[{"language":[{"iso":"eng"}],"type":"conference","citation":{"chicago":"Eckhoff, David, Christoph Sommer, Tobias Gansen, Reinhard German, and Falko Dressler. “Strong and Affordable Location Privacy in VANETs: Identity Diffusion Using Time-Slots and Swapping.” In 2010 IEEE Vehicular Networking Conference, 2011. https://doi.org/10.1109/vnc.2010.5698239.","apa":"Eckhoff, D., Sommer, C., Gansen, T., German, R., & Dressler, F. (2011). Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping. In 2010 IEEE Vehicular Networking Conference. https://doi.org/10.1109/vnc.2010.5698239","ama":"Eckhoff D, Sommer C, Gansen T, German R, Dressler F. Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping. In: 2010 IEEE Vehicular Networking Conference. ; 2011. doi:10.1109/vnc.2010.5698239","mla":"Eckhoff, David, et al. “Strong and Affordable Location Privacy in VANETs: Identity Diffusion Using Time-Slots and Swapping.” 2010 IEEE Vehicular Networking Conference, 2011, doi:10.1109/vnc.2010.5698239.","bibtex":"@inproceedings{Eckhoff_Sommer_Gansen_German_Dressler_2011, title={Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping}, DOI={10.1109/vnc.2010.5698239}, booktitle={2010 IEEE Vehicular Networking Conference}, author={Eckhoff, David and Sommer, Christoph and Gansen, Tobias and German, Reinhard and Dressler, Falko}, year={2011} }","short":"D. Eckhoff, C. Sommer, T. Gansen, R. German, F. Dressler, in: 2010 IEEE Vehicular Networking Conference, 2011.","ieee":"D. Eckhoff, C. Sommer, T. Gansen, R. German, and F. Dressler, “Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping,” in 2010 IEEE Vehicular Networking Conference, 2011."},"year":"2011","doi":"10.1109/vnc.2010.5698239","_id":"11997","date_updated":"2022-01-06T06:51:15Z","date_created":"2019-07-18T09:52:21Z","status":"public","publication_identifier":{"isbn":["9781424495269"]},"publication_status":"published","department":[{"_id":"589"}],"publication":"2010 IEEE Vehicular Networking Conference","author":[{"first_name":"David","full_name":"Eckhoff, David","last_name":"Eckhoff"},{"full_name":"Sommer, Christoph","orcid":"0000-0002-4336-7350","first_name":"Christoph","id":"49154","last_name":"Sommer"},{"first_name":"Tobias","full_name":"Gansen, Tobias","last_name":"Gansen"},{"last_name":"German","full_name":"German, Reinhard","first_name":"Reinhard"},{"last_name":"Dressler","full_name":"Dressler, Falko","first_name":"Falko"}],"user_id":"49154","title":"Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping"},{"_id":"11999","date_updated":"2022-01-06T06:51:15Z","doi":"10.1109/med-hoc-net.2011.5970497","citation":{"short":"D. Eckhoff, T. Gansen, R. Manz, D. Thum, O. Klages, C. Sommer, in: 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011.","ieee":"D. Eckhoff, T. Gansen, R. Manz, D. Thum, O. Klages, and C. Sommer, “Simulative performance evaluation of the simTD Self Organizing Traffic Information System,” in 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011.","ama":"Eckhoff D, Gansen T, Manz R, Thum D, Klages O, Sommer C. Simulative performance evaluation of the simTD Self Organizing Traffic Information System. In: 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop. ; 2011. doi:10.1109/med-hoc-net.2011.5970497","apa":"Eckhoff, D., Gansen, T., Manz, R., Thum, D., Klages, O., & Sommer, C. (2011). Simulative performance evaluation of the simTD Self Organizing Traffic Information System. In 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop. https://doi.org/10.1109/med-hoc-net.2011.5970497","chicago":"Eckhoff, David, Tobias Gansen, Robert Manz, Daniela Thum, Oliver Klages, and Christoph Sommer. “Simulative Performance Evaluation of the SimTD Self Organizing Traffic Information System.” In 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011. https://doi.org/10.1109/med-hoc-net.2011.5970497.","bibtex":"@inproceedings{Eckhoff_Gansen_Manz_Thum_Klages_Sommer_2011, title={Simulative performance evaluation of the simTD Self Organizing Traffic Information System}, DOI={10.1109/med-hoc-net.2011.5970497}, booktitle={2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop}, author={Eckhoff, David and Gansen, Tobias and Manz, Robert and Thum, Daniela and Klages, Oliver and Sommer, Christoph}, year={2011} }","mla":"Eckhoff, David, et al. “Simulative Performance Evaluation of the SimTD Self Organizing Traffic Information System.” 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011, doi:10.1109/med-hoc-net.2011.5970497."},"type":"conference","year":"2011","language":[{"iso":"eng"}],"title":"Simulative performance evaluation of the simTD Self Organizing Traffic Information System","user_id":"49154","department":[{"_id":"589"}],"publication":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","author":[{"last_name":"Eckhoff","first_name":"David","full_name":"Eckhoff, David"},{"first_name":"Tobias","full_name":"Gansen, Tobias","last_name":"Gansen"},{"full_name":"Manz, Robert","first_name":"Robert","last_name":"Manz"},{"first_name":"Daniela","full_name":"Thum, Daniela","last_name":"Thum"},{"full_name":"Klages, Oliver","first_name":"Oliver","last_name":"Klages"},{"id":"49154","last_name":"Sommer","orcid":"0000-0002-4336-7350","full_name":"Sommer, Christoph","first_name":"Christoph"}],"publication_status":"published","publication_identifier":{"isbn":["9781457708985"]},"date_created":"2019-07-18T09:52:26Z","status":"public"},{"type":"journal_article","citation":{"bibtex":"@article{Eckhoff_German_Sommer_Dressler_Gansen_2011, title={SlotSwap: strong and affordable location privacy in intelligent transportation systems}, DOI={10.1109/mcom.2011.6069719}, journal={IEEE Communications Magazine}, author={Eckhoff, David and German, Reinhard and Sommer, Christoph and Dressler, Falko and Gansen, Tobias}, year={2011}, pages={126–133} }","mla":"Eckhoff, David, et al. “SlotSwap: Strong and Affordable Location Privacy in Intelligent Transportation Systems.” IEEE Communications Magazine, 2011, pp. 126–33, doi:10.1109/mcom.2011.6069719.","apa":"Eckhoff, D., German, R., Sommer, C., Dressler, F., & Gansen, T. (2011). SlotSwap: strong and affordable location privacy in intelligent transportation systems. IEEE Communications Magazine, 126–133. https://doi.org/10.1109/mcom.2011.6069719","ama":"Eckhoff D, German R, Sommer C, Dressler F, Gansen T. SlotSwap: strong and affordable location privacy in intelligent transportation systems. IEEE Communications Magazine. 2011:126-133. doi:10.1109/mcom.2011.6069719","chicago":"Eckhoff, David, Reinhard German, Christoph Sommer, Falko Dressler, and Tobias Gansen. “SlotSwap: Strong and Affordable Location Privacy in Intelligent Transportation Systems.” IEEE Communications Magazine, 2011, 126–33. https://doi.org/10.1109/mcom.2011.6069719.","ieee":"D. Eckhoff, R. German, C. Sommer, F. Dressler, and T. Gansen, “SlotSwap: strong and affordable location privacy in intelligent transportation systems,” IEEE Communications Magazine, pp. 126–133, 2011.","short":"D. Eckhoff, R. German, C. Sommer, F. Dressler, T. Gansen, IEEE Communications Magazine (2011) 126–133."},"year":"2011","page":"126-133","language":[{"iso":"eng"}],"doi":"10.1109/mcom.2011.6069719","_id":"12000","date_updated":"2022-01-06T06:51:15Z","publication_identifier":{"issn":["0163-6804"]},"publication_status":"published","status":"public","date_created":"2019-07-18T09:52:29Z","author":[{"first_name":"David","full_name":"Eckhoff, David","last_name":"Eckhoff"},{"full_name":"German, Reinhard","first_name":"Reinhard","last_name":"German"},{"id":"49154","last_name":"Sommer","orcid":"0000-0002-4336-7350","full_name":"Sommer, Christoph","first_name":"Christoph"},{"last_name":"Dressler","first_name":"Falko","full_name":"Dressler, Falko"},{"last_name":"Gansen","first_name":"Tobias","full_name":"Gansen, Tobias"}],"publication":"IEEE Communications Magazine","department":[{"_id":"589"}],"title":"SlotSwap: strong and affordable location privacy in intelligent transportation systems","user_id":"49154"},{"doi":"10.1109/vnc.2010.5698242","_id":"12056","date_updated":"2022-01-06T06:51:16Z","citation":{"ieee":"C. Sommer, O. K. Tonguz, and F. Dressler, “Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems,” in 2010 IEEE Vehicular Networking Conference, 2011.","short":"C. Sommer, O.K. Tonguz, F. Dressler, in: 2010 IEEE Vehicular Networking Conference, 2011.","bibtex":"@inproceedings{Sommer_Tonguz_Dressler_2011, title={Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems}, DOI={10.1109/vnc.2010.5698242}, booktitle={2010 IEEE Vehicular Networking Conference}, author={Sommer, Christoph and Tonguz, Ozan K. and Dressler, Falko}, year={2011} }","mla":"Sommer, Christoph, et al. “Adaptive Beaconing for Delay-Sensitive and Congestion-Aware Traffic Information Systems.” 2010 IEEE Vehicular Networking Conference, 2011, doi:10.1109/vnc.2010.5698242.","chicago":"Sommer, Christoph, Ozan K. Tonguz, and Falko Dressler. “Adaptive Beaconing for Delay-Sensitive and Congestion-Aware Traffic Information Systems.” In 2010 IEEE Vehicular Networking Conference, 2011. https://doi.org/10.1109/vnc.2010.5698242.","ama":"Sommer C, Tonguz OK, Dressler F. Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems. In: 2010 IEEE Vehicular Networking Conference. ; 2011. doi:10.1109/vnc.2010.5698242","apa":"Sommer, C., Tonguz, O. K., & Dressler, F. (2011). Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems. In 2010 IEEE Vehicular Networking Conference. https://doi.org/10.1109/vnc.2010.5698242"},"type":"conference","year":"2011","language":[{"iso":"eng"}],"title":"Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems","user_id":"49154","publication_status":"published","publication_identifier":{"isbn":["9781424495269"]},"status":"public","date_created":"2019-07-18T09:55:11Z","author":[{"first_name":"Christoph","full_name":"Sommer, Christoph","orcid":"0000-0002-4336-7350","last_name":"Sommer","id":"49154"},{"last_name":"Tonguz","full_name":"Tonguz, Ozan K.","first_name":"Ozan K."},{"last_name":"Dressler","first_name":"Falko","full_name":"Dressler, Falko"}],"publication":"2010 IEEE Vehicular Networking Conference","department":[{"_id":"589"}]},{"date_updated":"2022-01-06T06:51:16Z","_id":"12062","doi":"10.1109/wons.2011.5720204","language":[{"iso":"eng"}],"type":"conference","citation":{"bibtex":"@inproceedings{Sommer_Eckhoff_German_Dressler_2011, title={A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments}, DOI={10.1109/wons.2011.5720204}, booktitle={2011 Eighth International Conference on Wireless On-Demand Network Systems and Services}, author={Sommer, Christoph and Eckhoff, D and German, R and Dressler, F}, year={2011} }","mla":"Sommer, Christoph, et al. “A Computationally Inexpensive Empirical Model of IEEE 802.11p Radio Shadowing in Urban Environments.” 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, 2011, doi:10.1109/wons.2011.5720204.","chicago":"Sommer, Christoph, D Eckhoff, R German, and F Dressler. “A Computationally Inexpensive Empirical Model of IEEE 802.11p Radio Shadowing in Urban Environments.” In 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, 2011. https://doi.org/10.1109/wons.2011.5720204.","ama":"Sommer C, Eckhoff D, German R, Dressler F. A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments. In: 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services. ; 2011. doi:10.1109/wons.2011.5720204","apa":"Sommer, C., Eckhoff, D., German, R., & Dressler, F. (2011). A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments. In 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services. https://doi.org/10.1109/wons.2011.5720204","ieee":"C. Sommer, D. Eckhoff, R. German, and F. Dressler, “A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments,” in 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, 2011.","short":"C. Sommer, D. Eckhoff, R. German, F. Dressler, in: 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, 2011."},"year":"2011","user_id":"49154","title":"A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments","author":[{"last_name":"Sommer","id":"49154","first_name":"Christoph","full_name":"Sommer, Christoph","orcid":"0000-0002-4336-7350"},{"full_name":"Eckhoff, D","first_name":"D","last_name":"Eckhoff"},{"last_name":"German","first_name":"R","full_name":"German, R"},{"full_name":"Dressler, F","first_name":"F","last_name":"Dressler"}],"publication":"2011 Eighth International Conference on Wireless On-Demand Network Systems and Services","department":[{"_id":"589"}],"status":"public","date_created":"2019-07-18T09:55:26Z","publication_status":"published","publication_identifier":{"isbn":["9781612841892"]}},{"year":"2011","type":"journal_article","citation":{"mla":"Sommer, Christoph, et al. “Traffic Information Systems: Efficient Message Dissemination via Adaptive Beaconing.” IEEE Communications Magazine, 2011, pp. 173–79, doi:10.1109/mcom.2011.5762815.","bibtex":"@article{Sommer_Tonguz_Dressler_2011, title={Traffic information systems: efficient message dissemination via adaptive beaconing}, DOI={10.1109/mcom.2011.5762815}, journal={IEEE Communications Magazine}, author={Sommer, Christoph and Tonguz, Ozan and Dressler, Falko}, year={2011}, pages={173–179} }","chicago":"Sommer, Christoph, Ozan Tonguz, and Falko Dressler. “Traffic Information Systems: Efficient Message Dissemination via Adaptive Beaconing.” IEEE Communications Magazine, 2011, 173–79. https://doi.org/10.1109/mcom.2011.5762815.","apa":"Sommer, C., Tonguz, O., & Dressler, F. (2011). Traffic information systems: efficient message dissemination via adaptive beaconing. IEEE Communications Magazine, 173–179. https://doi.org/10.1109/mcom.2011.5762815","ama":"Sommer C, Tonguz O, Dressler F. Traffic information systems: efficient message dissemination via adaptive beaconing. IEEE Communications Magazine. 2011:173-179. doi:10.1109/mcom.2011.5762815","ieee":"C. Sommer, O. Tonguz, and F. Dressler, “Traffic information systems: efficient message dissemination via adaptive beaconing,” IEEE Communications Magazine, pp. 173–179, 2011.","short":"C. Sommer, O. Tonguz, F. Dressler, IEEE Communications Magazine (2011) 173–179."},"page":"173-179","language":[{"iso":"eng"}],"doi":"10.1109/mcom.2011.5762815","date_updated":"2022-01-06T06:51:16Z","_id":"12063","publication_status":"published","publication_identifier":{"issn":["0163-6804"]},"status":"public","date_created":"2019-07-18T09:55:29Z","author":[{"id":"49154","last_name":"Sommer","full_name":"Sommer, Christoph","orcid":"0000-0002-4336-7350","first_name":"Christoph"},{"full_name":"Tonguz, Ozan","first_name":"Ozan","last_name":"Tonguz"},{"last_name":"Dressler","first_name":"Falko","full_name":"Dressler, Falko"}],"department":[{"_id":"589"}],"publication":"IEEE Communications Magazine","title":"Traffic information systems: efficient message dissemination via adaptive beaconing","user_id":"49154"},{"user_id":"209","title":"Diagnostic Test of Robust Circuits","place":"New Delhi, India","date_created":"2019-08-28T09:19:22Z","status":"public","publication":"20th IEEE Asian Test Symposium (ATS'11)","department":[{"_id":"48"}],"publisher":"IEEE","author":[{"last_name":"Cook","full_name":"Cook, Alejandro","first_name":"Alejandro"},{"orcid":"0000-0002-3717-3939","full_name":"Hellebrand, Sybille","first_name":"Sybille","id":"209","last_name":"Hellebrand"},{"first_name":"Thomas","full_name":"Indlekofer, Thomas","last_name":"Indlekofer"},{"last_name":"Wunderlich","full_name":"Wunderlich, Hans-Joachim","first_name":"Hans-Joachim"}],"doi":"10.1109/ats.2011.55","_id":"12982","date_updated":"2022-01-06T06:51:27Z","language":[{"iso":"eng"}],"page":"285-290","year":"2011","citation":{"mla":"Cook, Alejandro, et al. “Diagnostic Test of Robust Circuits.” 20th IEEE Asian Test Symposium (ATS’11), IEEE, 2011, pp. 285–90, doi:10.1109/ats.2011.55.","bibtex":"@inproceedings{Cook_Hellebrand_Indlekofer_Wunderlich_2011, place={New Delhi, India}, title={Diagnostic Test of Robust Circuits}, DOI={10.1109/ats.2011.55}, booktitle={20th IEEE Asian Test Symposium (ATS’11)}, publisher={IEEE}, author={Cook, Alejandro and Hellebrand, Sybille and Indlekofer, Thomas and Wunderlich, Hans-Joachim}, year={2011}, pages={285–290} }","chicago":"Cook, Alejandro, Sybille Hellebrand, Thomas Indlekofer, and Hans-Joachim Wunderlich. “Diagnostic Test of Robust Circuits.” In 20th IEEE Asian Test Symposium (ATS’11), 285–90. New Delhi, India: IEEE, 2011. https://doi.org/10.1109/ats.2011.55.","ama":"Cook A, Hellebrand S, Indlekofer T, Wunderlich H-J. Diagnostic Test of Robust Circuits. In: 20th IEEE Asian Test Symposium (ATS’11). New Delhi, India: IEEE; 2011:285-290. doi:10.1109/ats.2011.55","apa":"Cook, A., Hellebrand, S., Indlekofer, T., & Wunderlich, H.-J. (2011). Diagnostic Test of Robust Circuits. In 20th IEEE Asian Test Symposium (ATS’11) (pp. 285–290). New Delhi, India: IEEE. https://doi.org/10.1109/ats.2011.55","ieee":"A. Cook, S. Hellebrand, T. Indlekofer, and H.-J. Wunderlich, “Diagnostic Test of Robust Circuits,” in 20th IEEE Asian Test Symposium (ATS’11), 2011, pp. 285–290.","short":"A. Cook, S. Hellebrand, T. Indlekofer, H.-J. Wunderlich, in: 20th IEEE Asian Test Symposium (ATS’11), IEEE, New Delhi, India, 2011, pp. 285–290."},"type":"conference"},{"citation":{"ieee":"I. Polian, B. Becker, S. Hellebrand, H.-J. Wunderlich, and P. Maxwell, “Towards Variation-Aware Test Methods,” in 16th IEEE European Test Symposium Trondheim (ETS’11), 2011.","short":"I. Polian, B. Becker, S. Hellebrand, H.-J. Wunderlich, P. Maxwell, in: 16th IEEE European Test Symposium Trondheim (ETS’11), IEEE, Trondheim, Norway, 2011.","mla":"Polian, Ilia, et al. “Towards Variation-Aware Test Methods.” 16th IEEE European Test Symposium Trondheim (ETS’11), IEEE, 2011, doi:10.1109/ets.2011.51.","bibtex":"@inproceedings{Polian_Becker_Hellebrand_Wunderlich_Maxwell_2011, place={Trondheim, Norway}, title={Towards Variation-Aware Test Methods}, DOI={10.1109/ets.2011.51}, booktitle={16th IEEE European Test Symposium Trondheim (ETS’11)}, publisher={IEEE}, author={Polian, Ilia and Becker, Bernd and Hellebrand, Sybille and Wunderlich, Hans-Joachim and Maxwell, Peter}, year={2011} }","chicago":"Polian, Ilia, Bernd Becker, Sybille Hellebrand, Hans-Joachim Wunderlich, and Peter Maxwell. “Towards Variation-Aware Test Methods.” In 16th IEEE European Test Symposium Trondheim (ETS’11). Trondheim, Norway: IEEE, 2011. https://doi.org/10.1109/ets.2011.51.","apa":"Polian, I., Becker, B., Hellebrand, S., Wunderlich, H.-J., & Maxwell, P. (2011). Towards Variation-Aware Test Methods. In 16th IEEE European Test Symposium Trondheim (ETS’11). Trondheim, Norway: IEEE. https://doi.org/10.1109/ets.2011.51","ama":"Polian I, Becker B, Hellebrand S, Wunderlich H-J, Maxwell P. Towards Variation-Aware Test Methods. In: 16th IEEE European Test Symposium Trondheim (ETS’11). Trondheim, Norway: IEEE; 2011. doi:10.1109/ets.2011.51"},"year":"2011","type":"conference","language":[{"iso":"eng"}],"doi":"10.1109/ets.2011.51","date_updated":"2022-01-06T06:51:27Z","_id":"12984","alternative_title":["Embedded Tutorial"],"date_created":"2019-08-28T09:20:52Z","status":"public","publication":"16th IEEE European Test Symposium Trondheim (ETS'11)","department":[{"_id":"48"}],"author":[{"first_name":"Ilia","full_name":"Polian, Ilia","last_name":"Polian"},{"first_name":"Bernd","full_name":"Becker, Bernd","last_name":"Becker"},{"orcid":"0000-0002-3717-3939","full_name":"Hellebrand, Sybille","first_name":"Sybille","id":"209","last_name":"Hellebrand"},{"first_name":"Hans-Joachim","full_name":"Wunderlich, Hans-Joachim","last_name":"Wunderlich"},{"first_name":"Peter","full_name":"Maxwell, Peter","last_name":"Maxwell"}],"publisher":"IEEE","title":"Towards Variation-Aware Test Methods","user_id":"209","place":"Trondheim, Norway"},{"extern":"1","title":"Analysis of code reading to gain more insight in program comprehension","user_id":"21145","author":[{"last_name":"Busjahn","first_name":"Teresa","full_name":"Busjahn, Teresa"},{"last_name":"Schulte","id":"60311","first_name":"Carsten","full_name":"Schulte, Carsten"},{"full_name":"Busjahn, Andreas","first_name":"Andreas","last_name":"Busjahn"}],"publisher":"ACM","publication":"Koli Calling","department":[{"_id":"67"}],"status":"public","date_created":"2020-01-28T10:29:12Z","_id":"15672","date_updated":"2022-01-06T06:52:31Z","type":"conference","year":"2011","citation":{"ama":"Busjahn T, Schulte C, Busjahn A. Analysis of code reading to gain more insight in program comprehension. In: Koli Calling. ACM; 2011:1-9.","apa":"Busjahn, T., Schulte, C., & Busjahn, A. (2011). Analysis of code reading to gain more insight in program comprehension. In Koli Calling (pp. 1–9). ACM.","chicago":"Busjahn, Teresa, Carsten Schulte, and Andreas Busjahn. “Analysis of Code Reading to Gain More Insight in Program Comprehension.” In Koli Calling, 1–9. ACM, 2011.","mla":"Busjahn, Teresa, et al. “Analysis of Code Reading to Gain More Insight in Program Comprehension.” Koli Calling, ACM, 2011, pp. 1–9.","bibtex":"@inproceedings{Busjahn_Schulte_Busjahn_2011, title={Analysis of code reading to gain more insight in program comprehension}, booktitle={Koli Calling}, publisher={ACM}, author={Busjahn, Teresa and Schulte, Carsten and Busjahn, Andreas}, year={2011}, pages={1–9} }","short":"T. Busjahn, C. Schulte, A. Busjahn, in: Koli Calling, ACM, 2011, pp. 1–9.","ieee":"T. Busjahn, C. Schulte, and A. Busjahn, “Analysis of code reading to gain more insight in program comprehension,” in Koli Calling, 2011, pp. 1–9."},"page":"1-9","language":[{"iso":"eng"}]},{"extern":"1","title":"ProspectiveTeachers@Research: CS teacher education revised","user_id":"21145","author":[{"first_name":"Malte","full_name":"Hornung, Malte","last_name":"Hornung"},{"full_name":"Schulte, Carsten","first_name":"Carsten","id":"60311","last_name":"Schulte"}],"publisher":"ACM","department":[{"_id":"67"}],"publication":"Koli Calling","status":"public","date_created":"2020-01-28T10:29:13Z","_id":"15673","date_updated":"2022-01-06T06:52:31Z","citation":{"ieee":"M. Hornung and C. Schulte, “ProspectiveTeachers@Research: CS teacher education revised,” in Koli Calling, 2011, pp. 138–143.","short":"M. Hornung, C. Schulte, in: Koli Calling, ACM, 2011, pp. 138–143.","bibtex":"@inproceedings{Hornung_Schulte_2011, title={ProspectiveTeachers@Research: CS teacher education revised}, booktitle={Koli Calling}, publisher={ACM}, author={Hornung, Malte and Schulte, Carsten}, year={2011}, pages={138–143} }","mla":"Hornung, Malte, and Carsten Schulte. “ProspectiveTeachers@Research: CS Teacher Education Revised.” Koli Calling, ACM, 2011, pp. 138–43.","chicago":"Hornung, Malte, and Carsten Schulte. “ProspectiveTeachers@Research: CS Teacher Education Revised.” In Koli Calling, 138–43. ACM, 2011.","ama":"Hornung M, Schulte C. ProspectiveTeachers@Research: CS teacher education revised. In: Koli Calling. ACM; 2011:138-143.","apa":"Hornung, M., & Schulte, C. (2011). ProspectiveTeachers@Research: CS teacher education revised. In Koli Calling (pp. 138–143). ACM."},"year":"2011","type":"conference","page":"138-143","language":[{"iso":"eng"}]},{"volume":"P-189","status":"public","date_created":"2020-01-28T10:29:14Z","author":[{"last_name":"Kalbitz","full_name":"Kalbitz, Manuela","first_name":"Manuela"},{"last_name":"Voss","full_name":"Voss, Hendrik","first_name":"Hendrik"},{"last_name":"Schulte","id":"60311","first_name":"Carsten","full_name":"Schulte, Carsten"}],"publisher":"GI","publication":"INFOS","department":[{"_id":"67"}],"title":"Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht","user_id":"21145","extern":"1","year":"2011","type":"conference","citation":{"chicago":"Kalbitz, Manuela, Hendrik Voss, and Carsten Schulte. “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht.” In INFOS, P-189:137–46. {LNI}. GI, 2011.","apa":"Kalbitz, M., Voss, H., & Schulte, C. (2011). Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht. In INFOS (Vol. P-189, pp. 137–146). GI.","ama":"Kalbitz M, Voss H, Schulte C. Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht. In: INFOS. Vol P-189. {LNI}. GI; 2011:137-146.","mla":"Kalbitz, Manuela, et al. “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht.” INFOS, vol. P-189, GI, 2011, pp. 137–46.","bibtex":"@inproceedings{Kalbitz_Voss_Schulte_2011, series={{LNI}}, title={Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht}, volume={P-189}, booktitle={INFOS}, publisher={GI}, author={Kalbitz, Manuela and Voss, Hendrik and Schulte, Carsten}, year={2011}, pages={137–146}, collection={{LNI}} }","short":"M. Kalbitz, H. Voss, C. Schulte, in: INFOS, GI, 2011, pp. 137–146.","ieee":"M. Kalbitz, H. Voss, and C. Schulte, “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht,” in INFOS, 2011, vol. P-189, pp. 137–146."},"page":"137-146","language":[{"iso":"ger"}],"series_title":"{LNI}","_id":"15674","date_updated":"2022-01-06T06:52:31Z"},{"user_id":"21145","title":"Das Schülerlabor als Ort der Informatiklehrerbildung","author":[{"full_name":"Schulte, Carsten","first_name":"Carsten","id":"60311","last_name":"Schulte"}],"publisher":"GI","department":[{"_id":"67"}],"publication":"INFOS","status":"public","date_created":"2020-01-28T10:29:16Z","volume":"P-189","_id":"15675","date_updated":"2022-01-06T06:52:31Z","series_title":"{LNI}","language":[{"iso":"ger"}],"type":"conference","year":"2011","citation":{"short":"C. Schulte, in: INFOS, GI, 2011, pp. 47–56.","ieee":"C. Schulte, “Das Schülerlabor als Ort der Informatiklehrerbildung,” in INFOS, 2011, vol. P-189, pp. 47–56.","chicago":"Schulte, Carsten. “Das Schülerlabor als Ort der Informatiklehrerbildung.” In INFOS, P-189:47–56. {LNI}. GI, 2011.","ama":"Schulte C. Das Schülerlabor als Ort der Informatiklehrerbildung. In: INFOS. Vol P-189. {LNI}. GI; 2011:47-56.","apa":"Schulte, C. (2011). Das Schülerlabor als Ort der Informatiklehrerbildung. In INFOS (Vol. P-189, pp. 47–56). GI.","mla":"Schulte, Carsten. “Das Schülerlabor als Ort der Informatiklehrerbildung.” INFOS, vol. P-189, GI, 2011, pp. 47–56.","bibtex":"@inproceedings{Schulte_2011, series={{LNI}}, title={Das Schülerlabor als Ort der Informatiklehrerbildung}, volume={P-189}, booktitle={INFOS}, publisher={GI}, author={Schulte, Carsten}, year={2011}, pages={47–56}, collection={{LNI}} }"},"page":"47-56"},{"language":[{"iso":"eng"}],"type":"conference","citation":{"ieee":"K. Dembczynski, W. Waegeman, and E. Hüllermeier, “Joint mode estimation in multi-label classification by chaining,” in In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece, 2011.","short":"K. Dembczynski, W. Waegeman, E. Hüllermeier, in: In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece, 2011.","mla":"Dembczynski, K., et al. “Joint Mode Estimation in Multi-Label Classification by Chaining.” In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece, 2011.","bibtex":"@inproceedings{Dembczynski_Waegeman_Hüllermeier_2011, title={Joint mode estimation in multi-label classification by chaining}, booktitle={In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece}, author={Dembczynski, K. and Waegeman, W. and Hüllermeier, Eyke}, year={2011} }","apa":"Dembczynski, K., Waegeman, W., & Hüllermeier, E. (2011). Joint mode estimation in multi-label classification by chaining. In In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece.","ama":"Dembczynski K, Waegeman W, Hüllermeier E. Joint mode estimation in multi-label classification by chaining. In: In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece. ; 2011.","chicago":"Dembczynski, K., W. Waegeman, and Eyke Hüllermeier. “Joint Mode Estimation in Multi-Label Classification by Chaining.” In In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece, 2011."},"year":"2011","_id":"15762","date_updated":"2022-01-06T06:52:32Z","date_created":"2020-02-03T16:30:57Z","status":"public","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"publication":"In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece","author":[{"last_name":"Dembczynski","full_name":"Dembczynski, K.","first_name":"K."},{"last_name":"Waegeman","full_name":"Waegeman, W.","first_name":"W."},{"last_name":"Hüllermeier","id":"48129","first_name":"Eyke","full_name":"Hüllermeier, Eyke"}],"user_id":"49109","title":"Joint mode estimation in multi-label classification by chaining"},{"_id":"15764","date_updated":"2022-01-06T06:52:32Z","language":[{"iso":"eng"}],"type":"conference","year":"2011","citation":{"chicago":"Mernberger, M., D. Moog, S. Stork, S. Zauner, U. Maier, and Eyke Hüllermeier. “Prediction of Protein Localization for Specialized Compartments Using Time Series Kernels.” In In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011.","apa":"Mernberger, M., Moog, D., Stork, S., Zauner, S., Maier, U., & Hüllermeier, E. (2011). Prediction of protein localization for specialized compartments using time series kernels. In In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany.","ama":"Mernberger M, Moog D, Stork S, Zauner S, Maier U, Hüllermeier E. Prediction of protein localization for specialized compartments using time series kernels. In: In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany. ; 2011.","mla":"Mernberger, M., et al. “Prediction of Protein Localization for Specialized Compartments Using Time Series Kernels.” In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011.","bibtex":"@inproceedings{Mernberger_Moog_Stork_Zauner_Maier_Hüllermeier_2011, title={Prediction of protein localization for specialized compartments using time series kernels}, booktitle={In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany}, author={Mernberger, M. and Moog, D. and Stork, S. and Zauner, S. and Maier, U. and Hüllermeier, Eyke}, year={2011} }","short":"M. Mernberger, D. Moog, S. Stork, S. Zauner, U. Maier, E. Hüllermeier, in: In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011.","ieee":"M. Mernberger, D. Moog, S. Stork, S. Zauner, U. Maier, and E. Hüllermeier, “Prediction of protein localization for specialized compartments using time series kernels,” in In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011."},"user_id":"49109","title":"Prediction of protein localization for specialized compartments using time series kernels","author":[{"full_name":"Mernberger, M.","first_name":"M.","last_name":"Mernberger"},{"last_name":"Moog","first_name":"D.","full_name":"Moog, D."},{"first_name":"S.","full_name":"Stork, S.","last_name":"Stork"},{"last_name":"Zauner","first_name":"S.","full_name":"Zauner, S."},{"last_name":"Maier","first_name":"U.","full_name":"Maier, U."},{"last_name":"Hüllermeier","id":"48129","first_name":"Eyke","full_name":"Hüllermeier, Eyke"}],"department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"publication":"In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany","status":"public","date_created":"2020-02-03T16:40:34Z"},{"status":"public","date_created":"2020-02-15T09:19:07Z","publication_identifier":{"isbn":["9781450310048"]},"publication_status":"published","author":[{"first_name":"Juraj","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","last_name":"Somorovsky","id":"83504"},{"full_name":"Heiderich, Mario","first_name":"Mario","last_name":"Heiderich"},{"full_name":"Jensen, Meiko","first_name":"Meiko","last_name":"Jensen"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"},{"full_name":"Gruschka, Nils","first_name":"Nils","last_name":"Gruschka"},{"last_name":"Lo Iacono","first_name":"Luigi","full_name":"Lo Iacono, Luigi"}],"publication":"Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11","user_id":"83504","title":"All your clouds are belong to us: security analysis of cloud management interfaces","extern":"1","language":[{"iso":"eng"}],"year":"2011","type":"conference","citation":{"chicago":"Somorovsky, Juraj, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” In Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011. https://doi.org/10.1145/2046660.2046664.","apa":"Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., & Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11. https://doi.org/10.1145/2046660.2046664","ama":"Somorovsky J, Heiderich M, Jensen M, Schwenk J, Gruschka N, Lo Iacono L. All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11. ; 2011. doi:10.1145/2046660.2046664","bibtex":"@inproceedings{Somorovsky_Heiderich_Jensen_Schwenk_Gruschka_Lo Iacono_2011, title={All your clouds are belong to us: security analysis of cloud management interfaces}, DOI={10.1145/2046660.2046664}, booktitle={Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11}, author={Somorovsky, Juraj and Heiderich, Mario and Jensen, Meiko and Schwenk, Jörg and Gruschka, Nils and Lo Iacono, Luigi}, year={2011} }","mla":"Somorovsky, Juraj, et al. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011, doi:10.1145/2046660.2046664.","short":"J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011.","ieee":"J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All your clouds are belong to us: security analysis of cloud management interfaces,” in Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11, 2011."},"main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2011/10/22/AmazonSignatureWrapping.pdf"}],"doi":"10.1145/2046660.2046664","date_updated":"2022-01-06T06:52:39Z","_id":"15885"},{"title":"On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks","user_id":"83504","publication_identifier":{"isbn":["9781457711855"]},"publication_status":"published","status":"public","date_created":"2020-02-15T09:23:35Z","author":[{"last_name":"Jensen","full_name":"Jensen, Meiko","first_name":"Meiko"},{"full_name":"Meyer, Christopher","first_name":"Christopher","last_name":"Meyer"},{"id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","first_name":"Juraj"},{"full_name":"Schwenk, Jörg","first_name":"Jörg","last_name":"Schwenk"}],"publication":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","doi":"10.1109/iwsscloud.2011.6049019","_id":"15887","date_updated":"2022-01-06T06:52:39Z","year":"2011","citation":{"mla":"Jensen, Meiko, et al. “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks.” 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011, doi:10.1109/iwsscloud.2011.6049019.","bibtex":"@inproceedings{Jensen_Meyer_Somorovsky_Schwenk_2011, title={On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks}, DOI={10.1109/iwsscloud.2011.6049019}, booktitle={2011 1st International Workshop on Securing Services on the Cloud (IWSSC)}, author={Jensen, Meiko and Meyer, Christopher and Somorovsky, Juraj and Schwenk, Jörg}, year={2011} }","apa":"Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). https://doi.org/10.1109/iwsscloud.2011.6049019","ama":"Jensen M, Meyer C, Somorovsky J, Schwenk J. On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). ; 2011. doi:10.1109/iwsscloud.2011.6049019","chicago":"Jensen, Meiko, Christopher Meyer, Juraj Somorovsky, and Jörg Schwenk. “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks.” In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011. https://doi.org/10.1109/iwsscloud.2011.6049019.","ieee":"M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks,” in 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.","short":"M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk, in: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011."},"type":"conference","language":[{"iso":"eng"}]},{"date_updated":"2022-01-06T06:52:40Z","_id":"15915","doi":"10.1145/2046707.2046756","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2011/10/22/HowToBreakXMLenc.pdf"}],"citation":{"mla":"Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011, doi:10.1145/2046707.2046756.","bibtex":"@inproceedings{Jager_Somorovsky_2011, title={How to break XML encryption}, DOI={10.1145/2046707.2046756}, booktitle={Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11}, author={Jager, Tibor and Somorovsky, Juraj}, year={2011} }","apa":"Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11. https://doi.org/10.1145/2046707.2046756","ama":"Jager T, Somorovsky J. How to break XML encryption. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11. ; 2011. doi:10.1145/2046707.2046756","chicago":"Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011. https://doi.org/10.1145/2046707.2046756.","ieee":"T. Jager and J. Somorovsky, “How to break XML encryption,” in Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11, 2011.","short":"T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011."},"year":"2011","type":"conference","language":[{"iso":"eng"}],"extern":"1","title":"How to break XML encryption","user_id":"83504","publication":"Proceedings of the 18th ACM conference on Computer and communications security - CCS '11","author":[{"last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"publication_status":"published","publication_identifier":{"isbn":["9781450309486"]},"date_created":"2020-02-15T10:17:17Z","status":"public"},{"date_updated":"2022-01-06T06:52:40Z","_id":"15916","language":[{"iso":"eng"}],"type":"conference","year":"2011","citation":{"short":"C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, C. Wietfeld, in: 2011.","ieee":"C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, and C. Wietfeld, “Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage,” 2011.","chicago":"Meyer, Christopher, Juraj Somorovsky, Benedikt Driessen, Jörg Schwenk, Thang Tran, and Christian Wietfeld. “Sec2: Ein Mobiles Nutzer-Kontrolliertes Sicherheitskonzept Für Cloud-Storage,” 2011.","ama":"Meyer C, Somorovsky J, Driessen B, Schwenk J, Tran T, Wietfeld C. Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage. In: ; 2011.","apa":"Meyer, C., Somorovsky, J., Driessen, B., Schwenk, J., Tran, T., & Wietfeld, C. (2011). Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage.","mla":"Meyer, Christopher, et al. Sec2: Ein Mobiles Nutzer-Kontrolliertes Sicherheitskonzept Für Cloud-Storage. 2011.","bibtex":"@inproceedings{Meyer_Somorovsky_Driessen_Schwenk_Tran_Wietfeld_2011, title={Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage}, author={Meyer, Christopher and Somorovsky, Juraj and Driessen, Benedikt and Schwenk, Jörg and Tran, Thang and Wietfeld, Christian}, year={2011} }"},"user_id":"83504","title":"Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage","author":[{"last_name":"Meyer","first_name":"Christopher","full_name":"Meyer, Christopher"},{"last_name":"Somorovsky","id":"83504","first_name":"Juraj","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720"},{"last_name":"Driessen","first_name":"Benedikt","full_name":"Driessen, Benedikt"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"},{"last_name":"Tran","full_name":"Tran, Thang","first_name":"Thang"},{"last_name":"Wietfeld","full_name":"Wietfeld, Christian","first_name":"Christian"}],"date_created":"2020-02-15T10:19:15Z","status":"public"},{"status":"public","date_created":"2019-11-20T08:11:38Z","publication_identifier":{"isbn":["978-88579-286-4"]},"author":[{"last_name":"Arens","first_name":"Stephan","full_name":"Arens, Stephan"},{"first_name":"Gitta","full_name":"Domik, Gitta","last_name":"Domik","id":"90"}],"publisher":"Gesellschaft für Informatik e.V.","department":[{"_id":"65"}],"publication":"INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik.","user_id":"90","title":"Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern.","place":"Bonn","language":[{"iso":"eng"}],"type":"conference","citation":{"mla":"Arens, Stephan, and Gitta Domik. “Volume Studio: Flexible Multi-Volume Ray Casting Pipeline Mit Nahtlos Integriertem Rapid Prototyping von Shadern.” INFORMATIK 2011 – 41. Jahrestagung Der Gesellschaft Für Informatik., no. 324, Gesellschaft für Informatik e.V., 2011, pp. 347–52.","bibtex":"@inproceedings{Arens_Domik_2011, place={Bonn}, title={Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern.}, number={324}, booktitle={INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik.}, publisher={Gesellschaft für Informatik e.V.}, author={Arens, Stephan and Domik, Gitta}, year={2011}, pages={347–352} }","apa":"Arens, S., & Domik, G. (2011). Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern. In INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik. (pp. 347–352). Bonn: Gesellschaft für Informatik e.V.","ama":"Arens S, Domik G. Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern. In: INFORMATIK 2011 – 41. Jahrestagung Der Gesellschaft Für Informatik. Bonn: Gesellschaft für Informatik e.V.; 2011:347-352.","chicago":"Arens, Stephan, and Gitta Domik. “Volume Studio: Flexible Multi-Volume Ray Casting Pipeline Mit Nahtlos Integriertem Rapid Prototyping von Shadern.” In INFORMATIK 2011 – 41. Jahrestagung Der Gesellschaft Für Informatik., 347–52. Bonn: Gesellschaft für Informatik e.V., 2011.","ieee":"S. Arens and G. Domik, “Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern.,” in INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik., 2011, no. 324, pp. 347–352.","short":"S. Arens, G. Domik, in: INFORMATIK 2011 – 41. Jahrestagung Der Gesellschaft Für Informatik., Gesellschaft für Informatik e.V., Bonn, 2011, pp. 347–352."},"year":"2011","page":"347-352","issue":"324","date_updated":"2022-01-06T06:52:15Z","_id":"15046"},{"doi":"10.1007/978-3-642-23737-9_3","date_updated":"2022-01-06T06:52:15Z","_id":"15097","page":"27-41","year":"2011","citation":{"ieee":"M. Benter, S. Böttcher, and R. Hartel, “Mixing Bottom-Up and Top-Down XPath Query Evaluation,” in East European Conference on Advances in Databases and Information Systems, 2011, pp. 27–41.","short":"M. Benter, S. Böttcher, R. Hartel, in: East European Conference on Advances in Databases and Information Systems, Springer, 2011, pp. 27–41.","bibtex":"@inproceedings{Benter_Böttcher_Hartel_2011, title={Mixing Bottom-Up and Top-Down XPath Query Evaluation}, DOI={10.1007/978-3-642-23737-9_3}, booktitle={East European Conference on Advances in Databases and Information Systems}, publisher={Springer}, author={Benter, Markus and Böttcher, Stefan and Hartel, Rita}, year={2011}, pages={27–41} }","mla":"Benter, Markus, et al. “Mixing Bottom-Up and Top-Down XPath Query Evaluation.” East European Conference on Advances in Databases and Information Systems, Springer, 2011, pp. 27–41, doi:10.1007/978-3-642-23737-9_3.","chicago":"Benter, Markus, Stefan Böttcher, and Rita Hartel. “Mixing Bottom-Up and Top-Down XPath Query Evaluation.” In East European Conference on Advances in Databases and Information Systems, 27–41. Springer, 2011. https://doi.org/10.1007/978-3-642-23737-9_3.","apa":"Benter, M., Böttcher, S., & Hartel, R. (2011). Mixing Bottom-Up and Top-Down XPath Query Evaluation. In East European Conference on Advances in Databases and Information Systems (pp. 27–41). Springer. https://doi.org/10.1007/978-3-642-23737-9_3","ama":"Benter M, Böttcher S, Hartel R. Mixing Bottom-Up and Top-Down XPath Query Evaluation. In: East European Conference on Advances in Databases and Information Systems. Springer; 2011:27-41. doi:10.1007/978-3-642-23737-9_3"},"type":"conference","language":[{"iso":"eng"}],"title":"Mixing Bottom-Up and Top-Down XPath Query Evaluation","user_id":"14961","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642237362","9783642237379"]},"date_created":"2019-11-21T15:27:31Z","status":"public","publication":"East European Conference on Advances in Databases and Information Systems","department":[{"_id":"69"}],"author":[{"last_name":"Benter","full_name":"Benter, Markus","first_name":"Markus"},{"id":"624","last_name":"Böttcher","full_name":"Böttcher, Stefan","first_name":"Stefan"},{"last_name":"Hartel","id":"14961","first_name":"Rita","full_name":"Hartel, Rita"}],"publisher":"Springer"}]