[{"main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2016/JacobHaeb_ITG2016.pdf","open_access":"1"}],"title":"On the Bias of Direction of Arrival Estimation Using Linear Microphone Arrays","date_created":"2019-07-12T05:29:03Z","author":[{"full_name":"Jacob, Florian","last_name":"Jacob","first_name":"Florian"},{"first_name":"Reinhold","last_name":"Haeb-Umbach","id":"242","full_name":"Haeb-Umbach, Reinhold"}],"oa":"1","date_updated":"2022-01-06T06:51:10Z","citation":{"ieee":"F. Jacob and R. Haeb-Umbach, “On the Bias of Direction of Arrival Estimation Using Linear Microphone Arrays,” in <i>12. ITG Fachtagung Sprachkommunikation (ITG 2016)</i>, 2016.","chicago":"Jacob, Florian, and Reinhold Haeb-Umbach. “On the Bias of Direction of Arrival Estimation Using Linear Microphone Arrays.” In <i>12. ITG Fachtagung Sprachkommunikation (ITG 2016)</i>, 2016.","ama":"Jacob F, Haeb-Umbach R. On the Bias of Direction of Arrival Estimation Using Linear Microphone Arrays. In: <i>12. ITG Fachtagung Sprachkommunikation (ITG 2016)</i>. ; 2016.","apa":"Jacob, F., &#38; Haeb-Umbach, R. (2016). On the Bias of Direction of Arrival Estimation Using Linear Microphone Arrays. In <i>12. ITG Fachtagung Sprachkommunikation (ITG 2016)</i>.","bibtex":"@inproceedings{Jacob_Haeb-Umbach_2016, title={On the Bias of Direction of Arrival Estimation Using Linear Microphone Arrays}, booktitle={12. ITG Fachtagung Sprachkommunikation (ITG 2016)}, author={Jacob, Florian and Haeb-Umbach, Reinhold}, year={2016} }","short":"F. Jacob, R. Haeb-Umbach, in: 12. ITG Fachtagung Sprachkommunikation (ITG 2016), 2016.","mla":"Jacob, Florian, and Reinhold Haeb-Umbach. “On the Bias of Direction of Arrival Estimation Using Linear Microphone Arrays.” <i>12. ITG Fachtagung Sprachkommunikation (ITG 2016)</i>, 2016."},"year":"2016","related_material":{"link":[{"relation":"supplementary_material","description":"Poster","url":"https://groups.uni-paderborn.de/nt/pubs/2016/JacobHaeb_ITG2016_poster.pdf"}]},"language":[{"iso":"eng"}],"user_id":"44006","department":[{"_id":"54"}],"_id":"11829","status":"public","abstract":[{"lang":"eng","text":"This contribution investigates Direction of Arrival (DoA) estimation using linearly arranged microphone arrays. We are going to develop a model for the DoA estimation error in a reverberant scenario and show the existence of a bias, that is a consequence of the linear arrangement and limited field of view (FoV) bias: First, the limited FoV leading to a clipping of the measurements, and, second, the angular distribution of the signal energy of the reflections being non-uniform. Since both issues are a consequence of the linear arrangement of the sensors, the bias arises largely independent of the kind of DoA estimator. The experimental evaluation demonstrates the existence of the bias for a selected number of DoA estimation methods and proves that the prediction from the developed theoretical model matches the simulation results."}],"type":"conference","publication":"12. ITG Fachtagung Sprachkommunikation (ITG 2016)"},{"citation":{"chicago":"Heymann, Jahn, Lukas Drude, and Reinhold Haeb-Umbach. “Wide Residual BLSTM Network with Discriminative Speaker Adaptation for Robust Speech Recognition.” In <i>Computer Speech and Language</i>, 2016.","ieee":"J. Heymann, L. Drude, and R. Haeb-Umbach, “Wide Residual BLSTM Network with Discriminative Speaker Adaptation for Robust Speech Recognition,” in <i>Computer Speech and Language</i>, 2016.","ama":"Heymann J, Drude L, Haeb-Umbach R. Wide Residual BLSTM Network with Discriminative Speaker Adaptation for Robust Speech Recognition. In: <i>Computer Speech and Language</i>. ; 2016.","short":"J. Heymann, L. Drude, R. Haeb-Umbach, in: Computer Speech and Language, 2016.","bibtex":"@inproceedings{Heymann_Drude_Haeb-Umbach_2016, title={Wide Residual BLSTM Network with Discriminative Speaker Adaptation for Robust Speech Recognition}, booktitle={Computer Speech and Language}, author={Heymann, Jahn and Drude, Lukas and Haeb-Umbach, Reinhold}, year={2016} }","mla":"Heymann, Jahn, et al. “Wide Residual BLSTM Network with Discriminative Speaker Adaptation for Robust Speech Recognition.” <i>Computer Speech and Language</i>, 2016.","apa":"Heymann, J., Drude, L., &#38; Haeb-Umbach, R. (2016). Wide Residual BLSTM Network with Discriminative Speaker Adaptation for Robust Speech Recognition. In <i>Computer Speech and Language</i>."},"year":"2016","related_material":{"link":[{"relation":"supplementary_material","description":"Poster","url":"https://groups.uni-paderborn.de/nt/pubs/2016/chime4_upbonly_poster.pdf"}]},"main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2016/chime4_upbonly_paper.pdf","open_access":"1"}],"title":"Wide Residual BLSTM Network with Discriminative Speaker Adaptation for Robust Speech Recognition","author":[{"last_name":"Heymann","id":"9168","full_name":"Heymann, Jahn","first_name":"Jahn"},{"last_name":"Drude","id":"11213","full_name":"Drude, Lukas","first_name":"Lukas"},{"full_name":"Haeb-Umbach, Reinhold","id":"242","last_name":"Haeb-Umbach","first_name":"Reinhold"}],"date_created":"2019-07-12T05:29:09Z","oa":"1","date_updated":"2022-01-06T06:51:11Z","status":"public","abstract":[{"lang":"eng","text":"We present a system for the 4th CHiME challenge which significantly increases the performance for all three tracks with respect to the provided baseline system. The front-end uses a bi-directional Long Short-Term Memory (BLSTM)-based neural network to estimate signal statistics. These then steer a Generalized Eigenvalue beamformer. The back-end consists of a 22 layer deep Wide Residual Network and two extra BLSTM layers. Working on a whole utterance instead of frames allows us to refine Batch-Normalization. We also train our own BLSTM-based language model. Adding a discriminative speaker adaptation leads to further gains. The final system achieves a word error rate on the six channel real test data of 3.48%. For the two channel track we achieve 5.96% and for the one channel track 9.34%. This is the best reported performance on the challenge achieved by a single system, i.e., a configuration, which does not combine multiple systems. At the same time, our system is independent of the microphone configuration. We can thus use the same components for all three tracks."}],"publication":"Computer Speech and Language","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"54"}],"user_id":"44006","_id":"11834"},{"year":"2016","citation":{"apa":"Kinoshita, K., Delcroix, M., Gannot, S., Habets, E. A. P., Haeb-Umbach, R., Kellermann, W., … Yoshioka, T. (2016). A summary of the REVERB challenge: state-of-the-art and remaining challenges in reverberant speech processing research. <i>EURASIP Journal on Advances in Signal Processing</i>.","short":"K. Kinoshita, M. Delcroix, S. Gannot, E.A.P. Habets, R. Haeb-Umbach, W. Kellermann, V. Leutnant, R. Maas, T. Nakatani, B. Raj, A. Sehr, T. Yoshioka, EURASIP Journal on Advances in Signal Processing (2016).","bibtex":"@article{Kinoshita_Delcroix_Gannot_Habets_Haeb-Umbach_Kellermann_Leutnant_Maas_Nakatani_Raj_et al._2016, title={A summary of the REVERB challenge: state-of-the-art and remaining challenges in reverberant speech processing research}, journal={EURASIP Journal on Advances in Signal Processing}, author={Kinoshita, Keisuke and Delcroix, Marc and Gannot, Sharon and Habets, Emanuel A. P. and Haeb-Umbach, Reinhold and Kellermann, Walter and Leutnant, Volker and Maas, Roland and Nakatani, Tomohiro and Raj, Bhiksha and et al.}, year={2016} }","mla":"Kinoshita, Keisuke, et al. “A Summary of the REVERB Challenge: State-of-the-Art and Remaining Challenges in Reverberant Speech Processing Research.” <i>EURASIP Journal on Advances in Signal Processing</i>, 2016.","chicago":"Kinoshita, Keisuke, Marc Delcroix, Sharon Gannot, Emanuel A. P. Habets, Reinhold Haeb-Umbach, Walter Kellermann, Volker Leutnant, et al. “A Summary of the REVERB Challenge: State-of-the-Art and Remaining Challenges in Reverberant Speech Processing Research.” <i>EURASIP Journal on Advances in Signal Processing</i>, 2016.","ieee":"K. Kinoshita <i>et al.</i>, “A summary of the REVERB challenge: state-of-the-art and remaining challenges in reverberant speech processing research,” <i>EURASIP Journal on Advances in Signal Processing</i>, 2016.","ama":"Kinoshita K, Delcroix M, Gannot S, et al. A summary of the REVERB challenge: state-of-the-art and remaining challenges in reverberant speech processing research. <i>EURASIP Journal on Advances in Signal Processing</i>. 2016."},"oa":"1","date_updated":"2022-01-06T06:51:11Z","date_created":"2019-07-12T05:29:16Z","author":[{"first_name":"Keisuke","last_name":"Kinoshita","full_name":"Kinoshita, Keisuke"},{"first_name":"Marc","last_name":"Delcroix","full_name":"Delcroix, Marc"},{"full_name":"Gannot, Sharon","last_name":"Gannot","first_name":"Sharon"},{"full_name":"Habets, Emanuel A. P.","last_name":"Habets","first_name":"Emanuel A. P."},{"first_name":"Reinhold","last_name":"Haeb-Umbach","id":"242","full_name":"Haeb-Umbach, Reinhold"},{"first_name":"Walter","full_name":"Kellermann, Walter","last_name":"Kellermann"},{"last_name":"Leutnant","full_name":"Leutnant, Volker","first_name":"Volker"},{"full_name":"Maas, Roland","last_name":"Maas","first_name":"Roland"},{"first_name":"Tomohiro","full_name":"Nakatani, Tomohiro","last_name":"Nakatani"},{"last_name":"Raj","full_name":"Raj, Bhiksha","first_name":"Bhiksha"},{"first_name":"Armin","last_name":"Sehr","full_name":"Sehr, Armin"},{"first_name":"Takuya","full_name":"Yoshioka, Takuya","last_name":"Yoshioka"}],"title":"A summary of the REVERB challenge: state-of-the-art and remaining challenges in reverberant speech processing research","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2016/REVERB_summary.pdf","open_access":"1"}],"publication":"EURASIP Journal on Advances in Signal Processing","type":"journal_article","status":"public","_id":"11840","department":[{"_id":"54"}],"user_id":"44006","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"11908","user_id":"44006","department":[{"_id":"54"}],"abstract":[{"lang":"eng","text":"This paper describes automatic speech recognition (ASR) systems developed jointly by RWTH, UPB and FORTH for the 1ch, 2ch and 6ch track of the 4th CHiME Challenge. In the 2ch and 6ch tracks the final system output is obtained by a Confusion Network Combination (CNC) of multiple systems. The Acoustic Model (AM) is a deep neural network based on Bidirectional Long Short-Term Memory (BLSTM) units. The systems differ by front ends and training sets used for the acoustic training. The model for the 1ch track is trained without any preprocessing. For each front end we trained and evaluated individual acoustic models. We compare the ASR performance of different beamforming approaches: a conventional superdirective beamformer [1] and an MVDR beamformer as in [2], where the steering vector is estimated based on [3]. Furthermore we evaluated a BLSTM supported Generalized Eigenvalue beamformer using NN-GEV [4]. The back end is implemented using RWTH?s open-source toolkits RASR [5], RETURNN [6] and rwthlm [7]. We rescore lattices with a Long Short-Term Memory (LSTM) based language model. The overall best results are obtained by a system combination that includes the lattices from the system of UPB?s submission [8]. Our final submission scored second in each of the three tracks of the 4th CHiME Challenge."}],"status":"public","type":"conference","publication":"Computer Speech and Language","title":"The RWTH/UPB/FORTH System Combination for the 4th CHiME Challenge Evaluation","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2016/chime4_rwthupbforth_paper.pdf","open_access":"1"}],"date_updated":"2022-01-06T06:51:12Z","oa":"1","author":[{"last_name":"Menne","full_name":"Menne, Tobias","first_name":"Tobias"},{"first_name":"Jahn","last_name":"Heymann","full_name":"Heymann, Jahn","id":"9168"},{"first_name":"Anastasios","full_name":"Alexandridis, Anastasios","last_name":"Alexandridis"},{"full_name":"Irie, Kazuki","last_name":"Irie","first_name":"Kazuki"},{"first_name":"Albert","full_name":"Zeyer, Albert","last_name":"Zeyer"},{"last_name":"Kitza","full_name":"Kitza, Markus","first_name":"Markus"},{"first_name":"Pavel","last_name":"Golik","full_name":"Golik, Pavel"},{"full_name":"Kulikov, Ilia","last_name":"Kulikov","first_name":"Ilia"},{"id":"11213","full_name":"Drude, Lukas","last_name":"Drude","first_name":"Lukas"},{"full_name":"Schlüter, Ralf","last_name":"Schlüter","first_name":"Ralf"},{"last_name":"Ney","full_name":"Ney, Hermann","first_name":"Hermann"},{"full_name":"Haeb-Umbach, Reinhold","id":"242","last_name":"Haeb-Umbach","first_name":"Reinhold"},{"last_name":"Mouchtaris","full_name":"Mouchtaris, Athanasios","first_name":"Athanasios"}],"date_created":"2019-07-12T05:30:35Z","year":"2016","citation":{"ama":"Menne T, Heymann J, Alexandridis A, et al. The RWTH/UPB/FORTH System Combination for the 4th CHiME Challenge Evaluation. In: <i>Computer Speech and Language</i>. ; 2016.","chicago":"Menne, Tobias, Jahn Heymann, Anastasios Alexandridis, Kazuki Irie, Albert Zeyer, Markus Kitza, Pavel Golik, et al. “The RWTH/UPB/FORTH System Combination for the 4th CHiME Challenge Evaluation.” In <i>Computer Speech and Language</i>, 2016.","ieee":"T. Menne <i>et al.</i>, “The RWTH/UPB/FORTH System Combination for the 4th CHiME Challenge Evaluation,” in <i>Computer Speech and Language</i>, 2016.","mla":"Menne, Tobias, et al. “The RWTH/UPB/FORTH System Combination for the 4th CHiME Challenge Evaluation.” <i>Computer Speech and Language</i>, 2016.","bibtex":"@inproceedings{Menne_Heymann_Alexandridis_Irie_Zeyer_Kitza_Golik_Kulikov_Drude_Schlüter_et al._2016, title={The RWTH/UPB/FORTH System Combination for the 4th CHiME Challenge Evaluation}, booktitle={Computer Speech and Language}, author={Menne, Tobias and Heymann, Jahn and Alexandridis, Anastasios and Irie, Kazuki and Zeyer, Albert and Kitza, Markus and Golik, Pavel and Kulikov, Ilia and Drude, Lukas and Schlüter, Ralf and et al.}, year={2016} }","short":"T. Menne, J. Heymann, A. Alexandridis, K. Irie, A. Zeyer, M. Kitza, P. Golik, I. Kulikov, L. Drude, R. Schlüter, H. Ney, R. Haeb-Umbach, A. Mouchtaris, in: Computer Speech and Language, 2016.","apa":"Menne, T., Heymann, J., Alexandridis, A., Irie, K., Zeyer, A., Kitza, M., … Mouchtaris, A. (2016). The RWTH/UPB/FORTH System Combination for the 4th CHiME Challenge Evaluation. In <i>Computer Speech and Language</i>."}},{"main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/nt/pubs/2016/WaHa16.pdf"}],"title":"Unsupervised Word Discovery from Speech using Bayesian Hierarchical Models","author":[{"last_name":"Walter","full_name":"Walter, Oliver","first_name":"Oliver"},{"first_name":"Reinhold","full_name":"Haeb-Umbach, Reinhold","id":"242","last_name":"Haeb-Umbach"}],"date_created":"2019-07-12T05:30:49Z","oa":"1","date_updated":"2022-01-06T06:51:12Z","citation":{"mla":"Walter, Oliver, and Reinhold Haeb-Umbach. “Unsupervised Word Discovery from Speech Using Bayesian Hierarchical Models.” <i>38th German Conference on Pattern Recognition (GCPR 2016)</i>, 2016.","bibtex":"@inproceedings{Walter_Haeb-Umbach_2016, title={Unsupervised Word Discovery from Speech using Bayesian Hierarchical Models}, booktitle={38th German Conference on Pattern Recognition (GCPR 2016)}, author={Walter, Oliver and Haeb-Umbach, Reinhold}, year={2016} }","short":"O. Walter, R. Haeb-Umbach, in: 38th German Conference on Pattern Recognition (GCPR 2016), 2016.","apa":"Walter, O., &#38; Haeb-Umbach, R. (2016). Unsupervised Word Discovery from Speech using Bayesian Hierarchical Models. In <i>38th German Conference on Pattern Recognition (GCPR 2016)</i>.","ama":"Walter O, Haeb-Umbach R. Unsupervised Word Discovery from Speech using Bayesian Hierarchical Models. In: <i>38th German Conference on Pattern Recognition (GCPR 2016)</i>. ; 2016.","chicago":"Walter, Oliver, and Reinhold Haeb-Umbach. “Unsupervised Word Discovery from Speech Using Bayesian Hierarchical Models.” In <i>38th German Conference on Pattern Recognition (GCPR 2016)</i>, 2016.","ieee":"O. Walter and R. Haeb-Umbach, “Unsupervised Word Discovery from Speech using Bayesian Hierarchical Models,” in <i>38th German Conference on Pattern Recognition (GCPR 2016)</i>, 2016."},"year":"2016","related_material":{"link":[{"relation":"supplementary_material","description":"Presentation","url":"https://groups.uni-paderborn.de/nt/pubs/2016/WaHa16_Talk.pdf"}]},"language":[{"iso":"eng"}],"department":[{"_id":"54"}],"user_id":"44006","_id":"11920","status":"public","abstract":[{"lang":"eng","text":"In this paper we demonstrate an algorithm to learn words from speech using non-parametric Bayesian hierarchical models in an unsupervised setting. We exploit the assumption of a hierarchical structure of speech, namely the formation of spoken words as a sequence of phonemes. We employ the Nested Hierarchical Pitman-Yor Language Model, which allows an a priori unknown and possibly unlimited number of words. We assume the n-gram probabilities of words, the m-gram probabilities of phoneme sequences in words and the phoneme sequences of the words themselves as latent variables to be learned. We evaluate the algorithm on a cross language task using an existing speech recognizer trained on English speech to decode speech in the Xitsonga language supplied for the 2015 ZeroSpeech challenge. We apply the learning algorithm on the resulting phoneme graphs and achieve the highest token precision and F score compared to present systems."}],"publication":"38th German Conference on Pattern Recognition (GCPR 2016)","type":"conference"},{"title":"Projektmanagement in digitalen Forschungsprojekten","doi":"10.25366/2018.33","oa":"1","publisher":"Allitera Verlag, München","date_updated":"2022-01-06T06:51:27Z","date_created":"2019-08-16T12:54:22Z","author":[{"last_name":"Komprecht","full_name":"Komprecht, Anna Maria","first_name":"Anna Maria"},{"orcid":"https://orcid.org/0000-0001-6271-2095","last_name":"Röwenstrunk","id":"439","full_name":"Röwenstrunk, Daniel","first_name":"Daniel"}],"year":"2016","citation":{"bibtex":"@inbook{Komprecht_Röwenstrunk_2016, title={Projektmanagement in digitalen Forschungsprojekten}, DOI={<a href=\"https://doi.org/10.25366/2018.33\">10.25366/2018.33</a>}, booktitle={„Ei, dem alten Herrn zoll’ ich Achtung gern“}, publisher={Allitera Verlag, München}, author={Komprecht, Anna Maria and Röwenstrunk, Daniel}, year={2016} }","short":"A.M. Komprecht, D. Röwenstrunk, in: „Ei, Dem Alten Herrn Zoll’ Ich Achtung Gern“, Allitera Verlag, München, 2016.","mla":"Komprecht, Anna Maria, and Daniel Röwenstrunk. “Projektmanagement in Digitalen Forschungsprojekten.” <i>„Ei, Dem Alten Herrn Zoll’ Ich Achtung Gern“</i>, Allitera Verlag, München, 2016, doi:<a href=\"https://doi.org/10.25366/2018.33\">10.25366/2018.33</a>.","apa":"Komprecht, A. M., &#38; Röwenstrunk, D. (2016). Projektmanagement in digitalen Forschungsprojekten. In <i>„Ei, dem alten Herrn zoll’ ich Achtung gern“</i>. Allitera Verlag, München. <a href=\"https://doi.org/10.25366/2018.33\">https://doi.org/10.25366/2018.33</a>","ama":"Komprecht AM, Röwenstrunk D. Projektmanagement in digitalen Forschungsprojekten. In: <i>„Ei, Dem Alten Herrn Zoll’ Ich Achtung Gern“</i>. Allitera Verlag, München; 2016. doi:<a href=\"https://doi.org/10.25366/2018.33\">10.25366/2018.33</a>","chicago":"Komprecht, Anna Maria, and Daniel Röwenstrunk. “Projektmanagement in Digitalen Forschungsprojekten.” In <i>„Ei, Dem Alten Herrn Zoll’ Ich Achtung Gern“</i>. Allitera Verlag, München, 2016. <a href=\"https://doi.org/10.25366/2018.33\">https://doi.org/10.25366/2018.33</a>.","ieee":"A. M. Komprecht and D. Röwenstrunk, “Projektmanagement in digitalen Forschungsprojekten,” in <i>„Ei, dem alten Herrn zoll’ ich Achtung gern“</i>, Allitera Verlag, München, 2016."},"has_accepted_license":"1","ddc":["650","000"],"file_date_updated":"2019-08-16T13:05:57Z","language":[{"iso":"eng"}],"_id":"12935","department":[{"_id":"233"},{"_id":"43"}],"user_id":"439","status":"public","file":[{"title":"Projektmanagement in digitalen Forschungsprojekten.","file_size":253199,"access_level":"open_access","file_id":"12936","file_name":"2016_Röwenstrunk_Projektmanagement.pdf","date_updated":"2019-08-16T13:05:57Z","creator":"danruebe","date_created":"2019-08-16T12:56:16Z","relation":"main_file","content_type":"application/pdf"}],"publication":"„Ei, dem alten Herrn zoll’ ich Achtung gern“","type":"book_chapter"},{"publication_identifier":{"isbn":["978-1-931971-32-4"]},"page":"689-706","citation":{"apa":"Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., … Shavitt, Y. (2016). DROWN: Breaking TLS Using SSLv2. In <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i> (pp. 689–706). Austin, TX: {USENIX} Association.","mla":"Aviram, Nimrod, et al. “DROWN: Breaking TLS Using SSLv2.” <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i>, {USENIX} Association, 2016, pp. 689–706.","short":"N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni, E. Käsper, S. Cohney, S. Engels, C. Paar, Y. Shavitt, in: 25th {USENIX} Security Symposium ({USENIX} Security 16), {USENIX} Association, Austin, TX, 2016, pp. 689–706.","bibtex":"@inproceedings{Aviram_Schinzel_Somorovsky_Heninger_Dankel_Steube_Valenta_Adrian_Halderman_Dukhovni_et al._2016, place={Austin, TX}, title={DROWN: Breaking TLS Using SSLv2}, booktitle={25th {USENIX} Security Symposium ({USENIX} Security 16)}, publisher={{USENIX} Association}, author={Aviram, Nimrod and Schinzel, Sebastian and Somorovsky, Juraj and Heninger, Nadia and Dankel, Maik and Steube, Jens and Valenta, Luke and Adrian, David and Halderman, J. Alex and Dukhovni, Viktor and et al.}, year={2016}, pages={689–706} }","ama":"Aviram N, Schinzel S, Somorovsky J, et al. DROWN: Breaking TLS Using SSLv2. In: <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i>. Austin, TX: {USENIX} Association; 2016:689-706.","ieee":"N. Aviram <i>et al.</i>, “DROWN: Breaking TLS Using SSLv2,” in <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i>, 2016, pp. 689–706.","chicago":"Aviram, Nimrod, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, et al. “DROWN: Breaking TLS Using SSLv2.” In <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i>, 689–706. Austin, TX: {USENIX} Association, 2016."},"year":"2016","place":"Austin, TX","date_created":"2020-02-15T09:50:14Z","author":[{"first_name":"Nimrod","full_name":"Aviram, Nimrod","last_name":"Aviram"},{"first_name":"Sebastian","full_name":"Schinzel, Sebastian","last_name":"Schinzel"},{"first_name":"Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","full_name":"Somorovsky, Juraj","id":"83504"},{"first_name":"Nadia","full_name":"Heninger, Nadia","last_name":"Heninger"},{"last_name":"Dankel","full_name":"Dankel, Maik","first_name":"Maik"},{"first_name":"Jens","last_name":"Steube","full_name":"Steube, Jens"},{"first_name":"Luke","last_name":"Valenta","full_name":"Valenta, Luke"},{"first_name":"David","last_name":"Adrian","full_name":"Adrian, David"},{"first_name":"J. Alex","last_name":"Halderman","full_name":"Halderman, J. Alex"},{"last_name":"Dukhovni","full_name":"Dukhovni, Viktor","first_name":"Viktor"},{"full_name":"Käsper, Emilia","last_name":"Käsper","first_name":"Emilia"},{"last_name":"Cohney","full_name":"Cohney, Shaanan","first_name":"Shaanan"},{"first_name":"Susanne","full_name":"Engels, Susanne","last_name":"Engels"},{"last_name":"Paar","full_name":"Paar, Christof","first_name":"Christof"},{"last_name":"Shavitt","full_name":"Shavitt, Yuval","first_name":"Yuval"}],"date_updated":"2022-01-06T06:52:40Z","oa":"1","publisher":"{USENIX} Association","main_file_link":[{"url":"https://www.usenix.org/node/197246","open_access":"1"}],"title":"DROWN: Breaking TLS Using SSLv2","publication":"25th {USENIX} Security Symposium ({USENIX} Security 16)","type":"conference","status":"public","user_id":"83504","_id":"15907","language":[{"iso":"eng"}]},{"user_id":"83504","_id":"15913","language":[{"iso":"eng"}],"type":"conference","publication":"10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)","status":"public","author":[{"first_name":"Hanno","last_name":"Böck","full_name":"Böck, Hanno"},{"first_name":"Aaron","last_name":"Zauner","full_name":"Zauner, Aaron"},{"full_name":"Devlin, Sean","last_name":"Devlin","first_name":"Sean"},{"first_name":"Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","id":"83504","full_name":"Somorovsky, Juraj"},{"first_name":"Philipp","last_name":"Jovanovic","full_name":"Jovanovic, Philipp"}],"date_created":"2020-02-15T10:06:33Z","date_updated":"2022-01-06T06:52:40Z","publisher":"{USENIX} Association","oa":"1","main_file_link":[{"url":"https://www.usenix.org/conference/woot16/workshop-program/presentation/bock","open_access":"1"}],"title":"Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS","citation":{"apa":"Böck, H., Zauner, A., Devlin, S., Somorovsky, J., &#38; Jovanovic, P. (2016). Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>. Austin, TX: {USENIX} Association.","mla":"Böck, Hanno, et al. “Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.” <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>, {USENIX} Association, 2016.","bibtex":"@inproceedings{Böck_Zauner_Devlin_Somorovsky_Jovanovic_2016, place={Austin, TX}, title={Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS}, booktitle={10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)}, publisher={{USENIX} Association}, author={Böck, Hanno and Zauner, Aaron and Devlin, Sean and Somorovsky, Juraj and Jovanovic, Philipp}, year={2016} }","short":"H. Böck, A. Zauner, S. Devlin, J. Somorovsky, P. Jovanovic, in: 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), {USENIX} Association, Austin, TX, 2016.","ieee":"H. Böck, A. Zauner, S. Devlin, J. Somorovsky, and P. Jovanovic, “Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS,” in <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>, 2016.","chicago":"Böck, Hanno, Aaron Zauner, Sean Devlin, Juraj Somorovsky, and Philipp Jovanovic. “Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.” In <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>. Austin, TX: {USENIX} Association, 2016.","ama":"Böck H, Zauner A, Devlin S, Somorovsky J, Jovanovic P. Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In: <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>. Austin, TX: {USENIX} Association; 2016."},"place":"Austin, TX","year":"2016"},{"publication":"JoSch – Journal der Schreibberatung","type":"journal_article","status":"public","_id":"32164","department":[{"_id":"424"}],"user_id":"42165","keyword":["Schreibberatung","Schreibdidaktik","Schreibprozess","Sprache"],"language":[{"iso":"ger"}],"publication_status":"published","issue":"11","year":"2016","page":"13 - 23","citation":{"ama":"Lohmeier Y, Karsten A. Schreiben eine Stimme geben. Über die Beziehung von lautem Sprechen und Schreiben im Schreibprozess. <i>JoSch – Journal der Schreibberatung</i>. 2016;(11):13-23. doi:<a href=\"https://doi.org/10.3278/JOS1601W013\">10.3278/JOS1601W013</a>","ieee":"Y. Lohmeier and A. Karsten, “Schreiben eine Stimme geben. Über die Beziehung von lautem Sprechen und Schreiben im Schreibprozess,” <i>JoSch – Journal der Schreibberatung</i>, no. 11, pp. 13–23, 2016, doi: <a href=\"https://doi.org/10.3278/JOS1601W013\">10.3278/JOS1601W013</a>.","chicago":"Lohmeier, Yvonne, and Andrea Karsten. “Schreiben eine Stimme geben. Über die Beziehung von lautem Sprechen und Schreiben im Schreibprozess.” <i>JoSch – Journal der Schreibberatung</i>, no. 11 (2016): 13–23. <a href=\"https://doi.org/10.3278/JOS1601W013\">https://doi.org/10.3278/JOS1601W013</a>.","apa":"Lohmeier, Y., &#38; Karsten, A. (2016). Schreiben eine Stimme geben. Über die Beziehung von lautem Sprechen und Schreiben im Schreibprozess. <i>JoSch – Journal der Schreibberatung</i>, <i>11</i>, 13–23. <a href=\"https://doi.org/10.3278/JOS1601W013\">https://doi.org/10.3278/JOS1601W013</a>","short":"Y. Lohmeier, A. Karsten, JoSch – Journal der Schreibberatung (2016) 13–23.","mla":"Lohmeier, Yvonne, and Andrea Karsten. “Schreiben eine Stimme geben. Über die Beziehung von lautem Sprechen und Schreiben im Schreibprozess.” <i>JoSch – Journal der Schreibberatung</i>, no. 11, wbv, 2016, pp. 13–23, doi:<a href=\"https://doi.org/10.3278/JOS1601W013\">10.3278/JOS1601W013</a>.","bibtex":"@article{Lohmeier_Karsten_2016, title={Schreiben eine Stimme geben. Über die Beziehung von lautem Sprechen und Schreiben im Schreibprozess}, DOI={<a href=\"https://doi.org/10.3278/JOS1601W013\">10.3278/JOS1601W013</a>}, number={11}, journal={JoSch – Journal der Schreibberatung}, publisher={wbv}, author={Lohmeier, Yvonne and Karsten, Andrea}, year={2016}, pages={13–23} }"},"oa":"1","date_updated":"2022-07-18T09:24:29Z","publisher":"wbv","date_created":"2022-06-26T06:59:13Z","author":[{"first_name":"Yvonne","full_name":"Lohmeier, Yvonne","last_name":"Lohmeier"},{"full_name":"Karsten, Andrea","id":"53917","last_name":"Karsten","first_name":"Andrea"}],"title":"Schreiben eine Stimme geben. Über die Beziehung von lautem Sprechen und Schreiben im Schreibprozess","doi":"10.3278/JOS1601W013","main_file_link":[{"url":"https://www.wbv.de/shop/geistes-und-sozialwissenschaften/schreibwissenschaft/shop/detail/name/_/0/1/JOS1601W013/facet/JOS1601W013///////nb/0/category/1743.html","open_access":"1"}]},{"title":"Habitussensibilisierung durch Videoanalysen von Lehramtsstudierenden","main_file_link":[{"open_access":"1"}],"doi":"10.3217/zfhe-11-01/13","oa":"1","date_updated":"2022-01-11T16:31:36Z","author":[{"last_name":"Steinhardt","orcid":"https://orcid.org/0000-0002-2590-6189","full_name":"Steinhardt, Isabel","id":"90339","first_name":"Isabel"}],"date_created":"2022-01-11T16:29:55Z","volume":11,"year":"2016","citation":{"ieee":"I. Steinhardt, “Habitussensibilisierung durch Videoanalysen von Lehramtsstudierenden,” <i>Zeitschrift für Hochschulentwicklung</i>, vol. 11, no. 1, pp. 225–237, 2016, doi: <a href=\"https://doi.org/10.3217/zfhe-11-01/13\">10.3217/zfhe-11-01/13</a>.","chicago":"Steinhardt, Isabel. “Habitussensibilisierung durch Videoanalysen von Lehramtsstudierenden.” <i>Zeitschrift für Hochschulentwicklung</i> 11, no. 1 (2016): 225–37. <a href=\"https://doi.org/10.3217/zfhe-11-01/13\">https://doi.org/10.3217/zfhe-11-01/13</a>.","ama":"Steinhardt I. Habitussensibilisierung durch Videoanalysen von Lehramtsstudierenden. <i>Zeitschrift für Hochschulentwicklung</i>. 2016;11(1):225-237. doi:<a href=\"https://doi.org/10.3217/zfhe-11-01/13\">10.3217/zfhe-11-01/13</a>","apa":"Steinhardt, I. (2016). Habitussensibilisierung durch Videoanalysen von Lehramtsstudierenden. <i>Zeitschrift für Hochschulentwicklung</i>, <i>11</i>(1), 225–237. <a href=\"https://doi.org/10.3217/zfhe-11-01/13\">https://doi.org/10.3217/zfhe-11-01/13</a>","bibtex":"@article{Steinhardt_2016, title={Habitussensibilisierung durch Videoanalysen von Lehramtsstudierenden}, volume={11}, DOI={<a href=\"https://doi.org/10.3217/zfhe-11-01/13\">10.3217/zfhe-11-01/13</a>}, number={1}, journal={Zeitschrift für Hochschulentwicklung}, author={Steinhardt, Isabel}, year={2016}, pages={225–237} }","mla":"Steinhardt, Isabel. “Habitussensibilisierung durch Videoanalysen von Lehramtsstudierenden.” <i>Zeitschrift für Hochschulentwicklung</i>, vol. 11, no. 1, 2016, pp. 225–37, doi:<a href=\"https://doi.org/10.3217/zfhe-11-01/13\">10.3217/zfhe-11-01/13</a>.","short":"I. Steinhardt, Zeitschrift für Hochschulentwicklung 11 (2016) 225–237."},"page":"225-237","intvolume":"        11","publication_status":"published","quality_controlled":"1","issue":"1","article_type":"original","language":[{"iso":"ger"}],"_id":"29250","user_id":"90339","department":[{"_id":"477"}],"status":"public","type":"journal_article","publication":"Zeitschrift für Hochschulentwicklung"},{"status":"public","publication":"H-Soz Kult","type":"review","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"445"}],"user_id":"89037","_id":"29556","citation":{"chicago":"Schönhärl, Korinna. “Review: Schwarz, Steffen L.: Despoten – Barbaren – Wirtschaftspartner. Die Allgemeine Zeitung Und Der Diskurs Über Das Osmanische Reich 1821-1840, Köln Weimar Wien 2016.” <i>H-Soz Kult</i>, 2016.","ieee":"K. Schönhärl, “Review: Schwarz, Steffen L.: Despoten – Barbaren – Wirtschaftspartner. Die Allgemeine Zeitung und der Diskurs über das Osmanische Reich 1821-1840, Köln Weimar Wien 2016,” <i>H-Soz Kult</i>. 2016.","ama":"Schönhärl K. Review: Schwarz, Steffen L.: Despoten – Barbaren – Wirtschaftspartner. Die Allgemeine Zeitung und der Diskurs über das Osmanische Reich 1821-1840, Köln Weimar Wien 2016. <i>H-Soz Kult</i>. Published online 2016.","mla":"Schönhärl, Korinna. “Review: Schwarz, Steffen L.: Despoten – Barbaren – Wirtschaftspartner. Die Allgemeine Zeitung Und Der Diskurs Über Das Osmanische Reich 1821-1840, Köln Weimar Wien 2016.” <i>H-Soz Kult</i>, 2016.","short":"K. Schönhärl, H-Soz Kult (2016).","bibtex":"@article{Schönhärl_2016, title={Review: Schwarz, Steffen L.: Despoten – Barbaren – Wirtschaftspartner. Die Allgemeine Zeitung und der Diskurs über das Osmanische Reich 1821-1840, Köln Weimar Wien 2016}, journal={H-Soz Kult}, author={Schönhärl, Korinna}, year={2016} }","apa":"Schönhärl, K. (2016). Review: Schwarz, Steffen L.: Despoten – Barbaren – Wirtschaftspartner. Die Allgemeine Zeitung und der Diskurs über das Osmanische Reich 1821-1840, Köln Weimar Wien 2016. In <i>H-Soz Kult</i>."},"year":"2016","main_file_link":[{"url":"www.hsozkult.de/publicationreview/id/rezbuecher-25619","open_access":"1"}],"title":"Review: Schwarz, Steffen L.: Despoten – Barbaren – Wirtschaftspartner. Die Allgemeine Zeitung und der Diskurs über das Osmanische Reich 1821-1840, Köln Weimar Wien 2016","author":[{"orcid":"0000-0002-7967-3261","last_name":"Schönhärl","full_name":"Schönhärl, Korinna","id":"89037","first_name":"Korinna"}],"date_created":"2022-01-27T10:22:10Z","oa":"1","date_updated":"2022-02-01T07:52:49Z"},{"main_file_link":[{"open_access":"1","url":"http://ac-psych.org/en/download-pdf/volume/12/issue/1/id/185"}],"doi":"10.5709/acp-0184-1","oa":"1","date_updated":"2022-06-06T16:21:09Z","author":[{"first_name":"Alexander","full_name":"Krüger, Alexander","last_name":"Krüger"},{"first_name":"Jan","full_name":"Tünnermann, Jan","last_name":"Tünnermann"},{"last_name":"Scharlau","orcid":"0000-0003-2364-9489","id":"451","full_name":"Scharlau, Ingrid","first_name":"Ingrid"}],"volume":12,"citation":{"ama":"Krüger A, Tünnermann J, Scharlau I. Fast and conspicuous? Quantifying salience with the theory of visual attention. <i>Advances in Cognitive Psychology</i>. 2016;12(1):20-38. doi:<a href=\"https://doi.org/10.5709/acp-0184-1\">10.5709/acp-0184-1</a>","chicago":"Krüger, Alexander, Jan Tünnermann, and Ingrid Scharlau. “Fast and Conspicuous? Quantifying Salience with the Theory of Visual Attention.” <i>Advances in Cognitive Psychology</i> 12, no. 1 (2016): 20–38. <a href=\"https://doi.org/10.5709/acp-0184-1\">https://doi.org/10.5709/acp-0184-1</a>.","ieee":"A. Krüger, J. Tünnermann, and I. Scharlau, “Fast and conspicuous? Quantifying salience with the theory of visual attention.,” <i>Advances in Cognitive Psychology</i>, vol. 12, no. 1, pp. 20–38, 2016, doi: <a href=\"https://doi.org/10.5709/acp-0184-1\">10.5709/acp-0184-1</a>.","apa":"Krüger, A., Tünnermann, J., &#38; Scharlau, I. (2016). Fast and conspicuous? Quantifying salience with the theory of visual attention. <i>Advances in Cognitive Psychology</i>, <i>12</i>(1), 20–38. <a href=\"https://doi.org/10.5709/acp-0184-1\">https://doi.org/10.5709/acp-0184-1</a>","bibtex":"@article{Krüger_Tünnermann_Scharlau_2016, title={Fast and conspicuous? Quantifying salience with the theory of visual attention.}, volume={12}, DOI={<a href=\"https://doi.org/10.5709/acp-0184-1\">10.5709/acp-0184-1</a>}, number={1}, journal={Advances in Cognitive Psychology}, author={Krüger, Alexander and Tünnermann, Jan and Scharlau, Ingrid}, year={2016}, pages={20–38} }","mla":"Krüger, Alexander, et al. “Fast and Conspicuous? Quantifying Salience with the Theory of Visual Attention.” <i>Advances in Cognitive Psychology</i>, vol. 12, no. 1, 2016, pp. 20–38, doi:<a href=\"https://doi.org/10.5709/acp-0184-1\">10.5709/acp-0184-1</a>.","short":"A. Krüger, J. Tünnermann, I. Scharlau, Advances in Cognitive Psychology 12 (2016) 20–38."},"page":"20 - 38","intvolume":"        12","publication_status":"published","publication_identifier":{"issn":["1895-1171"]},"funded_apc":"1","_id":"6071","user_id":"42165","department":[{"_id":"424"}],"status":"public","type":"journal_article","title":"Fast and conspicuous? Quantifying salience with the theory of visual attention.","date_created":"2018-12-10T07:04:15Z","year":"2016","issue":"1","keyword":["salience","visual attention","Bayesian inference","theory of visual attention","computational modeling","Visual Attention","Computational Modeling","Inference","Judgment","Statistical Probability"],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Particular differences between an object and its surrounding cause salience, guide attention, and improve performance in various tasks. While much research has been dedicated to identifying which feature dimensions contribute to salience, much less regard has been paid to the quantitative strength of the salience caused by feature differences. Only a few studies systematically related salience effects to a common salience measure, and they are partly outdated in the light of new findings on the time course of salience effects. We propose Bundesen’s Theory of Visual Attention (TV A) as a theoretical basis for measuring salience and introduce an empirical and modeling approach to link this theory to data retrieved from temporal-order judgments. With this procedure, TV A becomes applicable to a broad range of salience-related stimulus material. Three experiments with orientation pop-out displays demonstrate the feasibility of the method. A 4th experiment substantiates its applicability t"}],"publication":"Advances in Cognitive Psychology"},{"type":"journal_article","publication":"Frontiers in Psychology","status":"public","abstract":[{"text":"Peripheral visual cues lead to large shifts in psychometric distributions of temporal-order judgments. In one view, such shifts are attributed to attention speeding up processing of the cued stimulus, so-called prior entry. However, sometimes these shifts are so large that it is unlikely that they are caused by attention alone. Here we tested the prevalent alternative explanation that the cue is sometimes confused with the target on a perceptual level, bolstering the shift of the psychometric function. We applied a novel model of cued temporal-order judgments, derived from Bundesen’s Theory of Visual Attention.We found that cue–target confusions indeed contribute to shifting psychometric functions. However, cue-induced changes in the processing rates of the target stimuli play an important role, too. At smaller cueing intervals, the cue increased the processing speed of the target. At larger intervals, inhibition of return was predominant. Earlier studies of cued TOJs were insensitive","lang":"eng"}],"user_id":"42165","department":[{"_id":"424"}],"_id":"6080","language":[{"iso":"eng"}],"keyword":["cueing","temporal-order judgements","theory of visual attention (TVA)","peripheral cue","processing speed","stimulus encoding","prior entry","Attention","Cues","Face Perception","Judgment"],"publication_status":"published","publication_identifier":{"issn":["1664-1078"]},"citation":{"ama":"Tünnermann J, Scharlau I. Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception. <i>Frontiers in Psychology</i>. 2016;7. doi:<a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">10.3389/fpsyg.2016.01442</a>","chicago":"Tünnermann, Jan, and Ingrid Scharlau. “Peripheral Visual Cues: Their Fate in Processing and Effects on Attention and Temporal-Order Perception.” <i>Frontiers in Psychology</i> 7 (2016). <a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">https://doi.org/10.3389/fpsyg.2016.01442</a>.","ieee":"J. Tünnermann and I. Scharlau, “Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception.,” <i>Frontiers in Psychology</i>, vol. 7, 2016, doi: <a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">10.3389/fpsyg.2016.01442</a>.","apa":"Tünnermann, J., &#38; Scharlau, I. (2016). Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception. <i>Frontiers in Psychology</i>, <i>7</i>. <a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">https://doi.org/10.3389/fpsyg.2016.01442</a>","bibtex":"@article{Tünnermann_Scharlau_2016, title={Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception.}, volume={7}, DOI={<a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">10.3389/fpsyg.2016.01442</a>}, journal={Frontiers in Psychology}, author={Tünnermann, Jan and Scharlau, Ingrid}, year={2016} }","mla":"Tünnermann, Jan, and Ingrid Scharlau. “Peripheral Visual Cues: Their Fate in Processing and Effects on Attention and Temporal-Order Perception.” <i>Frontiers in Psychology</i>, vol. 7, 2016, doi:<a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">10.3389/fpsyg.2016.01442</a>.","short":"J. Tünnermann, I. Scharlau, Frontiers in Psychology 7 (2016)."},"intvolume":"         7","year":"2016","author":[{"first_name":"Jan","full_name":"Tünnermann, Jan","last_name":"Tünnermann"},{"id":"451","full_name":"Scharlau, Ingrid","last_name":"Scharlau","orcid":"0000-0003-2364-9489","first_name":"Ingrid"}],"date_created":"2018-12-10T07:06:09Z","volume":7,"date_updated":"2022-06-06T16:29:50Z","oa":"1","main_file_link":[{"url":"https://www.frontiersin.org/articles/10.3389/fpsyg.2016.01442/full","open_access":"1"}],"doi":"10.3389/fpsyg.2016.01442","title":"Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception."},{"language":[{"iso":"eng"}],"_id":"28977","department":[{"_id":"424"}],"user_id":"42165","abstract":[{"lang":"eng","text":"The paper presents a hermeneutic approach to teaching and learning mathematics in which the hermeneutic circle is translated into methods of reading mathematical texts with the help of the three decisive steps 1) making prior knowledge explicit, 2) interpreting texts, and 3) fusing horizons of prior understanding and text content."}],"status":"public","publication":"Special Issue: The Philosophy of Mathematics Education at ICME 13","type":"journal_article","title":"Reading mathematical texts with philosophical methods","main_file_link":[{"open_access":"1","url":"http://socialsciences.exeter.ac.uk/education/research/centres/stem/publications/pmej/pome31/index.html"}],"date_updated":"2022-06-07T00:12:44Z","oa":"1","volume":31,"date_created":"2021-12-15T13:43:30Z","author":[{"first_name":"Jörn","full_name":"Schnieder, Jörn","last_name":"Schnieder"},{"id":"451","full_name":"Scharlau, Ingrid","last_name":"Scharlau","orcid":"0000-0003-2364-9489","first_name":"Ingrid"}],"year":"2016","intvolume":"        31","citation":{"mla":"Schnieder, Jörn, and Ingrid Scharlau. “Reading Mathematical Texts with Philosophical Methods.” <i>Special Issue: The Philosophy of Mathematics Education at ICME 13</i>, vol. 31, 2016.","short":"J. Schnieder, I. Scharlau, Special Issue: The Philosophy of Mathematics Education at ICME 13 31 (2016).","bibtex":"@article{Schnieder_Scharlau_2016, title={Reading mathematical texts with philosophical methods}, volume={31}, journal={Special Issue: The Philosophy of Mathematics Education at ICME 13}, author={Schnieder, Jörn and Scharlau, Ingrid}, year={2016} }","apa":"Schnieder, J., &#38; Scharlau, I. (2016). Reading mathematical texts with philosophical methods. <i>Special Issue: The Philosophy of Mathematics Education at ICME 13</i>, <i>31</i>.","ama":"Schnieder J, Scharlau I. Reading mathematical texts with philosophical methods. <i>Special Issue: The Philosophy of Mathematics Education at ICME 13</i>. 2016;31.","ieee":"J. Schnieder and I. Scharlau, “Reading mathematical texts with philosophical methods,” <i>Special Issue: The Philosophy of Mathematics Education at ICME 13</i>, vol. 31, 2016.","chicago":"Schnieder, Jörn, and Ingrid Scharlau. “Reading Mathematical Texts with Philosophical Methods.” <i>Special Issue: The Philosophy of Mathematics Education at ICME 13</i> 31 (2016)."}},{"publication":"Akademisches Schreiben. Halbband 1: Vom Qualitätspakt Lehre geförderte Schreibzentren und Schreibwerkstätten","language":[{"iso":"ger"}],"year":"2016","corporate_editor":["Universität Hamburg"],"title":"Zwei Fenster mit verschiedener Sicht","date_created":"2022-05-30T00:21:38Z","editor":[{"first_name":"Dagmar","full_name":"Knorr, Dagmar","last_name":"Knorr"}],"status":"public","type":"book_chapter","_id":"31488","series_title":"Universitätskolleg-Schriften","user_id":"42165","department":[{"_id":"424"}],"place":"Hamburg","citation":{"ama":"Scharlau I, Karsten A, Nettingsmeier P, Golombek C, Schäfer S. Zwei Fenster mit verschiedener Sicht. In: Knorr D, Universität Hamburg, eds. <i>Akademisches Schreiben. Halbband 1: Vom Qualitätspakt Lehre geförderte Schreibzentren und Schreibwerkstätten</i>. Vol 13. Universitätskolleg-Schriften. ; 2016:163-166.","ieee":"I. Scharlau, A. Karsten, P. Nettingsmeier, C. Golombek, and S. Schäfer, “Zwei Fenster mit verschiedener Sicht,” in <i>Akademisches Schreiben. Halbband 1: Vom Qualitätspakt Lehre geförderte Schreibzentren und Schreibwerkstätten</i>, vol. 13, D. Knorr and Universität Hamburg, Eds. Hamburg, 2016, pp. 163–166.","chicago":"Scharlau, Ingrid, Andrea Karsten, Pia Nettingsmeier, Christiane Golombek, and Stefanie Schäfer. “Zwei Fenster mit verschiedener Sicht.” In <i>Akademisches Schreiben. Halbband 1: Vom Qualitätspakt Lehre geförderte Schreibzentren und Schreibwerkstätten</i>, edited by Dagmar Knorr and Universität Hamburg, 13:163–66. Universitätskolleg-Schriften. Hamburg, 2016.","apa":"Scharlau, I., Karsten, A., Nettingsmeier, P., Golombek, C., &#38; Schäfer, S. (2016). Zwei Fenster mit verschiedener Sicht. In D. Knorr &#38; Universität Hamburg (Eds.), <i>Akademisches Schreiben. Halbband 1: Vom Qualitätspakt Lehre geförderte Schreibzentren und Schreibwerkstätten</i> (Vol. 13, pp. 163–166).","short":"I. Scharlau, A. Karsten, P. Nettingsmeier, C. Golombek, S. Schäfer, in: D. Knorr, Universität Hamburg (Eds.), Akademisches Schreiben. Halbband 1: Vom Qualitätspakt Lehre geförderte Schreibzentren und Schreibwerkstätten, Hamburg, 2016, pp. 163–166.","mla":"Scharlau, Ingrid, et al. “Zwei Fenster mit verschiedener Sicht.” <i>Akademisches Schreiben. Halbband 1: Vom Qualitätspakt Lehre geförderte Schreibzentren und Schreibwerkstätten</i>, edited by Dagmar Knorr and Universität Hamburg, vol. 13, 2016, pp. 163–66.","bibtex":"@inbook{Scharlau_Karsten_Nettingsmeier_Golombek_Schäfer_2016, place={Hamburg}, series={Universitätskolleg-Schriften}, title={Zwei Fenster mit verschiedener Sicht}, volume={13}, booktitle={Akademisches Schreiben. Halbband 1: Vom Qualitätspakt Lehre geförderte Schreibzentren und Schreibwerkstätten}, author={Scharlau, Ingrid and Karsten, Andrea and Nettingsmeier, Pia and Golombek, Christiane and Schäfer, Stefanie}, editor={Knorr, Dagmar and Universität Hamburg}, year={2016}, pages={163–166}, collection={Universitätskolleg-Schriften} }"},"page":"163 - 166","intvolume":"        13","publication_status":"published","main_file_link":[{"open_access":"1","url":"https://www.universitaetskolleg.uni-hamburg.de/publikationen/uk-schriften-013.pdf"}],"date_updated":"2022-06-07T00:29:15Z","oa":"1","author":[{"full_name":"Scharlau, Ingrid","id":"451","last_name":"Scharlau","orcid":"0000-0003-2364-9489","first_name":"Ingrid"},{"last_name":"Karsten","full_name":"Karsten, Andrea","id":"53917","first_name":"Andrea"},{"first_name":"Pia","last_name":"Nettingsmeier","full_name":"Nettingsmeier, Pia"},{"first_name":"Christiane","last_name":"Golombek","full_name":"Golombek, Christiane"},{"first_name":"Stefanie","last_name":"Schäfer","full_name":"Schäfer, Stefanie"}],"volume":13},{"publication":"Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016)","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-21T13:01:43Z","creator":"florida","date_created":"2018-03-21T13:01:43Z","file_size":1842753,"file_name":"137-p327-heindorf.pdf","file_id":"1561","access_level":"closed"}],"abstract":[{"text":"Wikidata is the new, large-scale knowledge base of the Wikimedia Foundation. Its knowledge is increasingly used within Wikipedia itself and various other kinds of information systems, imposing high demands on its integrity.Wikidata can be edited by anyone and, unfortunately, it frequently gets vandalized, exposing all information systems using it to the risk of spreading vandalized and falsified information. In this paper, we present a new machine learning-based approach to detect vandalism in Wikidata.We propose a set of 47 features that exploit both content and context information, and we report on 4 classifiers of increasing effectiveness tailored to this learning task. Our approach is evaluated on the recently published Wikidata Vandalism Corpus WDVC-2015 and it achieves an area under curve value of the receiver operating characteristic, ROC-AUC, of 0.991. It significantly outperforms the state of the art represented by the rule-based Wikidata Abuse Filter (0.865 ROC-AUC) and a prototypical vandalism detector recently introduced by Wikimedia within the Objective Revision Evaluation Service (0.859 ROC-AUC).","lang":"eng"}],"language":[{"iso":"eng"}],"ddc":["040"],"year":"2016","date_created":"2017-10-17T12:41:18Z","title":"Vandalism Detection in Wikidata","type":"conference","status":"public","department":[{"_id":"66"}],"user_id":"11871","_id":"137","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C5","_id":"17"},{"_id":"4","name":"SFB 901 - Project Area C"}],"file_date_updated":"2018-03-21T13:01:43Z","has_accepted_license":"1","page":"327--336","citation":{"ieee":"S. Heindorf, M. Potthast, B. Stein, and G. Engels, “Vandalism Detection in Wikidata,” in <i>Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016)</i>, 2016, pp. 327--336, doi: <a href=\"https://doi.org/10.1145/2983323.2983740\">10.1145/2983323.2983740</a>.","chicago":"Heindorf, Stefan, Matthias Potthast, Benno Stein, and Gregor Engels. “Vandalism Detection in Wikidata.” In <i>Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016)</i>, 327--336, 2016. <a href=\"https://doi.org/10.1145/2983323.2983740\">https://doi.org/10.1145/2983323.2983740</a>.","ama":"Heindorf S, Potthast M, Stein B, Engels G. Vandalism Detection in Wikidata. In: <i>Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016)</i>. ; 2016:327--336. doi:<a href=\"https://doi.org/10.1145/2983323.2983740\">10.1145/2983323.2983740</a>","apa":"Heindorf, S., Potthast, M., Stein, B., &#38; Engels, G. (2016). Vandalism Detection in Wikidata. <i>Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016)</i>, 327--336. <a href=\"https://doi.org/10.1145/2983323.2983740\">https://doi.org/10.1145/2983323.2983740</a>","bibtex":"@inproceedings{Heindorf_Potthast_Stein_Engels_2016, title={Vandalism Detection in Wikidata}, DOI={<a href=\"https://doi.org/10.1145/2983323.2983740\">10.1145/2983323.2983740</a>}, booktitle={Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016)}, author={Heindorf, Stefan and Potthast, Matthias and Stein, Benno and Engels, Gregor}, year={2016}, pages={327--336} }","short":"S. Heindorf, M. Potthast, B. Stein, G. Engels, in: Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016), 2016, pp. 327--336.","mla":"Heindorf, Stefan, et al. “Vandalism Detection in Wikidata.” <i>Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016)</i>, 2016, pp. 327--336, doi:<a href=\"https://doi.org/10.1145/2983323.2983740\">10.1145/2983323.2983740</a>."},"author":[{"id":"11871","full_name":"Heindorf, Stefan","last_name":"Heindorf","orcid":"0000-0002-4525-6865","first_name":"Stefan"},{"first_name":"Matthias","full_name":"Potthast, Matthias","last_name":"Potthast"},{"full_name":"Stein, Benno","last_name":"Stein","first_name":"Benno"},{"first_name":"Gregor","full_name":"Engels, Gregor","id":"107","last_name":"Engels"}],"oa":"1","date_updated":"2022-10-17T11:31:41Z","doi":"10.1145/2983323.2983740","main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/fg-engels/publications_pdfs/Konferenzbeitraege/heindorf2016_CIKM.pdf"}]},{"department":[{"_id":"35"},{"_id":"17"},{"_id":"22"},{"_id":"396"}],"user_id":"459","_id":"35989","language":[{"iso":"ger"}],"type":"working_paper","status":"public","date_created":"2023-01-11T10:46:12Z","author":[{"id":"459","full_name":"Schlegel-Matthies, Kirsten","last_name":"Schlegel-Matthies","first_name":"Kirsten"},{"full_name":"Gigerenzer, Gerd","last_name":"Gigerenzer","first_name":"Gerd"},{"last_name":"Wagner","full_name":"Wagner, Gert G.","first_name":"Gert G."}],"date_updated":"2023-01-11T10:46:50Z","oa":"1","main_file_link":[{"open_access":"1","url":"https://www.svr-verbraucherfragen.de/wp-content/uploads/Digitale-Welt-und-Gesundheit.pdf"}],"title":"Digitale Welt und Gesundheit. eHealth und mHealth – Chancen und Risiken der Digitalisierung im Gesundheitsbereich","publication_identifier":{"issn":["2365-919X"]},"publication_status":"published","page":"51","citation":{"apa":"Schlegel-Matthies, K., Gigerenzer, G., &#38; Wagner, G. G. (2016). <i>Digitale Welt und Gesundheit. eHealth und mHealth – Chancen und Risiken der Digitalisierung im Gesundheitsbereich</i>.","mla":"Schlegel-Matthies, Kirsten, et al. <i>Digitale Welt und Gesundheit. eHealth und mHealth – Chancen und Risiken der Digitalisierung im Gesundheitsbereich</i>. 2016.","short":"K. Schlegel-Matthies, G. Gigerenzer, G.G. Wagner, Digitale Welt und Gesundheit. eHealth und mHealth – Chancen und Risiken der Digitalisierung im Gesundheitsbereich, Berlin, 2016.","bibtex":"@book{Schlegel-Matthies_Gigerenzer_Wagner_2016, place={Berlin}, title={Digitale Welt und Gesundheit. eHealth und mHealth – Chancen und Risiken der Digitalisierung im Gesundheitsbereich}, author={Schlegel-Matthies, Kirsten and Gigerenzer, Gerd and Wagner, Gert G.}, year={2016} }","ama":"Schlegel-Matthies K, Gigerenzer G, Wagner GG. <i>Digitale Welt und Gesundheit. eHealth und mHealth – Chancen und Risiken der Digitalisierung im Gesundheitsbereich</i>.; 2016.","ieee":"K. Schlegel-Matthies, G. Gigerenzer, and G. G. Wagner, <i>Digitale Welt und Gesundheit. eHealth und mHealth – Chancen und Risiken der Digitalisierung im Gesundheitsbereich</i>. Berlin, 2016.","chicago":"Schlegel-Matthies, Kirsten, Gerd Gigerenzer, and Gert G. Wagner. <i>Digitale Welt und Gesundheit. eHealth und mHealth – Chancen und Risiken der Digitalisierung im Gesundheitsbereich</i>. Berlin, 2016."},"year":"2016","place":"Berlin"},{"editor":[{"first_name":"Nehal","last_name":"Buta","full_name":"Buta, Nehal"},{"full_name":"Kress, Claus","last_name":"Kress","first_name":"Claus"},{"last_name":"Beck","full_name":"Beck, Susanne","first_name":"Susanne"},{"full_name":"Geiss, Robin","last_name":"Geiss","first_name":"Robin"},{"full_name":"Liu, Hin-Yan","last_name":"Liu","first_name":"Hin-Yan"}],"status":"public","publication":"Autonomous Weapon Systems. Law, Ethics, Policy","type":"book_chapter","language":[{"iso":"eng"}],"_id":"36285","department":[{"_id":"411"}],"user_id":"14932","place":"Cambridge","year":"2016","page":"75-102","citation":{"ieee":"J. Weber and L. Suchman, “Human-Machine Autonomies,” in <i>Autonomous Weapon Systems. Law, Ethics, Policy</i>, N. Buta, C. Kress, S. Beck, R. Geiss, and H.-Y. Liu, Eds. Cambridge: Cambridge University Press, 2016, pp. 75–102.","chicago":"Weber, Jutta, and Lucy Suchman. “Human-Machine Autonomies.” In <i>Autonomous Weapon Systems. Law, Ethics, Policy</i>, edited by Nehal Buta, Claus Kress, Susanne Beck, Robin Geiss, and Hin-Yan Liu, 75–102. Cambridge: Cambridge University Press, 2016.","ama":"Weber J, Suchman L. Human-Machine Autonomies. In: Buta N, Kress C, Beck S, Geiss R, Liu H-Y, eds. <i>Autonomous Weapon Systems. Law, Ethics, Policy</i>. Cambridge University Press; 2016:75-102.","mla":"Weber, Jutta, and Lucy Suchman. “Human-Machine Autonomies.” <i>Autonomous Weapon Systems. Law, Ethics, Policy</i>, edited by Nehal Buta et al., Cambridge University Press, 2016, pp. 75–102.","bibtex":"@inbook{Weber_Suchman_2016, place={Cambridge}, title={Human-Machine Autonomies}, booktitle={Autonomous Weapon Systems. Law, Ethics, Policy}, publisher={Cambridge University Press}, author={Weber, Jutta and Suchman, Lucy}, editor={Buta, Nehal and Kress, Claus and Beck, Susanne and Geiss, Robin and Liu, Hin-Yan}, year={2016}, pages={75–102} }","short":"J. Weber, L. Suchman, in: N. Buta, C. Kress, S. Beck, R. Geiss, H.-Y. Liu (Eds.), Autonomous Weapon Systems. Law, Ethics, Policy, Cambridge University Press, Cambridge, 2016, pp. 75–102.","apa":"Weber, J., &#38; Suchman, L. (2016). Human-Machine Autonomies. In N. Buta, C. Kress, S. Beck, R. Geiss, &#38; H.-Y. Liu (Eds.), <i>Autonomous Weapon Systems. Law, Ethics, Policy</i> (pp. 75–102). Cambridge University Press."},"title":"Human-Machine Autonomies","main_file_link":[{"open_access":"1","url":"https://juttaweber.eu/wordpress/wp-content/uploads/2021/03/Weber_Suchman_Human_machine_autonomies_pre_print.pdf"}],"oa":"1","publisher":"Cambridge University Press","date_updated":"2023-01-12T08:06:25Z","date_created":"2023-01-12T08:05:49Z","author":[{"full_name":"Weber, Jutta","id":"31494","last_name":"Weber","first_name":"Jutta"},{"last_name":"Suchman","full_name":"Suchman, Lucy","first_name":"Lucy"}]},{"status":"public","type":"journal_article","publication":"Environment and Planning D. Society and Space. Special Issue on ‚The Politics of the List: Law, Security, Technology‘ (Hg.: Marieke de Goede/Anna Leander/Gavin Sullivan)","language":[{"iso":"eng"}],"user_id":"14932","department":[{"_id":"411"}],"_id":"36289","citation":{"ama":"Weber J. Keep Adding. Kill Lists, Drone Warfare and the Politics of Databases. <i>Environment and Planning D Society and Space Special Issue on ‚The Politics of the List: Law, Security, Technology‘ (Hg: Marieke de Goede/Anna Leander/Gavin Sullivan)</i>. 2016;Vol. 34, No.1, February 2016:107-125.","ieee":"J. Weber, “Keep Adding. Kill Lists, Drone Warfare and the Politics of Databases,” <i>Environment and Planning D. Society and Space. Special Issue on ‚The Politics of the List: Law, Security, Technology‘ (Hg.: Marieke de Goede/Anna Leander/Gavin Sullivan)</i>, vol. Vol. 34, No.1, February 2016, pp. 107–125, 2016.","chicago":"Weber, Jutta. “Keep Adding. Kill Lists, Drone Warfare and the Politics of Databases.” <i>Environment and Planning D. Society and Space. Special Issue on ‚The Politics of the List: Law, Security, Technology‘ (Hg.: Marieke de Goede/Anna Leander/Gavin Sullivan)</i> Vol. 34, No.1, February 2016 (2016): 107–25.","short":"J. Weber, Environment and Planning D. Society and Space. Special Issue on ‚The Politics of the List: Law, Security, Technology‘ (Hg.: Marieke de Goede/Anna Leander/Gavin Sullivan) Vol. 34, No.1, February 2016 (2016) 107–125.","bibtex":"@article{Weber_2016, title={Keep Adding. Kill Lists, Drone Warfare and the Politics of Databases}, volume={Vol. 34, No.1, February 2016}, journal={Environment and Planning D. Society and Space. Special Issue on ‚The Politics of the List: Law, Security, Technology‘ (Hg.: Marieke de Goede/Anna Leander/Gavin Sullivan)}, author={Weber, Jutta}, year={2016}, pages={107–125} }","mla":"Weber, Jutta. “Keep Adding. Kill Lists, Drone Warfare and the Politics of Databases.” <i>Environment and Planning D. Society and Space. Special Issue on ‚The Politics of the List: Law, Security, Technology‘ (Hg.: Marieke de Goede/Anna Leander/Gavin Sullivan)</i>, vol. Vol. 34, No.1, February 2016, 2016, pp. 107–25.","apa":"Weber, J. (2016). Keep Adding. Kill Lists, Drone Warfare and the Politics of Databases. <i>Environment and Planning D. Society and Space. Special Issue on ‚The Politics of the List: Law, Security, Technology‘ (Hg.: Marieke de Goede/Anna Leander/Gavin Sullivan)</i>, <i>Vol. 34, No.1, February 2016</i>, 107–125."},"page":"107-125","year":"2016","main_file_link":[{"url":"https://juttaweber.eu/wordpress/wp-content/uploads/2016/01/Weber_Kill-Lists-Drone-Warfare-and-the-Politics-of-Databases_submVers.pdf","open_access":"1"}],"title":"Keep Adding. Kill Lists, Drone Warfare and the Politics of Databases","author":[{"last_name":"Weber","full_name":"Weber, Jutta","id":"31494","first_name":"Jutta"}],"date_created":"2023-01-12T08:10:07Z","volume":"Vol. 34, No.1, February 2016","date_updated":"2023-01-12T08:25:24Z","oa":"1"},{"author":[{"id":"79451","full_name":"Hartung, Olaf","last_name":"Hartung","first_name":"Olaf"}],"volume":"16, 1","oa":"1","date_updated":"2023-11-16T18:11:01Z","main_file_link":[{"url":"http://www.sehepunkte.de/2016/01/27190.html","open_access":"1"}],"publication_status":"published","publication_identifier":{"issn":["1618-6168"]},"citation":{"chicago":"Hartung, Olaf. “ Rezension von: Jutta Berger / Christian Schmidtmann (Hgg.): Referendariat Geschichte. Kompaktwissen für Berufseinstieg und Examensvorbereitung, Berlin: Cornelsen 2014.” <i>sehepunkte</i>. München: sehepunkte 16 (2016), Nr. 1, 2016.","ieee":"O. Hartung, “ Rezension von: Jutta Berger / Christian Schmidtmann (Hgg.): Referendariat Geschichte. Kompaktwissen für Berufseinstieg und Examensvorbereitung, Berlin: Cornelsen 2014,” <i>sehepunkte</i>, vol. 16, 1. sehepunkte 16 (2016), Nr. 1, München, 2016.","ama":"Hartung O.  Rezension von: Jutta Berger / Christian Schmidtmann (Hgg.): Referendariat Geschichte. Kompaktwissen für Berufseinstieg und Examensvorbereitung, Berlin: Cornelsen 2014. <i>sehepunkte</i>. 2016;16, 1.","short":"O. Hartung, sehepunkte 16, 1 (2016).","mla":"Hartung, Olaf. “ Rezension von: Jutta Berger / Christian Schmidtmann (Hgg.): Referendariat Geschichte. Kompaktwissen für Berufseinstieg und Examensvorbereitung, Berlin: Cornelsen 2014.” <i>sehepunkte</i>, vol. 16, 1, sehepunkte 16 (2016), Nr. 1, 2016.","bibtex":"@article{Hartung_2016, place={München}, title={ Rezension von: Jutta Berger / Christian Schmidtmann (Hgg.): Referendariat Geschichte. Kompaktwissen für Berufseinstieg und Examensvorbereitung, Berlin: Cornelsen 2014}, volume={16, 1}, journal={sehepunkte}, publisher={sehepunkte 16 (2016), Nr. 1}, author={Hartung, Olaf}, year={2016} }","apa":"Hartung, O. (2016).  Rezension von: Jutta Berger / Christian Schmidtmann (Hgg.): Referendariat Geschichte. Kompaktwissen für Berufseinstieg und Examensvorbereitung, Berlin: Cornelsen 2014. In <i>sehepunkte</i> (Vols. 16, 1). sehepunkte 16 (2016), Nr. 1."},"place":"München","user_id":"79451","department":[{"_id":"6"},{"_id":"444"}],"_id":"48789","extern":"1","type":"review","status":"public","date_created":"2023-11-12T15:05:45Z","publisher":"sehepunkte 16 (2016), Nr. 1","title":" Rezension von: Jutta Berger / Christian Schmidtmann (Hgg.): Referendariat Geschichte. Kompaktwissen für Berufseinstieg und Examensvorbereitung, Berlin: Cornelsen 2014","year":"2016","publication_date":"2016-01-15","language":[{"iso":"ger"}],"publication":"sehepunkte"}]
