--- _id: '15674' author: - first_name: Manuela full_name: Kalbitz, Manuela last_name: Kalbitz - first_name: Hendrik full_name: Voss, Hendrik last_name: Voss - first_name: Carsten full_name: Schulte, Carsten id: '60311' last_name: Schulte citation: ama: 'Kalbitz M, Voss H, Schulte C. Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht. In: INFOS. Vol P-189. {LNI}. GI; 2011:137-146.' apa: Kalbitz, M., Voss, H., & Schulte, C. (2011). Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht. In INFOS (Vol. P-189, pp. 137–146). GI. bibtex: '@inproceedings{Kalbitz_Voss_Schulte_2011, series={{LNI}}, title={Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht}, volume={P-189}, booktitle={INFOS}, publisher={GI}, author={Kalbitz, Manuela and Voss, Hendrik and Schulte, Carsten}, year={2011}, pages={137–146}, collection={{LNI}} }' chicago: Kalbitz, Manuela, Hendrik Voss, and Carsten Schulte. “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht.” In INFOS, P-189:137–46. {LNI}. GI, 2011. ieee: M. Kalbitz, H. Voss, and C. Schulte, “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht,” in INFOS, 2011, vol. P-189, pp. 137–146. mla: Kalbitz, Manuela, et al. “Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht.” INFOS, vol. P-189, GI, 2011, pp. 137–46. short: 'M. Kalbitz, H. Voss, C. Schulte, in: INFOS, GI, 2011, pp. 137–146.' date_created: 2020-01-28T10:29:14Z date_updated: 2022-01-06T06:52:31Z department: - _id: '67' extern: '1' language: - iso: ger page: 137-146 publication: INFOS publisher: GI series_title: '{LNI}' status: public title: Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht type: conference user_id: '21145' volume: P-189 year: '2011' ... --- _id: '15675' author: - first_name: Carsten full_name: Schulte, Carsten id: '60311' last_name: Schulte citation: ama: 'Schulte C. Das Schülerlabor als Ort der Informatiklehrerbildung. In: INFOS. Vol P-189. {LNI}. GI; 2011:47-56.' apa: Schulte, C. (2011). Das Schülerlabor als Ort der Informatiklehrerbildung. In INFOS (Vol. P-189, pp. 47–56). GI. bibtex: '@inproceedings{Schulte_2011, series={{LNI}}, title={Das Schülerlabor als Ort der Informatiklehrerbildung}, volume={P-189}, booktitle={INFOS}, publisher={GI}, author={Schulte, Carsten}, year={2011}, pages={47–56}, collection={{LNI}} }' chicago: Schulte, Carsten. “Das Schülerlabor als Ort der Informatiklehrerbildung.” In INFOS, P-189:47–56. {LNI}. GI, 2011. ieee: C. Schulte, “Das Schülerlabor als Ort der Informatiklehrerbildung,” in INFOS, 2011, vol. P-189, pp. 47–56. mla: Schulte, Carsten. “Das Schülerlabor als Ort der Informatiklehrerbildung.” INFOS, vol. P-189, GI, 2011, pp. 47–56. short: 'C. Schulte, in: INFOS, GI, 2011, pp. 47–56.' date_created: 2020-01-28T10:29:16Z date_updated: 2022-01-06T06:52:31Z department: - _id: '67' language: - iso: ger page: 47-56 publication: INFOS publisher: GI series_title: '{LNI}' status: public title: Das Schülerlabor als Ort der Informatiklehrerbildung type: conference user_id: '21145' volume: P-189 year: '2011' ... --- _id: '15762' author: - first_name: K. full_name: Dembczynski, K. last_name: Dembczynski - first_name: W. full_name: Waegeman, W. last_name: Waegeman - first_name: Eyke full_name: Hüllermeier, Eyke id: '48129' last_name: Hüllermeier citation: ama: 'Dembczynski K, Waegeman W, Hüllermeier E. Joint mode estimation in multi-label classification by chaining. In: In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece. ; 2011.' apa: Dembczynski, K., Waegeman, W., & Hüllermeier, E. (2011). Joint mode estimation in multi-label classification by chaining. In In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece. bibtex: '@inproceedings{Dembczynski_Waegeman_Hüllermeier_2011, title={Joint mode estimation in multi-label classification by chaining}, booktitle={In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece}, author={Dembczynski, K. and Waegeman, W. and Hüllermeier, Eyke}, year={2011} }' chicago: Dembczynski, K., W. Waegeman, and Eyke Hüllermeier. “Joint Mode Estimation in Multi-Label Classification by Chaining.” In In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece, 2011. ieee: K. Dembczynski, W. Waegeman, and E. Hüllermeier, “Joint mode estimation in multi-label classification by chaining,” in In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece, 2011. mla: Dembczynski, K., et al. “Joint Mode Estimation in Multi-Label Classification by Chaining.” In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece, 2011. short: 'K. Dembczynski, W. Waegeman, E. Hüllermeier, in: In Proceedings ECML Workshop on Collective Inference and Learning on Structured Data, Athens, Greece, 2011.' date_created: 2020-02-03T16:30:57Z date_updated: 2022-01-06T06:52:32Z department: - _id: '34' - _id: '7' - _id: '355' language: - iso: eng publication: In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece status: public title: Joint mode estimation in multi-label classification by chaining type: conference user_id: '49109' year: '2011' ... --- _id: '15764' author: - first_name: M. full_name: Mernberger, M. last_name: Mernberger - first_name: D. full_name: Moog, D. last_name: Moog - first_name: S. full_name: Stork, S. last_name: Stork - first_name: S. full_name: Zauner, S. last_name: Zauner - first_name: U. full_name: Maier, U. last_name: Maier - first_name: Eyke full_name: Hüllermeier, Eyke id: '48129' last_name: Hüllermeier citation: ama: 'Mernberger M, Moog D, Stork S, Zauner S, Maier U, Hüllermeier E. Prediction of protein localization for specialized compartments using time series kernels. In: In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany. ; 2011.' apa: Mernberger, M., Moog, D., Stork, S., Zauner, S., Maier, U., & Hüllermeier, E. (2011). Prediction of protein localization for specialized compartments using time series kernels. In In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany. bibtex: '@inproceedings{Mernberger_Moog_Stork_Zauner_Maier_Hüllermeier_2011, title={Prediction of protein localization for specialized compartments using time series kernels}, booktitle={In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany}, author={Mernberger, M. and Moog, D. and Stork, S. and Zauner, S. and Maier, U. and Hüllermeier, Eyke}, year={2011} }' chicago: Mernberger, M., D. Moog, S. Stork, S. Zauner, U. Maier, and Eyke Hüllermeier. “Prediction of Protein Localization for Specialized Compartments Using Time Series Kernels.” In In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011. ieee: M. Mernberger, D. Moog, S. Stork, S. Zauner, U. Maier, and E. Hüllermeier, “Prediction of protein localization for specialized compartments using time series kernels,” in In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011. mla: Mernberger, M., et al. “Prediction of Protein Localization for Specialized Compartments Using Time Series Kernels.” In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011. short: 'M. Mernberger, D. Moog, S. Stork, S. Zauner, U. Maier, E. Hüllermeier, in: In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany, 2011.' date_created: 2020-02-03T16:40:34Z date_updated: 2022-01-06T06:52:32Z department: - _id: '34' - _id: '7' - _id: '355' language: - iso: eng publication: In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany status: public title: Prediction of protein localization for specialized compartments using time series kernels type: conference user_id: '49109' year: '2011' ... --- _id: '15885' author: - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 - first_name: Mario full_name: Heiderich, Mario last_name: Heiderich - first_name: Meiko full_name: Jensen, Meiko last_name: Jensen - first_name: Jörg full_name: Schwenk, Jörg last_name: Schwenk - first_name: Nils full_name: Gruschka, Nils last_name: Gruschka - first_name: Luigi full_name: Lo Iacono, Luigi last_name: Lo Iacono citation: ama: 'Somorovsky J, Heiderich M, Jensen M, Schwenk J, Gruschka N, Lo Iacono L. All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11. ; 2011. doi:10.1145/2046660.2046664' apa: 'Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., & Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11. https://doi.org/10.1145/2046660.2046664' bibtex: '@inproceedings{Somorovsky_Heiderich_Jensen_Schwenk_Gruschka_Lo Iacono_2011, title={All your clouds are belong to us: security analysis of cloud management interfaces}, DOI={10.1145/2046660.2046664}, booktitle={Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11}, author={Somorovsky, Juraj and Heiderich, Mario and Jensen, Meiko and Schwenk, Jörg and Gruschka, Nils and Lo Iacono, Luigi}, year={2011} }' chicago: 'Somorovsky, Juraj, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” In Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011. https://doi.org/10.1145/2046660.2046664.' ieee: 'J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All your clouds are belong to us: security analysis of cloud management interfaces,” in Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11, 2011.' mla: 'Somorovsky, Juraj, et al. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011, doi:10.1145/2046660.2046664.' short: 'J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011.' date_created: 2020-02-15T09:19:07Z date_updated: 2022-01-06T06:52:39Z doi: 10.1145/2046660.2046664 extern: '1' language: - iso: eng main_file_link: - url: https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2011/10/22/AmazonSignatureWrapping.pdf publication: Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11 publication_identifier: isbn: - '9781450310048' publication_status: published status: public title: 'All your clouds are belong to us: security analysis of cloud management interfaces' type: conference user_id: '83504' year: '2011' ... --- _id: '15887' author: - first_name: Meiko full_name: Jensen, Meiko last_name: Jensen - first_name: Christopher full_name: Meyer, Christopher last_name: Meyer - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 - first_name: Jörg full_name: Schwenk, Jörg last_name: Schwenk citation: ama: 'Jensen M, Meyer C, Somorovsky J, Schwenk J. On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). ; 2011. doi:10.1109/iwsscloud.2011.6049019' apa: Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). https://doi.org/10.1109/iwsscloud.2011.6049019 bibtex: '@inproceedings{Jensen_Meyer_Somorovsky_Schwenk_2011, title={On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks}, DOI={10.1109/iwsscloud.2011.6049019}, booktitle={2011 1st International Workshop on Securing Services on the Cloud (IWSSC)}, author={Jensen, Meiko and Meyer, Christopher and Somorovsky, Juraj and Schwenk, Jörg}, year={2011} }' chicago: Jensen, Meiko, Christopher Meyer, Juraj Somorovsky, and Jörg Schwenk. “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks.” In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011. https://doi.org/10.1109/iwsscloud.2011.6049019. ieee: M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks,” in 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011. mla: Jensen, Meiko, et al. “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks.” 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011, doi:10.1109/iwsscloud.2011.6049019. short: 'M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk, in: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011.' date_created: 2020-02-15T09:23:35Z date_updated: 2022-01-06T06:52:39Z doi: 10.1109/iwsscloud.2011.6049019 language: - iso: eng publication: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC) publication_identifier: isbn: - '9781457711855' publication_status: published status: public title: On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks type: conference user_id: '83504' year: '2011' ... --- _id: '15915' author: - first_name: Tibor full_name: Jager, Tibor last_name: Jager - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 citation: ama: 'Jager T, Somorovsky J. How to break XML encryption. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11. ; 2011. doi:10.1145/2046707.2046756' apa: Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11. https://doi.org/10.1145/2046707.2046756 bibtex: '@inproceedings{Jager_Somorovsky_2011, title={How to break XML encryption}, DOI={10.1145/2046707.2046756}, booktitle={Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11}, author={Jager, Tibor and Somorovsky, Juraj}, year={2011} }' chicago: Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011. https://doi.org/10.1145/2046707.2046756. ieee: T. Jager and J. Somorovsky, “How to break XML encryption,” in Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11, 2011. mla: Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011, doi:10.1145/2046707.2046756. short: 'T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011.' date_created: 2020-02-15T10:17:17Z date_updated: 2022-01-06T06:52:40Z doi: 10.1145/2046707.2046756 extern: '1' language: - iso: eng main_file_link: - url: https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2011/10/22/HowToBreakXMLenc.pdf publication: Proceedings of the 18th ACM conference on Computer and communications security - CCS '11 publication_identifier: isbn: - '9781450309486' publication_status: published status: public title: How to break XML encryption type: conference user_id: '83504' year: '2011' ... --- _id: '15916' author: - first_name: Christopher full_name: Meyer, Christopher last_name: Meyer - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 - first_name: Benedikt full_name: Driessen, Benedikt last_name: Driessen - first_name: Jörg full_name: Schwenk, Jörg last_name: Schwenk - first_name: Thang full_name: Tran, Thang last_name: Tran - first_name: Christian full_name: Wietfeld, Christian last_name: Wietfeld citation: ama: 'Meyer C, Somorovsky J, Driessen B, Schwenk J, Tran T, Wietfeld C. Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage. In: ; 2011.' apa: 'Meyer, C., Somorovsky, J., Driessen, B., Schwenk, J., Tran, T., & Wietfeld, C. (2011). Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage.' bibtex: '@inproceedings{Meyer_Somorovsky_Driessen_Schwenk_Tran_Wietfeld_2011, title={Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage}, author={Meyer, Christopher and Somorovsky, Juraj and Driessen, Benedikt and Schwenk, Jörg and Tran, Thang and Wietfeld, Christian}, year={2011} }' chicago: 'Meyer, Christopher, Juraj Somorovsky, Benedikt Driessen, Jörg Schwenk, Thang Tran, and Christian Wietfeld. “Sec2: Ein Mobiles Nutzer-Kontrolliertes Sicherheitskonzept Für Cloud-Storage,” 2011.' ieee: 'C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, and C. Wietfeld, “Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage,” 2011.' mla: 'Meyer, Christopher, et al. Sec2: Ein Mobiles Nutzer-Kontrolliertes Sicherheitskonzept Für Cloud-Storage. 2011.' short: 'C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, C. Wietfeld, in: 2011.' date_created: 2020-02-15T10:19:15Z date_updated: 2022-01-06T06:52:40Z language: - iso: eng status: public title: 'Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage' type: conference user_id: '83504' year: '2011' ... --- _id: '15046' author: - first_name: Stephan full_name: Arens, Stephan last_name: Arens - first_name: Gitta full_name: Domik, Gitta id: '90' last_name: Domik citation: ama: 'Arens S, Domik G. Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern. In: INFORMATIK 2011 – 41. Jahrestagung Der Gesellschaft Für Informatik. Bonn: Gesellschaft für Informatik e.V.; 2011:347-352.' apa: 'Arens, S., & Domik, G. (2011). Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern. In INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik. (pp. 347–352). Bonn: Gesellschaft für Informatik e.V.' bibtex: '@inproceedings{Arens_Domik_2011, place={Bonn}, title={Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern.}, number={324}, booktitle={INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik.}, publisher={Gesellschaft für Informatik e.V.}, author={Arens, Stephan and Domik, Gitta}, year={2011}, pages={347–352} }' chicago: 'Arens, Stephan, and Gitta Domik. “Volume Studio: Flexible Multi-Volume Ray Casting Pipeline Mit Nahtlos Integriertem Rapid Prototyping von Shadern.” In INFORMATIK 2011 – 41. Jahrestagung Der Gesellschaft Für Informatik., 347–52. Bonn: Gesellschaft für Informatik e.V., 2011.' ieee: 'S. Arens and G. Domik, “Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern.,” in INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik., 2011, no. 324, pp. 347–352.' mla: 'Arens, Stephan, and Gitta Domik. “Volume Studio: Flexible Multi-Volume Ray Casting Pipeline Mit Nahtlos Integriertem Rapid Prototyping von Shadern.” INFORMATIK 2011 – 41. Jahrestagung Der Gesellschaft Für Informatik., no. 324, Gesellschaft für Informatik e.V., 2011, pp. 347–52.' short: 'S. Arens, G. Domik, in: INFORMATIK 2011 – 41. Jahrestagung Der Gesellschaft Für Informatik., Gesellschaft für Informatik e.V., Bonn, 2011, pp. 347–352.' date_created: 2019-11-20T08:11:38Z date_updated: 2022-01-06T06:52:15Z department: - _id: '65' issue: '324' language: - iso: eng page: 347-352 place: Bonn publication: INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik. publication_identifier: isbn: - 978-88579-286-4 publisher: Gesellschaft für Informatik e.V. status: public title: 'Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern.' type: conference user_id: '90' year: '2011' ... --- _id: '15097' author: - first_name: Markus full_name: Benter, Markus last_name: Benter - first_name: Stefan full_name: Böttcher, Stefan id: '624' last_name: Böttcher - first_name: Rita full_name: Hartel, Rita id: '14961' last_name: Hartel citation: ama: 'Benter M, Böttcher S, Hartel R. Mixing Bottom-Up and Top-Down XPath Query Evaluation. In: East European Conference on Advances in Databases and Information Systems. Springer; 2011:27-41. doi:10.1007/978-3-642-23737-9_3' apa: Benter, M., Böttcher, S., & Hartel, R. (2011). Mixing Bottom-Up and Top-Down XPath Query Evaluation. In East European Conference on Advances in Databases and Information Systems (pp. 27–41). Springer. https://doi.org/10.1007/978-3-642-23737-9_3 bibtex: '@inproceedings{Benter_Böttcher_Hartel_2011, title={Mixing Bottom-Up and Top-Down XPath Query Evaluation}, DOI={10.1007/978-3-642-23737-9_3}, booktitle={East European Conference on Advances in Databases and Information Systems}, publisher={Springer}, author={Benter, Markus and Böttcher, Stefan and Hartel, Rita}, year={2011}, pages={27–41} }' chicago: Benter, Markus, Stefan Böttcher, and Rita Hartel. “Mixing Bottom-Up and Top-Down XPath Query Evaluation.” In East European Conference on Advances in Databases and Information Systems, 27–41. Springer, 2011. https://doi.org/10.1007/978-3-642-23737-9_3. ieee: M. Benter, S. Böttcher, and R. Hartel, “Mixing Bottom-Up and Top-Down XPath Query Evaluation,” in East European Conference on Advances in Databases and Information Systems, 2011, pp. 27–41. mla: Benter, Markus, et al. “Mixing Bottom-Up and Top-Down XPath Query Evaluation.” East European Conference on Advances in Databases and Information Systems, Springer, 2011, pp. 27–41, doi:10.1007/978-3-642-23737-9_3. short: 'M. Benter, S. Böttcher, R. Hartel, in: East European Conference on Advances in Databases and Information Systems, Springer, 2011, pp. 27–41.' date_created: 2019-11-21T15:27:31Z date_updated: 2022-01-06T06:52:15Z department: - _id: '69' doi: 10.1007/978-3-642-23737-9_3 language: - iso: eng page: 27-41 publication: East European Conference on Advances in Databases and Information Systems publication_identifier: isbn: - '9783642237362' - '9783642237379' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer status: public title: Mixing Bottom-Up and Top-Down XPath Query Evaluation type: conference user_id: '14961' year: '2011' ...