[{"publication":"Learning from errors at school and at work","department":[{"_id":"452"}],"author":[{"first_name":"Christian","full_name":"Harteis, Christian","orcid":"https://orcid.org/0000-0002-3570-7626","last_name":"Harteis","id":"27503"},{"first_name":"Katrin","full_name":"Buschmeyer, Katrin","last_name":"Buschmeyer"}],"publisher":"Barbara Budrich","editor":[{"last_name":"Wuttke","first_name":"Eveline","full_name":"Wuttke, Eveline"},{"full_name":"Seifried, Jürgen","first_name":"Jürgen","last_name":"Seifried"}],"date_created":"2018-07-26T09:32:05Z","status":"public","place":"Opladen","title":"Learning from mistakes - still a challenge for research and business practice","user_id":"27503","page":"31-47","year":"2012","citation":{"ieee":"C. Harteis and K. Buschmeyer, “Learning from mistakes - still a challenge for research and business practice,” in Learning from errors at school and at work, E. Wuttke and J. Seifried, Eds. Opladen: Barbara Budrich, 2012, pp. 31–47.","short":"C. Harteis, K. Buschmeyer, in: E. Wuttke, J. Seifried (Eds.), Learning from Errors at School and at Work, Barbara Budrich, Opladen, 2012, pp. 31–47.","mla":"Harteis, Christian, and Katrin Buschmeyer. “Learning from Mistakes - Still a Challenge for Research and Business Practice.” Learning from Errors at School and at Work, edited by Eveline Wuttke and Jürgen Seifried, Barbara Budrich, 2012, pp. 31–47.","bibtex":"@inbook{Harteis_Buschmeyer_2012, place={Opladen}, title={Learning from mistakes - still a challenge for research and business practice}, booktitle={Learning from errors at school and at work}, publisher={Barbara Budrich}, author={Harteis, Christian and Buschmeyer, Katrin}, editor={Wuttke, Eveline and Seifried, JürgenEditors}, year={2012}, pages={31–47} }","chicago":"Harteis, Christian, and Katrin Buschmeyer. “Learning from Mistakes - Still a Challenge for Research and Business Practice.” In Learning from Errors at School and at Work, edited by Eveline Wuttke and Jürgen Seifried, 31–47. Opladen: Barbara Budrich, 2012.","apa":"Harteis, C., & Buschmeyer, K. (2012). Learning from mistakes - still a challenge for research and business practice. In E. Wuttke & J. Seifried (Eds.), Learning from errors at school and at work (pp. 31–47). Opladen: Barbara Budrich.","ama":"Harteis C, Buschmeyer K. Learning from mistakes - still a challenge for research and business practice. In: Wuttke E, Seifried J, eds. Learning from Errors at School and at Work. Opladen: Barbara Budrich; 2012:31-47."},"type":"book_chapter","date_updated":"2022-01-06T06:59:31Z","_id":"3716"},{"author":[{"last_name":"Harteis","id":"27503","first_name":"Christian","full_name":"Harteis, Christian","orcid":"https://orcid.org/0000-0002-3570-7626"},{"last_name":"Frost","full_name":"Frost, Franziska","first_name":"Franziska"}],"department":[{"_id":"452"}],"publication":"Human fallibility. The ambiguity of errors for work and learning","status":"public","date_created":"2018-07-26T10:23:01Z","editor":[{"last_name":"Bauer","full_name":"Bauer, Johannes","first_name":"Johannes"},{"last_name":"Harteis","full_name":"Harteis, Christian","first_name":"Christian"}],"user_id":"27503","title":"Error orientation and intuitive decision making","type":"book_chapter","year":"2012","citation":{"chicago":"Harteis, Christian, and Franziska Frost. “Error Orientation and Intuitive Decision Making.” In Human Fallibility. The Ambiguity of Errors for Work and Learning, edited by Johannes Bauer and Christian Harteis, 141–53, 2012.","ama":"Harteis C, Frost F. Error orientation and intuitive decision making. In: Bauer J, Harteis C, eds. Human Fallibility. The Ambiguity of Errors for Work and Learning. ; 2012:141-153.","apa":"Harteis, C., & Frost, F. (2012). Error orientation and intuitive decision making. In J. Bauer & C. Harteis (Eds.), Human fallibility. The ambiguity of errors for work and learning (pp. 141–153).","mla":"Harteis, Christian, and Franziska Frost. “Error Orientation and Intuitive Decision Making.” Human Fallibility. The Ambiguity of Errors for Work and Learning, edited by Johannes Bauer and Christian Harteis, 2012, pp. 141–53.","bibtex":"@inbook{Harteis_Frost_2012, title={Error orientation and intuitive decision making}, booktitle={Human fallibility. The ambiguity of errors for work and learning}, author={Harteis, Christian and Frost, Franziska}, editor={Bauer, Johannes and Harteis, ChristianEditors}, year={2012}, pages={141–153} }","short":"C. Harteis, F. Frost, in: J. Bauer, C. Harteis (Eds.), Human Fallibility. The Ambiguity of Errors for Work and Learning, 2012, pp. 141–153.","ieee":"C. Harteis and F. Frost, “Error orientation and intuitive decision making,” in Human fallibility. The ambiguity of errors for work and learning, J. Bauer and C. Harteis, Eds. 2012, pp. 141–153."},"page":"141-153","_id":"3717","date_updated":"2022-01-06T06:59:31Z"},{"publication":"Proceedings of COLING 2012: Posters","department":[{"_id":"600"}],"author":[{"id":"3900","last_name":"Wachsmuth","full_name":"Wachsmuth, Henning","first_name":"Henning"},{"last_name":"Stein","first_name":"Benno","full_name":"Stein, Benno"}],"date_created":"2018-08-02T13:38:37Z","status":"public","user_id":"82920","title":"Optimal Scheduling of Information Extraction Algorithms","main_file_link":[{"url":"https://www.aclweb.org/anthology/C12-2125.pdf"}],"language":[{"iso":"eng"}],"page":"1281-1290","year":"2012","citation":{"ieee":"H. Wachsmuth and B. Stein, “Optimal Scheduling of Information Extraction Algorithms,” in Proceedings of COLING 2012: Posters, 2012, pp. 1281–1290.","short":"H. Wachsmuth, B. Stein, in: Proceedings of COLING 2012: Posters, 2012, pp. 1281–1290.","mla":"Wachsmuth, Henning, and Benno Stein. “Optimal Scheduling of Information Extraction Algorithms.” Proceedings of COLING 2012: Posters, 2012, pp. 1281–90.","bibtex":"@inproceedings{Wachsmuth_Stein_2012, title={Optimal Scheduling of Information Extraction Algorithms}, booktitle={Proceedings of COLING 2012: Posters}, author={Wachsmuth, Henning and Stein, Benno}, year={2012}, pages={1281–1290} }","ama":"Wachsmuth H, Stein B. Optimal Scheduling of Information Extraction Algorithms. In: Proceedings of COLING 2012: Posters. ; 2012:1281-1290.","apa":"Wachsmuth, H., & Stein, B. (2012). Optimal Scheduling of Information Extraction Algorithms. In Proceedings of COLING 2012: Posters (pp. 1281–1290).","chicago":"Wachsmuth, Henning, and Benno Stein. “Optimal Scheduling of Information Extraction Algorithms.” In Proceedings of COLING 2012: Posters, 1281–90, 2012."},"type":"conference","_id":"3812","date_updated":"2022-01-06T06:59:37Z"},{"extern":"1","place":"Wiesbaden","title":"Jahrbuch Medienpädagogik 9. Qualitätsentwicklung in der Schule und medienpädagogische Professionalisierung","user_id":"50923","department":[{"_id":"462"}],"publisher":"VS Verlag für Sozialwissenschaften","editor":[{"first_name":"Renate","full_name":"Schulz-Zander, Renate","last_name":"Schulz-Zander"},{"first_name":"Birgit","full_name":"Eickelmann, Birgit","last_name":"Eickelmann","id":"40387"},{"first_name":"Heinz","full_name":"Moser, Heinz","last_name":"Moser"},{"full_name":"Niesyto, Horst","first_name":"Horst","last_name":"Niesyto"},{"last_name":"Grell","full_name":"Grell, Petra","first_name":"Petra"}],"date_created":"2021-12-15T10:15:44Z","status":"public","date_updated":"2022-01-06T06:58:41Z","_id":"28935","type":"book_editor","citation":{"ieee":"R. Schulz-Zander, B. Eickelmann, H. Moser, H. Niesyto, and P. Grell, Eds., Jahrbuch Medienpädagogik 9. Qualitätsentwicklung in der Schule und medienpädagogische Professionalisierung. Wiesbaden: VS Verlag für Sozialwissenschaften, 2012.","short":"R. Schulz-Zander, B. Eickelmann, H. Moser, H. Niesyto, P. Grell, eds., Jahrbuch Medienpädagogik 9. Qualitätsentwicklung in der Schule und medienpädagogische Professionalisierung, VS Verlag für Sozialwissenschaften, Wiesbaden, 2012.","bibtex":"@book{Schulz-Zander_Eickelmann_Moser_Niesyto_Grell_2012, place={Wiesbaden}, title={Jahrbuch Medienpädagogik 9. Qualitätsentwicklung in der Schule und medienpädagogische Professionalisierung}, publisher={VS Verlag für Sozialwissenschaften}, year={2012} }","mla":"Schulz-Zander, Renate, et al., editors. Jahrbuch Medienpädagogik 9. Qualitätsentwicklung in der Schule und medienpädagogische Professionalisierung. VS Verlag für Sozialwissenschaften, 2012.","chicago":"Schulz-Zander, Renate, Birgit Eickelmann, Heinz Moser, Horst Niesyto, and Petra Grell, eds. Jahrbuch Medienpädagogik 9. Qualitätsentwicklung in der Schule und medienpädagogische Professionalisierung. Wiesbaden: VS Verlag für Sozialwissenschaften, 2012.","ama":"Schulz-Zander R, Eickelmann B, Moser H, Niesyto H, Grell P, eds. Jahrbuch Medienpädagogik 9. Qualitätsentwicklung in der Schule und medienpädagogische Professionalisierung. VS Verlag für Sozialwissenschaften; 2012.","apa":"Schulz-Zander, R., Eickelmann, B., Moser, H., Niesyto, H., & Grell, P. (Eds.). (2012). Jahrbuch Medienpädagogik 9. Qualitätsentwicklung in der Schule und medienpädagogische Professionalisierung. VS Verlag für Sozialwissenschaften."},"year":"2012","language":[{"iso":"ger"}]},{"user_id":"25078","title":"Certifying RSA","place":"Berlin, Heidelberg","extern":"1","status":"public","date_created":"2018-05-25T12:34:06Z","publication_identifier":{"isbn":["9783642349607","9783642349614"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","author":[{"last_name":"Kakvi","id":"66268","first_name":"Saqib","full_name":"Kakvi, Saqib"},{"last_name":"Kiltz","full_name":"Kiltz, Eike","first_name":"Eike"},{"last_name":"May","full_name":"May, Alexander","first_name":"Alexander"}],"publisher":"Springer Berlin Heidelberg","department":[{"_id":"558"}],"publication":"Advances in Cryptology – ASIACRYPT 2012","doi":"10.1007/978-3-642-34961-4_25","_id":"2918","date_updated":"2022-01-06T06:58:47Z","type":"book_chapter","year":"2012","citation":{"short":"S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.","ieee":"S. Kakvi, E. Kiltz, and A. May, “Certifying RSA,” in Advances in Cryptology – ASIACRYPT 2012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 404–414.","ama":"Kakvi S, Kiltz E, May A. Certifying RSA. In: Advances in Cryptology – ASIACRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:10.1007/978-3-642-34961-4_25","apa":"Kakvi, S., Kiltz, E., & May, A. (2012). Certifying RSA. In Advances in Cryptology – ASIACRYPT 2012 (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-34961-4_25","chicago":"Kakvi, Saqib, Eike Kiltz, and Alexander May. “Certifying RSA.” In Advances in Cryptology – ASIACRYPT 2012, 404–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. https://doi.org/10.1007/978-3-642-34961-4_25.","bibtex":"@inbook{Kakvi_Kiltz_May_2012, place={Berlin, Heidelberg}, title={Certifying RSA}, DOI={10.1007/978-3-642-34961-4_25}, booktitle={Advances in Cryptology – ASIACRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike and May, Alexander}, year={2012}, pages={404–414} }","mla":"Kakvi, Saqib, et al. “Certifying RSA.” Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, 2012, pp. 404–14, doi:10.1007/978-3-642-34961-4_25."},"page":"404-414"},{"author":[{"last_name":"Kakvi","id":"66268","first_name":"Saqib","full_name":"Kakvi, Saqib"},{"first_name":"Eike","full_name":"Kiltz, Eike","last_name":"Kiltz"}],"publisher":"Springer Berlin Heidelberg","department":[{"_id":"558"}],"publication":"Advances in Cryptology – EUROCRYPT 2012","status":"public","date_created":"2018-05-25T12:36:44Z","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642290107","9783642290114"]},"place":"Berlin, Heidelberg","extern":"1","user_id":"66268","title":"Optimal Security Proofs for Full Domain Hash, Revisited","main_file_link":[{"url":"https://doi.org/10.1007/s00145-017-9257-9"}],"year":"2012","type":"book_chapter","citation":{"chicago":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” In Advances in Cryptology – EUROCRYPT 2012, 537–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. https://doi.org/10.1007/978-3-642-29011-4_32.","apa":"Kakvi, S., & Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In Advances in Cryptology – EUROCRYPT 2012 (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-29011-4_32","ama":"Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: Advances in Cryptology – EUROCRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:10.1007/978-3-642-29011-4_32","bibtex":"@inbook{Kakvi_Kiltz_2012, place={Berlin, Heidelberg}, title={Optimal Security Proofs for Full Domain Hash, Revisited}, DOI={10.1007/978-3-642-29011-4_32}, booktitle={Advances in Cryptology – EUROCRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike}, year={2012}, pages={537–553} }","mla":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, 2012, pp. 537–53, doi:10.1007/978-3-642-29011-4_32.","short":"S. Kakvi, E. Kiltz, in: Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 537–553.","ieee":"S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” in Advances in Cryptology – EUROCRYPT 2012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 537–553."},"page":"537-553","date_updated":"2022-01-06T06:58:47Z","_id":"2919","doi":"10.1007/978-3-642-29011-4_32"},{"date_updated":"2022-01-06T06:58:48Z","_id":"2949","intvolume":" 19","doi":"10.1016/j.labeco.2012.04.005","issue":"5","year":"2012","citation":{"ieee":"T. Gries, N. Bilkic, and M. Pilichowski, “Stay in school or start working?- The human capital investment decision under uncertainty and irreversibility,” Labour Economics, vol. 19, no. 5, pp. 706–717, 2012.","short":"T. Gries, N. Bilkic, M. Pilichowski, Labour Economics 19 (2012) 706–717.","mla":"Gries, Thomas, et al. “Stay in School or Start Working?- The Human Capital Investment Decision under Uncertainty and Irreversibility.” Labour Economics, vol. 19, no. 5, 2012, pp. 706–17, doi:10.1016/j.labeco.2012.04.005.","bibtex":"@article{Gries_Bilkic_Pilichowski_2012, title={Stay in school or start working?- The human capital investment decision under uncertainty and irreversibility}, volume={19}, DOI={10.1016/j.labeco.2012.04.005}, number={5}, journal={Labour Economics}, author={Gries, Thomas and Bilkic, Natascha and Pilichowski, Margarethe}, year={2012}, pages={706–717} }","apa":"Gries, T., Bilkic, N., & Pilichowski, M. (2012). Stay in school or start working?- The human capital investment decision under uncertainty and irreversibility. Labour Economics, 19(5), 706–717. https://doi.org/10.1016/j.labeco.2012.04.005","ama":"Gries T, Bilkic N, Pilichowski M. Stay in school or start working?- The human capital investment decision under uncertainty and irreversibility. Labour Economics. 2012;19(5):706-717. doi:10.1016/j.labeco.2012.04.005","chicago":"Gries, Thomas, Natascha Bilkic, and Margarethe Pilichowski. “Stay in School or Start Working?- The Human Capital Investment Decision under Uncertainty and Irreversibility.” Labour Economics 19, no. 5 (2012): 706–17. https://doi.org/10.1016/j.labeco.2012.04.005."},"type":"journal_article","page":"706 - 717","language":[{"iso":"eng"}],"title":"Stay in school or start working?- The human capital investment decision under uncertainty and irreversibility","user_id":"186","author":[{"full_name":"Gries, Thomas","first_name":"Thomas","id":"186","last_name":"Gries"},{"last_name":"Bilkic","full_name":"Bilkic, Natascha ","first_name":"Natascha "},{"first_name":"Margarethe","full_name":"Pilichowski, Margarethe","last_name":"Pilichowski"}],"publication":"Labour Economics","department":[{"_id":"19"},{"_id":"200"},{"_id":"475"},{"_id":"202"}],"volume":19,"status":"public","date_created":"2018-05-29T11:44:03Z"},{"title":"Poverty in Shenzhen","user_id":"186","department":[{"_id":"19"},{"_id":"200"},{"_id":"475"},{"_id":"202"}],"publication":" Rising China in the Changing World Economy","author":[{"id":"186","last_name":"Gries","full_name":"Gries, Thomas","first_name":"Thomas"},{"first_name":"Jinjun","full_name":"Xue, Jinjun","last_name":"Xue"}],"publication_identifier":{"isbn":["9781138816732"]},"editor":[{"first_name":"Liming","full_name":"Wang, Liming","last_name":"Wang"}],"date_created":"2018-05-29T11:49:30Z","status":"public","date_updated":"2022-01-06T06:58:48Z","_id":"2950","page":"396 - 412","year":"2012","citation":{"ama":"Gries T, Xue J. Poverty in Shenzhen. In: Wang L, ed. Rising China in the Changing World Economy. ; 2012:396-412.","apa":"Gries, T., & Xue, J. (2012). Poverty in Shenzhen. In L. Wang (Ed.), Rising China in the Changing World Economy (pp. 396–412).","chicago":"Gries, Thomas, and Jinjun Xue. “Poverty in Shenzhen.” In Rising China in the Changing World Economy, edited by Liming Wang, 396–412, 2012.","mla":"Gries, Thomas, and Jinjun Xue. “Poverty in Shenzhen.” Rising China in the Changing World Economy, edited by Liming Wang, 2012, pp. 396–412.","bibtex":"@inbook{Gries_Xue_2012, title={Poverty in Shenzhen}, booktitle={ Rising China in the Changing World Economy}, author={Gries, Thomas and Xue, Jinjun}, editor={Wang, LimingEditor}, year={2012}, pages={396–412} }","short":"T. Gries, J. Xue, in: L. Wang (Ed.), Rising China in the Changing World Economy, 2012, pp. 396–412.","ieee":"T. Gries and J. Xue, “Poverty in Shenzhen,” in Rising China in the Changing World Economy, L. Wang, Ed. 2012, pp. 396–412."},"type":"book_chapter","language":[{"iso":"eng"}]},{"issue":"5","doi":"10.1080/10242694.2012.656945","_id":"2951","date_updated":"2022-01-06T06:58:48Z","intvolume":" 23","language":[{"iso":"eng"}],"page":"447 - 470","year":"2012","citation":{"short":"T. Gries, D. Meierrieks, Defence and Peace Economics 23 (2012) 447–470.","ieee":"T. Gries and D. Meierrieks, “Economic performance and terrorist activity in Latin America,” Defence and Peace Economics, vol. 23, no. 5, pp. 447–470, 2012.","chicago":"Gries, Thomas, and Daniel Meierrieks. “Economic Performance and Terrorist Activity in Latin America.” Defence and Peace Economics 23, no. 5 (2012): 447–70. https://doi.org/10.1080/10242694.2012.656945.","ama":"Gries T, Meierrieks D. Economic performance and terrorist activity in Latin America. Defence and Peace Economics. 2012;23(5):447-470. doi:10.1080/10242694.2012.656945","apa":"Gries, T., & Meierrieks, D. (2012). Economic performance and terrorist activity in Latin America. Defence and Peace Economics, 23(5), 447–470. https://doi.org/10.1080/10242694.2012.656945","mla":"Gries, Thomas, and Daniel Meierrieks. “Economic Performance and Terrorist Activity in Latin America.” Defence and Peace Economics, vol. 23, no. 5, 2012, pp. 447–70, doi:10.1080/10242694.2012.656945.","bibtex":"@article{Gries_Meierrieks_2012, title={Economic performance and terrorist activity in Latin America}, volume={23}, DOI={10.1080/10242694.2012.656945}, number={5}, journal={Defence and Peace Economics}, author={Gries, Thomas and Meierrieks, Daniel}, year={2012}, pages={447–470} }"},"type":"journal_article","user_id":"186","title":"Economic performance and terrorist activity in Latin America","date_created":"2018-05-29T11:51:34Z","status":"public","volume":23,"department":[{"_id":"19"},{"_id":"200"},{"_id":"475"},{"_id":"202"}],"publication":"Defence and Peace Economics","author":[{"full_name":"Gries, Thomas","first_name":"Thomas","id":"186","last_name":"Gries"},{"last_name":"Meierrieks","first_name":"Daniel","full_name":"Meierrieks, Daniel"}]},{"volume":14,"status":"public","date_created":"2018-05-29T11:58:55Z","author":[{"last_name":"Gries","id":"186","first_name":"Thomas","full_name":"Gries, Thomas"},{"last_name":"Prior","first_name":"Ulrich","full_name":"Prior, Ulrich"},{"first_name":"Caren","full_name":"Sureth, Caren","last_name":"Sureth"}],"department":[{"_id":"19"},{"_id":"200"},{"_id":"475"},{"_id":"202"}],"publication":"Journal of Public Economics Theory","title":"A Tax Paradox for Investment Decisions under Uncertainty","user_id":"186","type":"journal_article","year":"2012","citation":{"ama":"Gries T, Prior U, Sureth C. A Tax Paradox for Investment Decisions under Uncertainty. Journal of Public Economics Theory. 2012;14(3):521-545. doi:10.1111/j.1467-9779.2012.01547.x","apa":"Gries, T., Prior, U., & Sureth, C. (2012). A Tax Paradox for Investment Decisions under Uncertainty. Journal of Public Economics Theory, 14(3), 521–545. https://doi.org/10.1111/j.1467-9779.2012.01547.x","chicago":"Gries, Thomas, Ulrich Prior, and Caren Sureth. “A Tax Paradox for Investment Decisions under Uncertainty.” Journal of Public Economics Theory 14, no. 3 (2012): 521–45. https://doi.org/10.1111/j.1467-9779.2012.01547.x.","bibtex":"@article{Gries_Prior_Sureth_2012, title={A Tax Paradox for Investment Decisions under Uncertainty}, volume={14}, DOI={10.1111/j.1467-9779.2012.01547.x}, number={3}, journal={Journal of Public Economics Theory}, author={Gries, Thomas and Prior, Ulrich and Sureth, Caren}, year={2012}, pages={521–545} }","mla":"Gries, Thomas, et al. “A Tax Paradox for Investment Decisions under Uncertainty.” Journal of Public Economics Theory, vol. 14, no. 3, 2012, pp. 521–45, doi:10.1111/j.1467-9779.2012.01547.x.","short":"T. Gries, U. Prior, C. Sureth, Journal of Public Economics Theory 14 (2012) 521–545.","ieee":"T. Gries, U. Prior, and C. Sureth, “A Tax Paradox for Investment Decisions under Uncertainty,” Journal of Public Economics Theory, vol. 14, no. 3, pp. 521–545, 2012."},"page":"521 - 545","language":[{"iso":"eng"}],"doi":"10.1111/j.1467-9779.2012.01547.x","issue":"3","date_updated":"2022-01-06T06:58:48Z","_id":"2952","intvolume":" 14"},{"status":"public","date_created":"2018-06-05T07:41:14Z","publication_status":"published","volume":17,"author":[{"last_name":"Ackermann","full_name":"Ackermann, Marcel Rudolf","first_name":"Marcel Rudolf"},{"last_name":"Märtens","full_name":"Märtens, Marcus","first_name":"Marcus"},{"last_name":"Raupach","first_name":"Christoph","full_name":"Raupach, Christoph"},{"first_name":"Kamil","full_name":"Swierkot, Kamil","last_name":"Swierkot"},{"first_name":"Christiane","full_name":"Lammersen, Christiane","last_name":"Lammersen"},{"full_name":"Sohler, Christian","first_name":"Christian","last_name":"Sohler"}],"publisher":"ACM","department":[{"_id":"64"}],"user_id":"25078","title":"StreamKM++: A clustering algorithm for data streams","place":"New York, NY, USA","citation":{"ama":"Ackermann MR, Märtens M, Raupach C, Swierkot K, Lammersen C, Sohler C. StreamKM++: A clustering algorithm for data streams. 2012;17. doi:10.1145/2133803.2184450","apa":"Ackermann, M. R., Märtens, M., Raupach, C., Swierkot, K., Lammersen, C., & Sohler, C. (2012). StreamKM++: A clustering algorithm for data streams. New York, NY, USA: ACM. https://doi.org/10.1145/2133803.2184450","chicago":"Ackermann, Marcel Rudolf, Marcus Märtens, Christoph Raupach, Kamil Swierkot, Christiane Lammersen, and Christian Sohler. “StreamKM++: A Clustering Algorithm for Data Streams.” ACM Journal of Experimental Algorithmics. New York, NY, USA: ACM, 2012. https://doi.org/10.1145/2133803.2184450.","mla":"Ackermann, Marcel Rudolf, et al. StreamKM++: A Clustering Algorithm for Data Streams. Vol. 17, ACM, 2012, doi:10.1145/2133803.2184450.","bibtex":"@article{Ackermann_Märtens_Raupach_Swierkot_Lammersen_Sohler_2012, place={New York, NY, USA}, series={ACM Journal of Experimental Algorithmics}, title={StreamKM++: A clustering algorithm for data streams}, volume={17}, DOI={10.1145/2133803.2184450}, publisher={ACM}, author={Ackermann, Marcel Rudolf and Märtens, Marcus and Raupach, Christoph and Swierkot, Kamil and Lammersen, Christiane and Sohler, Christian}, year={2012}, collection={ACM Journal of Experimental Algorithmics} }","short":"M.R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, C. Sohler, 17 (2012).","ieee":"M. R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, and C. Sohler, “StreamKM++: A clustering algorithm for data streams,” vol. 17. ACM, New York, NY, USA, 2012."},"year":"2012","type":"conference","series_title":"ACM Journal of Experimental Algorithmics","doi":"10.1145/2133803.2184450","_id":"2982","intvolume":" 17","date_updated":"2022-01-06T06:58:50Z"},{"user_id":"25078","abstract":[{"text":"Ich beschreibe die deutsche Enigma-Verschlüsselungsmaschine und skizziere, wie sie von den Codebrechern von Bletchely Park um Alan Turing gebrochen wurde. Besonderes Augenmerk lege ich auf die Beiträge Alan Turings und die Bedeutung seiner Leistung für die Entwicklung moderner Kryptografie. ","lang":"eng"}],"status":"public","date_created":"2018-06-05T07:42:38Z","volume":35,"author":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"quality_controlled":"1","publication":"Informatik-Spektrum","issue":"4","_id":"2984","intvolume":" 35","year":"2012","citation":{"bibtex":"@article{Blömer_2012, title={Turing und Kryptografie}, volume={35}, DOI={10.1007/s00287-012-0622-7}, number={4}, journal={Informatik-Spektrum}, author={Blömer, Johannes}, year={2012} }","mla":"Blömer, Johannes. “Turing Und Kryptografie.” Informatik-Spektrum, vol. 35, no. 4, 2012, doi:10.1007/s00287-012-0622-7.","ama":"Blömer J. Turing und Kryptografie. Informatik-Spektrum. 2012;35(4). doi:10.1007/s00287-012-0622-7","apa":"Blömer, J. (2012). Turing und Kryptografie. Informatik-Spektrum, 35(4). https://doi.org/10.1007/s00287-012-0622-7","chicago":"Blömer, Johannes. “Turing Und Kryptografie.” Informatik-Spektrum 35, no. 4 (2012). https://doi.org/10.1007/s00287-012-0622-7.","ieee":"J. Blömer, “Turing und Kryptografie,” Informatik-Spektrum, vol. 35, no. 4, 2012.","short":"J. Blömer, Informatik-Spektrum 35 (2012)."},"type":"journal_article","title":"Turing und Kryptografie","publication_identifier":{"issn":["1432-122X"]},"publication_status":"published","department":[{"_id":"64"}],"doi":"10.1007/s00287-012-0622-7","date_updated":"2022-01-06T06:58:50Z","language":[{"iso":"eng"}]},{"date_updated":"2022-01-06T06:58:58Z","_id":"3132","type":"dissertation","year":"2012","citation":{"bibtex":"@book{Jager_2012, title={On black-box models of computation in cryptology}, publisher={Ruhr University Bochum}, author={Jager, Tibor}, year={2012} }","mla":"Jager, Tibor. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum, 2012.","chicago":"Jager, Tibor. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum, 2012.","ama":"Jager T. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum; 2012.","apa":"Jager, T. (2012). On black-box models of computation in cryptology. Ruhr University Bochum.","ieee":"T. Jager, On black-box models of computation in cryptology. Ruhr University Bochum, 2012.","short":"T. Jager, On Black-Box Models of Computation in Cryptology, Ruhr University Bochum, 2012."},"extern":"1","title":"On black-box models of computation in cryptology","user_id":"38235","publisher":"Ruhr University Bochum","author":[{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"}],"department":[{"_id":"558"}],"publication_identifier":{"isbn":["978-3-8348-1989-5"]},"status":"public","date_created":"2018-06-07T09:25:35Z"},{"page":"273--293","type":"conference","citation":{"short":"T. Jager, F. Kohlar, S. Schäge, J. Schwenk, in: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293.","ieee":"T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “On the Security of TLS-DHE in the Standard Model,” in Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293.","apa":"Jager, T., Kohlar, F., Schäge, S., & Schwenk, J. (2012). On the Security of TLS-DHE in the Standard Model. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings (pp. 273--293). https://doi.org/10.1007/978-3-642-32009-5_17","ama":"Jager T, Kohlar F, Schäge S, Schwenk J. On the Security of TLS-DHE in the Standard Model. In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. ; 2012:273--293. doi:10.1007/978-3-642-32009-5_17","chicago":"Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “On the Security of TLS-DHE in the Standard Model.” In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 273--293, 2012. https://doi.org/10.1007/978-3-642-32009-5_17.","mla":"Jager, Tibor, et al. “On the Security of TLS-DHE in the Standard Model.” Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293, doi:10.1007/978-3-642-32009-5_17.","bibtex":"@inproceedings{Jager_Kohlar_Schäge_Schwenk_2012, title={On the Security of TLS-DHE in the Standard Model}, DOI={10.1007/978-3-642-32009-5_17}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2012}, pages={273--293} }"},"year":"2012","doi":"10.1007/978-3-642-32009-5_17","date_updated":"2022-01-06T06:58:58Z","_id":"3133","date_created":"2018-06-07T09:25:56Z","status":"public","department":[{"_id":"558"}],"publication":"Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings","author":[{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Florian","full_name":"Kohlar, Florian","last_name":"Kohlar"},{"last_name":"Schäge","first_name":"Sven","full_name":"Schäge, Sven"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"title":"On the Security of TLS-DHE in the Standard Model","user_id":"38235","extern":"1"},{"author":[{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"}],"publication":"Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings","department":[{"_id":"558"}],"status":"public","date_created":"2018-06-07T09:26:31Z","extern":"1","user_id":"38235","title":"Tightly Secure Signatures and Public-Key Encryption","citation":{"short":"D. Hofheinz, T. Jager, in: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 590--607.","ieee":"D. Hofheinz and T. Jager, “Tightly Secure Signatures and Public-Key Encryption,” in Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 590--607.","apa":"Hofheinz, D., & Jager, T. (2012). Tightly Secure Signatures and Public-Key Encryption. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings (pp. 590--607). https://doi.org/10.1007/978-3-642-32009-5_35","ama":"Hofheinz D, Jager T. Tightly Secure Signatures and Public-Key Encryption. In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. ; 2012:590--607. doi:10.1007/978-3-642-32009-5_35","chicago":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 590--607, 2012. https://doi.org/10.1007/978-3-642-32009-5_35.","bibtex":"@inproceedings{Hofheinz_Jager_2012, title={Tightly Secure Signatures and Public-Key Encryption}, DOI={10.1007/978-3-642-32009-5_35}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor}, year={2012}, pages={590--607} }","mla":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 590--607, doi:10.1007/978-3-642-32009-5_35."},"type":"conference","year":"2012","page":"590--607","date_updated":"2022-01-06T06:58:58Z","_id":"3134","doi":"10.1007/978-3-642-32009-5_35"},{"publication":"Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings","department":[{"_id":"558"}],"author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"},{"last_name":"Schinzel","first_name":"Sebastian","full_name":"Schinzel, Sebastian"},{"last_name":"Somorovsky","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"date_created":"2018-06-07T09:26:54Z","status":"public","extern":"1","title":"Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption","user_id":"38235","page":"752--769","year":"2012","type":"conference","citation":{"mla":"Jager, Tibor, et al. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012, pp. 752--769, doi:10.1007/978-3-642-33167-1_43.","bibtex":"@inproceedings{Jager_Schinzel_Somorovsky_2012, title={Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption}, DOI={10.1007/978-3-642-33167-1_43}, booktitle={Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, author={Jager, Tibor and Schinzel, Sebastian and Somorovsky, Juraj}, year={2012}, pages={752--769} }","ama":"Jager T, Schinzel S, Somorovsky J. Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. ; 2012:752--769. doi:10.1007/978-3-642-33167-1_43","apa":"Jager, T., Schinzel, S., & Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings (pp. 752--769). https://doi.org/10.1007/978-3-642-33167-1_43","chicago":"Jager, Tibor, Sebastian Schinzel, and Juraj Somorovsky. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 752--769, 2012. https://doi.org/10.1007/978-3-642-33167-1_43.","ieee":"T. Jager, S. Schinzel, and J. Somorovsky, “Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption,” in Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012, pp. 752--769.","short":"T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012, pp. 752--769."},"_id":"3135","date_updated":"2022-01-06T06:58:58Z","doi":"10.1007/978-3-642-33167-1_43"},{"year":"2012","type":"conference","citation":{"short":"D. Hofheinz, T. Jager, E. Knapp, in: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83.","ieee":"D. Hofheinz, T. Jager, and E. Knapp, “Waters Signatures with Optimal Security Reduction,” in Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83.","chicago":"Hofheinz, Dennis, Tibor Jager, and Edward Knapp. “Waters Signatures with Optimal Security Reduction.” In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 66--83, 2012. https://doi.org/10.1007/978-3-642-30057-8_5.","apa":"Hofheinz, D., Jager, T., & Knapp, E. (2012). Waters Signatures with Optimal Security Reduction. In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings (pp. 66--83). https://doi.org/10.1007/978-3-642-30057-8_5","ama":"Hofheinz D, Jager T, Knapp E. Waters Signatures with Optimal Security Reduction. In: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. ; 2012:66--83. doi:10.1007/978-3-642-30057-8_5","mla":"Hofheinz, Dennis, et al. “Waters Signatures with Optimal Security Reduction.” Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83, doi:10.1007/978-3-642-30057-8_5.","bibtex":"@inproceedings{Hofheinz_Jager_Knapp_2012, title={Waters Signatures with Optimal Security Reduction}, DOI={10.1007/978-3-642-30057-8_5}, booktitle={Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor and Knapp, Edward}, year={2012}, pages={66--83} }"},"page":"66--83","_id":"3136","date_updated":"2022-01-06T06:58:58Z","doi":"10.1007/978-3-642-30057-8_5","author":[{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"last_name":"Jager","id":"64669","first_name":"Tibor","full_name":"Jager, Tibor"},{"first_name":"Edward","full_name":"Knapp, Edward","last_name":"Knapp"}],"publication":"Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings","department":[{"_id":"558"}],"status":"public","date_created":"2018-06-07T09:27:25Z","extern":"1","title":"Waters Signatures with Optimal Security Reduction","user_id":"38235"},{"citation":{"short":"O. Travkin, H. Wehrheim, G. Schellhorn, {ECEASST} (2012).","ieee":"O. Travkin, H. Wehrheim, and G. Schellhorn, “Proving Linearizability of Multiset with Local Proof Obligations,” {ECEASST}, 2012.","chicago":"Travkin, Oleg, Heike Wehrheim, and Gerhard Schellhorn. “Proving Linearizability of Multiset with Local Proof Obligations.” {ECEASST}, 2012.","apa":"Travkin, O., Wehrheim, H., & Schellhorn, G. (2012). Proving Linearizability of Multiset with Local Proof Obligations. {ECEASST}.","ama":"Travkin O, Wehrheim H, Schellhorn G. Proving Linearizability of Multiset with Local Proof Obligations. {ECEASST}. 2012.","bibtex":"@article{Travkin_Wehrheim_Schellhorn_2012, title={Proving Linearizability of Multiset with Local Proof Obligations}, journal={{ECEASST}}, author={Travkin, Oleg and Wehrheim, Heike and Schellhorn, Gerhard}, year={2012} }","mla":"Travkin, Oleg, et al. “Proving Linearizability of Multiset with Local Proof Obligations.” {ECEASST}, 2012."},"type":"journal_article","year":"2012","_id":"3180","date_updated":"2022-01-06T06:59:03Z","status":"public","date_created":"2018-06-13T08:16:49Z","author":[{"last_name":"Travkin","first_name":"Oleg","full_name":"Travkin, Oleg"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"},{"full_name":"Schellhorn, Gerhard","first_name":"Gerhard","last_name":"Schellhorn"}],"department":[{"_id":"77"}],"publication":"{ECEASST}","user_id":"29719","title":"Proving Linearizability of Multiset with Local Proof Obligations"},{"date_created":"2018-06-13T08:17:58Z","status":"public","publication":"Sci. Comput. Program.","department":[{"_id":"77"}],"author":[{"full_name":"Ruhroth, Thomas","first_name":"Thomas","last_name":"Ruhroth"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"title":"Model evolution and refinement","user_id":"29719","page":"270--289","citation":{"short":"T. Ruhroth, H. Wehrheim, Sci. Comput. Program. (2012) 270--289.","ieee":"T. Ruhroth and H. Wehrheim, “Model evolution and refinement,” Sci. Comput. Program., no. 3, pp. 270--289, 2012.","ama":"Ruhroth T, Wehrheim H. Model evolution and refinement. Sci Comput Program. 2012;(3):270--289. doi:10.1016/j.scico.2011.04.007","apa":"Ruhroth, T., & Wehrheim, H. (2012). Model evolution and refinement. Sci. Comput. Program., (3), 270--289. https://doi.org/10.1016/j.scico.2011.04.007","chicago":"Ruhroth, Thomas, and Heike Wehrheim. “Model Evolution and Refinement.” Sci. Comput. Program., no. 3 (2012): 270--289. https://doi.org/10.1016/j.scico.2011.04.007.","mla":"Ruhroth, Thomas, and Heike Wehrheim. “Model Evolution and Refinement.” Sci. Comput. Program., no. 3, 2012, pp. 270--289, doi:10.1016/j.scico.2011.04.007.","bibtex":"@article{Ruhroth_Wehrheim_2012, title={Model evolution and refinement}, DOI={10.1016/j.scico.2011.04.007}, number={3}, journal={Sci. Comput. Program.}, author={Ruhroth, Thomas and Wehrheim, Heike}, year={2012}, pages={270--289} }"},"year":"2012","type":"journal_article","doi":"10.1016/j.scico.2011.04.007","issue":"3","date_updated":"2022-01-06T06:59:03Z","_id":"3181"},{"date_updated":"2022-01-06T06:59:03Z","_id":"3182","doi":"10.1007/978-3-642-31424-7_21","series_title":"Lecture Notes in Computer Science","citation":{"mla":"Schellhorn, Gerhard, et al. “How to Prove Algorithms Linearisable.” Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, edited by P. Madhusudan and Sanjit A. Seshia, 2012, pp. 243--259, doi:10.1007/978-3-642-31424-7_21.","bibtex":"@inproceedings{Schellhorn_Wehrheim_Derrick_2012, series={Lecture Notes in Computer Science}, title={How to Prove Algorithms Linearisable}, DOI={10.1007/978-3-642-31424-7_21}, booktitle={Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings}, author={Schellhorn, Gerhard and Wehrheim, Heike and Derrick, John}, editor={Madhusudan, P. and A. Seshia, SanjitEditors}, year={2012}, pages={243--259}, collection={Lecture Notes in Computer Science} }","apa":"Schellhorn, G., Wehrheim, H., & Derrick, J. (2012). How to Prove Algorithms Linearisable. In P. Madhusudan & S. A. Seshia (Eds.), Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings (pp. 243--259). https://doi.org/10.1007/978-3-642-31424-7_21","ama":"Schellhorn G, Wehrheim H, Derrick J. How to Prove Algorithms Linearisable. In: Madhusudan P, A. Seshia S, eds. Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings. Lecture Notes in Computer Science. ; 2012:243--259. doi:10.1007/978-3-642-31424-7_21","chicago":"Schellhorn, Gerhard, Heike Wehrheim, and John Derrick. “How to Prove Algorithms Linearisable.” In Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, edited by P. Madhusudan and Sanjit A. Seshia, 243--259. Lecture Notes in Computer Science, 2012. https://doi.org/10.1007/978-3-642-31424-7_21.","ieee":"G. Schellhorn, H. Wehrheim, and J. Derrick, “How to Prove Algorithms Linearisable,” in Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, 2012, pp. 243--259.","short":"G. Schellhorn, H. Wehrheim, J. Derrick, in: P. Madhusudan, S. A. Seshia (Eds.), Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, 2012, pp. 243--259."},"year":"2012","type":"conference","page":"243--259","user_id":"29719","title":"How to Prove Algorithms Linearisable","author":[{"first_name":"Gerhard","full_name":"Schellhorn, Gerhard","last_name":"Schellhorn"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"},{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"}],"department":[{"_id":"77"}],"publication":"Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings","status":"public","date_created":"2018-06-13T08:19:33Z","editor":[{"last_name":"Madhusudan","full_name":"Madhusudan, P.","first_name":"P."},{"last_name":"A. Seshia","first_name":"Sanjit","full_name":"A. Seshia, Sanjit"}]}]