---
_id: '5701'
abstract:
- lang: eng
  text: "Purpose\r\n– The purpose of this paper is to craft a future research agenda
    to advance smart service research and practice. Smart services are delivered to
    or via intelligent objects that feature awareness and connectivity. For service
    researchers and managers, one of the most fascinating aspects of smart service
    provision is that the connected object is able to sense its own condition and
    its surroundings and thus allows for real-time data collection, continuous communication
    and interactive feedback. \r\n\r\nDesign/methodology/approach\r\n– This article
    is based on discussions in the workshop on “Fresh perspectives on technology in
    service” at the International Network of Service Researchers on September 26,
    2014 at CTF, Karlstad, Sweden. The paper summarizes the discussion on smart services,
    adds an extensive literature review, provides examples from business practice
    and develops a structured approach to new research avenues. \r\n\r\nFindings\r\n–
    We propose that smart services vary on their individual level of autonomous decision-making,
    visibility and embeddedness in objects and customer lives. Based on a discussion
    of these characteristics, we identify research avenues regarding the perception
    and nature of smart services, the adoption of smart services, the innovation through
    smart services as well as regarding the development of new business models. \r\n\r\nOriginality/value\r\n–
    Smart services is a new emerging topic in service marketing research, their implications
    on organizations, customers and the service landscape have not been fully explored.
    We provide a fresh perspective on service research by characterizing relevant
    aspects of smart service that will stimulate fruitful future research and advance
    the understanding and practice of smart services."
article_type: original
author:
- first_name: Nancy
  full_name: Wünderlich, Nancy
  id: '36392'
  last_name: Wünderlich
- first_name: Kristina
  full_name: Heinonen, Kristina
  last_name: Heinonen
- first_name: Amy L
  full_name: Ostrom, Amy L
  last_name: Ostrom
- first_name: Lia
  full_name: Patricio, Lia
  last_name: Patricio
- first_name: Rui
  full_name: Sousa, Rui
  last_name: Sousa
- first_name: Chris
  full_name: Voss, Chris
  last_name: Voss
- first_name: Jos
  full_name: Lemmink, Jos
  last_name: Lemmink
citation:
  ama: 'Wünderlich N, Heinonen K, Ostrom AL, et al. Futurizing” Smart Service: Implications
    for Service Researchers and Managers. <i>Journal of Services Marketing</i>. 2015;29(6/7):442-447.'
  apa: 'Wünderlich, N., Heinonen, K., Ostrom, A. L., Patricio, L., Sousa, R., Voss,
    C., &#38; Lemmink, J. (2015). Futurizing” Smart Service: Implications for Service
    Researchers and Managers. <i>Journal of Services Marketing</i>, <i>29</i>(6/7),
    442–447.'
  bibtex: '@article{Wünderlich_Heinonen_Ostrom_Patricio_Sousa_Voss_Lemmink_2015, title={Futurizing”
    Smart Service: Implications for Service Researchers and Managers.}, volume={29},
    number={6/7}, journal={Journal of Services Marketing}, publisher={Emerald Group
    Publishing Limited}, author={Wünderlich, Nancy and Heinonen, Kristina and Ostrom,
    Amy L and Patricio, Lia and Sousa, Rui and Voss, Chris and Lemmink, Jos}, year={2015},
    pages={442–447} }'
  chicago: 'Wünderlich, Nancy, Kristina Heinonen, Amy L Ostrom, Lia Patricio, Rui
    Sousa, Chris Voss, and Jos Lemmink. “Futurizing” Smart Service: Implications for
    Service Researchers and Managers.” <i>Journal of Services Marketing</i> 29, no.
    6/7 (2015): 442–47.'
  ieee: 'N. Wünderlich <i>et al.</i>, “Futurizing” Smart Service: Implications for
    Service Researchers and Managers.,” <i>Journal of Services Marketing</i>, vol.
    29, no. 6/7, pp. 442–447, 2015.'
  mla: 'Wünderlich, Nancy, et al. “Futurizing” Smart Service: Implications for Service
    Researchers and Managers.” <i>Journal of Services Marketing</i>, vol. 29, no.
    6/7, Emerald Group Publishing Limited, 2015, pp. 442–47.'
  short: N. Wünderlich, K. Heinonen, A.L. Ostrom, L. Patricio, R. Sousa, C. Voss,
    J. Lemmink, Journal of Services Marketing 29 (2015) 442–447.
date_created: 2018-11-15T11:27:26Z
date_updated: 2022-01-06T07:02:36Z
department:
- _id: '181'
intvolume: '        29'
issue: 6/7
keyword:
- Connected services
- Intelligent object
- New service type
- Smart services
language:
- iso: eng
page: 442-447
publication: Journal of Services Marketing
publication_status: published
publisher: Emerald Group Publishing Limited
status: public
title: 'Futurizing” Smart Service: Implications for Service Researchers and Managers.'
type: journal_article
user_id: '37741'
volume: 29
year: '2015'
...
---
_id: '5703'
abstract:
- lang: eng
  text: "Purpose\r\n– The purpose of this paper is to encourage the reader to think
    differently about service-related issues and to strive to conduct service research
    that makes a transformational impact on individuals, organizations and society.
    The authors suggest that service researchers are in an excellent position to develop
    research that matters by making stronger connections with theory and elevating
    purely applied research to research that is higher in both practical relevance
    and methodological rigor. \r\n\r\nDesign/methodology/approach\r\n– This paper
    takes a conceptual approach, connecting pertinent literature with new ideas highlighted
    in this special issue. \r\n\r\nFindings\r\n– This paper proposes that service
    researchers look beyond traditional service applications, take a multi-disciplinary
    approach to problem-solving and make greater strides towards connecting theory
    and practice. The authors propose a Model of Rigorous and Relevant Research, and
    call for fresh thinking across a wide range of research areas, including enhancing
    the customer experience, crafting innovation, integrating technology and measuring
    service outcomes. \r\n\r\nOriginality/value\r\n– The originality of this essay
    lies in its focus on revitalizing the discussion on relevance and rigor as a path
    forward for service research. Additionally, this paper offers new insights on
    core management aspects of service provision that provide a solid platform for
    future work in service research."
article_type: original
author:
- first_name: Anders
  full_name: Gustafsson, Anders
  last_name: Gustafsson
- first_name: Lerzan
  full_name: Aksoy, Lerzan
  last_name: Aksoy
- first_name: Michael K
  full_name: Brady, Michael K
  last_name: Brady
- first_name: Janet R
  full_name: McColl-Kennedy, Janet R
  last_name: McColl-Kennedy
- first_name: Nancy J
  full_name: Sirianni, Nancy J
  last_name: Sirianni
- first_name: Lars
  full_name: Witell, Lars
  last_name: Witell
- first_name: Nancy
  full_name: Wünderlich, Nancy
  id: '36392'
  last_name: Wünderlich
citation:
  ama: Gustafsson A, Aksoy L, Brady MK, et al. Conducting Service Research that Matters.
    <i>Journal of Services Marketing</i>. 2015;29(6/7):425-429.
  apa: Gustafsson, A., Aksoy, L., Brady, M. K., McColl-Kennedy, J. R., Sirianni, N.
    J., Witell, L., &#38; Wünderlich, N. (2015). Conducting Service Research that
    Matters. <i>Journal of Services Marketing</i>, <i>29</i>(6/7), 425–429.
  bibtex: '@article{Gustafsson_Aksoy_Brady_McColl-Kennedy_Sirianni_Witell_Wünderlich_2015,
    title={Conducting Service Research that Matters.}, volume={29}, number={6/7},
    journal={Journal of Services Marketing}, publisher={Emerald Group Publishing Limited},
    author={Gustafsson, Anders and Aksoy, Lerzan and Brady, Michael K and McColl-Kennedy,
    Janet R and Sirianni, Nancy J and Witell, Lars and Wünderlich, Nancy}, year={2015},
    pages={425–429} }'
  chicago: 'Gustafsson, Anders, Lerzan Aksoy, Michael K Brady, Janet R McColl-Kennedy,
    Nancy J Sirianni, Lars Witell, and Nancy Wünderlich. “Conducting Service Research
    That Matters.” <i>Journal of Services Marketing</i> 29, no. 6/7 (2015): 425–29.'
  ieee: A. Gustafsson <i>et al.</i>, “Conducting Service Research that Matters.,”
    <i>Journal of Services Marketing</i>, vol. 29, no. 6/7, pp. 425–429, 2015.
  mla: Gustafsson, Anders, et al. “Conducting Service Research That Matters.” <i>Journal
    of Services Marketing</i>, vol. 29, no. 6/7, Emerald Group Publishing Limited,
    2015, pp. 425–29.
  short: A. Gustafsson, L. Aksoy, M.K. Brady, J.R. McColl-Kennedy, N.J. Sirianni,
    L. Witell, N. Wünderlich, Journal of Services Marketing 29 (2015) 425–429.
date_created: 2018-11-15T11:32:07Z
date_updated: 2022-01-06T07:02:36Z
department:
- _id: '181'
intvolume: '        29'
issue: 6/7
keyword:
- Relevance
- Service technology
- Service innovation
- Customer experience
- Rigor
- Service outcomes
language:
- iso: eng
page: 425-429
publication: Journal of Services Marketing
publication_status: published
publisher: Emerald Group Publishing Limited
status: public
title: Conducting Service Research that Matters.
type: journal_article
user_id: '37741'
volume: 29
year: '2015'
...
---
_id: '5704'
abstract:
- lang: eng
  text: 'Advancements in information technology have changed the way customers experience
    a service encounter and their relationship with service providers. Especially
    technology-based self-service channels have found their way into the 21st century
    service economy. While research embraces these channels for their cost-efficiency,
    it has not examined whether a shift from personal to self-service affects customer–firm
    relationships. Drawing from the service-dominant logic and its central concept
    of value-in-context, we discuss customers’ value creation in self-service and
    personal service channels and examine the long-term impact of these channels on
    customer retention. Using longitudinal customer data, we investigate how the ratio
    of self-service versus personal service use influences customer defection over
    time. Our findings suggest that the ratio of self-service to personal service
    used affects customer defection in a U-shaped manner, with intermediate levels
    of both self-service and personal service use being associated with the lowest
    likelihood of defection. We also find that this effect mitigates over time. We
    conclude that firms should not shift customers toward self-service channels completely,
    especially not at the beginning of a relationship. Our study underlines the importance
    of understanding when and how self-service technologies create valuable customer
    experiences and stresses the notion of actively managing customers’ cocreation
    of value. '
article_type: original
author:
- first_name: Anne
  full_name: Scherer, Anne
  last_name: Scherer
- first_name: Nancy
  full_name: Wünderlich, Nancy
  id: '36392'
  last_name: Wünderlich
- first_name: Florian
  full_name: Von Wangenheim, Florian
  last_name: Von Wangenheim
citation:
  ama: 'Scherer A, Wünderlich N, Von Wangenheim F. The Value of Self-Service: Long-Term
    Effects of Technology-Based Self-Service Usage on Customer Retention. <i>MIS Quarterly</i>.
    2015;39(1):177-200.'
  apa: 'Scherer, A., Wünderlich, N., &#38; Von Wangenheim, F. (2015). The Value of
    Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer
    Retention. <i>MIS Quarterly</i>, <i>39</i>(1), 177–200.'
  bibtex: '@article{Scherer_Wünderlich_Von Wangenheim_2015, title={The Value of Self-Service:
    Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.},
    volume={39}, number={1}, journal={MIS Quarterly}, publisher={MIS RC}, author={Scherer,
    Anne and Wünderlich, Nancy and Von Wangenheim, Florian}, year={2015}, pages={177–200}
    }'
  chicago: 'Scherer, Anne, Nancy Wünderlich, and Florian Von Wangenheim. “The Value
    of Self-Service: Long-Term Effects of Technology-Based Self-Service Usage on Customer
    Retention.” <i>MIS Quarterly</i> 39, no. 1 (2015): 177–200.'
  ieee: 'A. Scherer, N. Wünderlich, and F. Von Wangenheim, “The Value of Self-Service:
    Long-Term Effects of Technology-Based Self-Service Usage on Customer Retention.,”
    <i>MIS Quarterly</i>, vol. 39, no. 1, pp. 177–200, 2015.'
  mla: 'Scherer, Anne, et al. “The Value of Self-Service: Long-Term Effects of Technology-Based
    Self-Service Usage on Customer Retention.” <i>MIS Quarterly</i>, vol. 39, no.
    1, MIS RC, 2015, pp. 177–200.'
  short: A. Scherer, N. Wünderlich, F. Von Wangenheim, MIS Quarterly 39 (2015) 177–200.
date_created: 2018-11-15T11:36:38Z
date_updated: 2022-01-06T07:02:36Z
department:
- _id: '181'
intvolume: '        39'
issue: '1'
keyword:
- customer defection
- customer retention
- e-service
- longitudinal
- Self-service
- value-in-context
language:
- iso: eng
page: 177-200
publication: MIS Quarterly
publication_identifier:
  issn:
  - 0276-7783.
publication_status: published
publisher: MIS RC
status: public
title: 'The Value of Self-Service: Long-Term Effects of Technology-Based Self-Service
  Usage on Customer Retention.'
type: journal_article
user_id: '37741'
volume: 39
year: '2015'
...
---
_id: '5714'
abstract:
- lang: eng
  text: Coalition loyalty programs are on the rise, yet few studies investigate the
    impact of service failures in such programs. Using data from a retail context,
    the authors show that a program partner deemed responsible for a service failure
    suffers negative customer responses. However, customers’ perceptions of the benefits
    of the coalition loyalty program buffer these consequences. Perhaps most importantly,
    when customers perceive the program's special treatment benefits as low, direct
    and indirect spillover effects occur, such that a service failure by one program
    partner has a negative effect on customer loyalty toward the program itself.
article_type: original
author:
- first_name: Jan H
  full_name: Schumann, Jan H
  last_name: Schumann
- first_name: Nancy
  full_name: Wünderlich, Nancy
  id: '36392'
  last_name: Wünderlich
- first_name: Heiner
  full_name: Evanschitzky, Heiner
  last_name: Evanschitzky
citation:
  ama: 'Schumann JH, Wünderlich N, Evanschitzky H. Spillover Effects of Service Failures
    in Coalition Loyalty Programs: The Buffering Effect of Special Treatment Benefits.
    <i>Journal of Retailing</i>. 2014;90(1):111-118.'
  apa: 'Schumann, J. H., Wünderlich, N., &#38; Evanschitzky, H. (2014). Spillover
    Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect
    of Special Treatment Benefits. <i>Journal of Retailing</i>, <i>90</i>(1), 111–118.'
  bibtex: '@article{Schumann_Wünderlich_Evanschitzky_2014, title={Spillover Effects
    of Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special
    Treatment Benefits.}, volume={90}, number={1}, journal={Journal of Retailing},
    publisher={Elsevier}, author={Schumann, Jan H and Wünderlich, Nancy and Evanschitzky,
    Heiner}, year={2014}, pages={111–118} }'
  chicago: 'Schumann, Jan H, Nancy Wünderlich, and Heiner Evanschitzky. “Spillover
    Effects of Service Failures in Coalition Loyalty Programs: The Buffering Effect
    of Special Treatment Benefits.” <i>Journal of Retailing</i> 90, no. 1 (2014):
    111–18.'
  ieee: 'J. H. Schumann, N. Wünderlich, and H. Evanschitzky, “Spillover Effects of
    Service Failures in Coalition Loyalty Programs: The Buffering Effect of Special
    Treatment Benefits.,” <i>Journal of Retailing</i>, vol. 90, no. 1, pp. 111–118,
    2014.'
  mla: 'Schumann, Jan H., et al. “Spillover Effects of Service Failures in Coalition
    Loyalty Programs: The Buffering Effect of Special Treatment Benefits.” <i>Journal
    of Retailing</i>, vol. 90, no. 1, Elsevier, 2014, pp. 111–18.'
  short: J.H. Schumann, N. Wünderlich, H. Evanschitzky, Journal of Retailing 90 (2014)
    111–118.
date_created: 2018-11-16T09:23:24Z
date_updated: 2022-01-06T07:02:37Z
department:
- _id: '181'
intvolume: '        90'
issue: '1'
keyword:
- Service failure
- Spillover effects
- Buffering effect
- Coalition loyalty program
language:
- iso: eng
page: 111-118
publication: Journal of Retailing
publication_status: published
publisher: Elsevier
status: public
title: 'Spillover Effects of Service Failures in Coalition Loyalty Programs: The Buffering
  Effect of Special Treatment Benefits.'
type: journal_article
user_id: '37741'
volume: 90
year: '2014'
...
---
_id: '5715'
abstract:
- lang: eng
  text: Smart interactive services, in contrast with other technology-based services,
    require significant human-to-human interaction and collaboration in addition to
    the service provided by the embedded technology itself. The authors’ foundational
    Delphi study confirms smart interactive services (e.g., remote diagnosis, remote
    repair of equipment, and telemedicine) are a rapidly growing innovation category
    across industries. Yet, gaining user acceptance of these types of services presents
    a significant challenge for managers. To address this challenge, the authors employ
    a grounded theory approach, drawing on depth interviews, to develop a framework
    of barriers and facilitators to users’ attitudinal and behavioral responses to
    smart interactive services. The findings reveal a new set of beliefs that are
    critical in this context. These beliefs are tied to the human element and specifically
    pertain to beliefs about the “service counterpart (SC),” who is the provider’s
    employee controlling the technology. Control, trustworthiness, and collaboration
    beliefs emerge jointly as important and interrelated influencers tied to the SC.
    Contrary to conventional wisdom that focuses on features of the technology itself
    to gain user acceptance, this research encourages providers to emphasize the interpersonal
    elements of the service by providing control cues, raising social presence, and
    enhancing human trust mechanisms.
article_type: original
author:
- first_name: Nancy
  full_name: Wünderlich, Nancy
  id: '36392'
  last_name: Wünderlich
- first_name: Florian V
  full_name: Wangenheim, Florian V
  last_name: Wangenheim
- first_name: Mary Jo
  full_name: Bitner, Mary Jo
  last_name: Bitner
citation:
  ama: 'Wünderlich N, Wangenheim FV, Bitner MJ. High Tech and High Touch: A Framework
    for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.
    <i>Journal of Service Research</i>. 2013;16(1):3-20.'
  apa: 'Wünderlich, N., Wangenheim, F. V., &#38; Bitner, M. J. (2013). High Tech and
    High Touch: A Framework for Understanding User Attitudes and Behaviors Related
    to Smart Interactive Services. <i>Journal of Service Research</i>, <i>16</i>(1),
    3–20.'
  bibtex: '@article{Wünderlich_Wangenheim_Bitner_2013, title={High Tech and High Touch:
    A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive
    Services.}, volume={16}, number={1}, journal={Journal of Service Research}, publisher={SAGE
    Publications Sage CA: Los Angeles, CA}, author={Wünderlich, Nancy and Wangenheim,
    Florian V and Bitner, Mary Jo}, year={2013}, pages={3–20} }'
  chicago: 'Wünderlich, Nancy, Florian V Wangenheim, and Mary Jo Bitner. “High Tech
    and High Touch: A Framework for Understanding User Attitudes and Behaviors Related
    to Smart Interactive Services.” <i>Journal of Service Research</i> 16, no. 1 (2013):
    3–20.'
  ieee: 'N. Wünderlich, F. V. Wangenheim, and M. J. Bitner, “High Tech and High Touch:
    A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive
    Services.,” <i>Journal of Service Research</i>, vol. 16, no. 1, pp. 3–20, 2013.'
  mla: 'Wünderlich, Nancy, et al. “High Tech and High Touch: A Framework for Understanding
    User Attitudes and Behaviors Related to Smart Interactive Services.” <i>Journal
    of Service Research</i>, vol. 16, no. 1, SAGE Publications Sage CA: Los Angeles,
    CA, 2013, pp. 3–20.'
  short: N. Wünderlich, F.V. Wangenheim, M.J. Bitner, Journal of Service Research
    16 (2013) 3–20.
date_created: 2018-11-16T09:31:00Z
date_updated: 2022-01-06T07:02:37Z
department:
- _id: '181'
intvolume: '        16'
issue: '1'
keyword:
- service technology
- technology-mediated service
- service counterpart
- smart service
- remote service
- technology adoption
language:
- iso: eng
page: 3-20
publication: Journal of Service Research
publication_status: published
publisher: 'SAGE Publications Sage CA: Los Angeles, CA'
status: public
title: 'High Tech and High Touch: A Framework for Understanding User Attitudes and
  Behaviors Related to Smart Interactive Services.'
type: journal_article
user_id: '37741'
volume: 16
year: '2013'
...
---
_id: '4699'
author:
- first_name: Jörg
  full_name: Becker, Jörg
  last_name: Becker
- first_name: Daniel
  full_name: Beverungen, Daniel
  id: '59677'
  last_name: Beverungen
- first_name: Ralf
  full_name: Knackstedt, Ralf
  last_name: Knackstedt
- first_name: Martin
  full_name: Matzner, Martin
  last_name: Matzner
- first_name: Oliver
  full_name: Müller, Oliver
  id: '72849'
  last_name: Müller
- first_name: Jens
  full_name: Pöppelbuss, Jens
  last_name: Pöppelbuss
citation:
  ama: 'Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuss J. Designing
    interaction routines in service networks: A modularity and social construction-based
    approach. <i>Scandinavian Journal of Information Systems</i>. 2013;(1):17--47.'
  apa: 'Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., &#38;
    Pöppelbuss, J. (2013). Designing interaction routines in service networks: A modularity
    and social construction-based approach. <i>Scandinavian Journal of Information
    Systems</i>, (1), 17--47.'
  bibtex: '@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuss_2013, title={Designing
    interaction routines in service networks: A modularity and social construction-based
    approach}, number={1}, journal={Scandinavian Journal of Information Systems},
    author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Matzner,
    Martin and Müller, Oliver and Pöppelbuss, Jens}, year={2013}, pages={17--47} }'
  chicago: 'Becker, Jörg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver
    Müller, and Jens Pöppelbuss. “Designing Interaction Routines in Service Networks:
    A Modularity and Social Construction-Based Approach.” <i>Scandinavian Journal
    of Information Systems</i>, no. 1 (2013): 17--47.'
  ieee: 'J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuss,
    “Designing interaction routines in service networks: A modularity and social construction-based
    approach,” <i>Scandinavian Journal of Information Systems</i>, no. 1, pp. 17--47,
    2013.'
  mla: 'Becker, Jörg, et al. “Designing Interaction Routines in Service Networks:
    A Modularity and Social Construction-Based Approach.” <i>Scandinavian Journal
    of Information Systems</i>, no. 1, 2013, pp. 17--47.'
  short: J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuss,
    Scandinavian Journal of Information Systems (2013) 17--47.
date_created: 2018-10-12T08:30:56Z
date_updated: 2022-01-06T07:01:18Z
extern: '1'
issue: '1'
keyword:
- Business process management
- Conceptual modeling
- Interaction routines
- Modular design
- Service networks
- Social construction
language:
- iso: eng
main_file_link:
- url: https://aisel.aisnet.org/sjis/vol25/iss1/2/
page: 17--47
publication: Scandinavian Journal of Information Systems
publication_identifier:
  issn:
  - '09050167'
status: public
title: 'Designing interaction routines in service networks: A modularity and social
  construction-based approach'
type: journal_article
user_id: '72849'
year: '2013'
...
---
_id: '4700'
author:
- first_name: Jorg
  full_name: Becker, Jorg
  last_name: Becker
- first_name: Daniel
  full_name: Beverungen, Daniel
  id: '59677'
  last_name: Beverungen
- first_name: Ralf
  full_name: Knackstedt, Ralf
  last_name: Knackstedt
- first_name: Martin
  full_name: Matzner, Martin
  last_name: Matzner
- first_name: Oliver
  full_name: Müller, Oliver
  id: '72849'
  last_name: Müller
- first_name: Jens
  full_name: Pöppelbuss, Jens
  last_name: Pöppelbuss
citation:
  ama: Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuss J. Bridging
    the gap between manufacturing and service through IT-based boundary objects. <i>IEEE
    Transactions on Engineering Management</i>. 2013;(3):468--482. doi:<a href="https://doi.org/10.1109/TEM.2012.2214770">10.1109/TEM.2012.2214770</a>
  apa: Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., &#38;
    Pöppelbuss, J. (2013). Bridging the gap between manufacturing and service through
    IT-based boundary objects. <i>IEEE Transactions on Engineering Management</i>,
    (3), 468--482. <a href="https://doi.org/10.1109/TEM.2012.2214770">https://doi.org/10.1109/TEM.2012.2214770</a>
  bibtex: '@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuss_2013, title={Bridging
    the gap between manufacturing and service through IT-based boundary objects},
    DOI={<a href="https://doi.org/10.1109/TEM.2012.2214770">10.1109/TEM.2012.2214770</a>},
    number={3}, journal={IEEE Transactions on Engineering Management}, author={Becker,
    Jorg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller,
    Oliver and Pöppelbuss, Jens}, year={2013}, pages={468--482} }'
  chicago: 'Becker, Jorg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver
    Müller, and Jens Pöppelbuss. “Bridging the Gap between Manufacturing and Service
    through IT-Based Boundary Objects.” <i>IEEE Transactions on Engineering Management</i>,
    no. 3 (2013): 468--482. <a href="https://doi.org/10.1109/TEM.2012.2214770">https://doi.org/10.1109/TEM.2012.2214770</a>.'
  ieee: J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuss,
    “Bridging the gap between manufacturing and service through IT-based boundary
    objects,” <i>IEEE Transactions on Engineering Management</i>, no. 3, pp. 468--482,
    2013.
  mla: Becker, Jorg, et al. “Bridging the Gap between Manufacturing and Service through
    IT-Based Boundary Objects.” <i>IEEE Transactions on Engineering Management</i>,
    no. 3, 2013, pp. 468--482, doi:<a href="https://doi.org/10.1109/TEM.2012.2214770">10.1109/TEM.2012.2214770</a>.
  short: J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuss,
    IEEE Transactions on Engineering Management (2013) 468--482.
date_created: 2018-10-12T08:31:02Z
date_updated: 2022-01-06T07:01:19Z
doi: 10.1109/TEM.2012.2214770
extern: '1'
issue: '3'
keyword:
- Action research
- boundary spanning
- business process management (BPM)
- service blueprinting
- service networks
language:
- iso: eng
page: 468--482
publication: IEEE Transactions on Engineering Management
publication_identifier:
  isbn:
  - 0018-9391
  issn:
  - '00189391'
status: public
title: Bridging the gap between manufacturing and service through IT-based boundary
  objects
type: journal_article
user_id: '72849'
year: '2013'
...
---
_id: '24036'
author:
- first_name: Jens
  full_name: Pottebaum, Jens
  id: '405'
  last_name: Pottebaum
  orcid: http://orcid.org/0000-0001-8778-2989
citation:
  ama: Pottebaum J. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>.
    Monsenstein und Vannerdat; 2012.
  apa: Pottebaum, J. (2012). <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>.
    Monsenstein und Vannerdat.
  bibtex: '@book{Pottebaum_2012, place={Münster}, title={Optimierung des einsatzbezogenen
    Lernens durch Wissensidentifikation}, publisher={Monsenstein und Vannerdat}, author={Pottebaum,
    Jens}, year={2012} }'
  chicago: 'Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>.
    Münster: Monsenstein und Vannerdat, 2012.'
  ieee: 'J. Pottebaum, <i>Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation</i>.
    Münster: Monsenstein und Vannerdat, 2012.'
  mla: Pottebaum, Jens. <i>Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation</i>.
    Monsenstein und Vannerdat, 2012.
  short: J. Pottebaum, Optimierung Des Einsatzbezogenen Lernens Durch Wissensidentifikation,
    Monsenstein und Vannerdat, Münster, 2012.
date_created: 2021-09-09T12:18:36Z
date_updated: 2022-01-06T06:56:06Z
keyword:
- Arbeitsorganisation
- E-Learning
- Lernorganisation
- Lerntechnik
- Wissensmanagement
language:
- iso: eng
place: Münster
publication_identifier:
  isbn:
  - 3-86991-525-0
publisher: Monsenstein und Vannerdat
status: public
title: Optimierung des einsatzbezogenen Lernens durch Wissensidentifikation
type: dissertation
user_id: '405'
year: '2012'
...
---
_id: '5716'
abstract:
- lang: eng
  text: The tendency of managers to focus on short-term results rather than on sustained
    company success is of particular importance to retail marketing managers, because
    marketing activities involve expenditures which may only pay off in the longer
    term. To address the issue of myopic management, our study shows how the complexity
    of the service profit chain (SPC) can cause managers to make suboptimal decisions.
    Hence, our paper departs from past research by recognizing that understanding
    the temporal interplay between operational investments, employee satisfaction,
    customer satisfaction, and operating profit is essential to achieving sustained
    success. In particular, we intend to improve understanding of the functioning
    of the SPC with respect to time lags and feedback loops. Results of our large-scale
    longitudinal study set in a multi-outlet retail chain reveal time-lag effects
    between operational investments and employee satisfaction, as well as between
    customer satisfaction and performance. These findings, along with evidence of
    a negative interaction effect of employee satisfaction on the relationship between
    current performance and future investments, show the substantial risk of mismanaging
    the SPC. We identify specific situations in which the dynamic approach leads to
    superior marketing investment decisions, when compared to the conventional static
    view of the SCP. These insights provide valuable managerial guidance for effectively
    managing the SPC over time.
article_type: original
author:
- first_name: Heiner
  full_name: Evanschitzky, Heiner
  last_name: Evanschitzky
- first_name: Florian v
  full_name: Wangenheim, Florian v
  last_name: Wangenheim
- first_name: Nancy
  full_name: Wünderlich, Nancy
  id: '36392'
  last_name: Wünderlich
citation:
  ama: 'Evanschitzky H, Wangenheim F v, Wünderlich N. Perils of Managing the Service
    Profit Chain: The Role of Time Lags and Feedback Loops. <i>Journal of Retailing</i>.
    2012;88(3):356-366.'
  apa: 'Evanschitzky, H., Wangenheim, F. v, &#38; Wünderlich, N. (2012). Perils of
    Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops. <i>Journal
    of Retailing</i>, <i>88</i>(3), 356–366.'
  bibtex: '@article{Evanschitzky_Wangenheim_Wünderlich_2012, title={Perils of Managing
    the Service Profit Chain: The Role of Time Lags and Feedback Loops.}, volume={88},
    number={3}, journal={Journal of Retailing}, publisher={Elsevier}, author={Evanschitzky,
    Heiner and Wangenheim, Florian v and Wünderlich, Nancy}, year={2012}, pages={356–366}
    }'
  chicago: 'Evanschitzky, Heiner, Florian v Wangenheim, and Nancy Wünderlich. “Perils
    of Managing the Service Profit Chain: The Role of Time Lags and Feedback Loops.”
    <i>Journal of Retailing</i> 88, no. 3 (2012): 356–66.'
  ieee: 'H. Evanschitzky, F. v Wangenheim, and N. Wünderlich, “Perils of Managing
    the Service Profit Chain: The Role of Time Lags and Feedback Loops.,” <i>Journal
    of Retailing</i>, vol. 88, no. 3, pp. 356–366, 2012.'
  mla: 'Evanschitzky, Heiner, et al. “Perils of Managing the Service Profit Chain:
    The Role of Time Lags and Feedback Loops.” <i>Journal of Retailing</i>, vol. 88,
    no. 3, Elsevier, 2012, pp. 356–66.'
  short: H. Evanschitzky, F. v Wangenheim, N. Wünderlich, Journal of Retailing 88
    (2012) 356–366.
date_created: 2018-11-16T09:37:06Z
date_updated: 2022-01-06T07:02:37Z
department:
- _id: '181'
intvolume: '        88'
issue: '3'
keyword:
- Employee satisfaction
- Customer satisfaction
- Performance
- Service profit chain
- Feedback loops
- Time lags
- Myopic marketing management
language:
- iso: eng
page: 356-366
publication: Journal of Retailing
publication_status: published
publisher: Elsevier
status: public
title: 'Perils of Managing the Service Profit Chain: The Role of Time Lags and Feedback
  Loops.'
type: journal_article
user_id: '37741'
volume: 88
year: '2012'
...
---
_id: '4430'
abstract:
- lang: ger
  text: Eine zentrale Herausforderung in der Ausbildung angehender Wirtschaftslehrpersonen
    stellt die sinnvolle Verknüpfung von Theorie- und Praxiserfahrungen dar. Im Rahmen
    der Ausbildung angehender Wirtschaftslehrpersonen an der Universität St. Gallen
    wird eine Lernumgebung gestaltet, die eine Verschränkung von Theorie- und Praxiserfahrungen
    ermöglichen soll. Die Lernprozesse der Studierenden werden dabei durch didaktisch
    angeleitete Weblogarbeit unterstützt. Trotz der Lernchancen, die sich aus einer
    Verknüpfung von theoretischen und praktischen Lernphasen ergeben, schätzen die
    Studierenden den Nutzen der Weblogarbeit als äusserst gering ein. Die Studierenden
    bei der reflexiven Integration praxisnaher und theoretischer Lernerfahrungen zu
    unterstützen, ist eine Herausforderung, die dezidierter Anleitung und Förderung
    durch die Lehrpersonen bedarf
author:
- first_name: Tobias
  full_name: Jenert, Tobias
  last_name: Jenert
- first_name: Anja
  full_name: Gebhardt, Anja
  last_name: Gebhardt
- first_name: Reto
  full_name: Käser, Reto
  last_name: Käser
citation:
  ama: Jenert T, Gebhardt A, Käser R. Weblogs zur Unterstützung der Theorie-Praxis-Integration
    in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift für E-Learning</i>. 2011;6(2):17-29.
  apa: Jenert, T., Gebhardt, A., &#38; Käser, R. (2011). Weblogs zur Unterstützung
    der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung. <i>Zeitschrift
    Für E-Learning</i>, <i>6</i>(2), 17–29.
  bibtex: '@article{Jenert_Gebhardt_Käser_2011, title={Weblogs zur Unterstützung der
    Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung}, volume={6},
    number={2}, journal={Zeitschrift für E-Learning}, publisher={Studien-Verlag},
    author={Jenert, Tobias and Gebhardt, Anja and Käser, Reto}, year={2011}, pages={17–29}
    }'
  chicago: 'Jenert, Tobias, Anja Gebhardt, and Reto Käser. “Weblogs Zur Unterstützung
    Der Theorie-Praxis-Integration in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift
    Für E-Learning</i> 6, no. 2 (2011): 17–29.'
  ieee: T. Jenert, A. Gebhardt, and R. Käser, “Weblogs zur Unterstützung der Theorie-Praxis-Integration
    in der Wirtschaftslehrenden-Ausbildung,” <i>Zeitschrift für E-Learning</i>, vol.
    6, no. 2, pp. 17–29, 2011.
  mla: Jenert, Tobias, et al. “Weblogs Zur Unterstützung Der Theorie-Praxis-Integration
    in Der Wirtschaftslehrenden-Ausbildung.” <i>Zeitschrift Für E-Learning</i>, vol.
    6, no. 2, Studien-Verlag, 2011, pp. 17–29.
  short: T. Jenert, A. Gebhardt, R. Käser, Zeitschrift Für E-Learning 6 (2011) 17–29.
date_created: 2018-09-18T09:23:54Z
date_updated: 2022-01-06T07:01:03Z
department:
- _id: '208'
- _id: '282'
extern: '1'
intvolume: '         6'
issue: '2'
keyword:
- Weblog
- Blog
- e-learning
- TEL
- higher education
- business education
page: 17-29
publication: Zeitschrift für E-Learning
publication_identifier:
  issn:
  - 1992-9579
publisher: Studien-Verlag
status: public
title: Weblogs zur Unterstützung der Theorie-Praxis-Integration in der Wirtschaftslehrenden-Ausbildung
type: journal_article
user_id: '51057'
volume: 6
year: '2011'
...
---
_id: '11892'
abstract:
- lang: eng
  text: For an environment to be perceived as being smart, contextual information
    has to be gathered to adapt the system's behavior and its interface towards the
    user. Being a rich source of context information speech can be acquired unobtrusively
    by microphone arrays and then processed to extract information about the user
    and his environment. In this paper, a system for joint temporal segmentation,
    speaker localization, and identification is presented, which is supported by face
    identification from video data obtained from a steerable camera. Special attention
    is paid to latency aspects and online processing capabilities, as they are important
    for the application under investigation, namely ambient communication. It describes
    the vision of terminal-less, session-less and multi-modal telecommunication with
    remote partners, where the user can move freely within his home while the communication
    follows him. The speaker diarization serves as a context source, which has been
    integrated in a service-oriented middleware architecture and provided to the application
    to select the most appropriate I/O device and to steer the camera towards the
    speaker during ambient communication.
author:
- first_name: Joerg
  full_name: Schmalenstroeer, Joerg
  id: '460'
  last_name: Schmalenstroeer
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: Schmalenstroeer J, Haeb-Umbach R. Online Diarization of Streaming Audio-Visual
    Data for Smart Environments. <i>IEEE Journal of Selected Topics in Signal Processing</i>.
    2010;4(5):845-856. doi:<a href="https://doi.org/10.1109/JSTSP.2010.2050519">10.1109/JSTSP.2010.2050519</a>
  apa: Schmalenstroeer, J., &#38; Haeb-Umbach, R. (2010). Online Diarization of Streaming
    Audio-Visual Data for Smart Environments. <i>IEEE Journal of Selected Topics in
    Signal Processing</i>, <i>4</i>(5), 845–856. <a href="https://doi.org/10.1109/JSTSP.2010.2050519">https://doi.org/10.1109/JSTSP.2010.2050519</a>
  bibtex: '@article{Schmalenstroeer_Haeb-Umbach_2010, title={Online Diarization of
    Streaming Audio-Visual Data for Smart Environments}, volume={4}, DOI={<a href="https://doi.org/10.1109/JSTSP.2010.2050519">10.1109/JSTSP.2010.2050519</a>},
    number={5}, journal={IEEE Journal of Selected Topics in Signal Processing}, author={Schmalenstroeer,
    Joerg and Haeb-Umbach, Reinhold}, year={2010}, pages={845–856} }'
  chicago: 'Schmalenstroeer, Joerg, and Reinhold Haeb-Umbach. “Online Diarization
    of Streaming Audio-Visual Data for Smart Environments.” <i>IEEE Journal of Selected
    Topics in Signal Processing</i> 4, no. 5 (2010): 845–56. <a href="https://doi.org/10.1109/JSTSP.2010.2050519">https://doi.org/10.1109/JSTSP.2010.2050519</a>.'
  ieee: 'J. Schmalenstroeer and R. Haeb-Umbach, “Online Diarization of Streaming Audio-Visual
    Data for Smart Environments,” <i>IEEE Journal of Selected Topics in Signal Processing</i>,
    vol. 4, no. 5, pp. 845–856, 2010, doi: <a href="https://doi.org/10.1109/JSTSP.2010.2050519">10.1109/JSTSP.2010.2050519</a>.'
  mla: Schmalenstroeer, Joerg, and Reinhold Haeb-Umbach. “Online Diarization of Streaming
    Audio-Visual Data for Smart Environments.” <i>IEEE Journal of Selected Topics
    in Signal Processing</i>, vol. 4, no. 5, 2010, pp. 845–56, doi:<a href="https://doi.org/10.1109/JSTSP.2010.2050519">10.1109/JSTSP.2010.2050519</a>.
  short: J. Schmalenstroeer, R. Haeb-Umbach, IEEE Journal of Selected Topics in Signal
    Processing 4 (2010) 845–856.
date_created: 2019-07-12T05:30:16Z
date_updated: 2023-10-26T08:10:18Z
department:
- _id: '54'
doi: 10.1109/JSTSP.2010.2050519
intvolume: '         4'
issue: '5'
keyword:
- audio streaming
- audio visual data streaming
- context information speech
- face identification
- face recognition
- image segmentation
- middleware
- multimodal telecommunication
- online diarization
- service oriented middleware architecture
- sessionless telecommunication
- software architecture
- speaker identification
- speaker localization
- speaker recognition
- steerable camera
- telecommunication computing
- temporal segmentation
- terminal-less telecommunication
- video streaming
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2010/ScHa10.pdf
oa: '1'
page: 845-856
publication: IEEE Journal of Selected Topics in Signal Processing
quality_controlled: '1'
status: public
title: Online Diarization of Streaming Audio-Visual Data for Smart Environments
type: journal_article
user_id: '460'
volume: 4
year: '2010'
...
---
_id: '5621'
abstract:
- lang: eng
  text: Remote voting through the Internet provides convenience and access to the
    electorate. At the same time, the security concerns facing any distributed application
    are magnified when the task is so crucial to democratic society. In addition,
    some of the electoral process loses transparency when it is encapsulated in information
    technology. In this paper, we examine the public record of three recent elections
    that used Internet voting. Our specific goal is to identify any potential flaws
    that security experts would recognize, but may have not been identified in the
    rush to implement technology. To do this, we present a multiple exploratory case
    study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands,
    and Switzerland. These elections were selected as particularly interesting and
    accessible, and each presents its own technical and security challenges. The electoral
    environment, technical design and process for each election are described, including
    reconstruction of details which are implied but not specified within the source
    material. We found that all three elections warrant significant concern about
    voter security, verifiability, and transparency. Usability, our fourth area of
    focus, seems to have been well-addressed in these elections. While our analysis
    is based on public documents and previously published reports, and therefore lacking
    access to any confidential materials held by electoral officials, this comparative
    analysis provides interesting insight and consistent questions across all these
    cases. Effective review of Internet voting requires an aggressive stance towards
    identifying potential security and operational flaws, and we encourage the use
    of third party reviews with critical technology skills during design, programming,
    and voting to reduce the changes of failure or fraud that would undermine public
    confidence.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Eliot
  full_name: Rich, Eliot
  last_name: Rich
citation:
  ama: 'Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective
    Analysis of Elections in Estonia, The Netherlands, and Switzerland. <i>IEEE Transactions
    on Information Forensics \&#38; Security</i>. 2009;4(4 Part):729-744.'
  apa: 'Schryen, G., &#38; Rich, E. (2009). Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.
    <i>IEEE Transactions on Information Forensics \&#38; Security</i>, <i>4</i>(4
    Part), 729–744.'
  bibtex: '@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland},
    volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics
    \&#38; Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009},
    pages={729–744} }'
  chicago: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
    <i>IEEE Transactions on Information Forensics \&#38; Security</i> 4, no. 4 Part
    (2009): 729–44.'
  ieee: 'G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective
    Analysis of Elections in Estonia, The Netherlands, and Switzerland,” <i>IEEE Transactions
    on Information Forensics \&#38; Security</i>, vol. 4, no. 4 Part, pp. 729–744,
    2009.'
  mla: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
    A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
    <i>IEEE Transactions on Information Forensics \&#38; Security</i>, vol. 4, no.
    4 Part, IEEE, 2009, pp. 729–44.'
  short: G. Schryen, E. Rich, IEEE Transactions on Information Forensics \&#38; Security
    4 (2009) 729–744.
date_created: 2018-11-14T14:06:44Z
date_updated: 2022-01-06T07:02:12Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:16:07Z
  date_updated: 2018-12-18T13:16:07Z
  file_id: '6316'
  file_name: JOURNAL VERSION.pdf
  file_size: 1544790
  relation: main_file
file_date_updated: 2018-12-18T13:16:07Z
has_accepted_license: '1'
intvolume: '         4'
issue: 4 Part
keyword:
- e-voting
- Internet voting
- Internet election
- security
- verifiability
- RIES
- Estonia
- Neuch{\^a}tel
language:
- iso: eng
oa: '1'
page: 729-744
publication: IEEE Transactions on Information Forensics \& Security
publisher: IEEE
status: public
title: 'Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections
  in Estonia, The Netherlands, and Switzerland'
type: journal_article
user_id: '61579'
volume: 4
year: '2009'
...
---
_id: '17278'
abstract:
- lang: eng
  text: This paper investigates the influence of feedback provided by an autonomous
    robot (BIRON) on users’ discursive behavior. A user study is described during
    which users show objects to the robot. The results of the experiment indicate,
    that the robot’s verbal feedback utterances cause the humans to adapt their own
    way of speaking. The changes in users’ verbal behavior are due to their beliefs
    about the robots knowledge and abilities. In this paper they are identified and
    grouped. Moreover, the data implies variations in user behavior regarding gestures.
    Unlike speech, the robot was not able to give feedback with gestures. Due to the
    lack of feedback, users did not seem to have a consistent mental representation
    of the robot’s abilities to recognize gestures. As a result, changes between different
    gestures are interpreted to be unconscious variations accompanying speech.
author:
- first_name: Manja
  full_name: Lohse, Manja
  last_name: Lohse
- first_name: Katharina
  full_name: Rohlfing, Katharina
  id: '50352'
  last_name: Rohlfing
- first_name: Britta
  full_name: Wrede, Britta
  last_name: Wrede
- first_name: Gerhard
  full_name: Sagerer, Gerhard
  last_name: Sagerer
citation:
  ama: 'Lohse M, Rohlfing K, Wrede B, Sagerer G. “Try something else!” — When users
    change their discursive behavior in human-robot interaction. In: ; 2008:3481-3486.
    doi:<a href="https://doi.org/10.1109/ROBOT.2008.4543743">10.1109/ROBOT.2008.4543743</a>'
  apa: Lohse, M., Rohlfing, K., Wrede, B., &#38; Sagerer, G. (2008). <i>“Try something
    else!” — When users change their discursive behavior in human-robot interaction</i>.
    3481–3486. <a href="https://doi.org/10.1109/ROBOT.2008.4543743">https://doi.org/10.1109/ROBOT.2008.4543743</a>
  bibtex: '@inproceedings{Lohse_Rohlfing_Wrede_Sagerer_2008, title={“Try something
    else!” — When users change their discursive behavior in human-robot interaction},
    DOI={<a href="https://doi.org/10.1109/ROBOT.2008.4543743">10.1109/ROBOT.2008.4543743</a>},
    author={Lohse, Manja and Rohlfing, Katharina and Wrede, Britta and Sagerer, Gerhard},
    year={2008}, pages={3481–3486} }'
  chicago: Lohse, Manja, Katharina Rohlfing, Britta Wrede, and Gerhard Sagerer. “‘Try
    Something Else!’ — When Users Change Their Discursive Behavior in Human-Robot
    Interaction,” 3481–86, 2008. <a href="https://doi.org/10.1109/ROBOT.2008.4543743">https://doi.org/10.1109/ROBOT.2008.4543743</a>.
  ieee: 'M. Lohse, K. Rohlfing, B. Wrede, and G. Sagerer, “‘Try something else!’ —
    When users change their discursive behavior in human-robot interaction,” 2008,
    pp. 3481–3486, doi: <a href="https://doi.org/10.1109/ROBOT.2008.4543743">10.1109/ROBOT.2008.4543743</a>.'
  mla: Lohse, Manja, et al. <i>“Try Something Else!” — When Users Change Their Discursive
    Behavior in Human-Robot Interaction</i>. 2008, pp. 3481–86, doi:<a href="https://doi.org/10.1109/ROBOT.2008.4543743">10.1109/ROBOT.2008.4543743</a>.
  short: 'M. Lohse, K. Rohlfing, B. Wrede, G. Sagerer, in: 2008, pp. 3481–3486.'
date_created: 2020-06-24T13:02:49Z
date_updated: 2023-02-01T13:08:20Z
department:
- _id: '749'
doi: 10.1109/ROBOT.2008.4543743
keyword:
- discursive behavior
- autonomous robot
- BIRON
- man-machine systems
- robot abilities
- robot knowledge
- user gestures
- robot verbal feedback utterance
- speech processing
- user verbal behavior
- service robots
- human-robot interaction
- human computer interaction
- gesture recognition
language:
- iso: eng
page: 3481-3486
publication_identifier:
  isbn:
  - 1050-4729
status: public
title: “Try something else!” — When users change their discursive behavior in human-robot
  interaction
type: conference
user_id: '14931'
year: '2008'
...
---
_id: '4494'
alternative_title:
- Proceedings der Pre-Conference Workshops der 5. e-Learning Fachtagung Informatik
  DeLFI 2007
author:
- first_name: Thomas
  full_name: Sporer, Thomas
  last_name: Sporer
- first_name: Tobias
  full_name: Jenert, Tobias
  id: '71994'
  last_name: Jenert
  orcid: ' https://orcid.org/0000-0001-9262-5646'
- first_name: Bernhard
  full_name: Strehl, Bernhard
  last_name: Strehl
- first_name: Patrick Ole
  full_name: Noack, Patrick Ole
  last_name: Noack
citation:
  ama: 'Sporer T, Jenert T, Strehl B, Noack PO. Einsatz von E-Portfolios zur Förderung
    von studentischen Lerngemeinschaften im Hochschulstudium. In: <i>DeLFI Workshops</i>.
    Logos Verlag; 2007:19--26.'
  apa: 'Sporer, T., Jenert, T., Strehl, B., &#38; Noack, P. O. (2007). Einsatz von
    E-Portfolios zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.
    In <i>DeLFI Workshops</i> (pp. 19--26). Siegen: Logos Verlag.'
  bibtex: '@inproceedings{Sporer_Jenert_Strehl_Noack_2007, title={Einsatz von E-Portfolios
    zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.}, booktitle={DeLFI
    Workshops}, publisher={Logos Verlag}, author={Sporer, Thomas and Jenert, Tobias
    and Strehl, Bernhard and Noack, Patrick Ole}, year={2007}, pages={19--26} }'
  chicago: Sporer, Thomas, Tobias Jenert, Bernhard Strehl, and Patrick Ole Noack.
    “Einsatz von E-Portfolios Zur Förderung von Studentischen Lerngemeinschaften Im
    Hochschulstudium.” In <i>DeLFI Workshops</i>, 19--26. Logos Verlag, 2007.
  ieee: T. Sporer, T. Jenert, B. Strehl, and P. O. Noack, “Einsatz von E-Portfolios
    zur Förderung von studentischen Lerngemeinschaften im Hochschulstudium.,” in <i>DeLFI
    Workshops</i>, Siegen, 2007, pp. 19--26.
  mla: Sporer, Thomas, et al. “Einsatz von E-Portfolios Zur Förderung von Studentischen
    Lerngemeinschaften Im Hochschulstudium.” <i>DeLFI Workshops</i>, Logos Verlag,
    2007, pp. 19--26.
  short: 'T. Sporer, T. Jenert, B. Strehl, P.O. Noack, in: DeLFI Workshops, Logos
    Verlag, 2007, pp. 19--26.'
conference:
  end_date: 2007-09-17
  location: Siegen
  name: DeLFI 2007 - 5. e-Learing Fachtagung Informatik der Gesellschaft für Informatik
    e.V.
  start_date: 2007-09-17
date_created: 2018-09-19T09:08:18Z
date_updated: 2022-01-06T07:01:06Z
department:
- _id: '208'
- _id: '282'
extern: '1'
keyword:
- E-Portfolios
- Lerngemeinschaften
- Praxisgemeinschaften
- Projektgruppen
- Hochschulstudium
- informelles Lernen
page: 19--26
publication: DeLFI Workshops
publisher: Logos Verlag
status: public
title: Einsatz von E-Portfolios zur Förderung von studentischen Lerngemeinschaften
  im Hochschulstudium.
type: conference
user_id: '51057'
year: '2007'
...
---
_id: '4497'
alternative_title:
- Creating New Learning Experiences on a Global Scale
author:
- first_name: Thomas
  full_name: Sporer, Thomas
  last_name: Sporer
- first_name: Nina
  full_name: Heinze, Nina
  last_name: Heinze
- first_name: Tobias
  full_name: Jenert, Tobias
  id: '71994'
  last_name: Jenert
  orcid: ' https://orcid.org/0000-0001-9262-5646'
- first_name: Gabi
  full_name: Reinmann, Gabi
  last_name: Reinmann
citation:
  ama: 'Sporer T, Heinze N, Jenert T, Reinmann G. Student Learning Communities in
    the Project-Centered Study Program" Problem-Solving Competencies". In: ; 2007.'
  apa: Sporer, T., Heinze, N., Jenert, T., &#38; Reinmann, G. (2007). Student Learning
    Communities in the Project-Centered Study Program" Problem-Solving Competencies".
    Presented at the Second European Conference on Technology Enhanced Learning (EC-TEL)
    2007, Kreta .
  bibtex: '@inproceedings{Sporer_Heinze_Jenert_Reinmann_2007, title={Student Learning
    Communities in the Project-Centered Study Program" Problem-Solving Competencies"},
    author={Sporer, Thomas and Heinze, Nina and Jenert, Tobias and Reinmann, Gabi},
    year={2007} }'
  chicago: Sporer, Thomas, Nina Heinze, Tobias Jenert, and Gabi Reinmann. “Student
    Learning Communities in the Project-Centered Study Program" Problem-Solving Competencies",”
    2007.
  ieee: T. Sporer, N. Heinze, T. Jenert, and G. Reinmann, “Student Learning Communities
    in the Project-Centered Study Program" Problem-Solving Competencies",” presented
    at the Second European Conference on Technology Enhanced Learning (EC-TEL) 2007,
    Kreta , 2007.
  mla: Sporer, Thomas, et al. <i>Student Learning Communities in the Project-Centered
    Study Program" Problem-Solving Competencies"</i>. 2007.
  short: 'T. Sporer, N. Heinze, T. Jenert, G. Reinmann, in: 2007.'
conference:
  end_date: '2007-06-20 '
  location: 'Kreta '
  name: Second European Conference on Technology Enhanced Learning (EC-TEL) 2007
  start_date: 2007-06-17
date_created: 2018-09-19T09:22:02Z
date_updated: 2022-01-06T07:01:06Z
department:
- _id: '208'
- _id: '282'
extern: '1'
keyword:
- Problem Solving Competencies
- E-Portfolio
status: public
title: Student Learning Communities in the Project-Centered Study Program" Problem-Solving
  Competencies"
type: conference
user_id: '51057'
year: '2007'
...
---
_id: '5655'
abstract:
- lang: eng
  text: Spam e-mails have become a serious technological and economic problem. Up
    to now, by deploying complementary anti-spam measures, we have been reasonably
    able to withstand spam e-mails and use the Internet for regular communication.
    However, if we are to avert the danger of losing the Internet e-mail service in
    its capacity as a valuable, free and worldwide medium of open communication, anti-spam
    activities should be performed more systematically than is currently the case
    regarding the mainly heuristic, anti-spam measures in place. A formal framework,
    within which the existing delivery routes that a spam e-mail may take, and anti-spam
    measures and their effectiveness can be investigated, will perhaps encourage a
    shift in methodology and pave the way for new, holistic anti-spam measures. This
    paper presents a model of the Internet e-mail infrastructure as a directed graph
    and a deterministic finite automaton and draws on automata theory to formally
    derive the spam delivery routes. The most important anti-spam measures are then
    described. Methods controlling only specific delivery routes are evaluated in
    terms of how effectively they cover the modeled e-mail infrastructure; methods
    operating independently of any particular routes receive a more general assessment.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach. <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>. 2007;3(2):66-90.
  apa: Schryen, G. (2007). Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach. <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, <i>3</i>(2), 66–90.
  bibtex: '@article{Schryen_2007, title={Do anti-spam measures effectively cover the
    e-mail communication network? A formal approach}, volume={3}, number={2}, journal={The
    Journal of Information Systems Security (AIS Special Interest Group in Security)},
    author={Schryen, Guido}, year={2007}, pages={66–90} }'
  chicago: 'Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication
    Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i> 3, no. 2 (2007): 66–90.'
  ieee: G. Schryen, “Do anti-spam measures effectively cover the e-mail communication
    network? A formal approach,” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, vol. 3, no. 2, pp. 66–90, 2007.
  mla: Schryen, Guido. “Do Anti-Spam Measures Effectively Cover the e-Mail Communication
    Network? A Formal Approach.” <i>The Journal of Information Systems Security (AIS
    Special Interest Group in Security)</i>, vol. 3, no. 2, 2007, pp. 66–90.
  short: G. Schryen, The Journal of Information Systems Security (AIS Special Interest
    Group in Security) 3 (2007) 66–90.
date_created: 2018-11-14T14:51:41Z
date_updated: 2022-01-06T07:02:22Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:25:12Z
  date_updated: 2018-12-18T13:25:12Z
  file_id: '6324'
  file_name: Do anti-spam measures effectively cover the e-mail communication - Journal
    version.pdf
  file_size: 100448
  relation: main_file
file_date_updated: 2018-12-18T13:25:12Z
has_accepted_license: '1'
intvolume: '         3'
issue: '2'
keyword:
- e-mail
- spam
- e-mail infrastructure
- anti-spam measures
- spamming options
language:
- iso: eng
oa: '1'
page: 66-90
publication: The Journal of Information Systems Security (AIS Special Interest Group
  in Security)
status: public
title: Do anti-spam measures effectively cover the e-mail communication network? A
  formal approach
type: journal_article
user_id: '61579'
volume: 3
year: '2007'
...
---
_id: '5661'
abstract:
- lang: eng
  text: Spam has become one of the most annoying and costly phenomenon in the Internet.
    Valid e-mail addresses belong to the most valuable resources of spammers, but
    little is known about spammers? behavior when collecting and harvesting addresses
    and spammers? capabilities and interest in carefully directed, consumer-oriented
    marketing have not been explored yet. Gaining insight into spammers? ways to obtain
    and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment
    of the effectiveness of address obscuring techniques and the usability and necessity
    of hiding e-mail addresses on the Internet. This paper presents a spam honeypot
    project in progress addressing these issues by systematically placing e-mail addresses
    in the Internet and analyzing received e-mails. The honeypot?s conceptual framework,
    its implementation, and first empirical results are presented. Finally, an outlook
    on further work and activities is provided.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses. In: <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>. Westpoint; 2005:37-41.'
  apa: Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses. In <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i> (pp. 37–41). Westpoint.
  bibtex: '@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’
    behavior in collecting and applying addresses}, booktitle={Proceedings of the
    6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen,
    Guido}, year={2005}, pages={37–41} }'
  chicago: Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting
    and Applying Addresses.” In <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, 37–41. Westpoint, 2005.
  ieee: G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting
    and applying addresses,” in <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, 2005, pp. 37–41.
  mla: Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting
    and Applying Addresses.” <i>Proceedings of the 6th IEEE Information Assurance
    Workshop</i>, Westpoint, 2005, pp. 37–41.
  short: 'G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop,
    Westpoint, 2005, pp. 37–41.'
date_created: 2018-11-14T14:55:48Z
date_updated: 2022-01-06T07:02:24Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:31:41Z
  date_updated: 2018-12-18T13:31:41Z
  file_id: '6331'
  file_name: Schryen - An e-mail honeypot addressing spammers' behavior in collecting
    and applying addresses.pdf
  file_size: 119362
  relation: main_file
file_date_updated: 2018-12-18T13:31:41Z
has_accepted_license: '1'
keyword:
- Spam
- ham
- e-mail
- honeypot
- address obscuring technique
- address taxonomy
language:
- iso: eng
oa: '1'
page: 37-41
publication: Proceedings of the 6th IEEE Information Assurance Workshop
publisher: Westpoint
status: public
title: An e-mail honeypot addressing spammers' behavior in collecting and applying
  addresses
type: conference
user_id: '61579'
year: '2005'
...
---
_id: '5662'
abstract:
- lang: eng
  text: Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur
    ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten,
    weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im
    Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe.
    Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem
    technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails
    in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt
    in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit
    bedeutendsten Verfahren zur Bekämpfung von Spam.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: Schryen G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>.
    2004;46(4):281-288.
  apa: Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam.
    <i>Wirtschaftsinformatik</i>, <i>46</i>(4), 281–288.
  bibtex: '@article{Schryen_2004, title={Effektivität von Lösungsansätzen zur Bekämpfung
    von Spam}, volume={46}, number={4}, journal={Wirtschaftsinformatik}, publisher={Springer},
    author={Schryen, Guido}, year={2004}, pages={281–288} }'
  chicago: 'Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.”
    <i>Wirtschaftsinformatik</i> 46, no. 4 (2004): 281–88.'
  ieee: G. Schryen, “Effektivität von Lösungsansätzen zur Bekämpfung von Spam,” <i>Wirtschaftsinformatik</i>,
    vol. 46, no. 4, pp. 281–288, 2004.
  mla: Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.”
    <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, Springer, 2004, pp. 281–88.
  short: G. Schryen, Wirtschaftsinformatik 46 (2004) 281–288.
date_created: 2018-11-14T14:56:51Z
date_updated: 2022-01-06T07:02:24Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:36:34Z
  date_updated: 2018-12-18T13:36:34Z
  file_id: '6338'
  file_name: Verlagsversion Guido_Schryen__281__288.pdf
  file_size: 288686
  relation: main_file
file_date_updated: 2018-12-18T13:36:34Z
has_accepted_license: '1'
intvolume: '        46'
issue: '4'
keyword:
- Spam
- E-Mail
- Spoofing
- Blockieren
- Filtern
- Lightweight Mail Transfer Agent Authentication Protocol (LMAP)
language:
- iso: eng
oa: '1'
page: 281-288
publication: Wirtschaftsinformatik
publisher: Springer
status: public
title: Effektivität von Lösungsansätzen zur Bekämpfung von Spam
type: journal_article
user_id: '61579'
volume: 46
year: '2004'
...
---
_id: '5663'
abstract:
- lang: eng
  text: Spam as unsolicited e-mail to a large number of recipients is known to ecome
    an increasingly disturbing and costly issue of electronic business and internet
    traffic. Mainly technical-oriented approaches are applied with a focus on blocking,
    filtering, and authentication mechanisms based on the domain name system. They
    come along with different drawbacks and have all low effectiveness in common.
    The article sketches these approaches, shows its limitations, and proposes an
    account-based approach where the number of e-mails per day and account is restricted.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Fighting Spam: Motivating an Account-based Approach. In: Isaias
    P, ed. <i>Proceedings of the IADIS International Conference WWW/Internet 2004.
    Vol. 2</i>. Madrid: IADIS Press; 2004:937-940.'
  apa: 'Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In
    P. Isaias (Ed.), <i>Proceedings of the IADIS International Conference WWW/Internet
    2004. vol. 2</i> (pp. 937–940). Madrid: IADIS Press.'
  bibtex: '@inproceedings{Schryen_2004, place={Madrid}, title={Fighting Spam: Motivating
    an Account-based Approach}, booktitle={Proceedings of the IADIS International
    Conference WWW/Internet 2004. vol. 2}, publisher={IADIS Press}, author={Schryen,
    Guido}, editor={Isaias, PedroEditor}, year={2004}, pages={937–940} }'
  chicago: 'Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.”
    In <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol.
    2</i>, edited by Pedro Isaias, 937–40. Madrid: IADIS Press, 2004.'
  ieee: 'G. Schryen, “Fighting Spam: Motivating an Account-based Approach,” in <i>Proceedings
    of the IADIS International Conference WWW/Internet 2004. vol. 2</i>, 2004, pp.
    937–940.'
  mla: 'Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” <i>Proceedings
    of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by
    Pedro Isaias, IADIS Press, 2004, pp. 937–40.'
  short: 'G. Schryen, in: P. Isaias (Ed.), Proceedings of the IADIS International
    Conference WWW/Internet 2004. Vol. 2, IADIS Press, Madrid, 2004, pp. 937–940.'
date_created: 2018-11-14T14:59:03Z
date_updated: 2022-01-06T07:02:25Z
ddc:
- '000'
department:
- _id: '277'
editor:
- first_name: Pedro
  full_name: Isaias, Pedro
  last_name: Isaias
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:33:30Z
  date_updated: 2018-12-18T13:33:30Z
  file_id: '6333'
  file_name: Fighting Spam_Motivating an account-based approach.pdf
  file_size: 46083
  relation: main_file
file_date_updated: 2018-12-18T13:33:30Z
has_accepted_license: '1'
keyword:
- e-mail
- spam
- filtering
- blocking
- LMAP
- SMTP account
language:
- iso: eng
oa: '1'
page: 937-940
place: Madrid
publication: Proceedings of the IADIS International Conference WWW/Internet 2004.
  vol. 2
publisher: IADIS Press
status: public
title: 'Fighting Spam: Motivating an Account-based Approach'
type: conference
user_id: '61579'
year: '2004'
...
---
_id: '1998'
abstract:
- lang: eng
  text: "Nearly all existing HPC systems are operated by resource management systems
    based on the queuing approach. With the increasing acceptance of grid middleware
    like Globus, new requirements for the underlying local resource management systems
    arise. Features like advanced reservation or quality of service are needed to
    implement high level functions like co-allocation. However it is difficult to
    realize these features with a resource management system based on the queuing
    concept since it considers only the present resource usage.\r\n\r\nIn this paper
    we present an approach which closes this gap. By assigning start times to each
    resource request, a complete schedule is planned. Advanced reservations are now
    easily possible. Based on this planning approach functions like diffuse requests,
    automatic duration extension, or service level agreements are described. We think
    they are useful to increase the usability, acceptance and performance of HPC machines.
    In the second part of this paper we present a planning based resource management
    system which already covers some of the mentioned features."
author:
- first_name: Matthias
  full_name: Hovestadt, Matthias
  last_name: Hovestadt
- first_name: Odej
  full_name: Kao, Odej
  last_name: Kao
- first_name: Axel
  full_name: Keller, Axel
  id: '15274'
  last_name: Keller
- first_name: Achim
  full_name: Streit, Achim
  last_name: Streit
citation:
  ama: 'Hovestadt M, Kao O, Keller A, Streit A. Scheduling in HPC Resource Management
    Systems: Queuing vs. Planning. In: <i>Proc. Workshop on Job Scheduling Strategies
    for Parallel Processing (JSSPP)</i>. Vol 2862. Lecture Notes in Computer Science.
    Berlin / Heidelberg; 2003:1-20. doi:<a href="https://doi.org/10.1007/10968987_1">10.1007/10968987_1</a>'
  apa: 'Hovestadt, M., Kao, O., Keller, A., &#38; Streit, A. (2003). Scheduling in
    HPC Resource Management Systems: Queuing vs. Planning. In <i>Proc. Workshop on
    Job Scheduling Strategies for Parallel Processing (JSSPP)</i> (Vol. 2862, pp.
    1–20). Berlin / Heidelberg. <a href="https://doi.org/10.1007/10968987_1">https://doi.org/10.1007/10968987_1</a>'
  bibtex: '@inproceedings{Hovestadt_Kao_Keller_Streit_2003, place={Berlin / Heidelberg},
    series={Lecture Notes in Computer Science}, title={Scheduling in HPC Resource
    Management Systems: Queuing vs. Planning}, volume={2862}, DOI={<a href="https://doi.org/10.1007/10968987_1">10.1007/10968987_1</a>},
    booktitle={Proc. Workshop on Job Scheduling Strategies for Parallel Processing
    (JSSPP)}, author={Hovestadt, Matthias and Kao, Odej and Keller, Axel and Streit,
    Achim}, year={2003}, pages={1–20}, collection={Lecture Notes in Computer Science}
    }'
  chicago: 'Hovestadt, Matthias, Odej Kao, Axel Keller, and Achim Streit. “Scheduling
    in HPC Resource Management Systems: Queuing vs. Planning.” In <i>Proc. Workshop
    on Job Scheduling Strategies for Parallel Processing (JSSPP)</i>, 2862:1–20. Lecture
    Notes in Computer Science. Berlin / Heidelberg, 2003. <a href="https://doi.org/10.1007/10968987_1">https://doi.org/10.1007/10968987_1</a>.'
  ieee: 'M. Hovestadt, O. Kao, A. Keller, and A. Streit, “Scheduling in HPC Resource
    Management Systems: Queuing vs. Planning,” in <i>Proc. Workshop on Job Scheduling
    Strategies for Parallel Processing (JSSPP)</i>, 2003, vol. 2862, pp. 1–20.'
  mla: 'Hovestadt, Matthias, et al. “Scheduling in HPC Resource Management Systems:
    Queuing vs. Planning.” <i>Proc. Workshop on Job Scheduling Strategies for Parallel
    Processing (JSSPP)</i>, vol. 2862, 2003, pp. 1–20, doi:<a href="https://doi.org/10.1007/10968987_1">10.1007/10968987_1</a>.'
  short: 'M. Hovestadt, O. Kao, A. Keller, A. Streit, in: Proc. Workshop on Job Scheduling
    Strategies for Parallel Processing (JSSPP), Berlin / Heidelberg, 2003, pp. 1–20.'
date_created: 2018-03-29T11:37:24Z
date_updated: 2022-01-06T06:54:17Z
department:
- _id: '27'
doi: 10.1007/10968987_1
intvolume: '      2862'
keyword:
- High Performance Computing
- Service Level Agreement
- Grid Resource
- Resource Management System
- Advance Reservation
language:
- iso: eng
page: 1-20
place: Berlin / Heidelberg
publication: Proc. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP)
publication_status: published
series_title: Lecture Notes in Computer Science
status: public
title: 'Scheduling in HPC Resource Management Systems: Queuing vs. Planning'
type: conference
user_id: '15274'
volume: 2862
year: '2003'
...
