@article{34844,
  abstract     = {{Let k be a number field, K/k a finite Galois extension with Galois group G, χ a faithful character of G. We prove that the Artin L-function L(s,χ,K/k) determines the Galois closure of K over $\ℚ$. In the special case $k=\ℚ$ it also determines the character χ. }},
  author       = {{Klüners, Jürgen and Nicolae, Florin}},
  issn         = {{0022-314X}},
  journal      = {{Journal of Number Theory}},
  keywords     = {{Algebra and Number Theory}},
  pages        = {{161--168}},
  publisher    = {{Elsevier BV}},
  title        = {{{Are number fields determined by Artin L-functions?}}},
  doi          = {{10.1016/j.jnt.2016.03.023}},
  volume       = {{167}},
  year         = {{2016}},
}

@article{42792,
  abstract     = {{We enumerate all positive definite ternary quadratic forms over number fields with class number at most 2. This is done by constructing all definite quaternion orders of type number at most 2 over number fields. Finally, we list all definite quaternion orders of ideal class number 1 or 2.}},
  author       = {{Kirschmer, Markus and Lorch, David}},
  issn         = {{0022-314X}},
  journal      = {{Journal of Number Theory}},
  keywords     = {{Algebra and Number Theory}},
  pages        = {{343--361}},
  publisher    = {{Elsevier BV}},
  title        = {{{Ternary quadratic forms over number fields with small class number}}},
  doi          = {{10.1016/j.jnt.2014.11.001}},
  volume       = {{161}},
  year         = {{2016}},
}

@inproceedings{1144,
  abstract     = {{Adopting the concept of “Local Grammars” (M. Gross), which were successfully applied in practice by (Geierhos, 2010) to biographical information extraction in English our project aims to detect, encode, and finally visualize relations between persons. Our corpus consists of the digitised biographical lexicon “Neue Deutsche Biographie (NDB)”, roughly 21.000 biographies in 25 volumes in print since 1953. We developed local grammars and suitable dictionaries to describe interpersonal relations and applied them to the corpus with Unitex 3.1. The local grammars were designed to integrate existing TEI-XML structures in the corpus. Using the ability of local grammars in Unitex to act as transducers we were able to produce XML-Tags and encode semantic information. Based on grammars for personal names and places we described interpersonal relations like to study, predecessors and successors as well as friends and circles. Afterwards we
identified persons (as given in the authority file or index). Finally we displayed relations on our website in an interactive and dynamic way. Utilizing the Javascript library D3.js we represented named relations between identified individuals as ego centred network graphs.}},
  author       = {{Stotz, Sophia and Stuß, Valentina and Reinert , Matthias and Schrott, Maximilian}},
  booktitle    = {{Proceedings of the First Conference on Biographical Data in a Digital World 2015}},
  editor       = {{ter Braake, Serge and Fokkens, Antske and Sluijter, Ronald and Declerck, Thierry and Wandl-Vogt, Eveline}},
  issn         = {{16130073}},
  keywords     = {{Local Grammar, Relation Extraction, Visualisation}},
  location     = {{Amsterdam, Netherlands}},
  pages        = {{74--80}},
  publisher    = {{CEUR-WS.org}},
  title        = {{{Interpersonal relations in biographical dictionaries. A case study}}},
  volume       = {{1399}},
  year         = {{2015}},
}

@inproceedings{5588,
  abstract     = {{The protection of information technology (IT) has become and is predicted to remain a key economic challenge for organizations. While research on IT security investment is fast growing, it lacks a theoretical basis for structuring research, explaining economic-technological phenomena and guide future research. We address this shortcoming by suggesting a new theoretical model emerging from a multi-theoretical perspective adopt-ing the Resource-Based View and the Organizational Learning Theory. The joint appli-cation of these theories allows to conceptualize in one theoretical model the organiza-tional learning effects that occur when the protection of organizational resources through IT security countermeasures develops over time. We use this model of IT security invest-ments to synthesize findings of a large body of literature and to derive research gaps. We also discuss managerial implications of (closing) these gaps by providing practical ex-amples.}},
  author       = {{Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}},
  booktitle    = {{International Conference on Information Systems}},
  keywords     = {{Information Security, Investment, Literature review, Resource-based View, Organi-zational Learning Theory, Multi-theoretical Perspective}},
  title        = {{{A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory}}},
  year         = {{2015}},
}

@inproceedings{5590,
  abstract     = {{Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview.}},
  author       = {{Weishäupl, Eva and Kunz, Michael and Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul, Günther}},
  booktitle    = {{2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)}},
  keywords     = {{Identity and Access Management, Economic Decision Making, Information Systems, Information Security Investment, Decision Theory}},
  title        = {{{Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory}}},
  year         = {{2015}},
}

@inproceedings{5618,
  abstract     = {{Literature reviews play an important role in the development of knowledge. Yet, we observe a lack of theoretical underpinning of and epistemological insights into how literature reviews can contribute to knowledge creation and have actually contributed in the IS discipline. To address these theoretical and empirical research gaps, we suggest a novel epistemological model of literature reviews. This model allows us to align different contributions of literature reviews with their underlying knowledge conversions - thereby building a bridge between the previously largely unconnected fields of literature reviews and epistemology. We evaluate the appropriateness of the model by conducting an empirical analysis of 173 IS literature reviews which were published in 39 pertinent IS journals between 2000 and 2014. Based on this analysis, we derive an epistemological taxonomy of IS literature reviews, which complements previously suggested typologies.}},
  author       = {{Schryen, Guido and Wagner, Gerit and Benlian, Alexander}},
  booktitle    = {{International Conference on Information Systems (ICIS)}},
  keywords     = {{Literature review, Research methods/methodology, Theory of knowledge}},
  title        = {{{Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature}}},
  year         = {{2015}},
}

@inproceedings{17661,
  author       = {{King, Thomas C. and Liu, Qingzhi and Polevoy, Gleb and de Weerdt, Mathijs and Dignum, Virginia and van Riemsdijk, M. Birna and Warnier, Martijn}},
  booktitle    = {{Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems}},
  isbn         = {{978-1-4503-2738-1}},
  keywords     = {{crowd-sensing, crowdsourcing, data aggregation, game theory, norms, reciprocation, self interested agents, simulation}},
  pages        = {{1651--1652}},
  publisher    = {{International Foundation for Autonomous Agents and Multiagent Systems}},
  title        = {{{Request Driven Social Sensing}}},
  year         = {{2014}},
}

@article{4697,
  author       = {{Sommerauer, Peter and Müller, Oliver}},
  isbn         = {{0360-1315}},
  issn         = {{03601315}},
  journal      = {{Computers and Education}},
  keywords     = {{Augmented reality, Cognitive theory of multimedia learning, Field experiment, Informal learning, Museum}},
  pages        = {{59----68}},
  title        = {{{Augmented reality in informal learning environments: A field experiment in a mathematics exhibition}}},
  doi          = {{10.1016/j.compedu.2014.07.013}},
  year         = {{2014}},
}

@article{34845,
  abstract     = {{Computational Galois theory, in particular the problem of computing the Galois group of a given polynomial, is a very old problem. Currently, the best algorithmic solution is Stauduhar’s method. Computationally, one of the key challenges in the application of Stauduhar’s method is to find, for a given pair of groups H<G, a G-relative H-invariant, that is a multivariate polynomial F that is H-invariant, but not G-invariant. While generic, theoretical methods are known to find such F, in general they yield impractical answers. We give a general method for computing invariants of large degree which improves on previous known methods, as well as various special invariants that are derived from the structure of the groups. We then apply our new invariants to the task of computing the Galois groups of polynomials over the rational numbers, resulting in the first practical degree independent algorithm.}},
  author       = {{Fieker, Claus and Klüners, Jürgen}},
  issn         = {{1461-1570}},
  journal      = {{LMS Journal of Computation and Mathematics}},
  keywords     = {{Computational Theory and Mathematics, General Mathematics}},
  number       = {{1}},
  pages        = {{141--158}},
  publisher    = {{Wiley}},
  title        = {{{Computation of Galois groups of rational polynomials}}},
  doi          = {{10.1112/s1461157013000302}},
  volume       = {{17}},
  year         = {{2014}},
}

@article{42793,
  abstract     = {{Suppose Q is a definite quadratic form on a vector space V over some totally real field K ≠ Q. Then the maximal integral Zₖ-lattices in (V,Q) are locally isometric everywhere and hence form a single genus. We enumerate all orthogonal spaces (V,Q) of dimension at least 3, where the corresponding genus of maximal integral lattices consists of a single isometry class. It turns out, there are 471 such genera. Moreover, the dimension of V and the degree of K are bounded by 6 and 5 respectively. This classification also yields all maximal quaternion orders of type number one.}},
  author       = {{Kirschmer, Markus}},
  issn         = {{0022-314X}},
  journal      = {{Journal of Number Theory}},
  keywords     = {{Algebra and Number Theory}},
  pages        = {{375--393}},
  publisher    = {{Elsevier BV}},
  title        = {{{One-class genera of maximal integral quadratic forms}}},
  doi          = {{10.1016/j.jnt.2013.10.007}},
  volume       = {{136}},
  year         = {{2014}},
}

@article{42794,
  abstract     = {{We exhibit a practical algorithm for solving the constructive membership problem for discrete free subgroups of rank 2 in PSL₂(R) or SL₂(R). This algorithm, together with methods for checking whether a two-generator subgroup of PSL₂(R) or SL₂(R) is discrete and free, have been implemented in Magma for groups defined over real algebraic number fields.}},
  author       = {{Eick, B. and Kirschmer, Markus and Leedham-Green, C.}},
  issn         = {{1461-1570}},
  journal      = {{LMS Journal of Computation and Mathematics}},
  keywords     = {{Computational Theory and Mathematics, General Mathematics}},
  number       = {{1}},
  pages        = {{345--359}},
  publisher    = {{Wiley}},
  title        = {{{The constructive membership problem for discrete free subgroups of rank 2 of SL₂(R)}}},
  doi          = {{10.1112/s1461157014000047}},
  volume       = {{17}},
  year         = {{2014}},
}

@article{46266,
  author       = {{Alizadeh, Bijan and Behnam, Payman and Sadeghi-Kohan, Somayeh}},
  issn         = {{0018-9340}},
  journal      = {{IEEE Transactions on Computers}},
  keywords     = {{Computational Theory and Mathematics, Hardware and Architecture, Theoretical Computer Science, Software}},
  pages        = {{1--1}},
  publisher    = {{Institute of Electrical and Electronics Engineers (IEEE)}},
  title        = {{{A Scalable Formal Debugging Approach with Auto-Correction Capability based on Static Slicing and Dynamic Ranking for RTL Datapath Designs}}},
  doi          = {{10.1109/tc.2014.2329687}},
  year         = {{2014}},
}

@inproceedings{4478,
  abstract     = {{The purpose of the research was to develop and validate an instrument for the assessment of attitudes towards the study environment in higher education contexts. The questionnaire is designed to measure students' attitudes towards two particular objects: the university (or Higher Education Institution) and the process of studying. Five studies at two different universities were conducted to develop and validate the Attitudes towards the Study Environment Questionnaire (ASEQ). In total, 1640 students filled in the questionnaire. Reliability tests and exploratory factor analysis as well as confirmatory factor analysis showed satisfactory psychometric characteristics of the ASEQ. Each part of the questionnaire is internally consistent and construct validity of the scales is supported by correlations with other constructs as assumed by current theories: Positive attitudinal constructs (normative behavior, autonomy, joy, self-efficacy, and task value) are positively related to intrinsic motivation and the expected study performance while anxiety is negatively related to these constructs. 
Since attitudes towards the study situation are connected to student engagement and motivation, the study contributes to the theory of student learning by providing a validated instrument to assess attitudes. Thus, the ASEQ can support further research on student performance and development by providing an instrument for the hitherto neglected but nonetheless extremely relevant domain of attitudes. Also, the questionnaire can be used as a diagnostic instrument for higher education faculty and administration to trace students' attitudinal development over time - a factor of prime importance for student socialization during the introductory phase of studying.}},
  author       = {{Brahm, Taiga and Jenert, Tobias and Euler, Dieter}},
  keywords     = {{attitudes, teaching and learning, studying, higher education institution, theory of planned behavior, instrument development}},
  location     = {{München }},
  publisher    = {{EARLI European Association for Research on Learning and Instruction}},
  title        = {{{On the assessment of attitudes towards the study process and the university: Attitudes towards the Study Environment Questionnaire (ASEQ)}}},
  year         = {{2013}},
}

@inproceedings{4481,
  abstract     = {{Die vorliegende Untersuchung an der Universität St. Gallen soll Erkenntnisse über die Verläufe der Einstellungsveränderungen der Studierenden geben (vgl. Brahm & Jenert, 2012). Basierend auf der Theorie des geplanten Verhaltens (Ajzen & Fishbein, 1980) werden drei Forschungsfragen adressiert: (1) Gibt es typische Pfade der Einstellungsentwicklung? (2) Wie wird das normative Verhalten von Mitstudierenden und anderen Personen wahrgenommen? (3) Welche Erfahrungen beeinflussen die Entwicklung? Zur Beantwortung dieser Fragen wurde über das erste Studienjahr hinweg eine Interviewserie mit 13 Studierenden durchgeführt. Die Datenanalyse mithilfe grafischer Case Histories zeigt, dass die Einstellungen der Probanden über die Zeit differenzierter werden. Zudem gibt es Widersprüche zwischen den Einstellungen und dem wahrgenommenen normativen Verhalten. Dabei ist die Einstellungsentwicklung von konkreten Ereignissen geprägt und kann damit durch strukturelle Interventionen beeinflusst werden.}},
  author       = {{Jenert, Tobias and Brahm, Taiga}},
  keywords     = {{student attitudes, theory of planned behaviour, Einstellungsentwicklung, student motivation}},
  location     = {{Hildesheim}},
  publisher    = {{Institut für Psychologie}},
  title        = {{{Die Entwicklung studien-und hochschulbezogener Einstellungen an einer Wirtschaftsuniversität: eine qualitative Längsschnittstudie}}},
  year         = {{2013}},
}

@inproceedings{4698,
  author       = {{Gregor, Shirley and Müller, Oliver and Seidel, Stefan}},
  booktitle    = {{European Conference on Information Systems}},
  keywords     = {{Abstraction, Affordances, Design Science Research, Design Theory, Information Systems Development, Reflection, Theorizing}},
  title        = {{{Reflection, abstraction and theorizing in design and development research}}},
  year         = {{2013}},
}

@inproceedings{11716,
  abstract     = {{The accuracy of automatic speech recognition systems in noisy and reverberant environments can be improved notably by exploiting the uncertainty of the estimated speech features using so-called uncertainty-of-observation techniques. In this paper, we introduce a new Bayesian decision rule that can serve as a mathematical framework from which both known and new uncertainty-of-observation techniques can be either derived or approximated. The new decision rule in its direct form leads to the new significance decoding approach for Gaussian mixture models, which results in better performance compared to standard uncertainty-of-observation techniques in different additive and convolutive noise scenarios.}},
  author       = {{Abdelaziz, Ahmed H. and Zeiler, Steffen and Kolossa, Dorothea and Leutnant, Volker and Haeb-Umbach, Reinhold}},
  booktitle    = {{Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on}},
  issn         = {{1520-6149}},
  keywords     = {{Bayes methods, Gaussian processes, convolution, decision theory, decoding, noise, reverberation, speech coding, speech recognition, Bayesian decision rule, GMM, Gaussian mixture models, additive noise scenarios, automatic speech recognition systems, convolutive noise scenarios, decoding approach, mathematical framework, reverberant environments, significance decoding, speech feature estimation, uncertainty-of-observation techniques, Hidden Markov models, Maximum likelihood decoding, Noise, Speech, Speech recognition, Uncertainty, Uncertainty-of-observation, modified imputation, noise robust speech recognition, significance decoding, uncertainty decoding}},
  pages        = {{6827--6831}},
  title        = {{{GMM-based significance decoding}}},
  doi          = {{10.1109/ICASSP.2013.6638984}},
  year         = {{2013}},
}

@inproceedings{11917,
  abstract     = {{In this paper we present a speech presence probability (SPP) estimation algorithmwhich exploits both temporal and spectral correlations of speech. To this end, the SPP estimation is formulated as the posterior probability estimation of the states of a two-dimensional (2D) Hidden Markov Model (HMM). We derive an iterative algorithm to decode the 2D-HMM which is based on the turbo principle. The experimental results show that indeed the SPP estimates improve from iteration to iteration, and further clearly outperform another state-of-the-art SPP estimation algorithm.}},
  author       = {{Vu, Dang Hai Tran and Haeb-Umbach, Reinhold}},
  booktitle    = {{38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)}},
  issn         = {{1520-6149}},
  keywords     = {{correlation methods, estimation theory, hidden Markov models, iterative methods, probability, spectral analysis, speech processing, 2D HMM, SPP estimates, iterative algorithm, posterior probability estimation, spectral correlation, speech presence probability estimation, state-of-the-art SPP estimation algorithm, temporal correlation, turbo principle, two-dimensional hidden Markov model, Correlation, Decoding, Estimation, Iterative decoding, Noise, Speech, Vectors}},
  pages        = {{863--867}},
  title        = {{{Using the turbo principle for exploiting temporal and spectral correlations in speech presence probability estimation}}},
  doi          = {{10.1109/ICASSP.2013.6637771}},
  year         = {{2013}},
}

@article{37672,
  abstract     = {{<jats:title>Abstract</jats:title><jats:p>Let <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline1" /><jats:tex-math>${F}_{BC} (\lambda , k; t)$</jats:tex-math></jats:alternatives></jats:inline-formula> be the Heckman–Opdam hypergeometric function of type BC with multiplicities <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline2" /><jats:tex-math>$k= ({k}_{1} , {k}_{2} , {k}_{3} )$</jats:tex-math></jats:alternatives></jats:inline-formula> and weighted half-sum <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline3" /><jats:tex-math>$\rho (k)$</jats:tex-math></jats:alternatives></jats:inline-formula> of positive roots. We prove that <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline4" /><jats:tex-math>${F}_{BC} (\lambda + \rho (k), k; t)$</jats:tex-math></jats:alternatives></jats:inline-formula> converges as <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline5" /><jats:tex-math>${k}_{1} + {k}_{2} \rightarrow \infty $</jats:tex-math></jats:alternatives></jats:inline-formula> and <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline6" /><jats:tex-math>${k}_{1} / {k}_{2} \rightarrow \infty $</jats:tex-math></jats:alternatives></jats:inline-formula> to a function of type A for <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline7" /><jats:tex-math>$t\in { \mathbb{R} }^{n} $</jats:tex-math></jats:alternatives></jats:inline-formula> and <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline8" /><jats:tex-math>$\lambda \in { \mathbb{C} }^{n} $</jats:tex-math></jats:alternatives></jats:inline-formula>. This limit is obtained from a corresponding result for Jacobi polynomials of type BC, which is proven for a slightly more general limit behavior of the multiplicities, using an explicit representation of Jacobi polynomials in terms of Jack polynomials. Our limits include limit transitions for the spherical functions of non-compact Grassmann manifolds over one of the fields <jats:inline-formula><jats:alternatives><jats:inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" mime-subtype="gif" xlink:type="simple" xlink:href="S0010437X13007045_inline9" /><jats:tex-math>$ \mathbb{F} = \mathbb{R} , \mathbb{C} , \mathbb{H} $</jats:tex-math></jats:alternatives></jats:inline-formula> when the rank is fixed and the dimension tends to infinity. The limit functions turn out to be exactly the spherical functions of the corresponding infinite-dimensional Grassmann manifold in the sense of Olshanski.</jats:p>}},
  author       = {{Rösler, Margit and Koornwinder, Tom and Voit, Michael}},
  issn         = {{0010-437X}},
  journal      = {{Compositio Mathematica}},
  keywords     = {{Algebra and Number Theory}},
  number       = {{8}},
  pages        = {{1381--1400}},
  publisher    = {{Wiley}},
  title        = {{{Limit transition between hypergeometric functions of type BC and type A}}},
  doi          = {{10.1112/s0010437x13007045}},
  volume       = {{149}},
  year         = {{2013}},
}

@article{42796,
  abstract     = {{We give an enumeration of all positive definite primitive Z-lattices in dimension n ≥ 3 whose genus consists of a single isometry class. This is achieved by using bounds obtained from the Smith–Minkowski–Siegel mass formula to computationally construct the square-free determinant lattices with this property, and then repeatedly calculating pre-images under a mapping first introduced by G. L. Watson.

We hereby complete the classification of single-class genera in dimensions 4 and 5 and correct some mistakes in Watson’s classifications in other dimensions. A list of all single-class primitive Z-lattices has been compiled and incorporated into the Catalogue of Lattices.}},
  author       = {{Lorch, David and Kirschmer, Markus}},
  issn         = {{1461-1570}},
  journal      = {{LMS Journal of Computation and Mathematics}},
  keywords     = {{Computational Theory and Mathematics, General Mathematics}},
  pages        = {{172--186}},
  publisher    = {{Wiley}},
  title        = {{{Single-class genera of positive integral lattices}}},
  doi          = {{10.1112/s1461157013000107}},
  volume       = {{16}},
  year         = {{2013}},
}

@article{45933,
  author       = {{Karátson, J. and Kovács, Balázs}},
  issn         = {{0898-1221}},
  journal      = {{Computers &amp; Mathematics with Applications}},
  keywords     = {{Computational Mathematics, Computational Theory and Mathematics, Modeling and Simulation}},
  number       = {{3}},
  pages        = {{449--459}},
  publisher    = {{Elsevier BV}},
  title        = {{{Variable preconditioning in complex Hilbert space and its application to the nonlinear Schrödinger equation}}},
  doi          = {{10.1016/j.camwa.2012.04.021}},
  volume       = {{65}},
  year         = {{2012}},
}

