@inbook{2032,
  author       = {{Krimphove, Dieter}},
  booktitle    = {{Kölner Kommentar zum Kartellrecht Bd. 4}},
  editor       = {{Busche, Jan and Röhling, Andreas}},
  pages        = {{1165 – 1218}},
  publisher    = {{Carl Heymanns Verlag KG}},
  title        = {{{Kartellrecht der Versicherungswirtschaft (Syst. VI) }}},
  year         = {{2013}},
}

@inbook{2034,
  author       = {{Krimphove, Dieter}},
  booktitle    = {{Handbuch Innovationsmanagement}},
  editor       = {{Schmeisser, Wilhelm and Krimphove, Dieter and Hentschel, Claudia and Hartmann, Matthias}},
  pages        = {{75 – 104}},
  publisher    = {{UKV}},
  title        = {{{Eigene Innovation oder Zugangsberechtigung zu fremden Innovationen}}},
  year         = {{2013}},
}

@inbook{2035,
  author       = {{Krimphove, Dieter}},
  booktitle    = {{Handbuch Innovationsmanagement}},
  editor       = {{Schmeisser, Wilhelm and Krimphove, Dieter and Hentschel, Claudia and Hartmann, Matthias}},
  pages        = {{105 – 158}},
  publisher    = {{UKV}},
  title        = {{{Ökonomisch/juristische Konzeption der Innovationen}}},
  year         = {{2013}},
}

@inbook{2036,
  author       = {{Krimphove, Dieter}},
  booktitle    = {{Kommentar: MaComp  Mindestanforderungen an die Compliance-Funktion und die weiteren Verhaltens-, Organisations- und Transparenzpflichten nach §§ 31 ff. WpHG für Wertpapierdienstleistungsunternehmen }},
  editor       = {{Krimphove, Dieter and Kruse, Oliver}},
  pages        = {{44 – 48}},
  publisher    = {{C.H. Beck}},
  title        = {{{AT 5 der MaComp: Zusammenarbeit mehrere Wertpapierdienstleistungsunternehmen}}},
  year         = {{2013}},
}

@inbook{2037,
  author       = {{Krimphove, Dieter}},
  booktitle    = {{Kommentar: MaComp  Mindestanforderungen an die Compliance-Funktion und die weiteren Verhaltens-, Organisations- und Transparenzpflichten nach §§ 31 ff. WpHG für Wertpapierdienstleistungsunternehmen }},
  editor       = {{Krimphove, Dieter and Kruse, Oliver}},
  pages        = {{76 – 88}},
  publisher    = {{C.H. Beck}},
  title        = {{{AT 7 der MaComp: Das Verhältnis §§ 33 WpHG ff. zu § 25a KWG }}},
  year         = {{2013}},
}

@article{20411,
  author       = {{Baumeister, Jochen and von Detten, S and van Niekerk, SM and Schubert, M and Ageberg, E and Louw, QA}},
  issn         = {{0172-4622}},
  journal      = {{Int J Sports Med}},
  number       = {{12}},
  pages        = {{1106--1111}},
  title        = {{{Brain activity in predictive sensorimotor control for landings: an EEG pilot study.}}},
  doi          = {{10.1055/s-0033-1341437}},
  volume       = {{34}},
  year         = {{2013}},
}

@inproceedings{20629,
  author       = {{Needle, AR and Swanik, CB and Schubert, M and Reinecke, K and Higginson, JS and Baumeister, Jochen}},
  title        = {{{Instrumented anterior mobilization of the ankle joint increases contralateral somatosensory cortex activation in healthy subjects }}},
  year         = {{2013}},
}

@inproceedings{20831,
  abstract     = {{Die Komplexität von mechatronischen Systemen wird stetig größer. MechatronicUML (MUML) ist eine Methode zur Entwicklung für Software von mechatronischen Systemen. Im Rahmen einer Bachelorarbeit wurde ein bestehender Quelltextgenerator für MUML-Modelle so erweitert, dass Quelltext für ein Echtzeitbetriebssystem generiert werden kann, welches auf einem LEGO Mindstorms-Roboter installiert ist.}},
  author       = {{Geismann, Johannes}},
  booktitle    = {{Berichtsband der Informatiktage 2013: Smarte Sichten, smarte Schichten}},
  pages        = {{71--74}},
  publisher    = {{Köllen Verlag}},
  title        = {{{Quelltextgenerierung für LEGO Mindstorms-Roboter}}},
  volume       = {{12}},
  year         = {{2013}},
}

@article{20863,
  abstract     = {{This article examines and extends research on the relation between the capital asset pricing model market beta, accounting risk measures and macroeconomic risk factors. We employ a beta decomposition approach that nests competing models with different business risk proxies and allows to frame cross-model comparison. Because model tests require estimated independent variables resulting in measurement error, we empirically estimate three comparable model specifications with instrumental variable estimators and for the first time provide thorough instrument diagnostics in this setting. Correcting for the heretofore neglected weak instruments problem we find that growth risk (i.e., the risk of firm sales variations that are inconsistent with the market wide trends), is the business risk that explains cross-sectional variations in market beta best.}},
  author       = {{Schlueter, Tobias and Sievers, Sönke}},
  issn         = {{0924-865X}},
  journal      = {{Review of Quantitative Finance and Accounting (VHB-JOURQUAL 3 Ranking B)}},
  keywords     = {{CAPM, Cost of capital, Accounting beta, Intrinsic business risk, Growth risk, Instrumental variables}},
  number       = {{3}},
  pages        = {{535--570}},
  title        = {{{Determinants of market beta: the impacts of firm-specific accounting figures and market conditions}}},
  doi          = {{10.1007/s11156-013-0352-1}},
  year         = {{2013}},
}

@inproceedings{20911,
  abstract     = {{One approach to cope with the growing complexity of today’s embedded systems software, especially in the automotive domain, is component-based software development. For systems based on hierarchical component architectures like AUTOSAR and developed in conformance with process models such as Automotive SPICE, requirements should be specified for the whole system under development and partitioned subsequently onto the particular components across several hierarchy layers. In previous work, we developed a formal requirements engineering (RE) approach based on a recent Live Sequence Chart (LSC) variant, so-called Modal Sequence Diagrams (MSDs). This scenario-based RE approach allows to validate the requirements by means of simulation (i.e., the play-out algorithm originally conceived for LSCs) and to formally verify the requirements for consistency. However, these scenarios are specified on a plain structural basis that does not reflect the typical structure of component architectures, which are arranged in a hierarchical way and encompass ports, interfaces, and directed connectors. In order to tackle this problem, we introduce in this paper a modeling and simulation approach for MSDs based on hierarchical component architectures. By binding these two aspects together, we foster an integrated and iterative RE and component architecture design.
}},
  author       = {{Holtmann, Jörg and Meyer, Matthias}},
  booktitle    = {{Proceedings of 11th Workshop Automotive Software Engineering}},
  pages        = {{2458–2472}},
  publisher    = {{Bonner Koellen Verlag}},
  title        = {{{Play-out for Hierarchical Component Architectures}}},
  volume       = {{P-220}},
  year         = {{2013}},
}

@inproceedings{20913,
  author       = {{Frieben, Jens and Heutger, Henning and Meyer, Matthias and Becker, Steffen}},
  booktitle    = {{9. Paderborner Workshop Entwurf mechatronischer Systeme}},
  pages        = {{147--160}},
  publisher    = {{Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}},
  title        = {{{Modulare Leistungsprognose von Kompaktsteuerungen}}},
  year         = {{2013}},
}

@misc{1795,
  abstract     = {{Distributed revision control is widespread throughout the software industry. Systems like git and mercurial gained a lot of users over the last years and started to supersede central systems like Subversion or CVS in some projects. While restricting access to those central systems is basically possible, it is difficult to control the propagation of contents in a distributed revision control system because every user has a local copy of the whole repository. In this thesis a concept is developed and implemented that allows secure storage of confidential data in a distributed revision control system and enables users to manage read and write permissions on single confidential files. Therefore different cryptographic methods are used, such as asymmetric encryption, digital signatures and convergent encryption. These techniques are applied in a manner that fits the special requirements of a revision control system and allows a space efficient storage of changes to the encrypted files.}},
  author       = {{Lass, Michael}},
  publisher    = {{Paderborn University}},
  title        = {{{Sichere Speicherung vertraulicher Daten in verteilten Versionskontrollsystemen}}},
  year         = {{2013}},
}

@inproceedings{1798,
  author       = {{Keller, Matthias and Robbert, Christoph and Peuster, Manuel}},
  booktitle    = {{Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM }},
  title        = {{{An evaluation testbed for adaptive, topology-aware deployment of elastic applications}}},
  year         = {{2013}},
}

@inproceedings{1799,
  author       = {{Ali-Ahmad, Hassan and Cicconetti, Claudio and de la Oliva, Antonio and Draxler, Martin and Gupta, Rohit and Mancuso, Vincenzo and Roullet, Laurent and Sciancalepore, Vincenzo}},
  booktitle    = {{2013 Second European Workshop on Software Defined Networks}},
  isbn         = {{9781479924332}},
  publisher    = {{IEEE}},
  title        = {{{CROWD: An SDN Approach for DenseNets}}},
  doi          = {{10.1109/ewsdn.2013.11}},
  year         = {{2013}},
}

@inbook{1800,
  author       = {{Blanckenstein, Johannes and Garcia-Jimenez, Javier and Klaue, Jirka and Karl, Holger}},
  booktitle    = {{Lecture Notes in Electrical Engineering}},
  isbn         = {{9783319030708}},
  issn         = {{1876-1100}},
  pages        = {{165--177}},
  publisher    = {{Springer International Publishing}},
  title        = {{{A Scalable Redundant TDMA Protocol for High-Density WSNs Inside an Aircraft}}},
  doi          = {{10.1007/978-3-319-03071-5_18}},
  year         = {{2013}},
}

@misc{18000,
  author       = {{Blumentritt, Fritz}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Cliquenbildung in verteilten Systemen}}},
  year         = {{2013}},
}

@inproceedings{1802,
  author       = {{Wette, P. and Graffi, K.}},
  booktitle    = {{2013 Conference on Networked Systems}},
  isbn         = {{9781467356459}},
  publisher    = {{IEEE}},
  title        = {{{Adding Capacity-Aware Storage Indirection to Homogeneous Distributed Hash Tables}}},
  doi          = {{10.1109/netsys.2013.9}},
  year         = {{2013}},
}

@inproceedings{1803,
  author       = {{Dannewitz, Christian and Herlich, Matthias and Karl, Holger}},
  booktitle    = {{37th Annual IEEE Conference on Local Computer Networks -- Workshops}},
  isbn         = {{9781467321297}},
  publisher    = {{IEEE}},
  title        = {{{OpenNetInf - prototyping an information-centric Network Architecture}}},
  doi          = {{10.1109/lcnw.2012.6424044}},
  year         = {{2013}},
}

@inbook{1804,
  author       = {{de la Oliva, Antonio and Morelli, Arianna and Mancuso, Vincenzo and Draexler, Martin and Hentschel, Tim and Melia, Telemaco and Seite, Pierrick and Cicconetti, Claudio}},
  booktitle    = {{Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}},
  isbn         = {{9783642379345}},
  issn         = {{1867-8211}},
  pages        = {{28--41}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Denser Networks for the Future Internet, the CROWD Approach}}},
  doi          = {{10.1007/978-3-642-37935-2_3}},
  year         = {{2013}},
}

@book{18064,
  editor       = {{Meister, Dorothee M. and von Gross, F. and Sander, U.}},
  publisher    = {{Juventa Verlag}},
  title        = {{{Enzyklopädie Erziehungswissenschaft Online - Medienpädagogik}}},
  year         = {{2013}},
}

