[{"date_created":"2019-07-12T05:31:17Z","publisher":"Springer","date_updated":"2022-01-06T06:51:12Z","oa":"1","main_file_link":[{"url":"http://www.springer.com/engineering/signals/book/978-3-642-21316-8?detailsPage=authorsAndEditors","open_access":"1"}],"title":"Robust Speech Recognition of Uncertain or Missing Data --- Theory and Applications","citation":{"apa":"Kolossa, D., &#38; Haeb-Umbach, R. (Eds.). (2011). <i>Robust Speech Recognition of Uncertain or Missing Data --- Theory and Applications</i>. Springer.","mla":"Kolossa, Dorothea, and Reinhold Haeb-Umbach, editors. <i>Robust Speech Recognition of Uncertain or Missing Data --- Theory and Applications</i>. Springer, 2011.","bibtex":"@book{Kolossa_Haeb-Umbach_2011, title={Robust Speech Recognition of Uncertain or Missing Data --- Theory and Applications}, publisher={Springer}, year={2011} }","short":"D. Kolossa, R. Haeb-Umbach, eds., Robust Speech Recognition of Uncertain or Missing Data --- Theory and Applications, Springer, 2011.","chicago":"Kolossa, Dorothea, and Reinhold Haeb-Umbach, eds. <i>Robust Speech Recognition of Uncertain or Missing Data --- Theory and Applications</i>. Springer, 2011.","ieee":"D. Kolossa and R. Haeb-Umbach, Eds., <i>Robust Speech Recognition of Uncertain or Missing Data --- Theory and Applications</i>. Springer, 2011.","ama":"Kolossa D, Haeb-Umbach R, eds. <i>Robust Speech Recognition of Uncertain or Missing Data --- Theory and Applications</i>. Springer; 2011."},"year":"2011","department":[{"_id":"54"}],"user_id":"44006","_id":"11945","language":[{"iso":"eng"}],"type":"book_editor","status":"public","editor":[{"full_name":"Kolossa, Dorothea","last_name":"Kolossa","first_name":"Dorothea"},{"id":"242","full_name":"Haeb-Umbach, Reinhold","last_name":"Haeb-Umbach","first_name":"Reinhold"}]},{"title":"Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link","doi":"10.1109/glocom.2010.5684106","date_updated":"2022-01-06T06:51:14Z","date_created":"2019-07-18T09:51:15Z","author":[{"first_name":"Serkan","full_name":"Ayaz, Serkan","last_name":"Ayaz"},{"last_name":"Hoffmann","full_name":"Hoffmann, Felix","first_name":"Felix"},{"full_name":"Sommer, Christoph","id":"49154","orcid":"0000-0002-4336-7350","last_name":"Sommer","first_name":"Christoph"},{"last_name":"German","full_name":"German, Reinhard","first_name":"Reinhard"},{"first_name":"Falko","last_name":"Dressler","full_name":"Dressler, Falko"}],"year":"2011","citation":{"ama":"Ayaz S, Hoffmann F, Sommer C, German R, Dressler F. Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link. In: <i>2010 IEEE Global Telecommunications Conference GLOBECOM 2010</i>. ; 2011. doi:<a href=\"https://doi.org/10.1109/glocom.2010.5684106\">10.1109/glocom.2010.5684106</a>","chicago":"Ayaz, Serkan, Felix Hoffmann, Christoph Sommer, Reinhard German, and Falko Dressler. “Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link.” In <i>2010 IEEE Global Telecommunications Conference GLOBECOM 2010</i>, 2011. <a href=\"https://doi.org/10.1109/glocom.2010.5684106\">https://doi.org/10.1109/glocom.2010.5684106</a>.","ieee":"S. Ayaz, F. Hoffmann, C. Sommer, R. German, and F. Dressler, “Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link,” in <i>2010 IEEE Global Telecommunications Conference GLOBECOM 2010</i>, 2011.","apa":"Ayaz, S., Hoffmann, F., Sommer, C., German, R., &#38; Dressler, F. (2011). Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link. In <i>2010 IEEE Global Telecommunications Conference GLOBECOM 2010</i>. <a href=\"https://doi.org/10.1109/glocom.2010.5684106\">https://doi.org/10.1109/glocom.2010.5684106</a>","short":"S. Ayaz, F. Hoffmann, C. Sommer, R. German, F. Dressler, in: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2011.","bibtex":"@inproceedings{Ayaz_Hoffmann_Sommer_German_Dressler_2011, title={Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link}, DOI={<a href=\"https://doi.org/10.1109/glocom.2010.5684106\">10.1109/glocom.2010.5684106</a>}, booktitle={2010 IEEE Global Telecommunications Conference GLOBECOM 2010}, author={Ayaz, Serkan and Hoffmann, Felix and Sommer, Christoph and German, Reinhard and Dressler, Falko}, year={2011} }","mla":"Ayaz, Serkan, et al. “Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link.” <i>2010 IEEE Global Telecommunications Conference GLOBECOM 2010</i>, 2011, doi:<a href=\"https://doi.org/10.1109/glocom.2010.5684106\">10.1109/glocom.2010.5684106</a>."},"publication_status":"published","publication_identifier":{"isbn":["9781424456369"]},"language":[{"iso":"eng"}],"_id":"11973","user_id":"49154","department":[{"_id":"589"}],"status":"public","type":"conference","publication":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010"},{"title":"Toward Realistic Simulation of Intervehicle Communication","doi":"10.1109/mvt.2011.941898","date_updated":"2022-01-06T06:51:15Z","date_created":"2019-07-18T09:52:10Z","author":[{"last_name":"Dressler","full_name":"Dressler, Falko","first_name":"Falko"},{"last_name":"Sommer","orcid":"0000-0002-4336-7350","full_name":"Sommer, Christoph","id":"49154","first_name":"Christoph"},{"first_name":"David","full_name":"Eckhoff, David","last_name":"Eckhoff"},{"last_name":"Tonguz","full_name":"Tonguz, Ozan","first_name":"Ozan"}],"year":"2011","citation":{"ama":"Dressler F, Sommer C, Eckhoff D, Tonguz O. Toward Realistic Simulation of Intervehicle Communication. <i>IEEE Vehicular Technology Magazine</i>. 2011:43-51. doi:<a href=\"https://doi.org/10.1109/mvt.2011.941898\">10.1109/mvt.2011.941898</a>","chicago":"Dressler, Falko, Christoph Sommer, David Eckhoff, and Ozan Tonguz. “Toward Realistic Simulation of Intervehicle Communication.” <i>IEEE Vehicular Technology Magazine</i>, 2011, 43–51. <a href=\"https://doi.org/10.1109/mvt.2011.941898\">https://doi.org/10.1109/mvt.2011.941898</a>.","ieee":"F. Dressler, C. Sommer, D. Eckhoff, and O. Tonguz, “Toward Realistic Simulation of Intervehicle Communication,” <i>IEEE Vehicular Technology Magazine</i>, pp. 43–51, 2011.","apa":"Dressler, F., Sommer, C., Eckhoff, D., &#38; Tonguz, O. (2011). Toward Realistic Simulation of Intervehicle Communication. <i>IEEE Vehicular Technology Magazine</i>, 43–51. <a href=\"https://doi.org/10.1109/mvt.2011.941898\">https://doi.org/10.1109/mvt.2011.941898</a>","bibtex":"@article{Dressler_Sommer_Eckhoff_Tonguz_2011, title={Toward Realistic Simulation of Intervehicle Communication}, DOI={<a href=\"https://doi.org/10.1109/mvt.2011.941898\">10.1109/mvt.2011.941898</a>}, journal={IEEE Vehicular Technology Magazine}, author={Dressler, Falko and Sommer, Christoph and Eckhoff, David and Tonguz, Ozan}, year={2011}, pages={43–51} }","short":"F. Dressler, C. Sommer, D. Eckhoff, O. Tonguz, IEEE Vehicular Technology Magazine (2011) 43–51.","mla":"Dressler, Falko, et al. “Toward Realistic Simulation of Intervehicle Communication.” <i>IEEE Vehicular Technology Magazine</i>, 2011, pp. 43–51, doi:<a href=\"https://doi.org/10.1109/mvt.2011.941898\">10.1109/mvt.2011.941898</a>."},"page":"43-51","publication_status":"published","publication_identifier":{"issn":["1556-6072"]},"language":[{"iso":"eng"}],"_id":"11993","user_id":"49154","department":[{"_id":"589"}],"status":"public","type":"journal_article","publication":"IEEE Vehicular Technology Magazine"},{"publication_identifier":{"isbn":["9781424495269"]},"publication_status":"published","year":"2011","citation":{"ama":"Eckhoff D, Sommer C, Gansen T, German R, Dressler F. Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping. In: <i>2010 IEEE Vehicular Networking Conference</i>. ; 2011. doi:<a href=\"https://doi.org/10.1109/vnc.2010.5698239\">10.1109/vnc.2010.5698239</a>","chicago":"Eckhoff, David, Christoph Sommer, Tobias Gansen, Reinhard German, and Falko Dressler. “Strong and Affordable Location Privacy in VANETs: Identity Diffusion Using Time-Slots and Swapping.” In <i>2010 IEEE Vehicular Networking Conference</i>, 2011. <a href=\"https://doi.org/10.1109/vnc.2010.5698239\">https://doi.org/10.1109/vnc.2010.5698239</a>.","ieee":"D. Eckhoff, C. Sommer, T. Gansen, R. German, and F. Dressler, “Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping,” in <i>2010 IEEE Vehicular Networking Conference</i>, 2011.","apa":"Eckhoff, D., Sommer, C., Gansen, T., German, R., &#38; Dressler, F. (2011). Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping. In <i>2010 IEEE Vehicular Networking Conference</i>. <a href=\"https://doi.org/10.1109/vnc.2010.5698239\">https://doi.org/10.1109/vnc.2010.5698239</a>","mla":"Eckhoff, David, et al. “Strong and Affordable Location Privacy in VANETs: Identity Diffusion Using Time-Slots and Swapping.” <i>2010 IEEE Vehicular Networking Conference</i>, 2011, doi:<a href=\"https://doi.org/10.1109/vnc.2010.5698239\">10.1109/vnc.2010.5698239</a>.","short":"D. Eckhoff, C. Sommer, T. Gansen, R. German, F. Dressler, in: 2010 IEEE Vehicular Networking Conference, 2011.","bibtex":"@inproceedings{Eckhoff_Sommer_Gansen_German_Dressler_2011, title={Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping}, DOI={<a href=\"https://doi.org/10.1109/vnc.2010.5698239\">10.1109/vnc.2010.5698239</a>}, booktitle={2010 IEEE Vehicular Networking Conference}, author={Eckhoff, David and Sommer, Christoph and Gansen, Tobias and German, Reinhard and Dressler, Falko}, year={2011} }"},"date_updated":"2022-01-06T06:51:15Z","date_created":"2019-07-18T09:52:21Z","author":[{"first_name":"David","last_name":"Eckhoff","full_name":"Eckhoff, David"},{"last_name":"Sommer","orcid":"0000-0002-4336-7350","full_name":"Sommer, Christoph","id":"49154","first_name":"Christoph"},{"last_name":"Gansen","full_name":"Gansen, Tobias","first_name":"Tobias"},{"first_name":"Reinhard","last_name":"German","full_name":"German, Reinhard"},{"last_name":"Dressler","full_name":"Dressler, Falko","first_name":"Falko"}],"title":"Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping","doi":"10.1109/vnc.2010.5698239","publication":"2010 IEEE Vehicular Networking Conference","type":"conference","status":"public","_id":"11997","department":[{"_id":"589"}],"user_id":"49154","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"department":[{"_id":"589"}],"user_id":"49154","_id":"11999","status":"public","publication":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","type":"conference","doi":"10.1109/med-hoc-net.2011.5970497","title":"Simulative performance evaluation of the sim<sup>TD</sup> Self Organizing Traffic Information System","author":[{"first_name":"David","last_name":"Eckhoff","full_name":"Eckhoff, David"},{"first_name":"Tobias","last_name":"Gansen","full_name":"Gansen, Tobias"},{"last_name":"Manz","full_name":"Manz, Robert","first_name":"Robert"},{"full_name":"Thum, Daniela","last_name":"Thum","first_name":"Daniela"},{"full_name":"Klages, Oliver","last_name":"Klages","first_name":"Oliver"},{"first_name":"Christoph","orcid":"0000-0002-4336-7350","last_name":"Sommer","full_name":"Sommer, Christoph","id":"49154"}],"date_created":"2019-07-18T09:52:26Z","date_updated":"2022-01-06T06:51:15Z","citation":{"ama":"Eckhoff D, Gansen T, Manz R, Thum D, Klages O, Sommer C. Simulative performance evaluation of the sim<sup>TD</sup> Self Organizing Traffic Information System. In: <i>2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop</i>. ; 2011. doi:<a href=\"https://doi.org/10.1109/med-hoc-net.2011.5970497\">10.1109/med-hoc-net.2011.5970497</a>","ieee":"D. Eckhoff, T. Gansen, R. Manz, D. Thum, O. Klages, and C. Sommer, “Simulative performance evaluation of the sim<sup>TD</sup> Self Organizing Traffic Information System,” in <i>2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop</i>, 2011.","chicago":"Eckhoff, David, Tobias Gansen, Robert Manz, Daniela Thum, Oliver Klages, and Christoph Sommer. “Simulative Performance Evaluation of the Sim<sup>TD</sup> Self Organizing Traffic Information System.” In <i>2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop</i>, 2011. <a href=\"https://doi.org/10.1109/med-hoc-net.2011.5970497\">https://doi.org/10.1109/med-hoc-net.2011.5970497</a>.","apa":"Eckhoff, D., Gansen, T., Manz, R., Thum, D., Klages, O., &#38; Sommer, C. (2011). Simulative performance evaluation of the sim<sup>TD</sup> Self Organizing Traffic Information System. In <i>2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop</i>. <a href=\"https://doi.org/10.1109/med-hoc-net.2011.5970497\">https://doi.org/10.1109/med-hoc-net.2011.5970497</a>","mla":"Eckhoff, David, et al. “Simulative Performance Evaluation of the Sim<sup>TD</sup> Self Organizing Traffic Information System.” <i>2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop</i>, 2011, doi:<a href=\"https://doi.org/10.1109/med-hoc-net.2011.5970497\">10.1109/med-hoc-net.2011.5970497</a>.","bibtex":"@inproceedings{Eckhoff_Gansen_Manz_Thum_Klages_Sommer_2011, title={Simulative performance evaluation of the sim<sup>TD</sup> Self Organizing Traffic Information System}, DOI={<a href=\"https://doi.org/10.1109/med-hoc-net.2011.5970497\">10.1109/med-hoc-net.2011.5970497</a>}, booktitle={2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop}, author={Eckhoff, David and Gansen, Tobias and Manz, Robert and Thum, Daniela and Klages, Oliver and Sommer, Christoph}, year={2011} }","short":"D. Eckhoff, T. Gansen, R. Manz, D. Thum, O. Klages, C. Sommer, in: 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011."},"year":"2011","publication_identifier":{"isbn":["9781457708985"]},"publication_status":"published"},{"date_updated":"2022-01-06T06:51:15Z","date_created":"2019-07-18T09:52:29Z","author":[{"full_name":"Eckhoff, David","last_name":"Eckhoff","first_name":"David"},{"first_name":"Reinhard","last_name":"German","full_name":"German, Reinhard"},{"first_name":"Christoph","full_name":"Sommer, Christoph","id":"49154","orcid":"0000-0002-4336-7350","last_name":"Sommer"},{"full_name":"Dressler, Falko","last_name":"Dressler","first_name":"Falko"},{"full_name":"Gansen, Tobias","last_name":"Gansen","first_name":"Tobias"}],"title":"SlotSwap: strong and affordable location privacy in intelligent transportation systems","doi":"10.1109/mcom.2011.6069719","publication_identifier":{"issn":["0163-6804"]},"publication_status":"published","year":"2011","page":"126-133","citation":{"apa":"Eckhoff, D., German, R., Sommer, C., Dressler, F., &#38; Gansen, T. (2011). SlotSwap: strong and affordable location privacy in intelligent transportation systems. <i>IEEE Communications Magazine</i>, 126–133. <a href=\"https://doi.org/10.1109/mcom.2011.6069719\">https://doi.org/10.1109/mcom.2011.6069719</a>","mla":"Eckhoff, David, et al. “SlotSwap: Strong and Affordable Location Privacy in Intelligent Transportation Systems.” <i>IEEE Communications Magazine</i>, 2011, pp. 126–33, doi:<a href=\"https://doi.org/10.1109/mcom.2011.6069719\">10.1109/mcom.2011.6069719</a>.","bibtex":"@article{Eckhoff_German_Sommer_Dressler_Gansen_2011, title={SlotSwap: strong and affordable location privacy in intelligent transportation systems}, DOI={<a href=\"https://doi.org/10.1109/mcom.2011.6069719\">10.1109/mcom.2011.6069719</a>}, journal={IEEE Communications Magazine}, author={Eckhoff, David and German, Reinhard and Sommer, Christoph and Dressler, Falko and Gansen, Tobias}, year={2011}, pages={126–133} }","short":"D. Eckhoff, R. German, C. Sommer, F. Dressler, T. Gansen, IEEE Communications Magazine (2011) 126–133.","ieee":"D. Eckhoff, R. German, C. Sommer, F. Dressler, and T. Gansen, “SlotSwap: strong and affordable location privacy in intelligent transportation systems,” <i>IEEE Communications Magazine</i>, pp. 126–133, 2011.","chicago":"Eckhoff, David, Reinhard German, Christoph Sommer, Falko Dressler, and Tobias Gansen. “SlotSwap: Strong and Affordable Location Privacy in Intelligent Transportation Systems.” <i>IEEE Communications Magazine</i>, 2011, 126–33. <a href=\"https://doi.org/10.1109/mcom.2011.6069719\">https://doi.org/10.1109/mcom.2011.6069719</a>.","ama":"Eckhoff D, German R, Sommer C, Dressler F, Gansen T. SlotSwap: strong and affordable location privacy in intelligent transportation systems. <i>IEEE Communications Magazine</i>. 2011:126-133. doi:<a href=\"https://doi.org/10.1109/mcom.2011.6069719\">10.1109/mcom.2011.6069719</a>"},"_id":"12000","department":[{"_id":"589"}],"user_id":"49154","language":[{"iso":"eng"}],"publication":"IEEE Communications Magazine","type":"journal_article","status":"public"},{"doi":"10.1109/vnc.2010.5698242","title":"Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems","date_created":"2019-07-18T09:55:11Z","author":[{"full_name":"Sommer, Christoph","id":"49154","last_name":"Sommer","orcid":"0000-0002-4336-7350","first_name":"Christoph"},{"first_name":"Ozan K.","full_name":"Tonguz, Ozan K.","last_name":"Tonguz"},{"full_name":"Dressler, Falko","last_name":"Dressler","first_name":"Falko"}],"date_updated":"2022-01-06T06:51:16Z","citation":{"ieee":"C. Sommer, O. K. Tonguz, and F. Dressler, “Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems,” in <i>2010 IEEE Vehicular Networking Conference</i>, 2011.","chicago":"Sommer, Christoph, Ozan K. Tonguz, and Falko Dressler. “Adaptive Beaconing for Delay-Sensitive and Congestion-Aware Traffic Information Systems.” In <i>2010 IEEE Vehicular Networking Conference</i>, 2011. <a href=\"https://doi.org/10.1109/vnc.2010.5698242\">https://doi.org/10.1109/vnc.2010.5698242</a>.","ama":"Sommer C, Tonguz OK, Dressler F. Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems. In: <i>2010 IEEE Vehicular Networking Conference</i>. ; 2011. doi:<a href=\"https://doi.org/10.1109/vnc.2010.5698242\">10.1109/vnc.2010.5698242</a>","bibtex":"@inproceedings{Sommer_Tonguz_Dressler_2011, title={Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems}, DOI={<a href=\"https://doi.org/10.1109/vnc.2010.5698242\">10.1109/vnc.2010.5698242</a>}, booktitle={2010 IEEE Vehicular Networking Conference}, author={Sommer, Christoph and Tonguz, Ozan K. and Dressler, Falko}, year={2011} }","mla":"Sommer, Christoph, et al. “Adaptive Beaconing for Delay-Sensitive and Congestion-Aware Traffic Information Systems.” <i>2010 IEEE Vehicular Networking Conference</i>, 2011, doi:<a href=\"https://doi.org/10.1109/vnc.2010.5698242\">10.1109/vnc.2010.5698242</a>.","short":"C. Sommer, O.K. Tonguz, F. Dressler, in: 2010 IEEE Vehicular Networking Conference, 2011.","apa":"Sommer, C., Tonguz, O. K., &#38; Dressler, F. (2011). Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems. In <i>2010 IEEE Vehicular Networking Conference</i>. <a href=\"https://doi.org/10.1109/vnc.2010.5698242\">https://doi.org/10.1109/vnc.2010.5698242</a>"},"year":"2011","publication_status":"published","publication_identifier":{"isbn":["9781424495269"]},"language":[{"iso":"eng"}],"user_id":"49154","department":[{"_id":"589"}],"_id":"12056","status":"public","type":"conference","publication":"2010 IEEE Vehicular Networking Conference"},{"publication_identifier":{"isbn":["9781612841892"]},"publication_status":"published","citation":{"ama":"Sommer C, Eckhoff D, German R, Dressler F. A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments. In: <i>2011 Eighth International Conference on Wireless On-Demand Network Systems and Services</i>. ; 2011. doi:<a href=\"https://doi.org/10.1109/wons.2011.5720204\">10.1109/wons.2011.5720204</a>","ieee":"C. Sommer, D. Eckhoff, R. German, and F. Dressler, “A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments,” in <i>2011 Eighth International Conference on Wireless On-Demand Network Systems and Services</i>, 2011.","chicago":"Sommer, Christoph, D Eckhoff, R German, and F Dressler. “A Computationally Inexpensive Empirical Model of IEEE 802.11p Radio Shadowing in Urban Environments.” In <i>2011 Eighth International Conference on Wireless On-Demand Network Systems and Services</i>, 2011. <a href=\"https://doi.org/10.1109/wons.2011.5720204\">https://doi.org/10.1109/wons.2011.5720204</a>.","short":"C. Sommer, D. Eckhoff, R. German, F. Dressler, in: 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, 2011.","mla":"Sommer, Christoph, et al. “A Computationally Inexpensive Empirical Model of IEEE 802.11p Radio Shadowing in Urban Environments.” <i>2011 Eighth International Conference on Wireless On-Demand Network Systems and Services</i>, 2011, doi:<a href=\"https://doi.org/10.1109/wons.2011.5720204\">10.1109/wons.2011.5720204</a>.","bibtex":"@inproceedings{Sommer_Eckhoff_German_Dressler_2011, title={A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments}, DOI={<a href=\"https://doi.org/10.1109/wons.2011.5720204\">10.1109/wons.2011.5720204</a>}, booktitle={2011 Eighth International Conference on Wireless On-Demand Network Systems and Services}, author={Sommer, Christoph and Eckhoff, D and German, R and Dressler, F}, year={2011} }","apa":"Sommer, C., Eckhoff, D., German, R., &#38; Dressler, F. (2011). A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments. In <i>2011 Eighth International Conference on Wireless On-Demand Network Systems and Services</i>. <a href=\"https://doi.org/10.1109/wons.2011.5720204\">https://doi.org/10.1109/wons.2011.5720204</a>"},"year":"2011","date_created":"2019-07-18T09:55:26Z","author":[{"id":"49154","full_name":"Sommer, Christoph","last_name":"Sommer","orcid":"0000-0002-4336-7350","first_name":"Christoph"},{"last_name":"Eckhoff","full_name":"Eckhoff, D","first_name":"D"},{"last_name":"German","full_name":"German, R","first_name":"R"},{"first_name":"F","last_name":"Dressler","full_name":"Dressler, F"}],"date_updated":"2022-01-06T06:51:16Z","doi":"10.1109/wons.2011.5720204","title":"A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments","publication":"2011 Eighth International Conference on Wireless On-Demand Network Systems and Services","type":"conference","status":"public","department":[{"_id":"589"}],"user_id":"49154","_id":"12062","language":[{"iso":"eng"}]},{"status":"public","type":"journal_article","publication":"IEEE Communications Magazine","language":[{"iso":"eng"}],"user_id":"49154","department":[{"_id":"589"}],"_id":"12063","citation":{"apa":"Sommer, C., Tonguz, O., &#38; Dressler, F. (2011). Traffic information systems: efficient message dissemination via adaptive beaconing. <i>IEEE Communications Magazine</i>, 173–179. <a href=\"https://doi.org/10.1109/mcom.2011.5762815\">https://doi.org/10.1109/mcom.2011.5762815</a>","short":"C. Sommer, O. Tonguz, F. Dressler, IEEE Communications Magazine (2011) 173–179.","mla":"Sommer, Christoph, et al. “Traffic Information Systems: Efficient Message Dissemination via Adaptive Beaconing.” <i>IEEE Communications Magazine</i>, 2011, pp. 173–79, doi:<a href=\"https://doi.org/10.1109/mcom.2011.5762815\">10.1109/mcom.2011.5762815</a>.","bibtex":"@article{Sommer_Tonguz_Dressler_2011, title={Traffic information systems: efficient message dissemination via adaptive beaconing}, DOI={<a href=\"https://doi.org/10.1109/mcom.2011.5762815\">10.1109/mcom.2011.5762815</a>}, journal={IEEE Communications Magazine}, author={Sommer, Christoph and Tonguz, Ozan and Dressler, Falko}, year={2011}, pages={173–179} }","ama":"Sommer C, Tonguz O, Dressler F. Traffic information systems: efficient message dissemination via adaptive beaconing. <i>IEEE Communications Magazine</i>. 2011:173-179. doi:<a href=\"https://doi.org/10.1109/mcom.2011.5762815\">10.1109/mcom.2011.5762815</a>","ieee":"C. Sommer, O. Tonguz, and F. Dressler, “Traffic information systems: efficient message dissemination via adaptive beaconing,” <i>IEEE Communications Magazine</i>, pp. 173–179, 2011.","chicago":"Sommer, Christoph, Ozan Tonguz, and Falko Dressler. “Traffic Information Systems: Efficient Message Dissemination via Adaptive Beaconing.” <i>IEEE Communications Magazine</i>, 2011, 173–79. <a href=\"https://doi.org/10.1109/mcom.2011.5762815\">https://doi.org/10.1109/mcom.2011.5762815</a>."},"page":"173-179","year":"2011","publication_status":"published","publication_identifier":{"issn":["0163-6804"]},"doi":"10.1109/mcom.2011.5762815","title":"Traffic information systems: efficient message dissemination via adaptive beaconing","date_created":"2019-07-18T09:55:29Z","author":[{"orcid":"0000-0002-4336-7350","last_name":"Sommer","id":"49154","full_name":"Sommer, Christoph","first_name":"Christoph"},{"full_name":"Tonguz, Ozan","last_name":"Tonguz","first_name":"Ozan"},{"first_name":"Falko","full_name":"Dressler, Falko","last_name":"Dressler"}],"date_updated":"2022-01-06T06:51:16Z"},{"year":"2011","place":"New Delhi, India","page":"285-290","citation":{"mla":"Cook, Alejandro, et al. “Diagnostic Test of Robust Circuits.” <i>20th IEEE Asian Test Symposium (ATS’11)</i>, IEEE, 2011, pp. 285–90, doi:<a href=\"https://doi.org/10.1109/ats.2011.55\">10.1109/ats.2011.55</a>.","bibtex":"@inproceedings{Cook_Hellebrand_Indlekofer_Wunderlich_2011, place={New Delhi, India}, title={Diagnostic Test of Robust Circuits}, DOI={<a href=\"https://doi.org/10.1109/ats.2011.55\">10.1109/ats.2011.55</a>}, booktitle={20th IEEE Asian Test Symposium (ATS’11)}, publisher={IEEE}, author={Cook, Alejandro and Hellebrand, Sybille and Indlekofer, Thomas and Wunderlich, Hans-Joachim}, year={2011}, pages={285–290} }","short":"A. Cook, S. Hellebrand, T. Indlekofer, H.-J. Wunderlich, in: 20th IEEE Asian Test Symposium (ATS’11), IEEE, New Delhi, India, 2011, pp. 285–290.","apa":"Cook, A., Hellebrand, S., Indlekofer, T., &#38; Wunderlich, H.-J. (2011). Diagnostic Test of Robust Circuits. In <i>20th IEEE Asian Test Symposium (ATS’11)</i> (pp. 285–290). New Delhi, India: IEEE. <a href=\"https://doi.org/10.1109/ats.2011.55\">https://doi.org/10.1109/ats.2011.55</a>","ama":"Cook A, Hellebrand S, Indlekofer T, Wunderlich H-J. Diagnostic Test of Robust Circuits. In: <i>20th IEEE Asian Test Symposium (ATS’11)</i>. New Delhi, India: IEEE; 2011:285-290. doi:<a href=\"https://doi.org/10.1109/ats.2011.55\">10.1109/ats.2011.55</a>","chicago":"Cook, Alejandro, Sybille Hellebrand, Thomas Indlekofer, and Hans-Joachim Wunderlich. “Diagnostic Test of Robust Circuits.” In <i>20th IEEE Asian Test Symposium (ATS’11)</i>, 285–90. New Delhi, India: IEEE, 2011. <a href=\"https://doi.org/10.1109/ats.2011.55\">https://doi.org/10.1109/ats.2011.55</a>.","ieee":"A. Cook, S. Hellebrand, T. Indlekofer, and H.-J. Wunderlich, “Diagnostic Test of Robust Circuits,” in <i>20th IEEE Asian Test Symposium (ATS’11)</i>, 2011, pp. 285–290."},"publisher":"IEEE","date_updated":"2022-01-06T06:51:27Z","author":[{"last_name":"Cook","full_name":"Cook, Alejandro","first_name":"Alejandro"},{"first_name":"Sybille","orcid":"0000-0002-3717-3939","last_name":"Hellebrand","id":"209","full_name":"Hellebrand, Sybille"},{"first_name":"Thomas","last_name":"Indlekofer","full_name":"Indlekofer, Thomas"},{"full_name":"Wunderlich, Hans-Joachim","last_name":"Wunderlich","first_name":"Hans-Joachim"}],"date_created":"2019-08-28T09:19:22Z","title":"Diagnostic Test of Robust Circuits","doi":"10.1109/ats.2011.55","publication":"20th IEEE Asian Test Symposium (ATS'11)","type":"conference","status":"public","_id":"12982","department":[{"_id":"48"}],"user_id":"209","language":[{"iso":"eng"}]},{"publisher":"IEEE","date_updated":"2022-01-06T06:51:27Z","author":[{"first_name":"Ilia","full_name":"Polian, Ilia","last_name":"Polian"},{"first_name":"Bernd","full_name":"Becker, Bernd","last_name":"Becker"},{"id":"209","full_name":"Hellebrand, Sybille","last_name":"Hellebrand","orcid":"0000-0002-3717-3939","first_name":"Sybille"},{"last_name":"Wunderlich","full_name":"Wunderlich, Hans-Joachim","first_name":"Hans-Joachim"},{"first_name":"Peter","full_name":"Maxwell, Peter","last_name":"Maxwell"}],"date_created":"2019-08-28T09:20:52Z","title":"Towards Variation-Aware Test Methods","doi":"10.1109/ets.2011.51","year":"2011","place":"Trondheim, Norway","citation":{"bibtex":"@inproceedings{Polian_Becker_Hellebrand_Wunderlich_Maxwell_2011, place={Trondheim, Norway}, title={Towards Variation-Aware Test Methods}, DOI={<a href=\"https://doi.org/10.1109/ets.2011.51\">10.1109/ets.2011.51</a>}, booktitle={16th IEEE European Test Symposium Trondheim (ETS’11)}, publisher={IEEE}, author={Polian, Ilia and Becker, Bernd and Hellebrand, Sybille and Wunderlich, Hans-Joachim and Maxwell, Peter}, year={2011} }","short":"I. Polian, B. Becker, S. Hellebrand, H.-J. Wunderlich, P. Maxwell, in: 16th IEEE European Test Symposium Trondheim (ETS’11), IEEE, Trondheim, Norway, 2011.","mla":"Polian, Ilia, et al. “Towards Variation-Aware Test Methods.” <i>16th IEEE European Test Symposium Trondheim (ETS’11)</i>, IEEE, 2011, doi:<a href=\"https://doi.org/10.1109/ets.2011.51\">10.1109/ets.2011.51</a>.","apa":"Polian, I., Becker, B., Hellebrand, S., Wunderlich, H.-J., &#38; Maxwell, P. (2011). Towards Variation-Aware Test Methods. In <i>16th IEEE European Test Symposium Trondheim (ETS’11)</i>. Trondheim, Norway: IEEE. <a href=\"https://doi.org/10.1109/ets.2011.51\">https://doi.org/10.1109/ets.2011.51</a>","chicago":"Polian, Ilia, Bernd Becker, Sybille Hellebrand, Hans-Joachim Wunderlich, and Peter Maxwell. “Towards Variation-Aware Test Methods.” In <i>16th IEEE European Test Symposium Trondheim (ETS’11)</i>. Trondheim, Norway: IEEE, 2011. <a href=\"https://doi.org/10.1109/ets.2011.51\">https://doi.org/10.1109/ets.2011.51</a>.","ieee":"I. Polian, B. Becker, S. Hellebrand, H.-J. Wunderlich, and P. Maxwell, “Towards Variation-Aware Test Methods,” in <i>16th IEEE European Test Symposium Trondheim (ETS’11)</i>, 2011.","ama":"Polian I, Becker B, Hellebrand S, Wunderlich H-J, Maxwell P. Towards Variation-Aware Test Methods. In: <i>16th IEEE European Test Symposium Trondheim (ETS’11)</i>. Trondheim, Norway: IEEE; 2011. doi:<a href=\"https://doi.org/10.1109/ets.2011.51\">10.1109/ets.2011.51</a>"},"_id":"12984","user_id":"209","department":[{"_id":"48"}],"alternative_title":["Embedded Tutorial"],"language":[{"iso":"eng"}],"type":"conference","publication":"16th IEEE European Test Symposium Trondheim (ETS'11)","status":"public"},{"type":"conference","publication":"Koli Calling","status":"public","user_id":"21145","department":[{"_id":"67"}],"_id":"15672","language":[{"iso":"eng"}],"extern":"1","citation":{"mla":"Busjahn, Teresa, et al. “Analysis of Code Reading to Gain More Insight in Program Comprehension.” <i>Koli Calling</i>, ACM, 2011, pp. 1–9.","short":"T. Busjahn, C. Schulte, A. Busjahn, in: Koli Calling, ACM, 2011, pp. 1–9.","bibtex":"@inproceedings{Busjahn_Schulte_Busjahn_2011, title={Analysis of code reading to gain more insight in program comprehension}, booktitle={Koli Calling}, publisher={ACM}, author={Busjahn, Teresa and Schulte, Carsten and Busjahn, Andreas}, year={2011}, pages={1–9} }","apa":"Busjahn, T., Schulte, C., &#38; Busjahn, A. (2011). Analysis of code reading to gain more insight in program comprehension. In <i>Koli Calling</i> (pp. 1–9). ACM.","ieee":"T. Busjahn, C. Schulte, and A. Busjahn, “Analysis of code reading to gain more insight in program comprehension,” in <i>Koli Calling</i>, 2011, pp. 1–9.","chicago":"Busjahn, Teresa, Carsten Schulte, and Andreas Busjahn. “Analysis of Code Reading to Gain More Insight in Program Comprehension.” In <i>Koli Calling</i>, 1–9. ACM, 2011.","ama":"Busjahn T, Schulte C, Busjahn A. Analysis of code reading to gain more insight in program comprehension. In: <i>Koli Calling</i>. ACM; 2011:1-9."},"page":"1-9","year":"2011","author":[{"last_name":"Busjahn","full_name":"Busjahn, Teresa","first_name":"Teresa"},{"last_name":"Schulte","id":"60311","full_name":"Schulte, Carsten","first_name":"Carsten"},{"last_name":"Busjahn","full_name":"Busjahn, Andreas","first_name":"Andreas"}],"date_created":"2020-01-28T10:29:12Z","publisher":"ACM","date_updated":"2022-01-06T06:52:31Z","title":"Analysis of code reading to gain more insight in program comprehension"},{"extern":"1","language":[{"iso":"eng"}],"_id":"15673","department":[{"_id":"67"}],"user_id":"21145","status":"public","publication":"Koli Calling","type":"conference","title":"ProspectiveTeachers@Research: CS teacher education revised","publisher":"ACM","date_updated":"2022-01-06T06:52:31Z","author":[{"last_name":"Hornung","full_name":"Hornung, Malte","first_name":"Malte"},{"id":"60311","full_name":"Schulte, Carsten","last_name":"Schulte","first_name":"Carsten"}],"date_created":"2020-01-28T10:29:13Z","year":"2011","page":"138-143","citation":{"apa":"Hornung, M., &#38; Schulte, C. (2011). ProspectiveTeachers@Research: CS teacher education revised. In <i>Koli Calling</i> (pp. 138–143). ACM.","mla":"Hornung, Malte, and Carsten Schulte. “ProspectiveTeachers@Research: CS Teacher Education Revised.” <i>Koli Calling</i>, ACM, 2011, pp. 138–43.","bibtex":"@inproceedings{Hornung_Schulte_2011, title={ProspectiveTeachers@Research: CS teacher education revised}, booktitle={Koli Calling}, publisher={ACM}, author={Hornung, Malte and Schulte, Carsten}, year={2011}, pages={138–143} }","short":"M. Hornung, C. Schulte, in: Koli Calling, ACM, 2011, pp. 138–143.","ama":"Hornung M, Schulte C. ProspectiveTeachers@Research: CS teacher education revised. In: <i>Koli Calling</i>. ACM; 2011:138-143.","ieee":"M. Hornung and C. Schulte, “ProspectiveTeachers@Research: CS teacher education revised,” in <i>Koli Calling</i>, 2011, pp. 138–143.","chicago":"Hornung, Malte, and Carsten Schulte. “ProspectiveTeachers@Research: CS Teacher Education Revised.” In <i>Koli Calling</i>, 138–43. ACM, 2011."}},{"publication":"INFOS","type":"conference","status":"public","_id":"15674","department":[{"_id":"67"}],"user_id":"21145","series_title":"{LNI}","extern":"1","language":[{"iso":"ger"}],"year":"2011","page":"137-146","citation":{"apa":"Kalbitz, M., Voss, H., &#38; Schulte, C. (2011). Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht. In <i>INFOS</i> (Vol. P-189, pp. 137–146). GI.","short":"M. Kalbitz, H. Voss, C. Schulte, in: INFOS, GI, 2011, pp. 137–146.","mla":"Kalbitz, Manuela, et al. “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht.” <i>INFOS</i>, vol. P-189, GI, 2011, pp. 137–46.","bibtex":"@inproceedings{Kalbitz_Voss_Schulte_2011, series={{LNI}}, title={Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht}, volume={P-189}, booktitle={INFOS}, publisher={GI}, author={Kalbitz, Manuela and Voss, Hendrik and Schulte, Carsten}, year={2011}, pages={137–146}, collection={{LNI}} }","chicago":"Kalbitz, Manuela, Hendrik Voss, and Carsten Schulte. “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht.” In <i>INFOS</i>, P-189:137–46. {LNI}. GI, 2011.","ieee":"M. Kalbitz, H. Voss, and C. Schulte, “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht,” in <i>INFOS</i>, 2011, vol. P-189, pp. 137–146.","ama":"Kalbitz M, Voss H, Schulte C. Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht. In: <i>INFOS</i>. Vol P-189. {LNI}. GI; 2011:137-146."},"date_updated":"2022-01-06T06:52:31Z","publisher":"GI","volume":"P-189","date_created":"2020-01-28T10:29:14Z","author":[{"first_name":"Manuela","last_name":"Kalbitz","full_name":"Kalbitz, Manuela"},{"full_name":"Voss, Hendrik","last_name":"Voss","first_name":"Hendrik"},{"first_name":"Carsten","last_name":"Schulte","full_name":"Schulte, Carsten","id":"60311"}],"title":"Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht"},{"status":"public","type":"conference","publication":"INFOS","language":[{"iso":"ger"}],"user_id":"21145","series_title":"{LNI}","department":[{"_id":"67"}],"_id":"15675","citation":{"ama":"Schulte C. Das Schülerlabor als Ort der Informatiklehrerbildung. In: <i>INFOS</i>. Vol P-189. {LNI}. GI; 2011:47-56.","chicago":"Schulte, Carsten. “Das Schülerlabor als Ort der Informatiklehrerbildung.” In <i>INFOS</i>, P-189:47–56. {LNI}. GI, 2011.","ieee":"C. Schulte, “Das Schülerlabor als Ort der Informatiklehrerbildung,” in <i>INFOS</i>, 2011, vol. P-189, pp. 47–56.","bibtex":"@inproceedings{Schulte_2011, series={{LNI}}, title={Das Schülerlabor als Ort der Informatiklehrerbildung}, volume={P-189}, booktitle={INFOS}, publisher={GI}, author={Schulte, Carsten}, year={2011}, pages={47–56}, collection={{LNI}} }","mla":"Schulte, Carsten. “Das Schülerlabor als Ort der Informatiklehrerbildung.” <i>INFOS</i>, vol. P-189, GI, 2011, pp. 47–56.","short":"C. Schulte, in: INFOS, GI, 2011, pp. 47–56.","apa":"Schulte, C. (2011). Das Schülerlabor als Ort der Informatiklehrerbildung. In <i>INFOS</i> (Vol. P-189, pp. 47–56). GI."},"page":"47-56","year":"2011","title":"Das Schülerlabor als Ort der Informatiklehrerbildung","author":[{"full_name":"Schulte, Carsten","id":"60311","last_name":"Schulte","first_name":"Carsten"}],"date_created":"2020-01-28T10:29:16Z","volume":"P-189","publisher":"GI","date_updated":"2022-01-06T06:52:31Z"},{"year":"2011","citation":{"bibtex":"@inproceedings{Dembczynski_Waegeman_Hüllermeier_2011, title={Joint mode estimation in multi-label classification by chaining}, booktitle={In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece}, author={Dembczynski, K. and Waegeman, W. and Hüllermeier, Eyke}, year={2011} }","mla":"Dembczynski, K., et al. “Joint Mode Estimation in Multi-Label Classification by Chaining.” <i>In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece</i>, 2011.","short":"K. Dembczynski, W. Waegeman, E. Hüllermeier, in: In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece, 2011.","apa":"Dembczynski, K., Waegeman, W., &#38; Hüllermeier, E. (2011). Joint mode estimation in multi-label classification by chaining. In <i>In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece</i>.","ama":"Dembczynski K, Waegeman W, Hüllermeier E. Joint mode estimation in multi-label classification by chaining. In: <i>In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece</i>. ; 2011.","chicago":"Dembczynski, K., W. Waegeman, and Eyke Hüllermeier. “Joint Mode Estimation in Multi-Label Classification by Chaining.” In <i>In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece</i>, 2011.","ieee":"K. Dembczynski, W. Waegeman, and E. Hüllermeier, “Joint mode estimation in multi-label classification by chaining,” in <i>In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece</i>, 2011."},"date_updated":"2022-01-06T06:52:32Z","date_created":"2020-02-03T16:30:57Z","author":[{"first_name":"K.","last_name":"Dembczynski","full_name":"Dembczynski, K."},{"first_name":"W.","last_name":"Waegeman","full_name":"Waegeman, W."},{"last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129","first_name":"Eyke"}],"title":"Joint mode estimation in multi-label classification by chaining","publication":"In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece","type":"conference","status":"public","_id":"15762","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"user_id":"49109","language":[{"iso":"eng"}]},{"status":"public","type":"conference","publication":"In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany","language":[{"iso":"eng"}],"user_id":"49109","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"_id":"15764","citation":{"ieee":"M. Mernberger, D. Moog, S. Stork, S. Zauner, U. Maier, and E. Hüllermeier, “Prediction of protein localization for specialized compartments using time series kernels,” in <i>In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany</i>, 2011.","chicago":"Mernberger, M., D. Moog, S. Stork, S. Zauner, U. Maier, and Eyke Hüllermeier. “Prediction of Protein Localization for Specialized Compartments Using Time Series Kernels.” In <i>In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany</i>, 2011.","ama":"Mernberger M, Moog D, Stork S, Zauner S, Maier U, Hüllermeier E. Prediction of protein localization for specialized compartments using time series kernels. In: <i>In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany</i>. ; 2011.","apa":"Mernberger, M., Moog, D., Stork, S., Zauner, S., Maier, U., &#38; Hüllermeier, E. (2011). Prediction of protein localization for specialized compartments using time series kernels. In <i>In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany</i>.","bibtex":"@inproceedings{Mernberger_Moog_Stork_Zauner_Maier_Hüllermeier_2011, title={Prediction of protein localization for specialized compartments using time series kernels}, booktitle={In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany}, author={Mernberger, M. and Moog, D. and Stork, S. and Zauner, S. and Maier, U. and Hüllermeier, Eyke}, year={2011} }","mla":"Mernberger, M., et al. “Prediction of Protein Localization for Specialized Compartments Using Time Series Kernels.” <i>In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany</i>, 2011.","short":"M. Mernberger, D. Moog, S. Stork, S. Zauner, U. Maier, E. Hüllermeier, in: In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011."},"year":"2011","title":"Prediction of protein localization for specialized compartments using time series kernels","author":[{"first_name":"M.","last_name":"Mernberger","full_name":"Mernberger, M."},{"last_name":"Moog","full_name":"Moog, D.","first_name":"D."},{"full_name":"Stork, S.","last_name":"Stork","first_name":"S."},{"first_name":"S.","last_name":"Zauner","full_name":"Zauner, S."},{"first_name":"U.","last_name":"Maier","full_name":"Maier, U."},{"full_name":"Hüllermeier, Eyke","id":"48129","last_name":"Hüllermeier","first_name":"Eyke"}],"date_created":"2020-02-03T16:40:34Z","date_updated":"2022-01-06T06:52:32Z"},{"main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2011/10/22/AmazonSignatureWrapping.pdf"}],"doi":"10.1145/2046660.2046664","title":"All your clouds are belong to us: security analysis of cloud management interfaces","author":[{"orcid":"0000-0002-3593-7720","last_name":"Somorovsky","full_name":"Somorovsky, Juraj","id":"83504","first_name":"Juraj"},{"full_name":"Heiderich, Mario","last_name":"Heiderich","first_name":"Mario"},{"last_name":"Jensen","full_name":"Jensen, Meiko","first_name":"Meiko"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"},{"full_name":"Gruschka, Nils","last_name":"Gruschka","first_name":"Nils"},{"first_name":"Luigi","full_name":"Lo Iacono, Luigi","last_name":"Lo Iacono"}],"date_created":"2020-02-15T09:19:07Z","date_updated":"2022-01-06T06:52:39Z","citation":{"bibtex":"@inproceedings{Somorovsky_Heiderich_Jensen_Schwenk_Gruschka_Lo Iacono_2011, title={All your clouds are belong to us: security analysis of cloud management interfaces}, DOI={<a href=\"https://doi.org/10.1145/2046660.2046664\">10.1145/2046660.2046664</a>}, booktitle={Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11}, author={Somorovsky, Juraj and Heiderich, Mario and Jensen, Meiko and Schwenk, Jörg and Gruschka, Nils and Lo Iacono, Luigi}, year={2011} }","short":"J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011.","mla":"Somorovsky, Juraj, et al. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” <i>Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11</i>, 2011, doi:<a href=\"https://doi.org/10.1145/2046660.2046664\">10.1145/2046660.2046664</a>.","apa":"Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., &#38; Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In <i>Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11</i>. <a href=\"https://doi.org/10.1145/2046660.2046664\">https://doi.org/10.1145/2046660.2046664</a>","ieee":"J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All your clouds are belong to us: security analysis of cloud management interfaces,” in <i>Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11</i>, 2011.","chicago":"Somorovsky, Juraj, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” In <i>Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11</i>, 2011. <a href=\"https://doi.org/10.1145/2046660.2046664\">https://doi.org/10.1145/2046660.2046664</a>.","ama":"Somorovsky J, Heiderich M, Jensen M, Schwenk J, Gruschka N, Lo Iacono L. All your clouds are belong to us: security analysis of cloud management interfaces. In: <i>Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11</i>. ; 2011. doi:<a href=\"https://doi.org/10.1145/2046660.2046664\">10.1145/2046660.2046664</a>"},"year":"2011","publication_status":"published","publication_identifier":{"isbn":["9781450310048"]},"language":[{"iso":"eng"}],"extern":"1","user_id":"83504","_id":"15885","status":"public","type":"conference","publication":"Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11"},{"title":"On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks","doi":"10.1109/iwsscloud.2011.6049019","date_updated":"2022-01-06T06:52:39Z","date_created":"2020-02-15T09:23:35Z","author":[{"last_name":"Jensen","full_name":"Jensen, Meiko","first_name":"Meiko"},{"full_name":"Meyer, Christopher","last_name":"Meyer","first_name":"Christopher"},{"first_name":"Juraj","full_name":"Somorovsky, Juraj","id":"83504","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"year":"2011","citation":{"apa":"Jensen, M., Meyer, C., Somorovsky, J., &#38; Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>. <a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">https://doi.org/10.1109/iwsscloud.2011.6049019</a>","short":"M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk, in: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.","mla":"Jensen, Meiko, et al. “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks.” <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>, 2011, doi:<a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">10.1109/iwsscloud.2011.6049019</a>.","bibtex":"@inproceedings{Jensen_Meyer_Somorovsky_Schwenk_2011, title={On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks}, DOI={<a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">10.1109/iwsscloud.2011.6049019</a>}, booktitle={2011 1st International Workshop on Securing Services on the Cloud (IWSSC)}, author={Jensen, Meiko and Meyer, Christopher and Somorovsky, Juraj and Schwenk, Jörg}, year={2011} }","chicago":"Jensen, Meiko, Christopher Meyer, Juraj Somorovsky, and Jörg Schwenk. “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks.” In <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>, 2011. <a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">https://doi.org/10.1109/iwsscloud.2011.6049019</a>.","ieee":"M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks,” in <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>, 2011.","ama":"Jensen M, Meyer C, Somorovsky J, Schwenk J. On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In: <i>2011 1st International Workshop on Securing Services on the Cloud (IWSSC)</i>. ; 2011. doi:<a href=\"https://doi.org/10.1109/iwsscloud.2011.6049019\">10.1109/iwsscloud.2011.6049019</a>"},"publication_identifier":{"isbn":["9781457711855"]},"publication_status":"published","language":[{"iso":"eng"}],"_id":"15887","user_id":"83504","status":"public","publication":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","type":"conference"},{"_id":"15915","user_id":"83504","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 18th ACM conference on Computer and communications security - CCS '11","status":"public","date_updated":"2022-01-06T06:52:40Z","date_created":"2020-02-15T10:17:17Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager"},{"id":"83504","full_name":"Somorovsky, Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"}],"title":"How to break XML encryption","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2011/10/22/HowToBreakXMLenc.pdf"}],"doi":"10.1145/2046707.2046756","publication_status":"published","publication_identifier":{"isbn":["9781450309486"]},"year":"2011","citation":{"ama":"Jager T, Somorovsky J. How to break XML encryption. In: <i>Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11</i>. ; 2011. doi:<a href=\"https://doi.org/10.1145/2046707.2046756\">10.1145/2046707.2046756</a>","ieee":"T. Jager and J. Somorovsky, “How to break XML encryption,” in <i>Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11</i>, 2011.","chicago":"Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In <i>Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11</i>, 2011. <a href=\"https://doi.org/10.1145/2046707.2046756\">https://doi.org/10.1145/2046707.2046756</a>.","mla":"Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” <i>Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11</i>, 2011, doi:<a href=\"https://doi.org/10.1145/2046707.2046756\">10.1145/2046707.2046756</a>.","bibtex":"@inproceedings{Jager_Somorovsky_2011, title={How to break XML encryption}, DOI={<a href=\"https://doi.org/10.1145/2046707.2046756\">10.1145/2046707.2046756</a>}, booktitle={Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11}, author={Jager, Tibor and Somorovsky, Juraj}, year={2011} }","short":"T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011.","apa":"Jager, T., &#38; Somorovsky, J. (2011). How to break XML encryption. In <i>Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11</i>. <a href=\"https://doi.org/10.1145/2046707.2046756\">https://doi.org/10.1145/2046707.2046756</a>"}}]
