirements Specifications.” In <i>Software
    Architecture</i>. Cham, 2014. <a href="https://doi.org/10.1007/978-3-319-09970-5_14">https://doi.org/10.1007/978-3-319-09970-5_14</a>.
  ieee: T. Koch, J. Holtmann, and J. DeAntoni, “Generating EAST-ADL Event Chains from
    Scenario-Based Requirements Specifications,” in <i>Software Architecture</i>,
    Cham, 2014.
  mla: Koch, Thorsten, et al. “Generating EAST-ADL Event Chains from Scenario-Based
    Requirements Specifications.” <i>Software Architecture</i>, 2014, doi:<a href="https://doi.org/10.1007/978-3-319-09970-5_14">10.1007/978-3-319-09970-5_14</a>.
  short: 'T. Koch, J. Holtmann, J. DeAntoni, in: Software Architecture, Cham, 2014.'
date_created: 2021-01-13T13:34:35Z
date_updated: 2022-01-06T06:54:42Z
department:
- _id: '241'
- _id: '662'
doi: 10.1007/978-3-319-09970-5_14
language:
- iso: eng
place: Cham
publication: Software Architecture
publication_identifier:
  isbn:
  - '9783319099699'
  - '9783319099705'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications
type: book_chapter
user_id: '13616'
year: '2014'
...
---
_id: '6741'
author:
- first_name: Dennis
  full_name: Bokermann, Dennis
  id: '11308'
  last_name: Bokermann
- first_name: Christian
  full_name: Gerth, Christian
  last_name: Gerth
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
citation:
  ama: 'Bokermann D, Gerth C, Engels G. Use Your Best Device! Enabling Device Changes
    at Runtime. In: <i>12th International Conference on Business Process Management
    (BPM 2014)</i>. Vol 8659. Lecture Notes in Computer Science. Springer International
    Publishing; 2014:357-365. doi:<a href="https://doi.org/10.1007/978-3-319-10172-9_23">10.1007/978-3-319-10172-9_23</a>'
  apa: Bokermann, D., Gerth, C., &#38; Engels, G. (2014). Use Your Best Device! Enabling
    Device Changes at Runtime. In <i>12th International Conference on Business Process
    Management (BPM 2014)</i> (Vol. 8659, pp. 357–365). Springer International Publishing.
    <a href="https://doi.org/10.1007/978-3-319-10172-9_23">https://doi.org/10.1007/978-3-319-10172-9_23</a>
  bibtex: '@inproceedings{Bokermann_Gerth_Engels_2014, series={Lecture Notes in Computer
    Science}, title={Use Your Best Device! Enabling Device Changes at Runtime}, volume={8659},
    DOI={<a href="https://doi.org/10.1007/978-3-319-10172-9_23">10.1007/978-3-319-10172-9_23</a>},
    booktitle={12th International Conference on Business Process Management (BPM 2014)},
    publisher={Springer International Publishing}, author={Bokermann, Dennis and Gerth,
    Christian and Engels, Gregor}, year={2014}, pages={357–365}, collection={Lecture
    Notes in Computer Science} }'
  chicago: Bokermann, Dennis, Christian Gerth, and Gregor Engels. “Use Your Best Device!
    Enabling Device Changes at Runtime.” In <i>12th International Conference on Business
    Process Management (BPM 2014)</i>, 8659:357–65. Lecture Notes in Computer Science.
    Springer International Publishing, 2014. <a href="https://doi.org/10.1007/978-3-319-10172-9_23">https://doi.org/10.1007/978-3-319-10172-9_23</a>.
  ieee: D. Bokermann, C. Gerth, and G. Engels, “Use Your Best Device! Enabling Device
    Changes at Runtime,” in <i>12th International Conference on Business Process Management
    (BPM 2014)</i>, 2014, vol. 8659, pp. 357–365.
  mla: Bokermann, Dennis, et al. “Use Your Best Device! Enabling Device Changes at
    Runtime.” <i>12th International Conference on Business Process Management (BPM
    2014)</i>, vol. 8659, Springer International Publishing, 2014, pp. 357–65, doi:<a
    href="https://doi.org/10.1007/978-3-319-10172-9_23">10.1007/978-3-319-10172-9_23</a>.
  short: 'D. Bokermann, C. Gerth, G. Engels, in: 12th International Conference on
    Business Process Management (BPM 2014), Springer International Publishing, 2014,
    pp. 357–365.'
date_created: 2019-01-15T14:49:31Z
date_updated: 2022-01-06T07:03:17Z
department:
- _id: '66'
doi: 10.1007/978-3-319-10172-9_23
intvolume: '      8659'
language:
- iso: eng
page: 357-365
publication: 12th International Conference on Business Process Management (BPM 2014)
publication_identifier:
  isbn:
  - '9783319101712'
  - '9783319101729'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Use Your Best Device! Enabling Device Changes at Runtime
type: conference
user_id: '11308'
volume: 8659
year: '2014'
...
---
_id: '16870'
citation:
  ama: 'Flocchini P, Gao J, Kranakis E, Meyer auf der Heide F, eds. <i>Algorithms
    for Sensor Systems - 9th International Symposium on Algorithms and Experiments
    for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS}
    2013</i>. Vol 8243. Berlin, Heidelberg: Springer; 2014. doi:<a href="https://doi.org/10.1007/978-3-642-45346-5">10.1007/978-3-642-45346-5</a>'
  apa: 'Flocchini, P., Gao, J., Kranakis, E., &#38; Meyer auf der Heide, F. (Eds.).
    (2014). <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms
    and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics,
    {ALGOSENSORS} 2013</i> (Vol. 8243). Berlin, Heidelberg: Springer. <a href="https://doi.org/10.1007/978-3-642-45346-5">https://doi.org/10.1007/978-3-642-45346-5</a>'
  bibtex: '@book{Flocchini_Gao_Kranakis_Meyer auf der Heide_2014, place={Berlin, Heidelberg},
    series={Lecture Notes in Computer Science}, title={Algorithms for Sensor Systems
    - 9th International Symposium on Algorithms and Experiments for Sensor Systems,
    Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013}, volume={8243},
    DOI={<a href="https://doi.org/10.1007/978-3-642-45346-5">10.1007/978-3-642-45346-5</a>},
    publisher={Springer}, year={2014}, collection={Lecture Notes in Computer Science}
    }'
  chicago: 'Flocchini, Paola, Jie Gao, Evangelos Kranakis, and Friedhelm Meyer auf
    der Heide, eds. <i>Algorithms for Sensor Systems - 9th International Symposium
    on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed
    Robotics, {ALGOSENSORS} 2013</i>. Vol. 8243. Lecture Notes in Computer Science.
    Berlin, Heidelberg: Springer, 2014. <a href="https://doi.org/10.1007/978-3-642-45346-5">https://doi.org/10.1007/978-3-642-45346-5</a>.'
  ieee: 'P. Flocchini, J. Gao, E. Kranakis, and F. Meyer auf der Heide, Eds., <i>Algorithms
    for Sensor Systems - 9th International Symposium on Algorithms and Experiments
    for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS}
    2013</i>, vol. 8243. Berlin, Heidelberg: Springer, 2014.'
  mla: Flocchini, Paola, et al., editors. <i>Algorithms for Sensor Systems - 9th International
    Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks
    and Distributed Robotics, {ALGOSENSORS} 2013</i>. Vol. 8243, Springer, 2014, doi:<a
    href="https://doi.org/10.1007/978-3-642-45346-5">10.1007/978-3-642-45346-5</a>.
  short: P. Flocchini, J. Gao, E. Kranakis, F. Meyer auf der Heide, eds., Algorithms
    for Sensor Systems - 9th International Symposium on Algorithms and Experiments
    for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS}
    2013, Springer, Berlin, Heidelberg, 2014.
date_created: 2020-04-27T10:31:57Z
date_updated: 2022-01-06T06:52:58Z
department:
- _id: '63'
doi: 10.1007/978-3-642-45346-5
editor:
- first_name: Paola
  full_name: Flocchini, Paola
  last_name: Flocchini
- first_name: Jie
  full_name: Gao, Jie
  last_name: Gao
- first_name: Evangelos
  full_name: Kranakis, Evangelos
  last_name: Kranakis
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
intvolume: '      8243'
language:
- iso: eng
place: Berlin, Heidelberg
publication_identifier:
  isbn:
  - '9783642453458'
  - '9783642453465'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: Algorithms for Sensor Systems - 9th International Symposium on Algorithms and
  Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS}
  2013
type: book_editor
user_id: '15415'
volume: 8243
year: '2014'
...
---
_id: '15092'
author:
- first_name: Stefan
  full_name: Böttcher, Stefan
  id: '624'
  last_name: Böttcher
- first_name: Rita
  full_name: Hartel, Rita
  id: '14961'
  last_name: Hartel
- first_name: Jonathan
  full_name: Rabe, Jonathan
  last_name: Rabe
citation:
  ama: 'Böttcher S, Hartel R, Rabe J. Efficient XML Keyword Search Based on DAG-Compression.
    In: <i>Database and Expert Systems Applications - 25th International Conference,
    DEXA 2014</i>. Cham: Springer; 2014:122-137. doi:<a href="https://doi.org/10.1007/978-3-319-10073-9_11">10.1007/978-3-319-10073-9_11</a>'
  apa: 'Böttcher, S., Hartel, R., &#38; Rabe, J. (2014). Efficient XML Keyword Search
    Based on DAG-Compression. In <i>Database and Expert Systems Applications - 25th
    International Conference, DEXA 2014</i> (pp. 122–137). Cham: Springer. <a href="https://doi.org/10.1007/978-3-319-10073-9_11">https://doi.org/10.1007/978-3-319-10073-9_11</a>'
  bibtex: '@inproceedings{Böttcher_Hartel_Rabe_2014, place={Cham}, title={Efficient
    XML Keyword Search Based on DAG-Compression}, DOI={<a href="https://doi.org/10.1007/978-3-319-10073-9_11">10.1007/978-3-319-10073-9_11</a>},
    booktitle={Database and Expert Systems Applications - 25th International Conference,
    DEXA 2014}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and
    Rabe, Jonathan}, year={2014}, pages={122–137} }'
  chicago: 'Böttcher, Stefan, Rita Hartel, and Jonathan Rabe. “Efficient XML Keyword
    Search Based on DAG-Compression.” In <i>Database and Expert Systems Applications
    - 25th International Conference, DEXA 2014</i>, 122–37. Cham: Springer, 2014.
    <a href="https://doi.org/10.1007/978-3-319-10073-9_11">https://doi.org/10.1007/978-3-319-10073-9_11</a>.'
  ieee: S. Böttcher, R. Hartel, and J. Rabe, “Efficient XML Keyword Search Based on
    DAG-Compression,” in <i>Database and Expert Systems Applications - 25th International
    Conference, DEXA 2014</i>, 2014, pp. 122–137.
  mla: Böttcher, Stefan, et al. “Efficient XML Keyword Search Based on DAG-Compression.”
    <i>Database and Expert Systems Applications - 25th International Conference, DEXA
    2014</i>, Springer, 2014, pp. 122–37, doi:<a href="https://doi.org/10.1007/978-3-319-10073-9_11">10.1007/978-3-319-10073-9_11</a>.
  short: 'S. Böttcher, R. Hartel, J. Rabe, in: Database and Expert Systems Applications
    - 25th International Conference, DEXA 2014, Springer, Cham, 2014, pp. 122–137.'
date_created: 2019-11-21T15:19:02Z
date_updated: 2022-01-06T06:52:15Z
department:
- _id: '69'
doi: 10.1007/978-3-319-10073-9_11
language:
- iso: eng
page: 122-137
place: Cham
publication: Database and Expert Systems Applications - 25th International Conference,
  DEXA 2014
publication_identifier:
  isbn:
  - '9783319100722'
  - '9783319100739'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer
status: public
title: Efficient XML Keyword Search Based on DAG-Compression
type: conference
user_id: '14961'
year: '2014'
...
---
_id: '16394'
author:
- first_name: Tamás
  full_name: Lukovszki, Tamás
  last_name: Lukovszki
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
citation:
  ama: 'Lukovszki T, Meyer auf der Heide F. Fast Collisionless Pattern Formation by
    Anonymous, Position-Aware Robots. In: <i>Lecture Notes in Computer Science</i>.
    Cham; 2014. doi:<a href="https://doi.org/10.1007/978-3-319-14472-6_17">10.1007/978-3-319-14472-6_17</a>'
  apa: Lukovszki, T., &#38; Meyer auf der Heide, F. (2014). Fast Collisionless Pattern
    Formation by Anonymous, Position-Aware Robots. In <i>Lecture Notes in Computer
    Science</i>. Cham. <a href="https://doi.org/10.1007/978-3-319-14472-6_17">https://doi.org/10.1007/978-3-319-14472-6_17</a>
  bibtex: '@inbook{Lukovszki_Meyer auf der Heide_2014, place={Cham}, title={Fast Collisionless
    Pattern Formation by Anonymous, Position-Aware Robots}, DOI={<a href="https://doi.org/10.1007/978-3-319-14472-6_17">10.1007/978-3-319-14472-6_17</a>},
    booktitle={Lecture Notes in Computer Science}, author={Lukovszki, Tamás and Meyer
    auf der Heide, Friedhelm}, year={2014} }'
  chicago: Lukovszki, Tamás, and Friedhelm Meyer auf der Heide. “Fast Collisionless
    Pattern Formation by Anonymous, Position-Aware Robots.” In <i>Lecture Notes in
    Computer Science</i>. Cham, 2014. <a href="https://doi.org/10.1007/978-3-319-14472-6_17">https://doi.org/10.1007/978-3-319-14472-6_17</a>.
  ieee: T. Lukovszki and F. Meyer auf der Heide, “Fast Collisionless Pattern Formation
    by Anonymous, Position-Aware Robots,” in <i>Lecture Notes in Computer Science</i>,
    Cham, 2014.
  mla: Lukovszki, Tamás, and Friedhelm Meyer auf der Heide. “Fast Collisionless Pattern
    Formation by Anonymous, Position-Aware Robots.” <i>Lecture Notes in Computer Science</i>,
    2014, doi:<a href="https://doi.org/10.1007/978-3-319-14472-6_17">10.1007/978-3-319-14472-6_17</a>.
  short: 'T. Lukovszki, F. Meyer auf der Heide, in: Lecture Notes in Computer Science,
    Cham, 2014.'
date_created: 2020-04-03T07:58:53Z
date_updated: 2022-01-06T06:52:50Z
department:
- _id: '63'
doi: 10.1007/978-3-319-14472-6_17
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783319144719'
  - '9783319144726'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots
type: book_chapter
user_id: '15415'
year: '2014'
...
---
_id: '16395'
author:
- first_name: Sebastian
  full_name: Abshoff, Sebastian
  last_name: Abshoff
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
citation:
  ama: 'Abshoff S, Meyer auf der Heide F. Continuous Aggregation in Dynamic Ad-Hoc
    Networks. In: <i>Structural Information and Communication Complexity</i>. Cham;
    2014. doi:<a href="https://doi.org/10.1007/978-3-319-09620-9_16">10.1007/978-3-319-09620-9_16</a>'
  apa: Abshoff, S., &#38; Meyer auf der Heide, F. (2014). Continuous Aggregation in
    Dynamic Ad-Hoc Networks. In <i>Structural Information and Communication Complexity</i>.
    Cham. <a href="https://doi.org/10.1007/978-3-319-09620-9_16">https://doi.org/10.1007/978-3-319-09620-9_16</a>
  bibtex: '@inbook{Abshoff_Meyer auf der Heide_2014, place={Cham}, title={Continuous
    Aggregation in Dynamic Ad-Hoc Networks}, DOI={<a href="https://doi.org/10.1007/978-3-319-09620-9_16">10.1007/978-3-319-09620-9_16</a>},
    booktitle={Structural Information and Communication Complexity}, author={Abshoff,
    Sebastian and Meyer auf der Heide, Friedhelm}, year={2014} }'
  chicago: Abshoff, Sebastian, and Friedhelm Meyer auf der Heide. “Continuous Aggregation
    in Dynamic Ad-Hoc Networks.” In <i>Structural Information and Communication Complexity</i>.
    Cham, 2014. <a href="https://doi.org/10.1007/978-3-319-09620-9_16">https://doi.org/10.1007/978-3-319-09620-9_16</a>.
  ieee: S. Abshoff and F. Meyer auf der Heide, “Continuous Aggregation in Dynamic
    Ad-Hoc Networks,” in <i>Structural Information and Communication Complexity</i>,
    Cham, 2014.
  mla: Abshoff, Sebastian, and Friedhelm Meyer auf der Heide. “Continuous Aggregation
    in Dynamic Ad-Hoc Networks.” <i>Structural Information and Communication Complexity</i>,
    2014, doi:<a href="https://doi.org/10.1007/978-3-319-09620-9_16">10.1007/978-3-319-09620-9_16</a>.
  short: 'S. Abshoff, F. Meyer auf der Heide, in: Structural Information and Communication
    Complexity, Cham, 2014.'
date_created: 2020-04-03T09:00:16Z
date_updated: 2022-01-06T06:52:50Z
department:
- _id: '63'
doi: 10.1007/978-3-319-09620-9_16
language:
- iso: eng
place: Cham
publication: Structural Information and Communication Complexity
publication_identifier:
  isbn:
  - '9783319096193'
  - '9783319096209'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Continuous Aggregation in Dynamic Ad-Hoc Networks
type: book_chapter
user_id: '15415'
year: '2014'
...
---
_id: '47839'
author:
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Kevin
  full_name: Stegemann, Kevin
  last_name: Stegemann
- first_name: Dominique
  full_name: Petersen, Dominique
  last_name: Petersen
- first_name: Norbert
  full_name: Pohlmann, Norbert
  last_name: Pohlmann
citation:
  ama: 'Fourné M, Stegemann K, Petersen D, Pohlmann N. Aggregation of Network Protocol
    Data Near Its Source. In: <i>Information and Communication Technology</i>. Springer
    Berlin Heidelberg; 2014. doi:<a href="https://doi.org/10.1007/978-3-642-55032-4_49">10.1007/978-3-642-55032-4_49</a>'
  apa: Fourné, M., Stegemann, K., Petersen, D., &#38; Pohlmann, N. (2014). Aggregation
    of Network Protocol Data Near Its Source. In <i>Information and Communication
    Technology</i>. Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-642-55032-4_49">https://doi.org/10.1007/978-3-642-55032-4_49</a>
  bibtex: '@inbook{Fourné_Stegemann_Petersen_Pohlmann_2014, place={Berlin, Heidelberg},
    title={Aggregation of Network Protocol Data Near Its Source}, DOI={<a href="https://doi.org/10.1007/978-3-642-55032-4_49">10.1007/978-3-642-55032-4_49</a>},
    booktitle={Information and Communication Technology}, publisher={Springer Berlin
    Heidelberg}, author={Fourné, Marcel and Stegemann, Kevin and Petersen, Dominique
    and Pohlmann, Norbert}, year={2014} }'
  chicago: 'Fourné, Marcel, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann.
    “Aggregation of Network Protocol Data Near Its Source.” In <i>Information and
    Communication Technology</i>. Berlin, Heidelberg: Springer Berlin Heidelberg,
    2014. <a href="https://doi.org/10.1007/978-3-642-55032-4_49">https://doi.org/10.1007/978-3-642-55032-4_49</a>.'
  ieee: 'M. Fourné, K. Stegemann, D. Petersen, and N. Pohlmann, “Aggregation of Network
    Protocol Data Near Its Source,” in <i>Information and Communication Technology</i>,
    Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.'
  mla: Fourné, Marcel, et al. “Aggregation of Network Protocol Data Near Its Source.”
    <i>Information and Communication Technology</i>, Springer Berlin Heidelberg, 2014,
    doi:<a href="https://doi.org/10.1007/978-3-642-55032-4_49">10.1007/978-3-642-55032-4_49</a>.
  short: 'M. Fourné, K. Stegemann, D. Petersen, N. Pohlmann, in: Information and Communication
    Technology, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.'
date_created: 2023-10-06T16:08:23Z
date_updated: 2023-10-06T16:22:35Z
doi: 10.1007/978-3-642-55032-4_49
extern: '1'
language:
- iso: eng
place: Berlin, Heidelberg
publication: Information and Communication Technology
publication_identifier:
  isbn:
  - '9783642550317'
  - '9783642550324'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Aggregation of Network Protocol Data Near Its Source
type: book_chapter
user_id: '99291'
year: '2014'
...
