---
_id: '6082'
abstract:
- lang: eng
  text: 'When two targets are presented in rapid succession, the first target (T1)
    is usually identified, but the second target (T2) is often missed. A remarkable
    exception to this ''attentional blink'' occurs when T2 immediately follows the
    first T1, at lag 1. It is then often spared but reported in the wrong order—that
    is, before T1. These order reversals have led to the hypothesis that ''lag 1 sparing''
    occurs because the two targets merge into a single episodic representation. Here,
    we report evidence consistent with an alternative theory: T2 receives more attention
    than T1, leading to prior entry into working memory. Two experiments showed that
    the more T2 performance exceeded that for T1, the more order reversals were made.
    Furthermore, precuing T1 led to a shift in performance benefits from T2 to T1
    and to an equivalent reduction in order reversals. We conclude that it is not
    necessary to assume episodic integration to explain lag 1 sparing or the accompanying
    order reversals. (PsycINFO Dat'
author:
- first_name: Christian N. L.
  full_name: Olivers, Christian N. L.
  last_name: Olivers
- first_name: Frederic
  full_name: Hilkenmeier, Frederic
  last_name: Hilkenmeier
- first_name: Ingrid
  full_name: Scharlau, Ingrid
  id: '451'
  last_name: Scharlau
  orcid: 0000-0003-2364-9489
citation:
  ama: Olivers CNL, Hilkenmeier F, Scharlau I. Prior entry explains order reversals
    in the attentional blink. <i>Attention, Perception, &#38; Psychophysics</i>. 2011;73(1):53-67.
  apa: Olivers, C. N. L., Hilkenmeier, F., &#38; Scharlau, I. (2011). Prior entry
    explains order reversals in the attentional blink. <i>Attention, Perception, &#38;
    Psychophysics</i>, <i>73</i>(1), 53–67.
  bibtex: '@article{Olivers_Hilkenmeier_Scharlau_2011, title={Prior entry explains
    order reversals in the attentional blink.}, volume={73}, number={1}, journal={Attention,
    Perception, &#38; Psychophysics}, author={Olivers, Christian N. L. and Hilkenmeier,
    Frederic and Scharlau, Ingrid}, year={2011}, pages={53–67} }'
  chicago: 'Olivers, Christian N. L., Frederic Hilkenmeier, and Ingrid Scharlau. “Prior
    Entry Explains Order Reversals in the Attentional Blink.” <i>Attention, Perception,
    &#38; Psychophysics</i> 73, no. 1 (2011): 53–67.'
  ieee: C. N. L. Olivers, F. Hilkenmeier, and I. Scharlau, “Prior entry explains order
    reversals in the attentional blink.,” <i>Attention, Perception, &#38; Psychophysics</i>,
    vol. 73, no. 1, pp. 53–67, 2011.
  mla: Olivers, Christian N. L., et al. “Prior Entry Explains Order Reversals in the
    Attentional Blink.” <i>Attention, Perception, &#38; Psychophysics</i>, vol. 73,
    no. 1, 2011, pp. 53–67.
  short: C.N.L. Olivers, F. Hilkenmeier, I. Scharlau, Attention, Perception, &#38;
    Psychophysics 73 (2011) 53–67.
date_created: 2018-12-10T07:06:31Z
date_updated: 2022-06-07T00:16:50Z
department:
- _id: '424'
funded_apc: '1'
intvolume: '        73'
issue: '1'
keyword:
- attentional blink
- order reversals
- prior entry
- working memory
- visual attention
- attentional performance
- Adolescent
- Adult
- Attention
- Attentional Blink
- Color Perception
- Cues
- Discrimination (Psychology)
- Female
- Humans
- Male
- Memory
- Short-Term
- Pattern Recognition
- Visual
- Psychophysics
- Reaction Time
- Reversal Learning
- Sensory Gating
- Serial Learning
- Young Adult
- Eyeblink Reflex
- Stimulus Change
- Stimulus Parameters
- Visual Attention
- Attentional Blink
- Short Term Memory
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://kw.uni-paderborn.de/fileadmin/fakultaet/Institute/psychologie/Kognitive_Psychologie/Publikationen/Olivers_etal__2011__AP_PProofs.pdf
oa: '1'
page: 53 - 67
publication: Attention, Perception, & Psychophysics
publication_identifier:
  issn:
  - 1943-3921
publication_status: published
status: public
title: Prior entry explains order reversals in the attentional blink.
type: journal_article
user_id: '42165'
volume: 73
year: '2011'
...
---
_id: '17246'
author:
- first_name: Iris
  full_name: Nomikou, Iris
  last_name: Nomikou
- first_name: Katharina
  full_name: Rohlfing, Katharina
  id: '50352'
  last_name: Rohlfing
citation:
  ama: 'Nomikou I, Rohlfing K. Language Does Something: Body Action and Language in
    Maternal Input to Three-Month-Olds. <i>IEEE Transactions on Autonomous Mental
    Development</i>. 2011;3(2):113-128. doi:<a href="https://doi.org/10.1109/TAMD.2011.2140113">10.1109/TAMD.2011.2140113</a>'
  apa: 'Nomikou, I., &#38; Rohlfing, K. (2011). Language Does Something: Body Action
    and Language in Maternal Input to Three-Month-Olds. <i>IEEE Transactions on Autonomous
    Mental Development</i>, <i>3</i>(2), 113–128. <a href="https://doi.org/10.1109/TAMD.2011.2140113">https://doi.org/10.1109/TAMD.2011.2140113</a>'
  bibtex: '@article{Nomikou_Rohlfing_2011, title={Language Does Something: Body Action
    and Language in Maternal Input to Three-Month-Olds}, volume={3}, DOI={<a href="https://doi.org/10.1109/TAMD.2011.2140113">10.1109/TAMD.2011.2140113</a>},
    number={2}, journal={IEEE Transactions on Autonomous Mental Development}, publisher={Institute
    of Electrical &#38; Electronics Engineers (IEEE)}, author={Nomikou, Iris and Rohlfing,
    Katharina}, year={2011}, pages={113–128} }'
  chicago: 'Nomikou, Iris, and Katharina Rohlfing. “Language Does Something: Body
    Action and Language in Maternal Input to Three-Month-Olds.” <i>IEEE Transactions
    on Autonomous Mental Development</i> 3, no. 2 (2011): 113–28. <a href="https://doi.org/10.1109/TAMD.2011.2140113">https://doi.org/10.1109/TAMD.2011.2140113</a>.'
  ieee: 'I. Nomikou and K. Rohlfing, “Language Does Something: Body Action and Language
    in Maternal Input to Three-Month-Olds,” <i>IEEE Transactions on Autonomous Mental
    Development</i>, vol. 3, no. 2, pp. 113–128, 2011, doi: <a href="https://doi.org/10.1109/TAMD.2011.2140113">10.1109/TAMD.2011.2140113</a>.'
  mla: 'Nomikou, Iris, and Katharina Rohlfing. “Language Does Something: Body Action
    and Language in Maternal Input to Three-Month-Olds.” <i>IEEE Transactions on Autonomous
    Mental Development</i>, vol. 3, no. 2, Institute of Electrical &#38; Electronics
    Engineers (IEEE), 2011, pp. 113–28, doi:<a href="https://doi.org/10.1109/TAMD.2011.2140113">10.1109/TAMD.2011.2140113</a>.'
  short: I. Nomikou, K. Rohlfing, IEEE Transactions on Autonomous Mental Development
    3 (2011) 113–128.
date_created: 2020-06-24T13:02:12Z
date_updated: 2023-02-01T12:54:33Z
department:
- _id: '749'
doi: 10.1109/TAMD.2011.2140113
intvolume: '         3'
issue: '2'
keyword:
- acoustic packaging
- mother-child interaction
- social learning
- multimodal grounding in input
- ecology of interactions
- synchrony
language:
- iso: eng
page: 113-128
publication: IEEE Transactions on Autonomous Mental Development
publication_identifier:
  issn:
  - 1943-0612
publisher: Institute of Electrical & Electronics Engineers (IEEE)
status: public
title: 'Language Does Something: Body Action and Language in Maternal Input to Three-Month-Olds'
type: journal_article
user_id: '14931'
volume: 3
year: '2011'
...
---
_id: '4448'
abstract:
- lang: ger
  text: '"Lernkultur" wird als Begriff häufig gebraucht und fast ebenso häufig definiert
     das gilt für den betrieblichen Kontext ebenso wie für die Bereiche der Schul-,
    Hochschul-, Berufs- und Erwachsenenbildung (z. B. Wulf, Althans, Blaschke, Ferrin,
    Göhlich, Jörissen, Mattig et al., 2007; Jenert, Zellweger Moser, Dommen & Gebhardt,
    2009; Kirchhöfer, 2004; Erpenbeck & Sauer, 2000). Trotz der grossen Aufmerksamkeit,
    die der Begriff in den letzten zwei Jahrzehnten erfahren hat, kann man nicht von
    einem in sich geschlossenen Forschungsprogramm sprechen. Die Zugänge zum Phänomenbereich
    Lernkultur sind ebenso vielfältig wie die hinter einzelnen Ansätzen stehenden
    Lernkulturkonstrukte. Den Autoren ist keine Publikation bekannt, welche unterschiedliche
    Ansätze der Lernkulturforschung systematisch aufarbeitet. Eine wichtige Referenzquelle
    ist der Bericht von Kuh und Whitt (1988) "The Invisible Tapestry: Culture in American
    Colleges and Universities". Ausgehend von einer fundierten Übersicht zu unterschiedlichen
    Zugängen zum Kulturbegriff (oft in starker Anlehnung an die Organisationskulturforschung
    (vgl. Allaire & Firsirotu, 1984)) stellen die Autoren ein Rahmenmodell zur Analyse
    von Hochschulkulturen vor (Kuh und Whitt, 1988, S. 56). Diese Arbeit erweist sich
    für ein besseres Verständnis unter-schiedlicher Zugänge zum Lernkulturbegriff
    als aufschlussreich, weil im Kontext Hoch-schule zwangsweise viele Aspekte des
    Lernens und Lehrens angesprochen werden. Allerdings fokussiert auch dieser Bericht
    nicht das Konstrukt der Lernkultur und bietet damit nur einen Ausgangspunkt für
    die Identifizierung unterschiedlicher Zugänge.'
author:
- first_name: Tobias
  full_name: Jenert, Tobias
  last_name: Jenert
- first_name: Anja
  full_name: Gebhardt, Anja
  last_name: Gebhardt
citation:
  ama: 'Jenert T, Gebhardt A. <i>Zugänge Zum Begriff Der Lernkultur: Eine Systematisierung
    Auf Basis Kultur-Und Lerntheoretischer Überlegungen</i>.; 2010.'
  apa: 'Jenert, T., &#38; Gebhardt, A. (2010). <i>Zugänge zum Begriff der Lernkultur:
    Eine Systematisierung auf Basis kultur-und lerntheoretischer Überlegungen</i>.'
  bibtex: '@book{Jenert_Gebhardt_2010, title={Zugänge zum Begriff der Lernkultur:
    Eine Systematisierung auf Basis kultur-und lerntheoretischer Überlegungen}, author={Jenert,
    Tobias and Gebhardt, Anja}, year={2010} }'
  chicago: 'Jenert, Tobias, and Anja Gebhardt. <i>Zugänge Zum Begriff Der Lernkultur:
    Eine Systematisierung Auf Basis Kultur-Und Lerntheoretischer Überlegungen</i>,
    2010.'
  ieee: 'T. Jenert and A. Gebhardt, <i>Zugänge zum Begriff der Lernkultur: Eine Systematisierung
    auf Basis kultur-und lerntheoretischer Überlegungen</i>. 2010.'
  mla: 'Jenert, Tobias, and Anja Gebhardt. <i>Zugänge Zum Begriff Der Lernkultur:
    Eine Systematisierung Auf Basis Kultur-Und Lerntheoretischer Überlegungen</i>.
    2010.'
  short: 'T. Jenert, A. Gebhardt, Zugänge Zum Begriff Der Lernkultur: Eine Systematisierung
    Auf Basis Kultur-Und Lerntheoretischer Überlegungen, 2010.'
date_created: 2018-09-18T11:50:40Z
date_updated: 2022-01-06T07:01:04Z
department:
- _id: '208'
- _id: '282'
extern: '1'
keyword:
- Lernkultur
- learning culture
- culture theory
- approaches to learning culture
- culture of learning
status: public
title: 'Zugänge zum Begriff der Lernkultur: Eine Systematisierung auf Basis kultur-und
  lerntheoretischer Überlegungen'
type: report
user_id: '51057'
year: '2010'
...
---
_id: '17253'
author:
- first_name: Anna-Lisa
  full_name: Vollmer, Anna-Lisa
  last_name: Vollmer
- first_name: Karola
  full_name: Pitsch, Karola
  last_name: Pitsch
- first_name: Katrin Solveig
  full_name: Lohan, Katrin Solveig
  last_name: Lohan
- first_name: Jannik
  full_name: Fritsch, Jannik
  last_name: Fritsch
- first_name: Katharina
  full_name: Rohlfing, Katharina
  id: '50352'
  last_name: Rohlfing
- first_name: Britta
  full_name: Wrede, Britta
  last_name: Wrede
citation:
  ama: 'Vollmer A-L, Pitsch K, Lohan KS, Fritsch J, Rohlfing K, Wrede B. Developing
    feedback: How children of different age contribute to a tutoring interaction with
    adults. In: <i>Development and Learning (ICDL), 2010 IEEE 9th International Conference
    on Development and Learning</i>. ; 2010:76-81.'
  apa: 'Vollmer, A.-L., Pitsch, K., Lohan, K. S., Fritsch, J., Rohlfing, K., &#38;
    Wrede, B. (2010). Developing feedback: How children of different age contribute
    to a tutoring interaction with adults. <i>Development and Learning (ICDL), 2010
    IEEE 9th International Conference on Development and Learning</i>, 76–81.'
  bibtex: '@inproceedings{Vollmer_Pitsch_Lohan_Fritsch_Rohlfing_Wrede_2010, title={Developing
    feedback: How children of different age contribute to a tutoring interaction with
    adults}, booktitle={Development and Learning (ICDL), 2010 IEEE 9th International
    Conference on Development and Learning}, author={Vollmer, Anna-Lisa and Pitsch,
    Karola and Lohan, Katrin Solveig and Fritsch, Jannik and Rohlfing, Katharina and
    Wrede, Britta}, year={2010}, pages={76–81} }'
  chicago: 'Vollmer, Anna-Lisa, Karola Pitsch, Katrin Solveig Lohan, Jannik Fritsch,
    Katharina Rohlfing, and Britta Wrede. “Developing Feedback: How Children of Different
    Age Contribute to a Tutoring Interaction with Adults.” In <i>Development and Learning
    (ICDL), 2010 IEEE 9th International Conference on Development and Learning</i>,
    76–81, 2010.'
  ieee: 'A.-L. Vollmer, K. Pitsch, K. S. Lohan, J. Fritsch, K. Rohlfing, and B. Wrede,
    “Developing feedback: How children of different age contribute to a tutoring interaction
    with adults,” in <i>Development and Learning (ICDL), 2010 IEEE 9th International
    Conference on Development and Learning</i>, 2010, pp. 76–81.'
  mla: 'Vollmer, Anna-Lisa, et al. “Developing Feedback: How Children of Different
    Age Contribute to a Tutoring Interaction with Adults.” <i>Development and Learning
    (ICDL), 2010 IEEE 9th International Conference on Development and Learning</i>,
    2010, pp. 76–81.'
  short: 'A.-L. Vollmer, K. Pitsch, K.S. Lohan, J. Fritsch, K. Rohlfing, B. Wrede,
    in: Development and Learning (ICDL), 2010 IEEE 9th International Conference on
    Development and Learning, 2010, pp. 76–81.'
date_created: 2020-06-24T13:02:20Z
date_updated: 2023-02-01T13:00:15Z
department:
- _id: '749'
keyword:
- tutoring interaction
- social interaction
- video signal processing
- robot systems
- paediatrics
- neurophysiology
- Learning
- infant
- feedback
- biology computing
- cognitive capabilities
- cognition
- children
language:
- iso: eng
page: 76-81
publication: Development and Learning (ICDL), 2010 IEEE 9th International Conference
  on Development and Learning
status: public
title: 'Developing feedback: How children of different age contribute to a tutoring
  interaction with adults'
type: conference
user_id: '14931'
year: '2010'
...
---
_id: '4450'
author:
- first_name: Tobias
  full_name: Jenert, Tobias
  id: '71994'
  last_name: Jenert
  orcid: ' https://orcid.org/0000-0001-9262-5646'
- first_name: Franziska
  full_name: Zellweger, Franziska
  last_name: Zellweger
- first_name: Jenny
  full_name: Dommen, Jenny
  last_name: Dommen
- first_name: Anja
  full_name: Gebhardt, Anja
  last_name: Gebhardt
citation:
  ama: 'Jenert T, Zellweger F, Dommen J, Gebhardt A. <i>Lernkulturen an Hochschulen:
    Theoretische Überlegungen Zur Betrachtung Studentischen Lernens Unter Individueller,
    Pädagogischer Und Organisationaler Perspektive</i>.; 2009.'
  apa: 'Jenert, T., Zellweger, F., Dommen, J., &#38; Gebhardt, A. (2009). <i>Lernkulturen
    an Hochschulen: Theoretische Überlegungen zur Betrachtung studentischen Lernens
    unter individueller, pädagogischer und organisationaler Perspektive</i>.'
  bibtex: '@book{Jenert_Zellweger_Dommen_Gebhardt_2009, title={Lernkulturen an Hochschulen:
    Theoretische Überlegungen zur Betrachtung studentischen Lernens unter individueller,
    pädagogischer und organisationaler Perspektive}, author={Jenert, Tobias and Zellweger,
    Franziska and Dommen, Jenny and Gebhardt, Anja}, year={2009} }'
  chicago: 'Jenert, Tobias, Franziska Zellweger, Jenny Dommen, and Anja Gebhardt.
    <i>Lernkulturen an Hochschulen: Theoretische Überlegungen Zur Betrachtung Studentischen
    Lernens Unter Individueller, Pädagogischer Und Organisationaler Perspektive</i>,
    2009.'
  ieee: 'T. Jenert, F. Zellweger, J. Dommen, and A. Gebhardt, <i>Lernkulturen an Hochschulen:
    Theoretische Überlegungen zur Betrachtung studentischen Lernens unter individueller,
    pädagogischer und organisationaler Perspektive</i>. 2009.'
  mla: 'Jenert, Tobias, et al. <i>Lernkulturen an Hochschulen: Theoretische Überlegungen
    Zur Betrachtung Studentischen Lernens Unter Individueller, Pädagogischer Und Organisationaler
    Perspektive</i>. 2009.'
  short: 'T. Jenert, F. Zellweger, J. Dommen, A. Gebhardt, Lernkulturen an Hochschulen:
    Theoretische Überlegungen Zur Betrachtung Studentischen Lernens Unter Individueller,
    Pädagogischer Und Organisationaler Perspektive, 2009.'
date_created: 2018-09-18T11:55:39Z
date_updated: 2022-01-06T07:01:05Z
department:
- _id: '208'
- _id: '282'
extern: '1'
keyword:
- Lernkultur
- Hochschule
- HEI
- learning culture
- higher education
- teaching and learning
- Hochschullehre
status: public
title: 'Lernkulturen an Hochschulen: Theoretische Überlegungen zur Betrachtung studentischen
  Lernens unter individueller, pädagogischer und organisationaler Perspektive'
type: report
user_id: '51057'
year: '2009'
...
---
_id: '5621'
abstract:
- lang: eng
  text: Remote voting through the Internet provides convenience and access to the
    electorate. At the same time, the security concerns facing any distributed application
    are magnified when the task is so crucial to democratic society. In addition,
    some of the electoral process loses transparency when it is encapsulated in information
    technology. In this paper, we examine the public record of three recent elections
    that used Internet voting. Our specific goal is to identify any potential flaws
    that security experts would recognize, but may have not been identified in the
    rush to implement technology. To do this, we present a multiple exploratory case
    study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands,
    and Switzerland. These elections were selected as particularly interesting and
    accessible, and each presents its own technical and security challenges. The electoral
    environment, technical design and process for each election are described, including
    reconstruction of details which are implied but not specified within the source
    material. We found that all three elections warrant significant concern about
    voter security, verifiability, and transparency. Usability, our fourth area of
    focus, seems to have been well-addressed in these elections. While our analysis
    is based on public documents and previously published reports, and therefore lacking
    access to any confidential materials held by electoral officials, this comparative
    analysis provides interesting insight and consistent questions across all these
    cases. Effective review of Internet voting requires an aggressive stance towards
    identifying potential security and operational flaws, and we encourage the use
    of third party reviews with critical technology skills during design, programming,
    and voting to reduce the changes of failure or fraud that would undermine public
    confidence.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Eliot
  full_name: Rich, Eliot
  last_name: Rich
citation:
  ama: 'Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective
    Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions
    on Information Forensics \&#38; Security</i>. 2009;4(4 Part):729-744.'
  apa: 'Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.
    <i>IEEE Transactions on Information Forensics \&#38; Security</i>, <i>4</i>(4
    Part), 729–744.'
  bibtex: '@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland},
    volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics
    \&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009},
    pages={729–744} }'
  chicago: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
    <i>IEEE Transactions on Information Forensics \&#38; Security</i> 4, no. 4 Part
    (2009): 729–44.'
  ieee: 'G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective
    Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions
    on Information Forensics \&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744,
    2009.'
  mla: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
    <i>IEEE Transactions on Information Forensics \&#38; Security</i>, vol. 4, no.
    4 Part, IEEE, 2009, pp. 729–44.'
  short: G. Schryen, E. Rich, IEEE Transactions on Information Forensics \&#38; Security
    4 (2009) 729–744.
date_created: 2018-11-14T14:06:44Z
date_updated: 2022-01-06T07:02:12Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:16:07Z
  date_updated: 2018-12-18T13:16:07Z
  file_id: '6316'
  file_name: JOURNAL VERSION.pdf
  file_size: 1544790
  relation: main_file
file_date_updated: 2018-12-18T13:16:07Z
has_accepted_license: '1'
intvolume: '         4'
issue: 4 Part
keyword:
- e-voting
- Internet voting
- Internet election
- security
- verifiability
- RIES
- Estonia
- Neuch{\^a}tel
language:
- iso: eng
oa: '1'
page: 729-744
publication: IEEE Transactions on Information Forensics \& Security
publisher: IEEE
status: public
title: 'Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections
  in Estonia, The Netherlands, and Switzerland'
type: journal_article
user_id: '61579'
volume: 4
year: '2009'
...
---
_id: '17272'
abstract:
- lang: eng
  text: In developmental research, tutoring behavior has been identified as scaffolding
    infants' learning processes. It has been defined in terms of child-directed speech
    (Motherese), child-directed motion (Motionese), and contingency. In the field
    of developmental robotics, research often assumes that in human-robot interaction
    (HRI), robots are treated similar to infants, because their immature cognitive
    capabilities benefit from this behavior. However, according to our knowledge,
    it has barely been studied whether this is true and how exactly humans alter their
    behavior towards a robotic interaction partner. In this paper, we present results
    concerning the acceptance of a robotic agent in a social learning scenario obtained
    via comparison to adults and 8-11 months old infants in equal conditions. These
    results constitute an important empirical basis for making use of tutoring behavior
    in social robotics. In our study, we performed a detailed multimodal analysis
    of HRI in a tutoring situation using the example of a robot simulation equipped
    with a bottom-up saliency-based attention model. Our results reveal significant
    differences in hand movement velocity, motion pauses, range of motion, and eye
    gaze suggesting that for example adults decrease their hand movement velocity
    in an Adult-Child Interaction (ACI), opposed to an Adult-Adult Interaction (AAI)
    and this decrease is even higher in the Adult-Robot Interaction (ARI). We also
    found important differences between ACI and ARI in how the behavior is modified
    over time as the interaction unfolds. These findings indicate the necessity of
    integrating top-down feedback structures into a bottom-up system for robots to
    be fully accepted as interaction partners.
author:
- first_name: Anna-Lisa
  full_name: Vollmer, Anna-Lisa
  last_name: Vollmer
- first_name: Katrin Solveig
  full_name: Lohan, Katrin Solveig
  last_name: Lohan
- first_name: Kerstin
  full_name: Fischer, Kerstin
  last_name: Fischer
- first_name: Yukie
  full_name: Nagai, Yukie
  last_name: Nagai
- first_name: Karola
  full_name: Pitsch, Karola
  last_name: Pitsch
- first_name: Jannik
  full_name: Fritsch, Jannik
  last_name: Fritsch
- first_name: Katharina
  full_name: Rohlfing, Katharina
  id: '50352'
  last_name: Rohlfing
- first_name: Britta
  full_name: Wrede, Britta
  last_name: Wrede
citation:
  ama: 'Vollmer A-L, Lohan KS, Fischer K, et al. People modify their tutoring behavior
    in robot-directed interaction for action learning. In: <i>Development and Learning,
    2009. ICDL 2009. IEEE 8th International Conference on Development and Learning</i>.
    IEEE; 2009:1-6. doi:<a href="https://doi.org/10.1109/DEVLRN.2009.5175516">10.1109/DEVLRN.2009.5175516</a>'
  apa: Vollmer, A.-L., Lohan, K. S., Fischer, K., Nagai, Y., Pitsch, K., Fritsch,
    J., Rohlfing, K., &#38; Wrede, B. (2009). People modify their tutoring behavior
    in robot-directed interaction for action learning. <i>Development and Learning,
    2009. ICDL 2009. IEEE 8th International Conference on Development and Learning</i>,
    1–6. <a href="https://doi.org/10.1109/DEVLRN.2009.5175516">https://doi.org/10.1109/DEVLRN.2009.5175516</a>
  bibtex: '@inproceedings{Vollmer_Lohan_Fischer_Nagai_Pitsch_Fritsch_Rohlfing_Wrede_2009,
    title={People modify their tutoring behavior in robot-directed interaction for
    action learning}, DOI={<a href="https://doi.org/10.1109/DEVLRN.2009.5175516">10.1109/DEVLRN.2009.5175516</a>},
    booktitle={Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference
    on Development and Learning}, publisher={IEEE}, author={Vollmer, Anna-Lisa and
    Lohan, Katrin Solveig and Fischer, Kerstin and Nagai, Yukie and Pitsch, Karola
    and Fritsch, Jannik and Rohlfing, Katharina and Wrede, Britta}, year={2009}, pages={1–6}
    }'
  chicago: Vollmer, Anna-Lisa, Katrin Solveig Lohan, Kerstin Fischer, Yukie Nagai,
    Karola Pitsch, Jannik Fritsch, Katharina Rohlfing, and Britta Wrede. “People Modify
    Their Tutoring Behavior in Robot-Directed Interaction for Action Learning.” In
    <i>Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference
    on Development and Learning</i>, 1–6. IEEE, 2009. <a href="https://doi.org/10.1109/DEVLRN.2009.5175516">https://doi.org/10.1109/DEVLRN.2009.5175516</a>.
  ieee: 'A.-L. Vollmer <i>et al.</i>, “People modify their tutoring behavior in robot-directed
    interaction for action learning,” in <i>Development and Learning, 2009. ICDL 2009.
    IEEE 8th International Conference on Development and Learning</i>, 2009, pp. 1–6,
    doi: <a href="https://doi.org/10.1109/DEVLRN.2009.5175516">10.1109/DEVLRN.2009.5175516</a>.'
  mla: Vollmer, Anna-Lisa, et al. “People Modify Their Tutoring Behavior in Robot-Directed
    Interaction for Action Learning.” <i>Development and Learning, 2009. ICDL 2009.
    IEEE 8th International Conference on Development and Learning</i>, IEEE, 2009,
    pp. 1–6, doi:<a href="https://doi.org/10.1109/DEVLRN.2009.5175516">10.1109/DEVLRN.2009.5175516</a>.
  short: 'A.-L. Vollmer, K.S. Lohan, K. Fischer, Y. Nagai, K. Pitsch, J. Fritsch,
    K. Rohlfing, B. Wrede, in: Development and Learning, 2009. ICDL 2009. IEEE 8th
    International Conference on Development and Learning, IEEE, 2009, pp. 1–6.'
date_created: 2020-06-24T13:02:43Z
date_updated: 2023-02-01T13:06:43Z
department:
- _id: '749'
doi: 10.1109/DEVLRN.2009.5175516
keyword:
- robot simulation
- hand movement velocity
- robotic interaction partner
- robotic agent
- robot-directed interaction
- multimodal analysis
- Motionese
- Motherese
- intelligent tutoring systems
- immature cognitive capability
- human computer interaction
- eye gaze
- child-directed speech
- child-directed motion
- bottom-up system
- bottom-up saliency-based attention model
- adult-robot interaction
- adult-child interaction
- adult-adult interaction
- human-robot interaction
- action learning
- social learning scenario
- social robotics
- software agents
- top-down feedback structures
- tutoring behavior
language:
- iso: eng
page: 1-6
publication: Development and Learning, 2009. ICDL 2009. IEEE 8th International Conference
  on Development and Learning
publisher: IEEE
status: public
title: People modify their tutoring behavior in robot-directed interaction for action
  learning
type: conference
user_id: '14931'
year: '2009'
...
---
_id: '4494'
alternative_title:
- Proceedings der Pre-Conference Workshops der 5. e-Learning Fachtagung Informatik
  DeLFI 2007
author:
- first_name: Thomas
  full_name: Sporer, Thomas
  last_name: Sporer
- first_name: Tobias
  full_name: Jenert, Tobias
  id: '71994'
  last_name: Jenert
  orcid: ' https://orcid.org/0000-0001-9262-5646'
- first_name: Bernhard
  full_name: Strehl, Bernhard
  last_name: Strehl
- first_name: Patrick Ole
  full_name: Noack, Patrick Ole
  last_name: Noack
citation:
  ama: 'Sporer T, Jenert T, Strehl B, Noack PO. Einsatz von E-Portfolios zur Förderung
    von studentischen Lerngemeinschaften im Hochschulstudium. In: <i>DeLFI Workshops</i>.
    Logos Verlag; 2007:19--26.'
  apa: 'Sporer, T., Jenert, T., Strehl, B., &#38; Noack, P. O. (2007). Einsatz von
    E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.
    In <i>DeLFI Workshops</i> (pp. 19--26). Siegen: Logos Verlag.'
  bibtex: '@inproceedings{Sporer_Jenert_Strehl_Noack_2007, title={Einsatz von E-Portfolios
    zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}, booktitle={DeLFI
    Workshops}, publisher={Logos Verlag}, author={Sporer, Thomas and Jenert, Tobias
    and Strehl, Bernhard and Noack, Patrick Ole}, year={2007}, pages={19--26} }'
  chicago: Sporer, Thomas, Tobias Jenert, Bernhard Strehl, and Patrick Ole Noack.
    “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im
    Hochschulstudium.” In <i>DeLFI Workshops</i>, 19--26. Logos Verlag, 2007.
  ieee: T. Sporer, T. Jenert, B. Strehl, and P. O. Noack, “Einsatz von E-Portfolios
    zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.,” in <i>DeLFI
    Workshops</i>, Siegen, 2007, pp. 19--26.
  mla: Sporer, Thomas, et al. “Einsatz von E-Portfolios Zur Förderung von Studentischen
    Lerngemeinschaften Im Hochschulstudium.” <i>DeLFI Workshops</i>, Logos Verlag,
    2007, pp. 19--26.
  short: 'T. Sporer, T. Jenert, B. Strehl, P.O. Noack, in: DeLFI Workshops, Logos
    Verlag, 2007, pp. 19--26.'
conference:
  end_date: 2007-09-17
  location: Siegen
  name: DeLFI 2007 - 5. e-Learing Fachtagung Informatik der Gesellschaft für Informatik
    e.V.
  start_date: 2007-09-17
date_created: 2018-09-19T09:08:18Z
date_updated: 2022-01-06T07:01:06Z
department:
- _id: '208'
- _id: '282'
extern: '1'
keyword:
- E-Portfolios
- Lerngemeinschaften
- Praxisgemeinschaften
- Projektgruppen
- Hochschulstudium
- informelles Lernen
page: 19--26
publication: DeLFI Workshops
publisher: Logos Verlag
status: public
title: Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften
  im Hochschulstudium.
type: conference
user_id: '51057'
year: '2007'
...
---
_id: '4496'
alternative_title:
- Information in Wissenschaft, Bildung und Wirtschaft
author:
- first_name: Nina
  full_name: Heinze, Nina
  last_name: Heinze
- first_name: Thomas
  full_name: Sporer, Thomas
  last_name: Sporer
- first_name: Tobias
  full_name: Jenert, Tobias
  id: '71994'
  last_name: Jenert
  orcid: ' https://orcid.org/0000-0001-9262-5646'
citation:
  ama: 'Heinze N, Sporer T, Jenert T. Semivirtuelle Lernumgebung zum wissenschaftlichen
    Arbeiten als Ergänzung des Studienangebots der Universität Augsburg. In: <i>Deutsche
    Gesellschaft Für Informationswissenschaft Und Informationspraxis: Tagungen Der
    Deutschen Gesellschaft Für Informationswissenschaft Und Informationspraxis</i>.
    Vol 9. Frankfurt am Main ; 2007:319-328.'
  apa: 'Heinze, N., Sporer, T., &#38; Jenert, T. (2007). Semivirtuelle Lernumgebung
    zum wissenschaftlichen Arbeiten als Ergänzung des Studienangebots der Universität
    Augsburg. In <i>Deutsche Gesellschaft für Informationswissenschaft und Informationspraxis:
    Tagungen der Deutschen Gesellschaft für Informationswissenschaft und Informationspraxis</i>
    (Vol. 9, pp. 319–328). Frankfurt am Main .'
  bibtex: '@inproceedings{Heinze_Sporer_Jenert_2007, place={Frankfurt am Main }, title={Semivirtuelle
    Lernumgebung zum wissenschaftlichen Arbeiten als Ergänzung des Studienangebots
    der Universität Augsburg}, volume={9}, booktitle={Deutsche Gesellschaft für Informationswissenschaft
    und Informationspraxis: Tagungen der Deutschen Gesellschaft für Informationswissenschaft
    und Informationspraxis}, author={Heinze, Nina and Sporer, Thomas and Jenert, Tobias},
    year={2007}, pages={319–328} }'
  chicago: 'Heinze, Nina, Thomas Sporer, and Tobias Jenert. “Semivirtuelle Lernumgebung
    Zum Wissenschaftlichen Arbeiten Als Ergänzung Des Studienangebots Der Universität
    Augsburg.” In <i>Deutsche Gesellschaft Für Informationswissenschaft Und Informationspraxis:
    Tagungen Der Deutschen Gesellschaft Für Informationswissenschaft Und Informationspraxis</i>,
    9:319–28. Frankfurt am Main , 2007.'
  ieee: 'N. Heinze, T. Sporer, and T. Jenert, “Semivirtuelle Lernumgebung zum wissenschaftlichen
    Arbeiten als Ergänzung des Studienangebots der Universität Augsburg,” in <i>Deutsche
    Gesellschaft für Informationswissenschaft und Informationspraxis: Tagungen der
    Deutschen Gesellschaft für Informationswissenschaft und Informationspraxis</i>,
    Frankfurt am Main , 2007, vol. 9, pp. 319–328.'
  mla: 'Heinze, Nina, et al. “Semivirtuelle Lernumgebung Zum Wissenschaftlichen Arbeiten
    Als Ergänzung Des Studienangebots Der Universität Augsburg.” <i>Deutsche Gesellschaft
    Für Informationswissenschaft Und Informationspraxis: Tagungen Der Deutschen Gesellschaft
    Für Informationswissenschaft Und Informationspraxis</i>, vol. 9, 2007, pp. 319–28.'
  short: 'N. Heinze, T. Sporer, T. Jenert, in: Deutsche Gesellschaft Für Informationswissenschaft
    Und Informationspraxis: Tagungen Der Deutschen Gesellschaft Für Informationswissenschaft
    Und Informationspraxis, Frankfurt am Main , 2007, pp. 319–328.'
conference:
  end_date: 2007-10-12
  location: 'Frankfurt am Main '
  name: 29. Online-Tagung der DGI
  start_date: 2007-10-10
date_created: 2018-09-19T09:17:23Z
date_updated: 2022-01-06T07:01:06Z
department:
- _id: '208'
- _id: '282'
extern: '1'
intvolume: '         9'
keyword:
- Wissenschaftliches Arbeiten
- Blended Learning
- Tutoring
page: 319-328
place: 'Frankfurt am Main '
publication: 'Deutsche Gesellschaft für Informationswissenschaft und Informationspraxis:
  Tagungen der Deutschen Gesellschaft für Informationswissenschaft und Informationspraxis'
publication_identifier:
  isbn:
  - 978-3-925474-60-6
status: public
title: Semivirtuelle Lernumgebung zum wissenschaftlichen Arbeiten als Ergänzung des
  Studienangebots der Universität Augsburg
type: conference
user_id: '51057'
volume: 9
year: '2007'
...
---
_id: '4497'
alternative_title:
- Creating New Learning Experiences on a Global Scale
author:
- first_name: Thomas
  full_name: Sporer, Thomas
  last_name: Sporer
- first_name: Nina
  full_name: Heinze, Nina
  last_name: Heinze
- first_name: Tobias
  full_name: Jenert, Tobias
  id: '71994'
  last_name: Jenert
  orcid: ' https://orcid.org/0000-0001-9262-5646'
- first_name: Gabi
  full_name: Reinmann, Gabi
  last_name: Reinmann
citation:
  ama: 'Sporer T, Heinze N, Jenert T, Reinmann G. Student Learning Communities in
    the Project-Centered Study Program" Problem-Solving Competencies". In: ; 2007.'
  apa: Sporer, T., Heinze, N., Jenert, T., &#38; Reinmann, G. (2007). Student Learning
    Communities in the Project-Centered Study Program" Problem-Solving Competencies".
    Presented at the Second European Conference on Technology Enhanced Learning (EC-TEL)
    2007, Kreta .
  bibtex: '@inproceedings{Sporer_Heinze_Jenert_Reinmann_2007, title={Student Learning
    Communities in the Project-Centered Study Program" Problem-Solving Competencies"},
    author={Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi},
    year={2007} }'
  chicago: Sporer, Thomas, Nina Heinze, Tobias Jenert, and Gabi Reinmann. “Student
    Learning Communities in the Project-Centered Study Program" Problem-Solving Competencies",”
    2007.
  ieee: T. Sporer, N. Heinze, T. Jenert, and G. Reinmann, “Student Learning Communities
    in the Project-Centered Study Program" Problem-Solving Competencies",” presented
    at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007,
    Kreta , 2007.
  mla: Sporer, Thomas, et al. <i>Student Learning Communities in the Project-Centered
    Study Program" Problem-Solving Competencies"</i>. 2007.
  short: 'T. Sporer, N. Heinze, T. Jenert, G. Reinmann, in: 2007.'
conference:
  end_date: '2007-06-20 '
  location: 'Kreta '
  name: Second European Conference on Technology Enhanced Learning (EC-TEL) 2007
  start_date: 2007-06-17
date_created: 2018-09-19T09:22:02Z
date_updated: 2022-01-06T07:01:06Z
department:
- _id: '208'
- _id: '282'
extern: '1'
keyword:
- Problem Solving Competencies
- E-Portfolio
status: public
title: Student Learning Communities in the Project-Centered Study Program" Problem-Solving
  Competencies"
type: conference
user_id: '51057'
year: '2007'
...
---
_id: '5655'
abstract:
- lang: eng
  text: Spam e-mails have become a serious technological and economic problem. Up
    to now, by deploying complementary anti-spam measures, we have been reasonably
    able to withstand spam e-mails and use the Internet for regular communication.
    However, if we are to avert the danger of losing the Internet e-mail service in
    its capacity as a valuable, free and worldwide medium of open communication, anti-spam
    activities should be performed more systematically than is currently the case
    regarding the mainly heuristic, anti-spam measures in place. A formal framework,
    within which the existing delivery routes that a spam e-mail may take, and anti-spam
    measures and their effectiveness can be investigated, will perhaps encourage a
    shift in methodology and pave the way for new, holistic anti-spam measures. This
    paper presents a model of the Internet e-mail infrastructure as a directed graph
    and a deterministic finite automaton and draws on automata theory to formally
    derive the spam delivery routes. The most important anti-spam measures are then
    described. Methods controlling only specific delivery routes are evaluated in
    terms of how effectively they cover the modeled e-mail infrastructure; methods
    operating independently of any particular routes receive a more general assessment.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach. <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>. 2007;3(2):66-90.
  apa: Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach. <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, <i>3</i>(2), 66–90.
  bibtex: '@article{Schryen_2007, title={Do anti-spam measures effectively cover the
    e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The
    Journal of Information Systems Security (AIS Special Interest Group in Security)},
    author={Schryen, Guido}, year={2007}, pages={66–90} }'
  chicago: 'Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication
    Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.'
  ieee: G. Schryen, “Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach,” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007.
  mla: Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication
    Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.
  short: G. Schryen, The Journal of Information Systems Security (AIS Special Interest
    Group in Security) 3 (2007) 66–90.
date_created: 2018-11-14T14:51:41Z
date_updated: 2022-01-06T07:02:22Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:25:12Z
  date_updated: 2018-12-18T13:25:12Z
  file_id: '6324'
  file_name: Do anti-spam measures effectively cover the e-mail communication - Journal
    version.pdf
  file_size: 100448
  relation: main_file
file_date_updated: 2018-12-18T13:25:12Z
has_accepted_license: '1'
intvolume: '         3'
issue: '2'
keyword:
- e-mail
- spam
- e-mail infrastructure
- anti-spam measures
- spamming options
language:
- iso: eng
oa: '1'
page: 66-90
publication: The Journal of Information Systems Security (AIS Special Interest Group
  in Security)
status: public
title: Do anti-spam measures effectively cover the e-mail communication network? A
  formal approach
type: journal_article
user_id: '61579'
volume: 3
year: '2007'
...
---
_id: '17289'
abstract:
- lang: eng
  text: 'Robots have to deal with an enormous amount of sensory stimuli. One solution
    in making sense of them is to enable a robot system to actively search for cues
    that help structuring the information. Studies with infants reveal that parents
    support the learning-process by modifying their interaction style, dependent on
    their child''s developmental age. In our study, in which parents demonstrated
    everyday actions to their preverbal children (8-11 months old), our aim was to
    identify objective parameters for multimodal action modification. Our results
    reveal two action parameters being modified in adult-child interaction: roundness
    and pace. Furthermore, we found that language has the power to help children structuring
    actions sequences by synchrony and emphasis. These insights are discussed with
    respect to the built-in attention architecture of a socially interactive robot,
    which enables it to understand demonstrated actions. Our algorithmic approach
    towards automatically detecting the task structure in child-designed input demonstrates
    the potential impact of insights from developmental learning on robotics. The
    presented findings pave the way to automatically detect when to imitate in a demonstration'
author:
- first_name: Katharina
  full_name: Rohlfing, Katharina
  id: '50352'
  last_name: Rohlfing
- first_name: Jannik
  full_name: Fritsch, Jannik
  last_name: Fritsch
- first_name: Britta
  full_name: Wrede, Britta
  last_name: Wrede
- first_name: Tanja
  full_name: Jungmann, Tanja
  last_name: Jungmann
citation:
  ama: Rohlfing K, Fritsch J, Wrede B, Jungmann T. How can multimodal cues from child-directed
    interaction reduce learning complexity in robots? <i>Advanced Robotics</i>. 2006;20(10):1183-1199.
    doi:<a href="https://doi.org/10.1163/156855306778522532">10.1163/156855306778522532</a>
  apa: Rohlfing, K., Fritsch, J., Wrede, B., &#38; Jungmann, T. (2006). How can multimodal
    cues from child-directed interaction reduce learning complexity in robots? <i>Advanced
    Robotics</i>, <i>20</i>(10), 1183–1199. <a href="https://doi.org/10.1163/156855306778522532">https://doi.org/10.1163/156855306778522532</a>
  bibtex: '@article{Rohlfing_Fritsch_Wrede_Jungmann_2006, title={How can multimodal
    cues from child-directed interaction reduce learning complexity in robots?}, volume={20},
    DOI={<a href="https://doi.org/10.1163/156855306778522532">10.1163/156855306778522532</a>},
    number={10}, journal={Advanced Robotics}, publisher={VSP BV}, author={Rohlfing,
    Katharina and Fritsch, Jannik and Wrede, Britta and Jungmann, Tanja}, year={2006},
    pages={1183–1199} }'
  chicago: 'Rohlfing, Katharina, Jannik Fritsch, Britta Wrede, and Tanja Jungmann.
    “How Can Multimodal Cues from Child-Directed Interaction Reduce Learning Complexity
    in Robots?” <i>Advanced Robotics</i> 20, no. 10 (2006): 1183–99. <a href="https://doi.org/10.1163/156855306778522532">https://doi.org/10.1163/156855306778522532</a>.'
  ieee: 'K. Rohlfing, J. Fritsch, B. Wrede, and T. Jungmann, “How can multimodal cues
    from child-directed interaction reduce learning complexity in robots?,” <i>Advanced
    Robotics</i>, vol. 20, no. 10, pp. 1183–1199, 2006, doi: <a href="https://doi.org/10.1163/156855306778522532">10.1163/156855306778522532</a>.'
  mla: Rohlfing, Katharina, et al. “How Can Multimodal Cues from Child-Directed Interaction
    Reduce Learning Complexity in Robots?” <i>Advanced Robotics</i>, vol. 20, no.
    10, VSP BV, 2006, pp. 1183–99, doi:<a href="https://doi.org/10.1163/156855306778522532">10.1163/156855306778522532</a>.
  short: K. Rohlfing, J. Fritsch, B. Wrede, T. Jungmann, Advanced Robotics 20 (2006)
    1183–1199.
date_created: 2020-06-24T13:03:02Z
date_updated: 2023-02-01T13:14:36Z
department:
- _id: '749'
doi: 10.1163/156855306778522532
intvolume: '        20'
issue: '10'
keyword:
- multi-modal motherese
- child-directed input
- motionese
- learning mechanisms
language:
- iso: eng
page: 1183-1199
publication: Advanced Robotics
publication_identifier:
  issn:
  - 1568-5535
publisher: VSP BV
status: public
title: How can multimodal cues from child-directed interaction reduce learning complexity
  in robots?
type: journal_article
user_id: '14931'
volume: 20
year: '2006'
...
---
_id: '5661'
abstract:
- lang: eng
  text: Spam has become one of the most annoying and costly phenomenon in the Internet.
    Valid e-mail addresses belong to the most valuable resources of spammers, but
    little is known about spammers? behavior when collecting and harvesting addresses
    and spammers? capabilities and interest in carefully directed, consumer-oriented
    marketing have not been explored yet. Gaining insight into spammers? ways to obtain
    and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment
    of the effectiveness of address obscuring techniques and the usability and necessity
    of hiding e-mail addresses on the Internet. This paper presents a spam honeypot
    project in progress addressing these issues by systematically placing e-mail addresses
    in the Internet and analyzing received e-mails. The honeypot?s conceptual framework,
    its implementation, and first empirical results are presented. Finally, an outlook
    on further work and activities is provided.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses. In: <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>. Westpoint; 2005:37-41.'
  apa: Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses. In <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i> (pp. 37–41). Westpoint.
  bibtex: '@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’
    behavior in collecting and applying addresses}, booktitle={Proceedings of the
    6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen,
    Guido}, year={2005}, pages={37–41} }'
  chicago: Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting
    and Applying Addresses.” In <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, 37–41. Westpoint, 2005.
  ieee: G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses,” in <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, 2005, pp. 37–41.
  mla: Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting
    and Applying Addresses.” <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, Westpoint, 2005, pp. 37–41.
  short: 'G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop,
    Westpoint, 2005, pp. 37–41.'
date_created: 2018-11-14T14:55:48Z
date_updated: 2022-01-06T07:02:24Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:31:41Z
  date_updated: 2018-12-18T13:31:41Z
  file_id: '6331'
  file_name: Schryen - An e-mail honeypot addressing spammers' behavior in collecting
    and applying addresses.pdf
  file_size: 119362
  relation: main_file
file_date_updated: 2018-12-18T13:31:41Z
has_accepted_license: '1'
keyword:
- Spam
- ham
- e-mail
- honeypot
- address obscuring technique
- address taxonomy
language:
- iso: eng
oa: '1'
page: 37-41
publication: Proceedings of the 6th IEEE Information Assurance Workshop
publisher: Westpoint
status: public
title: An e-mail honeypot addressing spammers' behavior in collecting and applying
  addresses
type: conference
user_id: '61579'
year: '2005'
...
---
_id: '5662'
abstract:
- lang: eng
  text: Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur
    ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten,
    weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im
    Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe.
    Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem
    technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails
    in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt
    in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit
    bedeutendsten Verfahren zur Bekämpfung von Spam.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>.
    2004;46(4):281-288.
  apa: Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam.
    <i>Wirtschaftsinformatik</i>, <i>46</i>(4), 281–288.
  bibtex: '@article{Schryen_2004, title={Effektivität von Lösungsansätzen zur Bekämpfung
    von Spam}, volume={46}, number={4}, journal={Wirtschaftsinformatik}, publisher={Springer},
    author={Schryen, Guido}, year={2004}, pages={281–288} }'
  chicago: 'Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.”
    <i>Wirtschaftsinformatik</i> 46, no. 4 (2004): 281–88.'
  ieee: G. Schryen, “Effektivität von Lösungsansätzen zur Bekämpfung von Spam,” <i>Wirtschaftsinformatik</i>,
    vol. 46, no. 4, pp. 281–288, 2004.
  mla: Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.”
    <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, Springer, 2004, pp. 281–88.
  short: G. Schryen, Wirtschaftsinformatik 46 (2004) 281–288.
date_created: 2018-11-14T14:56:51Z
date_updated: 2022-01-06T07:02:24Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:36:34Z
  date_updated: 2018-12-18T13:36:34Z
  file_id: '6338'
  file_name: Verlagsversion Guido_Schryen__281__288.pdf
  file_size: 288686
  relation: main_file
file_date_updated: 2018-12-18T13:36:34Z
has_accepted_license: '1'
intvolume: '        46'
issue: '4'
keyword:
- Spam
- E-Mail
- Spoofing
- Blockieren
- Filtern
- Lightweight Mail Transfer Agent Authentication Protocol (LMAP)
language:
- iso: eng
oa: '1'
page: 281-288
publication: Wirtschaftsinformatik
publisher: Springer
status: public
title: Effektivität von Lösungsansätzen zur Bekämpfung von Spam
type: journal_article
user_id: '61579'
volume: 46
year: '2004'
...
---
_id: '5663'
abstract:
- lang: eng
  text: Spam as unsolicited e-mail to a large number of recipients is known to ecome
    an increasingly disturbing and costly issue of electronic business and internet
    traffic. Mainly technical-oriented approaches are applied with a focus on blocking,
    filtering, and authentication mechanisms based on the domain name system. They
    come along with different drawbacks and have all low effectiveness in common.
    The article sketches these approaches, shows its limitations, and proposes an
    account-based approach where the number of e-mails per day and account is restricted.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Fighting Spam: Motivating an Account-based Approach. In: Isaias
    P, ed. <i>Proceedings of the IADIS International Conference WWW/Internet 2004.
    Vol. 2</i>. Madrid: IADIS Press; 2004:937-940.'
  apa: 'Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In
    P. Isaias (Ed.), <i>Proceedings of the IADIS International Conference WWW/Internet
    2004. vol. 2</i> (pp. 937–940). Madrid: IADIS Press.'
  bibtex: '@inproceedings{Schryen_2004, place={Madrid}, title={Fighting Spam: Motivating
    an Account-based Approach}, booktitle={Proceedings of the IADIS International
    Conference WWW/Internet 2004. vol. 2}, publisher={IADIS Press}, author={Schryen,
    Guido}, editor={Isaias, PedroEditor}, year={2004}, pages={937–940} }'
  chicago: 'Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.”
    In <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol.
    2</i>, edited by Pedro Isaias, 937–40. Madrid: IADIS Press, 2004.'
  ieee: 'G. Schryen, “Fighting Spam: Motivating an Account-based Approach,” in <i>Proceedings
    of the IADIS International Conference WWW/Internet 2004. vol. 2</i>, 2004, pp.
    937–940.'
  mla: 'Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” <i>Proceedings
    of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by
    Pedro Isaias, IADIS Press, 2004, pp. 937–40.'
  short: 'G. Schryen, in: P. Isaias (Ed.), Proceedings of the IADIS International
    Conference WWW/Internet 2004. Vol. 2, IADIS Press, Madrid, 2004, pp. 937–940.'
date_created: 2018-11-14T14:59:03Z
date_updated: 2022-01-06T07:02:25Z
ddc:
- '000'
department:
- _id: '277'
editor:
- first_name: Pedro
  full_name: Isaias, Pedro
  last_name: Isaias
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:33:30Z
  date_updated: 2018-12-18T13:33:30Z
  file_id: '6333'
  file_name: Fighting Spam_Motivating an account-based approach.pdf
  file_size: 46083
  relation: main_file
file_date_updated: 2018-12-18T13:33:30Z
has_accepted_license: '1'
keyword:
- e-mail
- spam
- filtering
- blocking
- LMAP
- SMTP account
language:
- iso: eng
oa: '1'
page: 937-940
place: Madrid
publication: Proceedings of the IADIS International Conference WWW/Internet 2004.
  vol. 2
publisher: IADIS Press
status: public
title: 'Fighting Spam: Motivating an Account-based Approach'
type: conference
user_id: '61579'
year: '2004'
...
---
_id: '6068'
abstract:
- lang: eng
  text: Attending to a location shortens the perceptual latency of stimuli appearing
    at this location (perceptual latency priming). According to attentional explanations,
    perceptual latency priming relies on the speeded transfer of attended visual information
    into an internal model. However, doubts about the attentional origin have repeatedly
    been raised because efforts to minimize response bias have been insufficient in
    most studies. Five experiments investigated the contribution of a response bias
    to perceptual latency priming (judgment bias due to the two-alternative forced-choice
    method and due to the existence of the prime, criterion effects or second-order
    bias, sensorimotor priming). If any, only small response biases were found. The
    results thus support the attentional explanation. (PsycINFO Database Record (c)
    2016 APA, all rights reserved)
author:
- first_name: Ingrid
  full_name: Scharlau, Ingrid
  id: '451'
  last_name: Scharlau
  orcid: 0000-0003-2364-9489
citation:
  ama: Scharlau I. Evidence against response bias in temporal order tasks with attention
    manipulation by masked primes. <i>Psychological Research</i>. 2004;68(4):224-236.
  apa: Scharlau, I. (2004). Evidence against response bias in temporal order tasks
    with attention manipulation by masked primes. <i>Psychological Research</i>, <i>68</i>(4),
    224–236.
  bibtex: '@article{Scharlau_2004, title={Evidence against response bias in temporal
    order tasks with attention manipulation by masked primes.}, volume={68}, number={4},
    journal={Psychological Research}, author={Scharlau, Ingrid}, year={2004}, pages={224–236}
    }'
  chicago: 'Scharlau, Ingrid. “Evidence against Response Bias in Temporal Order Tasks
    with Attention Manipulation by Masked Primes.” <i>Psychological Research</i> 68,
    no. 4 (2004): 224–36.'
  ieee: I. Scharlau, “Evidence against response bias in temporal order tasks with
    attention manipulation by masked primes.,” <i>Psychological Research</i>, vol.
    68, no. 4, pp. 224–236, 2004.
  mla: Scharlau, Ingrid. “Evidence against Response Bias in Temporal Order Tasks with
    Attention Manipulation by Masked Primes.” <i>Psychological Research</i>, vol.
    68, no. 4, 2004, pp. 224–36.
  short: I. Scharlau, Psychological Research 68 (2004) 224–236.
date_created: 2018-12-10T07:03:30Z
date_updated: 2022-06-07T00:25:03Z
department:
- _id: '424'
extern: '1'
intvolume: '        68'
issue: '4'
keyword:
- response bias
- temporal order tasks
- attention manipulation
- masked primes
- perceptual latency priming
- Adult
- Attention
- Discrimination Learning
- Female
- Humans
- Male
- Memory
- Short-Term
- Orientation
- Pattern Recognition
- Visual
- Perceptual Masking
- Psychomotor Performance
- Psychophysics
- Reaction Time
- Serial Learning
- Attention
- Latent Learning
- Priming
- Response Bias
- Visual Perception
- Response Latency
- Temporal Order (Judgment)
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://kw.uni-paderborn.de/fileadmin/fakultaet/Institute/psychologie/Kognitive_Psychologie/Publikationen/Scharlau2004PsychResResponseBiasFinal.pdf
oa: '1'
page: 224 - 236
publication: Psychological Research
publication_identifier:
  issn:
  - 0340-0727
publication_status: published
status: public
title: Evidence against response bias in temporal order tasks with attention manipulation
  by masked primes.
type: journal_article
user_id: '42165'
volume: 68
year: '2004'
...
---
_id: '5667'
abstract:
- lang: eng
  text: Voting via the Internet is part of electronic government and electronic democracy.
    However, there are many obstacles which have to be overcome, especially legal
    restrictions have to be transformed into technical and security solutions. In
    the first part the article discusses advantages and disadvantages of Internet
    elections, shows different application fields, and presents important international
    pilot schemes (political and business ones). in the second part, due to democratic
    basic principles, technological security aspects are worked out.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. E-Democracy: Internet Voting. In: <i>Proceedings of the IADIS International
    Conference WWW Internet 2003. Vol. 2</i>. Algarve: IADIS Press; 2003:1017-1021.'
  apa: 'Schryen, G. (2003). E-Democracy: Internet Voting. In <i>Proceedings of the
    IADIS International Conference WWW Internet 2003. vol. 2</i> (pp. 1017–1021).
    Algarve: IADIS Press.'
  bibtex: '@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting},
    booktitle={Proceedings of the IADIS International Conference WWW Internet 2003.
    vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021}
    }'
  chicago: 'Schryen, Guido. “E-Democracy: Internet Voting.” In <i>Proceedings of the
    IADIS International Conference WWW Internet 2003. Vol. 2</i>, 1017–21. Algarve:
    IADIS Press, 2003.'
  ieee: 'G. Schryen, “E-Democracy: Internet Voting,” in <i>Proceedings of the IADIS
    International Conference WWW Internet 2003. vol. 2</i>, Algarve: IADIS Press,
    2003, pp. 1017–1021.'
  mla: 'Schryen, Guido. “E-Democracy: Internet Voting.” <i>Proceedings of the IADIS
    International Conference WWW Internet 2003. Vol. 2</i>, IADIS Press, 2003, pp.
    1017–21.'
  short: 'G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet
    2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.'
date_created: 2018-11-14T15:01:49Z
date_updated: 2022-01-06T07:02:25Z
department:
- _id: '277'
extern: '1'
keyword:
- Internet Voting
- Online polls
- E-Democracy
- Security
language:
- iso: eng
page: 1017-1021
place: Algarve
publication: Proceedings of the IADIS International Conference WWW Internet 2003.
  vol. 2
publisher: IADIS Press
status: public
title: 'E-Democracy: Internet Voting'
type: book_chapter
user_id: '61579'
year: '2003'
...
---
_id: '5668'
abstract:
- lang: eng
  text: 'Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen
    diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger
    Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen
    wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden
    anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen
    herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte
    herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität
    der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell
    vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems
    systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem
    Ausblick auf notwendige Untersuchungen.'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Internet-Wahlen. In: <i>6. Internationale Tagung Wirtschaftsinformatik</i>.
    ; 2003:937-956.'
  apa: Schryen, G. (2003). Internet-Wahlen. In <i>6. Internationale Tagung Wirtschaftsinformatik</i>
    (pp. 937–956).
  bibtex: '@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale
    Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956}
    }'
  chicago: Schryen, Guido. “Internet-Wahlen.” In <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    937–56, 2003.
  ieee: G. Schryen, “Internet-Wahlen,” in <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    2003, pp. 937–956.
  mla: Schryen, Guido. “Internet-Wahlen.” <i>6. Internationale Tagung Wirtschaftsinformatik</i>,
    2003, pp. 937–56.
  short: 'G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp.
    937–956.'
date_created: 2018-11-14T15:03:15Z
date_updated: 2022-01-06T07:02:26Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:40:14Z
  date_updated: 2018-12-18T13:40:14Z
  file_id: '6340'
  file_name: Schryen - Internet-Wahlen.pdf
  file_size: 364380
  relation: main_file
file_date_updated: 2018-12-18T13:40:14Z
has_accepted_license: '1'
keyword:
- Internet-Wahlen
- E-Democracy
- Sicherheit
- Kryptographie
language:
- iso: eng
oa: '1'
page: 937-956
publication: 6. Internationale Tagung Wirtschaftsinformatik
status: public
title: Internet-Wahlen
type: conference
user_id: '61579'
year: '2003'
...
---
_id: '5623'
abstract:
- lang: eng
  text: 'Mit dem elektronischen Papier wird in der Displayforschung ein neuer materialtechnologischer
    Ansatz verfolgt: Elektronisches Papier besteht aus einer dünnen, flexiblen Folie,
    in der farbige Pigmente mittels elektrischer Felder ausgerichtet werden. Die Vorteile
    gegenüber traditionellen Technologien wie beispielsweise LCD-Displays bestehen
    zum einen in niedrigeren Herstellungskosten (niedrigere Produktionskosten und
    geringere Materialkosten) und einem geringeren Gewicht. Zum anderen entsteht eine
    bessere Lesbarkeit, da sich Reflexion, Kontrast und mögliche Betrachtungswinkel
    verbessern bzw. vergrößern. Diese Potenziale können bei Anzeigetafeln, Computerdisplays
    und mobilen Endgeräten ausgeschöpft werden. Mit der Eigenschaft, fast beliebige
    Materialien als Trägermedium zu verwenden, öffnet sich auch die Anwendungsmöglichkeit
    des biegsamen, elektronischen Mediums für Zeitungen und Zeitschriften. Die US-Unternehmen
    E Ink und Gyricon Media bieten eine zunehmend größere Produktpalette mit elektronischem
    Papier an.'
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Jürgen
  full_name: Karla, Jürgen
  last_name: Karla
citation:
  ama: Schryen G, Karla J. Elektronisches Papier - Display-Technologie mit weitem
    Anwendungsspektrum. <i>Wirtschaftsinformatik</i>. 2002;44(6):567-574.
  apa: Schryen, G., &#38; Karla, J. (2002). Elektronisches Papier - Display-Technologie
    mit weitem Anwendungsspektrum. <i>Wirtschaftsinformatik</i>, <i>44</i>(6), 567–574.
  bibtex: '@article{Schryen_Karla_2002, title={Elektronisches Papier - Display-Technologie
    mit weitem Anwendungsspektrum}, volume={44}, number={6}, journal={Wirtschaftsinformatik},
    publisher={Springer}, author={Schryen, Guido and Karla, Jürgen}, year={2002},
    pages={567–574} }'
  chicago: 'Schryen, Guido, and Jürgen Karla. “Elektronisches Papier - Display-Technologie
    Mit Weitem Anwendungsspektrum.” <i>Wirtschaftsinformatik</i> 44, no. 6 (2002):
    567–74.'
  ieee: G. Schryen and J. Karla, “Elektronisches Papier - Display-Technologie mit
    weitem Anwendungsspektrum,” <i>Wirtschaftsinformatik</i>, vol. 44, no. 6, pp.
    567–574, 2002.
  mla: Schryen, Guido, and Jürgen Karla. “Elektronisches Papier - Display-Technologie
    Mit Weitem Anwendungsspektrum.” <i>Wirtschaftsinformatik</i>, vol. 44, no. 6,
    Springer, 2002, pp. 567–74.
  short: G. Schryen, J. Karla, Wirtschaftsinformatik 44 (2002) 567–574.
date_created: 2018-11-14T14:08:02Z
date_updated: 2022-01-06T07:02:12Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:43:09Z
  date_updated: 2018-12-18T13:43:09Z
  file_id: '6344'
  file_name: Schryen Karla - ElektronischesPapier.pdf
  file_size: 415354
  relation: main_file
file_date_updated: 2018-12-18T13:43:09Z
has_accepted_license: '1'
intvolume: '        44'
issue: '6'
keyword:
- Elektronisches Papier
- Elektronische Tinte
- E Ink
- Gyricon Media
- Displays
- Mobile Endger{\
language:
- iso: eng
oa: '1'
page: 567-574
publication: Wirtschaftsinformatik
publisher: Springer
status: public
title: Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum
type: journal_article
user_id: '61579'
volume: 44
year: '2002'
...
