[{"status":"public","type":"mastersthesis","language":[{"iso":"ger"}],"user_id":"477","_id":"605","project":[{"name":"SFB 901","_id":"1"},{"_id":"15","name":"SFB 901 - Subprojekt C3"},{"name":"SFB 901 - Project Area C","_id":"4"}],"citation":{"apa":"Isenberg, F. (2012). <i>Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung</i>. Universität Paderborn.","mla":"Isenberg, Florian. <i>Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung</i>. Universität Paderborn, 2012.","short":"F. Isenberg, Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung, Universität Paderborn, 2012.","bibtex":"@book{Isenberg_2012, title={Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung}, publisher={Universität Paderborn}, author={Isenberg, Florian}, year={2012} }","ieee":"F. Isenberg, <i>Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung</i>. Universität Paderborn, 2012.","chicago":"Isenberg, Florian. <i>Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung</i>. Universität Paderborn, 2012.","ama":"Isenberg F. <i>Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung</i>. Universität Paderborn; 2012."},"year":"2012","title":"Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung","author":[{"full_name":"Isenberg, Florian","last_name":"Isenberg","first_name":"Florian"}],"date_created":"2017-10-17T12:42:50Z","date_updated":"2022-01-06T07:02:51Z","publisher":"Universität Paderborn"},{"type":"journal_article","publication":"Neural Networks","status":"public","_id":"6055","user_id":"59649","department":[{"_id":"115"}],"extern":"1","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0893-6080"]},"year":"2012","citation":{"bibtex":"@article{Mehler_Lücking_Menke_2012, title={Assessing cognitive alignment in different types of dialog by means of a network model}, volume={32}, DOI={<a href=\"https://doi.org/10.1016/j.neunet.2012.02.013\">10.1016/j.neunet.2012.02.013</a>}, journal={Neural Networks}, publisher={Elsevier BV}, author={Mehler, Alexander and Lücking, Andy and Menke, Peter}, year={2012}, pages={159–164} }","short":"A. Mehler, A. Lücking, P. Menke, Neural Networks 32 (2012) 159–164.","mla":"Mehler, Alexander, et al. “Assessing Cognitive Alignment in Different Types of Dialog by Means of a Network Model.” <i>Neural Networks</i>, vol. 32, Elsevier BV, 2012, pp. 159–64, doi:<a href=\"https://doi.org/10.1016/j.neunet.2012.02.013\">10.1016/j.neunet.2012.02.013</a>.","apa":"Mehler, A., Lücking, A., &#38; Menke, P. (2012). Assessing cognitive alignment in different types of dialog by means of a network model. <i>Neural Networks</i>, <i>32</i>, 159–164. <a href=\"https://doi.org/10.1016/j.neunet.2012.02.013\">https://doi.org/10.1016/j.neunet.2012.02.013</a>","ieee":"A. Mehler, A. Lücking, and P. Menke, “Assessing cognitive alignment in different types of dialog by means of a network model,” <i>Neural Networks</i>, vol. 32, pp. 159–164, 2012.","chicago":"Mehler, Alexander, Andy Lücking, and Peter Menke. “Assessing Cognitive Alignment in Different Types of Dialog by Means of a Network Model.” <i>Neural Networks</i> 32 (2012): 159–64. <a href=\"https://doi.org/10.1016/j.neunet.2012.02.013\">https://doi.org/10.1016/j.neunet.2012.02.013</a>.","ama":"Mehler A, Lücking A, Menke P. Assessing cognitive alignment in different types of dialog by means of a network model. <i>Neural Networks</i>. 2012;32:159-164. doi:<a href=\"https://doi.org/10.1016/j.neunet.2012.02.013\">10.1016/j.neunet.2012.02.013</a>"},"intvolume":"        32","page":"159-164","publisher":"Elsevier BV","date_updated":"2022-01-06T07:02:51Z","date_created":"2018-12-07T15:17:39Z","author":[{"first_name":"Alexander","full_name":"Mehler, Alexander","last_name":"Mehler"},{"first_name":"Andy","full_name":"Lücking, Andy","last_name":"Lücking"},{"first_name":"Peter","full_name":"Menke, Peter","id":"59649","last_name":"Menke"}],"volume":32,"title":"Assessing cognitive alignment in different types of dialog by means of a network model","doi":"10.1016/j.neunet.2012.02.013"},{"date_updated":"2022-01-06T07:02:51Z","publisher":"de Gruyter","volume":8,"author":[{"first_name":"Peter","last_name":"Menke","id":"59649","full_name":"Menke, Peter"}],"date_created":"2018-12-07T15:22:25Z","title":"Evaluation of Technical Communication","publication_identifier":{"isbn":["978-3-11-018834-9"]},"publication_status":"published","year":"2012","intvolume":"         8","page":"285–314","citation":{"apa":"Menke, P. (2012). Evaluation of Technical Communication. In <i>Handbook of Technical Communication</i> (Vol. 8, pp. 285–314). de Gruyter.","mla":"Menke, Peter. “Evaluation of Technical Communication.” <i>Handbook of Technical Communication</i>, vol. 8, de Gruyter, 2012, pp. 285–314.","short":"P. Menke, in: Handbook of Technical Communication, de Gruyter, 2012, pp. 285–314.","bibtex":"@inbook{Menke_2012, series={Handbooks of Applied Linguistics}, title={Evaluation of Technical Communication}, volume={8}, booktitle={Handbook of Technical Communication}, publisher={de Gruyter}, author={Menke, Peter}, year={2012}, pages={285–314}, collection={Handbooks of Applied Linguistics} }","ama":"Menke P. Evaluation of Technical Communication. In: <i>Handbook of Technical Communication</i>. Vol 8. Handbooks of Applied Linguistics. de Gruyter; 2012:285–314.","chicago":"Menke, Peter. “Evaluation of Technical Communication.” In <i>Handbook of Technical Communication</i>, 8:285–314. Handbooks of Applied Linguistics. de Gruyter, 2012.","ieee":"P. Menke, “Evaluation of Technical Communication,” in <i>Handbook of Technical Communication</i>, vol. 8, de Gruyter, 2012, pp. 285–314."},"_id":"6057","department":[{"_id":"115"}],"user_id":"59649","series_title":"Handbooks of Applied Linguistics","language":[{"iso":"eng"}],"extern":"1","publication":"Handbook of Technical Communication","type":"book_chapter","status":"public"},{"title":"Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:51Z","date_created":"2017-10-17T12:42:50Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"first_name":"Nils","full_name":"Löken, Nils","id":"13703","last_name":"Löken"}],"year":"2012","citation":{"short":"N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität Paderborn, 2012.","bibtex":"@book{Löken_2012, title={Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas}, publisher={Universität Paderborn}, author={Löken, Nils}, year={2012} }","mla":"Löken, Nils. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012.","apa":"Löken, N. (2012). <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn.","ama":"Löken N. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn; 2012.","chicago":"Löken, Nils. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012.","ieee":"N. Löken, <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012."},"language":[{"iso":"ger"}],"_id":"606","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"64"}],"user_id":"13703","status":"public","type":"bachelorsthesis"},{"status":"public","type":"bachelorsthesis","language":[{"iso":"ger"}],"_id":"607","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"64"}],"user_id":"477","year":"2012","citation":{"ieee":"T. Haarhoff, <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn, 2012.","chicago":"Haarhoff, Thomas. <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn, 2012.","ama":"Haarhoff T. <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn; 2012.","apa":"Haarhoff, T. (2012). <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn.","mla":"Haarhoff, Thomas. <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn, 2012.","bibtex":"@book{Haarhoff_2012, title={Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2}, publisher={Universität Paderborn}, author={Haarhoff, Thomas}, year={2012} }","short":"T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2, Universität Paderborn, 2012."},"title":"Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:51Z","date_created":"2017-10-17T12:42:50Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"full_name":"Haarhoff, Thomas","last_name":"Haarhoff","first_name":"Thomas"}]},{"page":"348-363","citation":{"ama":"Timm N, Wehrheim H, Czech M. Heuristic-Guided Abstraction Refinement for Concurrent Systems. In: <i>Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)</i>. LNCS. ; 2012:348-363. doi:<a href=\"https://doi.org/10.1007/978-3-642-34281-3_25\">10.1007/978-3-642-34281-3_25</a>","chicago":"Timm, Nils, Heike Wehrheim, and Mike Czech. “Heuristic-Guided Abstraction Refinement for Concurrent Systems.” In <i>Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)</i>, 348–63. LNCS, 2012. <a href=\"https://doi.org/10.1007/978-3-642-34281-3_25\">https://doi.org/10.1007/978-3-642-34281-3_25</a>.","ieee":"N. Timm, H. Wehrheim, and M. Czech, “Heuristic-Guided Abstraction Refinement for Concurrent Systems,” in <i>Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)</i>, 2012, pp. 348–363.","apa":"Timm, N., Wehrheim, H., &#38; Czech, M. (2012). Heuristic-Guided Abstraction Refinement for Concurrent Systems. In <i>Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)</i> (pp. 348–363). <a href=\"https://doi.org/10.1007/978-3-642-34281-3_25\">https://doi.org/10.1007/978-3-642-34281-3_25</a>","mla":"Timm, Nils, et al. “Heuristic-Guided Abstraction Refinement for Concurrent Systems.” <i>Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)</i>, 2012, pp. 348–63, doi:<a href=\"https://doi.org/10.1007/978-3-642-34281-3_25\">10.1007/978-3-642-34281-3_25</a>.","short":"N. Timm, H. Wehrheim, M. Czech, in: Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM), 2012, pp. 348–363.","bibtex":"@inproceedings{Timm_Wehrheim_Czech_2012, series={LNCS}, title={Heuristic-Guided Abstraction Refinement for Concurrent Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-34281-3_25\">10.1007/978-3-642-34281-3_25</a>}, booktitle={Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)}, author={Timm, Nils and Wehrheim, Heike and Czech, Mike}, year={2012}, pages={348–363}, collection={LNCS} }"},"has_accepted_license":"1","doi":"10.1007/978-3-642-34281-3_25","date_updated":"2022-01-06T07:02:52Z","author":[{"first_name":"Nils","last_name":"Timm","full_name":"Timm, Nils"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"},{"first_name":"Mike","last_name":"Czech","full_name":"Czech, Mike"}],"status":"public","type":"conference","file_date_updated":"2018-03-15T08:15:33Z","_id":"608","project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}],"user_id":"477","series_title":"LNCS","year":"2012","title":"Heuristic-Guided Abstraction Refinement for Concurrent Systems","date_created":"2017-10-17T12:42:50Z","abstract":[{"lang":"eng","text":"Predicate abstraction is an established technique in software verification. It inherently includes an abstraction refinement loop successively adding predicates until the right level of abstraction is found. For concurrent systems, predicate abstraction can be combined with spotlight abstraction, further reducing the state space by abstracting away certain processes. Refinement then has to decide whether to add a new predicate or a new process. Selecting the right predicates and processes is a crucial task: The positive effect of abstraction may be compromised by unfavourable refinement decisions. Here we present a heuristic approach to abstraction refinement. The basis for a decision is a set of refinement candidates, derived by multiple counterexample-generation. Candidates are evaluated with respect to their influence on other components in the system. Experimental results show that our technique can significantly speed up verification as compared to a naive abstraction refinement."}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"florida","date_created":"2018-03-15T08:15:33Z","date_updated":"2018-03-15T08:15:33Z","file_name":"608-Timm2013-0main.pdf","file_id":"1250","access_level":"closed","file_size":396337}],"publication":"Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM)","ddc":["040"],"language":[{"iso":"eng"}]},{"type":"mastersthesis","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"610-MA_Mohr_2012_final.pdf","file_id":"1248","access_level":"closed","file_size":1270467,"date_created":"2018-03-15T08:13:40Z","creator":"florida","date_updated":"2018-03-15T08:13:40Z"}],"status":"public","user_id":"15504","project":[{"_id":"1","name":"SFB 901"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"610","file_date_updated":"2018-03-15T08:13:40Z","ddc":["040"],"has_accepted_license":"1","citation":{"apa":"Mohr, M. (2012). <i>Generating Prototypes of Adaptive Component-based Software Systems for Performance Analysis</i>. Universität Paderborn.","mla":"Mohr, Mario. <i>Generating Prototypes of Adaptive Component-Based Software Systems for Performance Analysis</i>. Universität Paderborn, 2012.","bibtex":"@book{Mohr_2012, title={Generating Prototypes of Adaptive Component-based Software Systems for Performance Analysis}, publisher={Universität Paderborn}, author={Mohr, Mario}, year={2012} }","short":"M. Mohr, Generating Prototypes of Adaptive Component-Based Software Systems for Performance Analysis, Universität Paderborn, 2012.","ieee":"M. Mohr, <i>Generating Prototypes of Adaptive Component-based Software Systems for Performance Analysis</i>. Universität Paderborn, 2012.","chicago":"Mohr, Mario. <i>Generating Prototypes of Adaptive Component-Based Software Systems for Performance Analysis</i>. Universität Paderborn, 2012.","ama":"Mohr M. <i>Generating Prototypes of Adaptive Component-Based Software Systems for Performance Analysis</i>. Universität Paderborn; 2012."},"year":"2012","date_created":"2017-10-17T12:42:51Z","author":[{"last_name":"Mohr","full_name":"Mohr, Mario","first_name":"Mario"}],"date_updated":"2022-01-06T07:02:52Z","publisher":"Universität Paderborn","title":"Generating Prototypes of Adaptive Component-based Software Systems for Performance Analysis"},{"citation":{"mla":"Steinmetz, Holger, et al. “Das Cranet-Projekt: Kreuzkulturelle Vergleiche Im HR-Management.” <i>PERSONALquartely</i>, vol. 64, no. 1, 2012, pp. 34–39.","bibtex":"@article{Steinmetz_Schwens_Wehner_Kabst_2012, title={Das Cranet-Projekt: Kreuzkulturelle Vergleiche im HR-Management.}, volume={64}, number={1}, journal={PERSONALquartely}, author={Steinmetz, Holger and Schwens, C and Wehner, M and Kabst, Rüdiger}, year={2012}, pages={34–39} }","short":"H. Steinmetz, C. Schwens, M. Wehner, R. Kabst, PERSONALquartely 64 (2012) 34–39.","apa":"Steinmetz, H., Schwens, C., Wehner, M., &#38; Kabst, R. (2012). Das Cranet-Projekt: Kreuzkulturelle Vergleiche im HR-Management. <i>PERSONALquartely</i>, <i>64</i>(1), 34–39.","ieee":"H. Steinmetz, C. Schwens, M. Wehner, and R. Kabst, “Das Cranet-Projekt: Kreuzkulturelle Vergleiche im HR-Management.,” <i>PERSONALquartely</i>, vol. 64, no. 1, pp. 34–39, 2012.","chicago":"Steinmetz, Holger, C Schwens, M Wehner, and Rüdiger Kabst. “Das Cranet-Projekt: Kreuzkulturelle Vergleiche Im HR-Management.” <i>PERSONALquartely</i> 64, no. 1 (2012): 34–39.","ama":"Steinmetz H, Schwens C, Wehner M, Kabst R. Das Cranet-Projekt: Kreuzkulturelle Vergleiche im HR-Management. <i>PERSONALquartely</i>. 2012;64(1):34-39."},"page":"34-39","intvolume":"        64","year":"2012","issue":"1","title":"Das Cranet-Projekt: Kreuzkulturelle Vergleiche im HR-Management.","date_created":"2018-12-10T11:09:13Z","author":[{"first_name":"Holger","last_name":"Steinmetz","id":"43261","full_name":"Steinmetz, Holger"},{"last_name":"Schwens","full_name":"Schwens, C","first_name":"C"},{"last_name":"Wehner","full_name":"Wehner, M","first_name":"M"},{"first_name":"Rüdiger","last_name":"Kabst","id":"42362","full_name":"Kabst, Rüdiger"}],"volume":64,"date_updated":"2022-01-06T07:02:53Z","status":"public","type":"journal_article","publication":"PERSONALquartely","language":[{"iso":"eng"}],"user_id":"46632","department":[{"_id":"274"}],"_id":"6102"},{"title":"Editorial: Employer Branding: Strategie, Instrumente, Umsetzung","date_updated":"2022-01-06T07:02:53Z","date_created":"2018-12-10T11:39:27Z","author":[{"first_name":"Rüdiger","last_name":"Kabst","full_name":"Kabst, Rüdiger","id":"42362"},{"full_name":"Baum, M","last_name":"Baum","first_name":"M"}],"volume":64,"year":"2012","citation":{"apa":"Kabst, R., &#38; Baum, M. (2012). Editorial: Employer Branding: Strategie, Instrumente, Umsetzung. <i>PERSONALquartely</i>, <i>64</i>(3), 3.","short":"R. Kabst, M. Baum, PERSONALquartely 64 (2012) 3.","mla":"Kabst, Rüdiger, and M. Baum. “Editorial: Employer Branding: Strategie, Instrumente, Umsetzung.” <i>PERSONALquartely</i>, vol. 64, no. 3, 2012, p. 3.","bibtex":"@article{Kabst_Baum_2012, title={Editorial: Employer Branding: Strategie, Instrumente, Umsetzung}, volume={64}, number={3}, journal={PERSONALquartely}, author={Kabst, Rüdiger and Baum, M}, year={2012}, pages={3} }","ama":"Kabst R, Baum M. Editorial: Employer Branding: Strategie, Instrumente, Umsetzung. <i>PERSONALquartely</i>. 2012;64(3):3.","ieee":"R. Kabst and M. Baum, “Editorial: Employer Branding: Strategie, Instrumente, Umsetzung,” <i>PERSONALquartely</i>, vol. 64, no. 3, p. 3, 2012.","chicago":"Kabst, Rüdiger, and M Baum. “Editorial: Employer Branding: Strategie, Instrumente, Umsetzung.” <i>PERSONALquartely</i> 64, no. 3 (2012): 3."},"page":"3","intvolume":"        64","issue":"3","language":[{"iso":"eng"}],"_id":"6103","user_id":"46632","department":[{"_id":"274"}],"status":"public","type":"journal_article","publication":"PERSONALquartely"},{"year":"2012","citation":{"ama":"Hangmann H. <i>Generating Adjustable Temperature Gradients on Modern FPGAs</i>. Universität Paderborn; 2012.","ieee":"H. Hangmann, <i>Generating Adjustable Temperature Gradients on modern FPGAs</i>. Universität Paderborn, 2012.","chicago":"Hangmann, Hendrik. <i>Generating Adjustable Temperature Gradients on Modern FPGAs</i>. Universität Paderborn, 2012.","mla":"Hangmann, Hendrik. <i>Generating Adjustable Temperature Gradients on Modern FPGAs</i>. Universität Paderborn, 2012.","short":"H. Hangmann, Generating Adjustable Temperature Gradients on Modern FPGAs, Universität Paderborn, 2012.","bibtex":"@book{Hangmann_2012, title={Generating Adjustable Temperature Gradients on modern FPGAs}, publisher={Universität Paderborn}, author={Hangmann, Hendrik}, year={2012} }","apa":"Hangmann, H. (2012). <i>Generating Adjustable Temperature Gradients on modern FPGAs</i>. Universität Paderborn."},"title":"Generating Adjustable Temperature Gradients on modern FPGAs","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:53Z","author":[{"first_name":"Hendrik","full_name":"Hangmann, Hendrik","last_name":"Hangmann"}],"date_created":"2017-10-17T12:42:51Z","status":"public","type":"bachelorsthesis","project":[{"_id":"1","name":"SFB 901"},{"_id":"14","name":"SFB 901 - Subprojekt C2"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"611","user_id":"15504"},{"title":"Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens","date_created":"2017-10-17T12:42:51Z","author":[{"full_name":"Wohlfarth, Stefan","last_name":"Wohlfarth","first_name":"Stefan"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:53Z","citation":{"bibtex":"@book{Wohlfarth_2012, title={Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens}, publisher={Universität Paderborn}, author={Wohlfarth, Stefan}, year={2012} }","mla":"Wohlfarth, Stefan. <i>Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens</i>. Universität Paderborn, 2012.","short":"S. Wohlfarth, Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens, Universität Paderborn, 2012.","apa":"Wohlfarth, S. (2012). <i>Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens</i>. Universität Paderborn.","chicago":"Wohlfarth, Stefan. <i>Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens</i>. Universität Paderborn, 2012.","ieee":"S. Wohlfarth, <i>Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens</i>. Universität Paderborn, 2012.","ama":"Wohlfarth S. <i>Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens</i>. Universität Paderborn; 2012."},"year":"2012","language":[{"iso":"ger"}],"user_id":"477","_id":"613","project":[{"name":"SFB 901","_id":"1"},{"_id":"15","name":"SFB 901 - Subprojekt C3"},{"_id":"4","name":"SFB 901 - Project Area C"}],"status":"public","type":"mastersthesis"},{"language":[{"iso":"eng"}],"_id":"6138","user_id":"46632","department":[{"_id":"274"}],"status":"public","type":"book","title":"Einführung in die Betriebswirtschaftslehre","date_updated":"2022-01-06T07:02:53Z","author":[{"first_name":"W","full_name":"Weber, W","last_name":"Weber"},{"first_name":"Rüdiger","last_name":"Kabst","id":"42362","full_name":"Kabst, Rüdiger"}],"date_created":"2018-12-11T10:21:09Z","place":"Wiesbaden","year":"2012","citation":{"apa":"Weber, W., &#38; Kabst, R. (2012). <i>Einführung in die Betriebswirtschaftslehre</i> (8th ed.). Wiesbaden.","short":"W. Weber, R. Kabst, Einführung in Die Betriebswirtschaftslehre, 8th ed., Wiesbaden, 2012.","bibtex":"@book{Weber_Kabst_2012, place={Wiesbaden}, edition={8}, title={Einführung in die Betriebswirtschaftslehre}, author={Weber, W and Kabst, Rüdiger}, year={2012} }","mla":"Weber, W., and Rüdiger Kabst. <i>Einführung in Die Betriebswirtschaftslehre</i>. 8th ed., 2012.","ama":"Weber W, Kabst R. <i>Einführung in Die Betriebswirtschaftslehre</i>. 8th ed. Wiesbaden; 2012.","chicago":"Weber, W, and Rüdiger Kabst. <i>Einführung in Die Betriebswirtschaftslehre</i>. 8th ed. Wiesbaden, 2012.","ieee":"W. Weber and R. Kabst, <i>Einführung in die Betriebswirtschaftslehre</i>, 8th ed. Wiesbaden, 2012."},"publication_identifier":{"isbn":["978-3-8349-1994-6"]},"edition":"8"},{"title":"Empirischer, quantitativer Vergleich von Modelltransformationssprachen","date_updated":"2022-01-06T07:02:53Z","publisher":"Universität Paderborn","author":[{"first_name":"Sebastian","last_name":"Lehrig","full_name":"Lehrig, Sebastian"}],"date_created":"2017-10-17T12:42:51Z","year":"2012","citation":{"short":"S. Lehrig, Empirischer, quantitativer Vergleich von Modelltransformationssprachen, Universität Paderborn, 2012.","mla":"Lehrig, Sebastian. <i>Empirischer, quantitativer Vergleich von Modelltransformationssprachen</i>. Universität Paderborn, 2012.","bibtex":"@book{Lehrig_2012, title={Empirischer, quantitativer Vergleich von Modelltransformationssprachen}, publisher={Universität Paderborn}, author={Lehrig, Sebastian}, year={2012} }","apa":"Lehrig, S. (2012). <i>Empirischer, quantitativer Vergleich von Modelltransformationssprachen</i>. Universität Paderborn.","chicago":"Lehrig, Sebastian. <i>Empirischer, quantitativer Vergleich von Modelltransformationssprachen</i>. Universität Paderborn, 2012.","ieee":"S. Lehrig, <i>Empirischer, quantitativer Vergleich von Modelltransformationssprachen</i>. Universität Paderborn, 2012.","ama":"Lehrig S. <i>Empirischer, quantitativer Vergleich von Modelltransformationssprachen</i>. Universität Paderborn; 2012."},"language":[{"iso":"ger"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"614","user_id":"477","status":"public","type":"mastersthesis"},{"title":"Determinants of Different Types of Born Globals.","date_updated":"2022-01-06T07:02:53Z","publisher":"Edward Elgar Publishing Ltd.","date_created":"2018-12-11T11:02:56Z","author":[{"full_name":"Baum, M","last_name":"Baum","first_name":"M"},{"full_name":"Schwens, C","last_name":"Schwens","first_name":"C"},{"full_name":"Kabst, R","last_name":"Kabst","first_name":"R"}],"year":"2012","place":"Cheltenham Glos/Northampton","page":"36-45","citation":{"mla":"Baum, M., et al. “Determinants of Different Types of Born Globals.” <i>Handbook of Research on Born Globals</i>, edited by M Gabrielsson and M Kirpalani, Edward Elgar Publishing Ltd., 2012, pp. 36–45.","short":"M. Baum, C. Schwens, R. Kabst, in: M. Gabrielsson, M. Kirpalani (Eds.), Handbook of Research on Born Globals, Edward Elgar Publishing Ltd., Cheltenham Glos/Northampton, 2012, pp. 36–45.","bibtex":"@inbook{Baum_Schwens_Kabst_2012, place={Cheltenham Glos/Northampton}, title={Determinants of Different Types of Born Globals.}, booktitle={Handbook of Research on Born Globals}, publisher={Edward Elgar Publishing Ltd.}, author={Baum, M and Schwens, C and Kabst, R}, editor={Gabrielsson, M and Kirpalani, MEditors}, year={2012}, pages={36–45} }","apa":"Baum, M., Schwens, C., &#38; Kabst, R. (2012). Determinants of Different Types of Born Globals. In M. Gabrielsson &#38; M. Kirpalani (Eds.), <i>Handbook of Research on Born Globals</i> (pp. 36–45). Cheltenham Glos/Northampton: Edward Elgar Publishing Ltd.","ama":"Baum M, Schwens C, Kabst R. Determinants of Different Types of Born Globals. In: Gabrielsson M, Kirpalani M, eds. <i>Handbook of Research on Born Globals</i>. Cheltenham Glos/Northampton: Edward Elgar Publishing Ltd.; 2012:36-45.","chicago":"Baum, M, C Schwens, and R Kabst. “Determinants of Different Types of Born Globals.” In <i>Handbook of Research on Born Globals</i>, edited by M Gabrielsson and M Kirpalani, 36–45. Cheltenham Glos/Northampton: Edward Elgar Publishing Ltd., 2012.","ieee":"M. Baum, C. Schwens, and R. Kabst, “Determinants of Different Types of Born Globals.,” in <i>Handbook of Research on Born Globals</i>, M. Gabrielsson and M. Kirpalani, Eds. Cheltenham Glos/Northampton: Edward Elgar Publishing Ltd., 2012, pp. 36–45."},"language":[{"iso":"eng"}],"_id":"6148","department":[{"_id":"274"}],"user_id":"46632","editor":[{"last_name":"Gabrielsson","full_name":"Gabrielsson, M","first_name":"M"},{"first_name":"M","last_name":"Kirpalani","full_name":"Kirpalani, M"}],"status":"public","publication":"Handbook of Research on Born Globals","type":"book_chapter"},{"date_created":"2018-12-11T11:06:03Z","author":[{"full_name":"Isidor, R","last_name":"Isidor","first_name":"R"},{"full_name":"Schwens, C","last_name":"Schwens","first_name":"C"},{"first_name":"R","full_name":"Kabst, R","last_name":"Kabst"}],"date_updated":"2022-01-06T07:02:53Z","title":"Die Messung von Joint-Venture Erfolg","publication_identifier":{"isbn":["978-3-8349-3503-8"]},"page":"193-205","citation":{"chicago":"Isidor, R, C Schwens, and R Kabst. “Die Messung von Joint-Venture Erfolg.” In <i>Markteintrittsstrategien - Dynamik Und Komplexität</i>, edited by J Zentes, 193–205, 2012.","ieee":"R. Isidor, C. Schwens, and R. Kabst, “Die Messung von Joint-Venture Erfolg,” in <i>Markteintrittsstrategien - Dynamik und Komplexität</i>, J. Zentes, Ed. 2012, pp. 193–205.","ama":"Isidor R, Schwens C, Kabst R. Die Messung von Joint-Venture Erfolg. In: Zentes J, ed. <i>Markteintrittsstrategien - Dynamik Und Komplexität</i>. ; 2012:193-205.","apa":"Isidor, R., Schwens, C., &#38; Kabst, R. (2012). Die Messung von Joint-Venture Erfolg. In J. Zentes (Ed.), <i>Markteintrittsstrategien - Dynamik und Komplexität</i> (pp. 193–205).","short":"R. Isidor, C. Schwens, R. Kabst, in: J. Zentes (Ed.), Markteintrittsstrategien - Dynamik Und Komplexität, 2012, pp. 193–205.","bibtex":"@inbook{Isidor_Schwens_Kabst_2012, title={Die Messung von Joint-Venture Erfolg}, booktitle={Markteintrittsstrategien - Dynamik und Komplexität}, author={Isidor, R and Schwens, C and Kabst, R}, editor={Zentes, JEditor}, year={2012}, pages={193–205} }","mla":"Isidor, R., et al. “Die Messung von Joint-Venture Erfolg.” <i>Markteintrittsstrategien - Dynamik Und Komplexität</i>, edited by J Zentes, 2012, pp. 193–205."},"year":"2012","department":[{"_id":"274"}],"user_id":"46632","_id":"6149","language":[{"iso":"eng"}],"publication":"Markteintrittsstrategien - Dynamik und Komplexität","type":"book_chapter","status":"public","editor":[{"first_name":"J","full_name":"Zentes, J","last_name":"Zentes"}]},{"citation":{"ieee":"S. Kluczniok, <i>Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen</i>. Universität Paderborn, 2012.","chicago":"Kluczniok, Sven. <i>Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen</i>. Universität Paderborn, 2012.","ama":"Kluczniok S. <i>Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen</i>. Universität Paderborn; 2012.","apa":"Kluczniok, S. (2012). <i>Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen</i>. Universität Paderborn.","bibtex":"@book{Kluczniok_2012, title={Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen}, publisher={Universität Paderborn}, author={Kluczniok, Sven}, year={2012} }","mla":"Kluczniok, Sven. <i>Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen</i>. Universität Paderborn, 2012.","short":"S. Kluczniok, Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen, Universität Paderborn, 2012."},"year":"2012","date_created":"2017-10-17T12:42:52Z","author":[{"first_name":"Sven","full_name":"Kluczniok, Sven","last_name":"Kluczniok"}],"date_updated":"2022-01-06T07:02:54Z","publisher":"Universität Paderborn","title":"Effiziente Paketbildung in mehrdimensionalen Verhandlungsproblemen","type":"bachelorsthesis","status":"public","user_id":"477","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"616","language":[{"iso":"ger"}]},{"date_updated":"2022-01-06T07:02:55Z","author":[{"full_name":"Jungmann, Alexander","last_name":"Jungmann","first_name":"Alexander"},{"first_name":"Bernd","last_name":"Kleinjohann","full_name":"Kleinjohann, Bernd"},{"first_name":"Elisabeth","last_name":"Kleinjohann","full_name":"Kleinjohann, Elisabeth","id":"15588"},{"first_name":"Maarten","full_name":"Bieshaar, Maarten","last_name":"Bieshaar"}],"date_created":"2017-10-17T12:42:52Z","title":"Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems","has_accepted_license":"1","related_material":{"link":[{"relation":"confirmation","url":"http://www.thinkmind.org/index.php?view=article&articleid=intensive_2012_1_50_30031"}]},"year":"2012","citation":{"apa":"Jungmann, A., Kleinjohann, B., Kleinjohann, E., &#38; Bieshaar, M. (2012). Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems. In <i>Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE)</i> (pp. 22–29).","mla":"Jungmann, Alexander, et al. “Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems.” <i>Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE)</i>, 2012, pp. 22–29.","short":"A. Jungmann, B. Kleinjohann, E. Kleinjohann, M. Bieshaar, in: Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE), 2012, pp. 22–29.","bibtex":"@inproceedings{Jungmann_Kleinjohann_Kleinjohann_Bieshaar_2012, title={Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems}, booktitle={Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE)}, author={Jungmann, Alexander and Kleinjohann, Bernd and Kleinjohann, Elisabeth and Bieshaar, Maarten}, year={2012}, pages={22–29} }","ama":"Jungmann A, Kleinjohann B, Kleinjohann E, Bieshaar M. Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems. In: <i>Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE)</i>. ; 2012:22-29.","chicago":"Jungmann, Alexander, Bernd Kleinjohann, Elisabeth Kleinjohann, and Maarten Bieshaar. “Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems.” In <i>Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE)</i>, 22–29, 2012.","ieee":"A. Jungmann, B. Kleinjohann, E. Kleinjohann, and M. Bieshaar, “Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems,” in <i>Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE)</i>, 2012, pp. 22–29."},"page":"22-29","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B2","_id":"10"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"617","user_id":"477","ddc":["040"],"file_date_updated":"2018-03-15T06:47:50Z","type":"conference","publication":"Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE)","abstract":[{"lang":"eng","text":"In this paper, a color based feature extraction and classification approach for image processing in embedded systems in presented. The algorithms and data structures developed for this approach pay particular attention to reduce memory consumption and computation power of the entire image processing, since embedded systems usually impose strong restrictions regarding those resources. The feature extraction is realized in terms of an image segmentation algorithm. The criteria of homogeneity for merging pixels and regions is provided by the color classification mechanism, which incorporates appropriate methods for defining, representing and accessing subspaces in the working color space. By doing so, pixels and regions with color values that belong to the same color class can be merged. Furthermore, pixels with redundant color values that do not belong to any pre-defined color class can be completely discarded in order to minimize computational effort. Subsequently, the extracted regions are converted to a more convenient feature representation in terms of statistical moments up to and including second order. For evaluation, the whole image processing approach is applied to a mobile representative of embedded systems within the scope of a simple real-world scenario."}],"file":[{"date_updated":"2018-03-15T06:47:50Z","creator":"florida","date_created":"2018-03-15T06:47:50Z","file_size":2787964,"file_name":"617-INTENSIVE2012-Jungmann.pdf","access_level":"closed","file_id":"1245","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public"},{"type":"mastersthesis","citation":{"short":"S. Kurras, Distributed Sampling of Regular Graphs, Universität Paderborn, 2012.","bibtex":"@book{Kurras_2012, title={Distributed Sampling of Regular Graphs}, publisher={Universität Paderborn}, author={Kurras, Sven}, year={2012} }","mla":"Kurras, Sven. <i>Distributed Sampling of Regular Graphs</i>. Universität Paderborn, 2012.","apa":"Kurras, S. (2012). <i>Distributed Sampling of Regular Graphs</i>. Universität Paderborn.","ama":"Kurras S. <i>Distributed Sampling of Regular Graphs</i>. Universität Paderborn; 2012.","ieee":"S. Kurras, <i>Distributed Sampling of Regular Graphs</i>. Universität Paderborn, 2012.","chicago":"Kurras, Sven. <i>Distributed Sampling of Regular Graphs</i>. Universität Paderborn, 2012."},"status":"public","year":"2012","date_created":"2017-10-17T12:42:52Z","author":[{"full_name":"Kurras, Sven","last_name":"Kurras","first_name":"Sven"}],"user_id":"15504","project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Project Area A","_id":"2"}],"date_updated":"2022-01-06T07:02:55Z","publisher":"Universität Paderborn","_id":"618","title":"Distributed Sampling of Regular Graphs"},{"publication":"Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS)","type":"conference","status":"public","file":[{"date_updated":"2018-03-15T06:47:15Z","creator":"florida","date_created":"2018-03-15T06:47:15Z","file_size":346044,"access_level":"closed","file_id":"1244","file_name":"619-Brandes_MadHTADDS12_01.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"text":"Dynamics in networks is caused by a variety of reasons, like nodes moving in 2D (or 3D) in multihop cellphone networks, joins and leaves in peer-to-peer networks, evolution in social networks, and many others. In order to understand such kinds of dynamics, and to design distributed algorithms that behave well under dynamics, many ways to model dynamics are introduced and analyzed w.r.t. correctness and eciency of distributed algorithms. In [16], Kuhn, Lynch, and Oshman have introduced a very general, worst case type model of dynamics: The edge set of the network may change arbitrarily from step to step, the only restriction is that it is connected at all times and the set of nodes does not change. An extended model demands that a xed connected subnetwork is maintained over each time interval of length T (T-interval dynamics). They have presented, among others, algorithms for counting the number of nodes under such general models of dynamics.In this paper, we generalize their models and algorithms by adding random edge faults, i.e., we consider fault-prone dynamic networks: We assume that an edge currently existing may fail to transmit data with some probability p. We rst observe that strong counting, i.e., each node knows the correct count and stops, is not possible in a model with random edge faults. Our main two positive results are feasibility and runtime bounds for weak counting, i.e., stopping is no longer required (but still a correct count in each node), and for strong counting with an upper bound, i.e., an upper bound N on n is known to all nodes.","lang":"eng"}],"department":[{"_id":"63"}],"series_title":"ICPS","user_id":"15504","_id":"619","project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Project Area A","_id":"2"}],"file_date_updated":"2018-03-15T06:47:15Z","ddc":["040"],"has_accepted_license":"1","page":"9-14","citation":{"ama":"Brandes P, Meyer auf der Heide F. Distributed Computing in Fault-Prone Dynamic Networks. In: <i>Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS)</i>. ICPS. ; 2012:9-14. doi:<a href=\"https://doi.org/10.1145/2414815.2414818\">10.1145/2414815.2414818</a>","chicago":"Brandes, Philipp, and Friedhelm Meyer auf der Heide. “Distributed Computing in Fault-Prone Dynamic Networks.” In <i>Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS)</i>, 9–14. ICPS, 2012. <a href=\"https://doi.org/10.1145/2414815.2414818\">https://doi.org/10.1145/2414815.2414818</a>.","ieee":"P. Brandes and F. Meyer auf der Heide, “Distributed Computing in Fault-Prone Dynamic Networks,” in <i>Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS)</i>, 2012, pp. 9–14.","bibtex":"@inproceedings{Brandes_Meyer auf der Heide_2012, series={ICPS}, title={Distributed Computing in Fault-Prone Dynamic Networks}, DOI={<a href=\"https://doi.org/10.1145/2414815.2414818\">10.1145/2414815.2414818</a>}, booktitle={Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS)}, author={Brandes, Philipp and Meyer auf der Heide, Friedhelm}, year={2012}, pages={9–14}, collection={ICPS} }","mla":"Brandes, Philipp, and Friedhelm Meyer auf der Heide. “Distributed Computing in Fault-Prone Dynamic Networks.” <i>Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS)</i>, 2012, pp. 9–14, doi:<a href=\"https://doi.org/10.1145/2414815.2414818\">10.1145/2414815.2414818</a>.","short":"P. Brandes, F. Meyer auf der Heide, in: Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS), 2012, pp. 9–14.","apa":"Brandes, P., &#38; Meyer auf der Heide, F. (2012). Distributed Computing in Fault-Prone Dynamic Networks. In <i>Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS)</i> (pp. 9–14). <a href=\"https://doi.org/10.1145/2414815.2414818\">https://doi.org/10.1145/2414815.2414818</a>"},"year":"2012","date_created":"2017-10-17T12:42:52Z","author":[{"first_name":"Philipp","last_name":"Brandes","full_name":"Brandes, Philipp"},{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_updated":"2022-01-06T07:02:56Z","doi":"10.1145/2414815.2414818","title":"Distributed Computing in Fault-Prone Dynamic Networks"},{"title":"Datenschutzgerechtes DRM im Cloud Computing","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:56Z","author":[{"full_name":"Mittendorf, Robert","last_name":"Mittendorf","first_name":"Robert"}],"date_created":"2017-10-17T12:42:52Z","year":"2012","citation":{"ama":"Mittendorf R. <i>Datenschutzgerechtes DRM im Cloud Computing</i>. Universität Paderborn; 2012.","ieee":"R. Mittendorf, <i>Datenschutzgerechtes DRM im Cloud Computing</i>. Universität Paderborn, 2012.","chicago":"Mittendorf, Robert. <i>Datenschutzgerechtes DRM im Cloud Computing</i>. Universität Paderborn, 2012.","bibtex":"@book{Mittendorf_2012, title={Datenschutzgerechtes DRM im Cloud Computing}, publisher={Universität Paderborn}, author={Mittendorf, Robert}, year={2012} }","mla":"Mittendorf, Robert. <i>Datenschutzgerechtes DRM im Cloud Computing</i>. Universität Paderborn, 2012.","short":"R. Mittendorf, Datenschutzgerechtes DRM im Cloud Computing, Universität Paderborn, 2012.","apa":"Mittendorf, R. (2012). <i>Datenschutzgerechtes DRM im Cloud Computing</i>. Universität Paderborn."},"language":[{"iso":"ger"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"620","user_id":"477","status":"public","type":"bachelorsthesis"}]
