[{"_id":"7735","date_updated":"2022-01-06T07:03:45Z","citation":{"apa":"Münkhoff, E., Garnefeld, I., & Bruns, A. (2013). How to prolong a sales promotion – Ex-post time extension versus reframing. In roceedings of the 42nd European Marketing Academy (EMAC) Conference.","ama":"Münkhoff E, Garnefeld I, Bruns A. How to prolong a sales promotion – Ex-post time extension versus reframing. In: Roceedings of the 42nd European Marketing Academy (EMAC) Conference. ; 2013.","chicago":"Münkhoff, E, I Garnefeld, and A Bruns. “How to Prolong a Sales Promotion – Ex-Post Time Extension versus Reframing.” In Roceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","bibtex":"@inproceedings{Münkhoff_Garnefeld_Bruns_2013, title={How to prolong a sales promotion – Ex-post time extension versus reframing}, booktitle={roceedings of the 42nd European Marketing Academy (EMAC) Conference}, author={Münkhoff, E and Garnefeld, I and Bruns, A}, year={2013} }","mla":"Münkhoff, E., et al. “How to Prolong a Sales Promotion – Ex-Post Time Extension versus Reframing.” Roceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","short":"E. Münkhoff, I. Garnefeld, A. Bruns, in: Roceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","ieee":"E. Münkhoff, I. Garnefeld, and A. Bruns, “How to prolong a sales promotion – Ex-post time extension versus reframing,” in roceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013."},"year":"2013","type":"conference","language":[{"iso":"eng"}],"title":"How to prolong a sales promotion – Ex-post time extension versus reframing","user_id":"57352","status":"public","date_created":"2019-02-16T10:09:34Z","author":[{"full_name":"Münkhoff, E","first_name":"E","last_name":"Münkhoff"},{"first_name":"I","full_name":"Garnefeld, I","last_name":"Garnefeld"},{"last_name":"Bruns","full_name":"Bruns, A","first_name":"A"}],"publication":"roceedings of the 42nd European Marketing Academy (EMAC) Conference","department":[{"_id":"19"},{"_id":"180"}]},{"status":"public","date_created":"2019-02-18T10:44:22Z","author":[{"last_name":"Posner ","first_name":"T","full_name":"Posner , T"},{"last_name":"Garnefeld","full_name":"Garnefeld, I","first_name":"I"},{"last_name":"Eggert","full_name":"Eggert, A","first_name":"A"}],"publication":"Proceedings of the 42nd European Marketing Academy (EMAC) Conference","department":[{"_id":"19"},{"_id":"180"}],"title":"Creating Emotional Brand Attachment through the Salesperson's Brand-Consistent Behavior","user_id":"57352","citation":{"short":"T. Posner , I. Garnefeld, A. Eggert, in: Proceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","ieee":"T. Posner , I. Garnefeld, and A. Eggert, “Creating Emotional Brand Attachment through the Salesperson’s Brand-Consistent Behavior,” in Proceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","ama":"Posner T, Garnefeld I, Eggert A. Creating Emotional Brand Attachment through the Salesperson’s Brand-Consistent Behavior. In: Proceedings of the 42nd European Marketing Academy (EMAC) Conference. ; 2013.","apa":"Posner , T., Garnefeld, I., & Eggert, A. (2013). Creating Emotional Brand Attachment through the Salesperson’s Brand-Consistent Behavior. In Proceedings of the 42nd European Marketing Academy (EMAC) Conference.","chicago":"Posner , T, I Garnefeld, and A Eggert. “Creating Emotional Brand Attachment through the Salesperson’s Brand-Consistent Behavior.” In Proceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","mla":"Posner , T., et al. “Creating Emotional Brand Attachment through the Salesperson’s Brand-Consistent Behavior.” Proceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","bibtex":"@inproceedings{Posner _Garnefeld_Eggert_2013, title={Creating Emotional Brand Attachment through the Salesperson’s Brand-Consistent Behavior}, booktitle={Proceedings of the 42nd European Marketing Academy (EMAC) Conference}, author={Posner , T and Garnefeld, I and Eggert, A}, year={2013} }"},"type":"conference","year":"2013","language":[{"iso":"eng"}],"_id":"7736","date_updated":"2022-01-06T07:03:45Z"},{"citation":{"ieee":"L. Steinhoff and R. W. Palmatier, “The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance,” in Proceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","short":"L. Steinhoff, R.W. Palmatier, in: Proceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","bibtex":"@inproceedings{Steinhoff_Palmatier_2013, title={The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance}, booktitle={Proceedings of the 42nd European Marketing Academy (EMAC) Conference}, author={Steinhoff, L and Palmatier, R. W}, year={2013} }","mla":"Steinhoff, L., and R. W. Palmatier. “The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance.” Proceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013.","apa":"Steinhoff, L., & Palmatier, R. W. (2013). The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance. In Proceedings of the 42nd European Marketing Academy (EMAC) Conference.","ama":"Steinhoff L, Palmatier RW. The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance. In: Proceedings of the 42nd European Marketing Academy (EMAC) Conference. ; 2013.","chicago":"Steinhoff, L, and R. W Palmatier. “The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance.” In Proceedings of the 42nd European Marketing Academy (EMAC) Conference, 2013."},"type":"conference","year":"2013","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:03:45Z","_id":"7737","author":[{"first_name":"L","full_name":"Steinhoff, L","last_name":"Steinhoff"},{"last_name":"Palmatier","full_name":"Palmatier, R. W","first_name":"R. W"}],"publication":"Proceedings of the 42nd European Marketing Academy (EMAC) Conference","department":[{"_id":"19"},{"_id":"180"}],"status":"public","date_created":"2019-02-18T10:46:24Z","title":"The Effect of Loyalty Programs on Target and Bystander Customers: A Customer Portfolio Perspective on Loyalty Program Performance","user_id":"57352"},{"date_updated":"2022-01-06T07:03:45Z","_id":"7738","type":"conference","year":"2013","citation":{"ieee":"A. Eggert, C. Thiesbrummel, and C. Deutscher, “Exploring differential effects of product and service innovations on industrial firms’ financial performance,” in 2013 AMA Winter Marketing Educators’ Proceedings, 2013.","short":"A. Eggert, C. Thiesbrummel, C. Deutscher, in: 2013 AMA Winter Marketing Educators’ Proceedings, 2013.","bibtex":"@inproceedings{Eggert_Thiesbrummel_Deutscher_2013, title={Exploring differential effects of product and service innovations on industrial firms’ financial performance}, booktitle={2013 AMA Winter Marketing Educators’ Proceedings}, author={Eggert, A and Thiesbrummel, C and Deutscher, C}, year={2013} }","mla":"Eggert, A., et al. “Exploring Differential Effects of Product and Service Innovations on Industrial Firms’ Financial Performance.” 2013 AMA Winter Marketing Educators’ Proceedings, 2013.","chicago":"Eggert, A, C Thiesbrummel, and C Deutscher. “Exploring Differential Effects of Product and Service Innovations on Industrial Firms’ Financial Performance.” In 2013 AMA Winter Marketing Educators’ Proceedings, 2013.","ama":"Eggert A, Thiesbrummel C, Deutscher C. Exploring differential effects of product and service innovations on industrial firms’ financial performance. In: 2013 AMA Winter Marketing Educators’ Proceedings. ; 2013.","apa":"Eggert, A., Thiesbrummel, C., & Deutscher, C. (2013). Exploring differential effects of product and service innovations on industrial firms’ financial performance. In 2013 AMA Winter Marketing Educators’ Proceedings."},"language":[{"iso":"eng"}],"title":"Exploring differential effects of product and service innovations on industrial firms’ financial performance","user_id":"57352","date_created":"2019-02-18T10:48:20Z","status":"public","publication":"2013 AMA Winter Marketing Educators' Proceedings","department":[{"_id":"19"},{"_id":"180"}],"author":[{"last_name":"Eggert","full_name":"Eggert, A","first_name":"A"},{"last_name":"Thiesbrummel","full_name":"Thiesbrummel, C","first_name":"C"},{"last_name":"Deutscher","first_name":"C","full_name":"Deutscher, C"}]},{"user_id":"15572","title":"The playground of Wireless Dense networks of the future","department":[{"_id":"75"}],"publication":"2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013","author":[{"first_name":"Claudio","full_name":"Cicconetti, Claudio","last_name":"Cicconetti"},{"last_name":"Morelli","full_name":"Morelli, Arianna","first_name":"Arianna"},{"last_name":"Dräxler","full_name":"Dräxler, Martin","first_name":"Martin"},{"last_name":"Karl","id":"126","first_name":"Holger","full_name":"Karl, Holger"},{"last_name":"Mancuso","first_name":"Vincenzo","full_name":"Mancuso, Vincenzo"},{"last_name":"Sciancalepore","first_name":"Vincenzo","full_name":"Sciancalepore, Vincenzo"},{"full_name":"Gupta, Rohit","first_name":"Rohit","last_name":"Gupta"},{"last_name":"de la Oliva","first_name":"Antonio","full_name":"de la Oliva, Antonio"},{"full_name":"Isabel Sanchez, M.","first_name":"M.","last_name":"Isabel Sanchez"},{"last_name":"Serrano","first_name":"Pablo","full_name":"Serrano, Pablo"},{"last_name":"Roullet","first_name":"Laurent","full_name":"Roullet, Laurent"}],"date_created":"2017-11-27T10:22:26Z","status":"public","_id":"774","date_updated":"2022-01-06T07:03:45Z","page":"1--4","year":"2013","type":"conference","citation":{"mla":"Cicconetti, Claudio, et al. “The Playground of Wireless Dense Networks of the Future.” 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013, 2013, pp. 1--4.","bibtex":"@inproceedings{Cicconetti_Morelli_Dräxler_Karl_Mancuso_Sciancalepore_Gupta_de la Oliva_Isabel Sanchez_Serrano_et al._2013, title={The playground of Wireless Dense networks of the future}, booktitle={2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013}, author={Cicconetti, Claudio and Morelli, Arianna and Dräxler, Martin and Karl, Holger and Mancuso, Vincenzo and Sciancalepore, Vincenzo and Gupta, Rohit and de la Oliva, Antonio and Isabel Sanchez, M. and Serrano, Pablo and et al.}, year={2013}, pages={1--4} }","apa":"Cicconetti, C., Morelli, A., Dräxler, M., Karl, H., Mancuso, V., Sciancalepore, V., … Roullet, L. (2013). The playground of Wireless Dense networks of the future. In 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013 (pp. 1--4).","ama":"Cicconetti C, Morelli A, Dräxler M, et al. The playground of Wireless Dense networks of the future. In: 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013. ; 2013:1--4.","chicago":"Cicconetti, Claudio, Arianna Morelli, Martin Dräxler, Holger Karl, Vincenzo Mancuso, Vincenzo Sciancalepore, Rohit Gupta, et al. “The Playground of Wireless Dense Networks of the Future.” In 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013, 1--4, 2013.","ieee":"C. Cicconetti et al., “The playground of Wireless Dense networks of the future,” in 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013, 2013, pp. 1--4.","short":"C. Cicconetti, A. Morelli, M. Dräxler, H. Karl, V. Mancuso, V. Sciancalepore, R. Gupta, A. de la Oliva, M. Isabel Sanchez, P. Serrano, L. Roullet, in: 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013, 2013, pp. 1--4."}},{"year":"2013","type":"conference","citation":{"ieee":"M. Keller, M. Peuster, C. Robbert, and H. Karl, “A topology-aware adaptive deployment framework for elastic applications,” in 17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013, 2013, pp. 61--69.","short":"M. Keller, M. Peuster, C. Robbert, H. Karl, in: 17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013, 2013, pp. 61--69.","mla":"Keller, Matthias, et al. “A Topology-Aware Adaptive Deployment Framework for Elastic Applications.” 17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013, 2013, pp. 61--69, doi:10.1109/ICIN.2013.6670895.","bibtex":"@inproceedings{Keller_Peuster_Robbert_Karl_2013, title={A topology-aware adaptive deployment framework for elastic applications}, DOI={10.1109/ICIN.2013.6670895}, booktitle={17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013}, author={Keller, Matthias and Peuster, Manuel and Robbert, Christoph and Karl, Holger}, year={2013}, pages={61--69} }","chicago":"Keller, Matthias, Manuel Peuster, Christoph Robbert, and Holger Karl. “A Topology-Aware Adaptive Deployment Framework for Elastic Applications.” In 17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013, 61--69, 2013. https://doi.org/10.1109/ICIN.2013.6670895.","ama":"Keller M, Peuster M, Robbert C, Karl H. A topology-aware adaptive deployment framework for elastic applications. In: 17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013. ; 2013:61--69. doi:10.1109/ICIN.2013.6670895","apa":"Keller, M., Peuster, M., Robbert, C., & Karl, H. (2013). A topology-aware adaptive deployment framework for elastic applications. In 17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013 (pp. 61--69). https://doi.org/10.1109/ICIN.2013.6670895"},"page":"61--69","date_updated":"2022-01-06T07:03:45Z","_id":"775","ec_funded":"1","doi":"10.1109/ICIN.2013.6670895","author":[{"last_name":"Keller","first_name":"Matthias","full_name":"Keller, Matthias"},{"first_name":"Manuel","full_name":"Peuster, Manuel","last_name":"Peuster","id":"13271"},{"first_name":"Christoph","full_name":"Robbert, Christoph","last_name":"Robbert"},{"id":"126","last_name":"Karl","full_name":"Karl, Holger","first_name":"Holger"}],"department":[{"_id":"75"}],"publication":"17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013","status":"public","date_created":"2017-11-27T10:22:26Z","project":[{"_id":"26","call_identifier":"FP7-ICT-2009-5","name":"Scalable & Adaptive Internet soLutions","grant_number":"257448"}],"user_id":"15572","title":"A topology-aware adaptive deployment framework for elastic applications"},{"_id":"776","date_updated":"2022-01-06T07:03:45Z","page":"1--5","citation":{"bibtex":"@inproceedings{Herlich_Karl_2013, title={Energy-Efficient Assignment of User Equipment to Cooperative Base Stations}, booktitle={ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013}, author={Herlich, Matthias and Karl, Holger}, year={2013}, pages={1--5} }","mla":"Herlich, Matthias, and Holger Karl. “Energy-Efficient Assignment of User Equipment to Cooperative Base Stations.” ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013, 2013, pp. 1--5.","chicago":"Herlich, Matthias, and Holger Karl. “Energy-Efficient Assignment of User Equipment to Cooperative Base Stations.” In ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013, 1--5, 2013.","apa":"Herlich, M., & Karl, H. (2013). Energy-Efficient Assignment of User Equipment to Cooperative Base Stations. In ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013 (pp. 1--5).","ama":"Herlich M, Karl H. Energy-Efficient Assignment of User Equipment to Cooperative Base Stations. In: ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013. ; 2013:1--5.","ieee":"M. Herlich and H. Karl, “Energy-Efficient Assignment of User Equipment to Cooperative Base Stations,” in ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013, 2013, pp. 1--5.","short":"M. Herlich, H. Karl, in: ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013, 2013, pp. 1--5."},"year":"2013","type":"conference","title":"Energy-Efficient Assignment of User Equipment to Cooperative Base Stations","user_id":"15572","date_created":"2017-11-27T10:22:26Z","status":"public","department":[{"_id":"75"}],"publication":"ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013","author":[{"full_name":"Herlich, Matthias","first_name":"Matthias","last_name":"Herlich"},{"first_name":"Holger","full_name":"Karl, Holger","last_name":"Karl","id":"126"}]},{"volume":"P-224","editor":[{"last_name":"Fazal-Baqaie","first_name":"Masud","full_name":"Fazal-Baqaie, Masud"}],"date_created":"2019-02-19T11:59:57Z","status":"public","department":[{"_id":"66"}],"publisher":"GI, Köllen Druck+Verlag GmbH, Bonn","title":"Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch und Wirklichkeit - Proceedings der 20. Tagung der Fachgruppe Vorgehensmodelle im Fachgebiet Wirtschaftsinformatik (WI-VM) der Gesellschaft für Informatik e.V., Lörrach (Germany)","user_id":"52534","type":"conference_editor","year":"2013","citation":{"short":"M. Fazal-Baqaie, ed., Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch Und Wirklichkeit - Proceedings Der 20. Tagung Der Fachgruppe Vorgehensmodelle Im Fachgebiet Wirtschaftsinformatik (WI-VM) Der Gesellschaft Für Informatik e.V., Lörrach (Germany), GI, Köllen Druck+Verlag GmbH, Bonn, 2013.","ieee":"M. Fazal-Baqaie, Ed., Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch und Wirklichkeit - Proceedings der 20. Tagung der Fachgruppe Vorgehensmodelle im Fachgebiet Wirtschaftsinformatik (WI-VM) der Gesellschaft für Informatik e.V., Lörrach (Germany), vol. P-224. GI, Köllen Druck+Verlag GmbH, Bonn, 2013.","chicago":"Fazal-Baqaie, Masud, ed. Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch Und Wirklichkeit - Proceedings Der 20. Tagung Der Fachgruppe Vorgehensmodelle Im Fachgebiet Wirtschaftsinformatik (WI-VM) Der Gesellschaft Für Informatik e.V., Lörrach (Germany). Vol. P-224. Lecture Notes in Informatics. GI, Köllen Druck+Verlag GmbH, Bonn, 2013.","ama":"Fazal-Baqaie M, ed. Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch Und Wirklichkeit - Proceedings Der 20. Tagung Der Fachgruppe Vorgehensmodelle Im Fachgebiet Wirtschaftsinformatik (WI-VM) Der Gesellschaft Für Informatik e.V., Lörrach (Germany). Vol P-224. GI, Köllen Druck+Verlag GmbH, Bonn; 2013.","apa":"Fazal-Baqaie, M. (Ed.). (2013). Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch und Wirklichkeit - Proceedings der 20. Tagung der Fachgruppe Vorgehensmodelle im Fachgebiet Wirtschaftsinformatik (WI-VM) der Gesellschaft für Informatik e.V., Lörrach (Germany) (Vol. P-224). GI, Köllen Druck+Verlag GmbH, Bonn.","bibtex":"@book{Fazal-Baqaie_2013, series={Lecture Notes in Informatics}, title={Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch und Wirklichkeit - Proceedings der 20. Tagung der Fachgruppe Vorgehensmodelle im Fachgebiet Wirtschaftsinformatik (WI-VM) der Gesellschaft für Informatik e.V., Lörrach (Germany)}, volume={P-224}, publisher={GI, Köllen Druck+Verlag GmbH, Bonn}, year={2013}, collection={Lecture Notes in Informatics} }","mla":"Fazal-Baqaie, Masud, editor. Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch Und Wirklichkeit - Proceedings Der 20. Tagung Der Fachgruppe Vorgehensmodelle Im Fachgebiet Wirtschaftsinformatik (WI-VM) Der Gesellschaft Für Informatik e.V., Lörrach (Germany). Vol. P-224, GI, Köllen Druck+Verlag GmbH, Bonn, 2013."},"language":[{"iso":"eng"}],"series_title":"Lecture Notes in Informatics","_id":"7762","date_updated":"2022-01-06T07:03:45Z"},{"year":"2013","type":"conference","citation":{"chicago":"Dräxler, Martin, and Holger Karl. “Cross-Layer Scheduling for Multi-Quality Video Streaming in Cellular Wireless Networks.” In 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013, 1181--1186, 2013. https://doi.org/10.1109/IWCMC.2013.6583724.","ama":"Dräxler M, Karl H. Cross-layer scheduling for multi-quality video streaming in cellular wireless networks. In: 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013. ; 2013:1181--1186. doi:10.1109/IWCMC.2013.6583724","apa":"Dräxler, M., & Karl, H. (2013). Cross-layer scheduling for multi-quality video streaming in cellular wireless networks. In 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013 (pp. 1181--1186). https://doi.org/10.1109/IWCMC.2013.6583724","bibtex":"@inproceedings{Dräxler_Karl_2013, title={Cross-layer scheduling for multi-quality video streaming in cellular wireless networks}, DOI={10.1109/IWCMC.2013.6583724}, booktitle={2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013}, author={Dräxler, Martin and Karl, Holger}, year={2013}, pages={1181--1186} }","mla":"Dräxler, Martin, and Holger Karl. “Cross-Layer Scheduling for Multi-Quality Video Streaming in Cellular Wireless Networks.” 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013, 2013, pp. 1181--1186, doi:10.1109/IWCMC.2013.6583724.","short":"M. Dräxler, H. Karl, in: 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013, 2013, pp. 1181--1186.","ieee":"M. Dräxler and H. Karl, “Cross-layer scheduling for multi-quality video streaming in cellular wireless networks,” in 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013, 2013, pp. 1181--1186."},"page":"1181--1186","doi":"10.1109/IWCMC.2013.6583724","date_updated":"2022-01-06T07:03:45Z","_id":"777","status":"public","date_created":"2017-11-27T10:22:26Z","author":[{"last_name":"Dräxler","full_name":"Dräxler, Martin","first_name":"Martin"},{"full_name":"Karl, Holger","first_name":"Holger","id":"126","last_name":"Karl"}],"department":[{"_id":"75"}],"publication":"2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013","user_id":"15572","title":"Cross-layer scheduling for multi-quality video streaming in cellular wireless networks"},{"language":[{"iso":"eng"}],"year":"2013","type":"preprint","citation":{"ama":"Dräxler M, Blobel J, Dreimann P, Valentin S, Karl H. Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming. CoRR. 2013.","apa":"Dräxler, M., Blobel, J., Dreimann, P., Valentin, S., & Karl, H. (2013). Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming. CoRR.","chicago":"Dräxler, Martin, Johannes Blobel, Philipp Dreimann, Stefan Valentin, and Holger Karl. “Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming.” CoRR, 2013.","mla":"Dräxler, Martin, et al. “Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming.” CoRR, 2013.","bibtex":"@article{Dräxler_Blobel_Dreimann_Valentin_Karl_2013, title={Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming}, journal={CoRR}, author={Dräxler, Martin and Blobel, Johannes and Dreimann, Philipp and Valentin, Stefan and Karl, Holger}, year={2013} }","short":"M. Dräxler, J. Blobel, P. Dreimann, S. Valentin, H. Karl, CoRR (2013).","ieee":"M. Dräxler, J. Blobel, P. Dreimann, S. Valentin, and H. Karl, “Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming,” CoRR. 2013."},"_id":"781","date_updated":"2022-01-06T07:03:46Z","status":"public","date_created":"2017-11-27T10:22:26Z","author":[{"last_name":"Dräxler","first_name":"Martin","full_name":"Dräxler, Martin"},{"full_name":"Blobel, Johannes","first_name":"Johannes","last_name":"Blobel"},{"full_name":"Dreimann, Philipp","first_name":"Philipp","last_name":"Dreimann"},{"last_name":"Valentin","first_name":"Stefan","full_name":"Valentin, Stefan"},{"full_name":"Karl, Holger","first_name":"Holger","id":"126","last_name":"Karl"}],"department":[{"_id":"75"}],"publication":"CoRR","user_id":"126","related_material":{"link":[{"relation":"confirmation","url":"https://arxiv.org/abs/1309.5491"}]},"title":"Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming"},{"language":[{"iso":"eng"}],"page":"17-26","citation":{"bibtex":"@inproceedings{Nagel_Gerth_Post_Engels_2013, title={Ensuring Consistency Among Business Goals and Business Process Models}, booktitle={Proceedings of the 17th IEEE International EDOC Conference (EDOC’13)}, publisher={IEEE Computer Society}, author={Nagel, Benjamin and Gerth, Christian and Post, Jennifer and Engels, Gregor}, year={2013}, pages={17–26} }","mla":"Nagel, Benjamin, et al. “Ensuring Consistency Among Business Goals and Business Process Models.” Proceedings of the 17th IEEE International EDOC Conference (EDOC’13), IEEE Computer Society, 2013, pp. 17–26.","ama":"Nagel B, Gerth C, Post J, Engels G. Ensuring Consistency Among Business Goals and Business Process Models. In: Proceedings of the 17th IEEE International EDOC Conference (EDOC’13). IEEE Computer Society; 2013:17-26.","apa":"Nagel, B., Gerth, C., Post, J., & Engels, G. (2013). Ensuring Consistency Among Business Goals and Business Process Models. In Proceedings of the 17th IEEE International EDOC Conference (EDOC’13) (pp. 17–26). IEEE Computer Society.","chicago":"Nagel, Benjamin, Christian Gerth, Jennifer Post, and Gregor Engels. “Ensuring Consistency Among Business Goals and Business Process Models.” In Proceedings of the 17th IEEE International EDOC Conference (EDOC’13), 17–26. IEEE Computer Society, 2013.","ieee":"B. Nagel, C. Gerth, J. Post, and G. Engels, “Ensuring Consistency Among Business Goals and Business Process Models,” in Proceedings of the 17th IEEE International EDOC Conference (EDOC’13), 2013, pp. 17–26.","short":"B. Nagel, C. Gerth, J. Post, G. Engels, in: Proceedings of the 17th IEEE International EDOC Conference (EDOC’13), IEEE Computer Society, 2013, pp. 17–26."},"type":"conference","year":"2013","date_updated":"2022-01-06T07:03:50Z","_id":"8057","date_created":"2019-02-21T21:06:49Z","status":"public","publication":"Proceedings of the 17th IEEE International EDOC Conference (EDOC'13)","department":[{"_id":"66"}],"author":[{"last_name":"Nagel","first_name":"Benjamin","full_name":"Nagel, Benjamin"},{"first_name":"Christian","full_name":"Gerth, Christian","last_name":"Gerth"},{"last_name":"Post","first_name":"Jennifer","full_name":"Post, Jennifer"},{"first_name":"Gregor","full_name":"Engels, Gregor","last_name":"Engels","id":"107"}],"publisher":"IEEE Computer Society","user_id":"52534","title":"Ensuring Consistency Among Business Goals and Business Process Models","abstract":[{"lang":"eng","text":"The paradigm of service-oriented architectures has emerged as an architectural style for designing enterprise applications. Requirements engineering for such applications comprises the specification of business goal models representing stakeholder objectives and the operationalization to business process models that specify the required composition of services. Inconsistencies between business goals and derived business processes can lead to service compositions that are not in line with the actual stakeholder objectives. For preserving consistency it is required to consider logical and temporal dependencies among goals (e.g. the order in which they need to be achieved) in the derivation of business processes. In previous work, we provided a technique for the elicitation and specification of dependencies between business goals. Extending this approach, we aim at validating the consistency between business goal models and business process models regarding these dependencies. In this paper, we present a pattern-based approach for the automated generation of verifiable business process quality constraints from business goal models. We describe how these constraints can be used to check the consistency between business goals and business processes and demonstrate the applicability of our approach in a case study by using the implemented tool support."}]},{"place":"Bonn","title":"Modellbasierte Bewertung von Testprozessen nach TPI NEXT® mit Geschäftsprozess-Mustern","user_id":"52534","publication":"Proceedings of the conference on Software Enginneering, Fachtagung des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany)","department":[{"_id":"66"}],"publisher":"Gesellschaft für Informatik (GI)","author":[{"first_name":"Claudia","full_name":"Schumacher, Claudia","last_name":"Schumacher"},{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"full_name":"Güldali, Baris","first_name":"Baris","last_name":"Güldali"},{"last_name":"Niehammer","full_name":"Niehammer, Markus","first_name":"Markus"},{"last_name":"Hamburg","first_name":"Matthias","full_name":"Hamburg, Matthias"}],"volume":"P-213","editor":[{"last_name":"Kowalewski","first_name":"Stefan","full_name":"Kowalewski, Stefan"},{"first_name":"Bernhard","full_name":"Rumpe, Bernhard","last_name":"Rumpe"}],"date_created":"2019-02-21T21:09:30Z","status":"public","_id":"8058","date_updated":"2022-01-06T07:03:50Z","series_title":"Lecture Notes in Informatics (LNI)","page":"331-344","type":"conference","citation":{"apa":"Schumacher, C., Engels, G., Güldali, B., Niehammer, M., & Hamburg, M. (2013). Modellbasierte Bewertung von Testprozessen nach TPI NEXT® mit Geschäftsprozess-Mustern. In S. Kowalewski & B. Rumpe (Eds.), Proceedings of the conference on Software Enginneering, Fachtagung des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany) (Vol. P-213, pp. 331–344). Bonn: Gesellschaft für Informatik (GI).","ama":"Schumacher C, Engels G, Güldali B, Niehammer M, Hamburg M. Modellbasierte Bewertung von Testprozessen nach TPI NEXT® mit Geschäftsprozess-Mustern. In: Kowalewski S, Rumpe B, eds. Proceedings of the Conference on Software Enginneering, Fachtagung Des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany). Vol P-213. Lecture Notes in Informatics (LNI). Bonn: Gesellschaft für Informatik (GI); 2013:331-344.","chicago":"Schumacher, Claudia, Gregor Engels, Baris Güldali, Markus Niehammer, and Matthias Hamburg. “Modellbasierte Bewertung von Testprozessen Nach TPI NEXT® Mit Geschäftsprozess-Mustern.” In Proceedings of the Conference on Software Enginneering, Fachtagung Des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany), edited by Stefan Kowalewski and Bernhard Rumpe, P-213:331–44. Lecture Notes in Informatics (LNI). Bonn: Gesellschaft für Informatik (GI), 2013.","bibtex":"@inproceedings{Schumacher_Engels_Güldali_Niehammer_Hamburg_2013, place={Bonn}, series={Lecture Notes in Informatics (LNI)}, title={Modellbasierte Bewertung von Testprozessen nach TPI NEXT® mit Geschäftsprozess-Mustern}, volume={P-213}, booktitle={Proceedings of the conference on Software Enginneering, Fachtagung des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany)}, publisher={Gesellschaft für Informatik (GI)}, author={Schumacher, Claudia and Engels, Gregor and Güldali, Baris and Niehammer, Markus and Hamburg, Matthias}, editor={Kowalewski, Stefan and Rumpe, BernhardEditors}, year={2013}, pages={331–344}, collection={Lecture Notes in Informatics (LNI)} }","mla":"Schumacher, Claudia, et al. “Modellbasierte Bewertung von Testprozessen Nach TPI NEXT® Mit Geschäftsprozess-Mustern.” Proceedings of the Conference on Software Enginneering, Fachtagung Des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany), edited by Stefan Kowalewski and Bernhard Rumpe, vol. P-213, Gesellschaft für Informatik (GI), 2013, pp. 331–44.","short":"C. Schumacher, G. Engels, B. Güldali, M. Niehammer, M. Hamburg, in: S. Kowalewski, B. Rumpe (Eds.), Proceedings of the Conference on Software Enginneering, Fachtagung Des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany), Gesellschaft für Informatik (GI), Bonn, 2013, pp. 331–344.","ieee":"C. Schumacher, G. Engels, B. Güldali, M. Niehammer, and M. Hamburg, “Modellbasierte Bewertung von Testprozessen nach TPI NEXT® mit Geschäftsprozess-Mustern,” in Proceedings of the conference on Software Enginneering, Fachtagung des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany), 2013, vol. P-213, pp. 331–344."},"year":"2013","language":[{"iso":"eng"}]},{"_id":"8059","date_updated":"2022-01-06T07:03:50Z","language":[{"iso":"eng"}],"page":"17-18","citation":{"ieee":"G. Engels, “On-the-Fly Computing - Das Entwicklungs- und Betriebsparadigma für Softwaresysteme der Zukunft,” in Software Engineering 2013, 2013, vol. P-213, pp. 17–18.","short":"G. Engels, in: Software Engineering 2013, 2013, pp. 17–18.","mla":"Engels, Gregor. “On-the-Fly Computing - Das Entwicklungs- Und Betriebsparadigma Für Softwaresysteme Der Zukunft.” Software Engineering 2013, vol. P-213, 2013, pp. 17–18.","bibtex":"@inproceedings{Engels_2013, series={LNI}, title={On-the-Fly Computing - Das Entwicklungs- und Betriebsparadigma für Softwaresysteme der Zukunft}, volume={P-213}, booktitle={Software Engineering 2013}, author={Engels, Gregor}, year={2013}, pages={17–18}, collection={LNI} }","ama":"Engels G. On-the-Fly Computing - Das Entwicklungs- und Betriebsparadigma für Softwaresysteme der Zukunft. In: Software Engineering 2013. Vol P-213. LNI. ; 2013:17-18.","apa":"Engels, G. (2013). On-the-Fly Computing - Das Entwicklungs- und Betriebsparadigma für Softwaresysteme der Zukunft. In Software Engineering 2013 (Vol. P-213, pp. 17–18).","chicago":"Engels, Gregor. “On-the-Fly Computing - Das Entwicklungs- Und Betriebsparadigma Für Softwaresysteme Der Zukunft.” In Software Engineering 2013, P-213:17–18. LNI, 2013."},"type":"conference","year":"2013","series_title":"LNI","user_id":"52534","title":"On-the-Fly Computing - Das Entwicklungs- und Betriebsparadigma für Softwaresysteme der Zukunft","date_created":"2019-02-21T21:09:31Z","status":"public","volume":"P-213","publication":"Software Engineering 2013","department":[{"_id":"66"}],"author":[{"first_name":"Gregor","full_name":"Engels, Gregor","last_name":"Engels","id":"107"}]},{"_id":"8060","date_updated":"2022-01-06T07:03:50Z","intvolume":" 8274","type":"conference","citation":{"ieee":"Z. Huma, C. Gerth, G. Engels, and O. Juwig, “Automated Service Composition for On-the-Fly SOAs,” in Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13), 2013, vol. 8274, pp. 524–532.","short":"Z. Huma, C. Gerth, G. Engels, O. Juwig, in: Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13), Springer-Verlag, Berlin/Heidelberg, 2013, pp. 524–532.","bibtex":"@inproceedings{Huma_Gerth_Engels_Juwig_2013, place={Berlin/Heidelberg}, series={LNCS }, title={Automated Service Composition for On-the-Fly SOAs}, volume={8274}, booktitle={Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13)}, publisher={Springer-Verlag}, author={Huma, Zille and Gerth, Christian and Engels, Gregor and Juwig, Oliver}, year={2013}, pages={524–532}, collection={LNCS } }","mla":"Huma, Zille, et al. “Automated Service Composition for On-the-Fly SOAs.” Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13), vol. 8274, Springer-Verlag, 2013, pp. 524–32.","apa":"Huma, Z., Gerth, C., Engels, G., & Juwig, O. (2013). Automated Service Composition for On-the-Fly SOAs. In Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13) (Vol. 8274, pp. 524–532). Berlin/Heidelberg: Springer-Verlag.","ama":"Huma Z, Gerth C, Engels G, Juwig O. Automated Service Composition for On-the-Fly SOAs. In: Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13). Vol 8274. LNCS . Berlin/Heidelberg: Springer-Verlag; 2013:524-532.","chicago":"Huma, Zille, Christian Gerth, Gregor Engels, and Oliver Juwig. “Automated Service Composition for On-the-Fly SOAs.” In Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13), 8274:524–32. LNCS . Berlin/Heidelberg: Springer-Verlag, 2013."},"year":"2013","page":"524-532","language":[{"iso":"eng"}],"series_title":"LNCS ","title":"Automated Service Composition for On-the-Fly SOAs","user_id":"52534","place":"Berlin/Heidelberg","volume":8274,"status":"public","date_created":"2019-02-21T21:09:33Z","author":[{"first_name":"Zille","full_name":"Huma, Zille","last_name":"Huma"},{"last_name":"Gerth","full_name":"Gerth, Christian","first_name":"Christian"},{"first_name":"Gregor","full_name":"Engels, Gregor","last_name":"Engels","id":"107"},{"last_name":"Juwig","first_name":"Oliver","full_name":"Juwig, Oliver"}],"publisher":"Springer-Verlag","publication":"Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC'13)","department":[{"_id":"66"}]},{"series_title":"SEAMS '13","language":[{"iso":"eng"}],"type":"conference","citation":{"mla":"Luckey, Markus, and Gregor Engels. “High-Quality Specification of Self-Adaptive Software Systems.” Proceeding of the 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, ACM, 2013, pp. 143–52.","bibtex":"@inproceedings{Luckey_Engels_2013, place={New York, NY, USA}, series={SEAMS ’13}, title={High-Quality Specification of Self-Adaptive Software Systems}, booktitle={Proceeding of the 8th international symposium on Software engineering for adaptive and self-managing systems}, publisher={ACM}, author={Luckey, Markus and Engels, Gregor}, year={2013}, pages={143–152}, collection={SEAMS ’13} }","chicago":"Luckey, Markus, and Gregor Engels. “High-Quality Specification of Self-Adaptive Software Systems.” In Proceeding of the 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 143–52. SEAMS ’13. New York, NY, USA: ACM, 2013.","ama":"Luckey M, Engels G. High-Quality Specification of Self-Adaptive Software Systems. In: Proceeding of the 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. SEAMS ’13. New York, NY, USA: ACM; 2013:143-152.","apa":"Luckey, M., & Engels, G. (2013). High-Quality Specification of Self-Adaptive Software Systems. In Proceeding of the 8th international symposium on Software engineering for adaptive and self-managing systems (pp. 143–152). New York, NY, USA: ACM.","ieee":"M. Luckey and G. Engels, “High-Quality Specification of Self-Adaptive Software Systems,” in Proceeding of the 8th international symposium on Software engineering for adaptive and self-managing systems, 2013, pp. 143–152.","short":"M. Luckey, G. Engels, in: Proceeding of the 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, NY, USA, 2013, pp. 143–152."},"year":"2013","page":"143-152","date_updated":"2022-01-06T07:03:50Z","_id":"8061","author":[{"last_name":"Luckey","full_name":"Luckey, Markus","first_name":"Markus"},{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"}],"publisher":"ACM","publication":"Proceeding of the 8th international symposium on Software engineering for adaptive and self-managing systems","department":[{"_id":"66"}],"status":"public","date_created":"2019-02-21T21:09:34Z","place":"New York, NY, USA","user_id":"52534","related_material":{"link":[{"url":"http://dl.acm.org/citation.cfm?id=2487336.2487359","relation":"confirmation"}]},"title":"High-Quality Specification of Self-Adaptive Software Systems"},{"title":"Decision Support via Automated Metric Comparison for the Palladio-based Performance Blame Analysis","user_id":"52534","date_created":"2019-02-21T21:09:35Z","status":"public","department":[{"_id":"66"}],"publication":"Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic)","author":[{"full_name":"Brüseke, Frank","first_name":"Frank","last_name":"Brüseke"},{"full_name":"Becker, Steffen","first_name":"Steffen","last_name":"Becker"},{"first_name":"Gregor","full_name":"Engels, Gregor","last_name":"Engels","id":"107"}],"publisher":"ACM New York, NY, USA","date_updated":"2022-01-06T07:03:50Z","_id":"8062","page":"77-88","type":"conference","year":"2013","citation":{"ama":"Brüseke F, Becker S, Engels G. Decision Support via Automated Metric Comparison for the Palladio-based Performance Blame Analysis. In: Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic). ACM New York, NY, USA; 2013:77-88.","apa":"Brüseke, F., Becker, S., & Engels, G. (2013). Decision Support via Automated Metric Comparison for the Palladio-based Performance Blame Analysis. In Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic) (pp. 77–88). ACM New York, NY, USA.","chicago":"Brüseke, Frank, Steffen Becker, and Gregor Engels. “Decision Support via Automated Metric Comparison for the Palladio-Based Performance Blame Analysis.” In Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic), 77–88. ACM New York, NY, USA, 2013.","mla":"Brüseke, Frank, et al. “Decision Support via Automated Metric Comparison for the Palladio-Based Performance Blame Analysis.” Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic), ACM New York, NY, USA, 2013, pp. 77–88.","bibtex":"@inproceedings{Brüseke_Becker_Engels_2013, title={Decision Support via Automated Metric Comparison for the Palladio-based Performance Blame Analysis}, booktitle={Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic)}, publisher={ACM New York, NY, USA}, author={Brüseke, Frank and Becker, Steffen and Engels, Gregor}, year={2013}, pages={77–88} }","short":"F. Brüseke, S. Becker, G. Engels, in: Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic), ACM New York, NY, USA, 2013, pp. 77–88.","ieee":"F. Brüseke, S. Becker, and G. Engels, “Decision Support via Automated Metric Comparison for the Palladio-based Performance Blame Analysis,” in Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic), 2013, pp. 77–88."},"language":[{"iso":"eng"}]},{"author":[{"full_name":"Becker, Matthias","first_name":"Matthias","last_name":"Becker"},{"first_name":"Markus","full_name":"Luckey, Markus","last_name":"Luckey"},{"full_name":"Becker, Steffen","first_name":"Steffen","last_name":"Becker"}],"publisher":"ACM New York, NY, USA","publication":"Ninth International ACM Sigsoft Conference on the Quality of Software Architectures","department":[{"_id":"66"}],"status":"public","date_created":"2019-02-21T21:09:36Z","place":"New York, NY, USA","title":"Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time","user_id":"52534","series_title":"QoSA 2013","citation":{"ieee":"M. Becker, M. Luckey, and S. Becker, “Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time,” in Ninth International ACM Sigsoft Conference on the Quality of Software Architectures, 2013, pp. 43–52.","short":"M. Becker, M. Luckey, S. Becker, in: Ninth International ACM Sigsoft Conference on the Quality of Software Architectures, ACM New York, NY, USA, New York, NY, USA, 2013, pp. 43–52.","bibtex":"@inproceedings{Becker_Luckey_Becker_2013, place={New York, NY, USA}, series={QoSA 2013}, title={Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time}, booktitle={Ninth International ACM Sigsoft Conference on the Quality of Software Architectures}, publisher={ACM New York, NY, USA}, author={Becker, Matthias and Luckey, Markus and Becker, Steffen}, year={2013}, pages={43–52}, collection={QoSA 2013} }","mla":"Becker, Matthias, et al. “Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time.” Ninth International ACM Sigsoft Conference on the Quality of Software Architectures, ACM New York, NY, USA, 2013, pp. 43–52.","chicago":"Becker, Matthias, Markus Luckey, and Steffen Becker. “Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time.” In Ninth International ACM Sigsoft Conference on the Quality of Software Architectures, 43–52. QoSA 2013. New York, NY, USA: ACM New York, NY, USA, 2013.","apa":"Becker, M., Luckey, M., & Becker, S. (2013). Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time. In Ninth International ACM Sigsoft Conference on the Quality of Software Architectures (pp. 43–52). New York, NY, USA: ACM New York, NY, USA.","ama":"Becker M, Luckey M, Becker S. Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time. In: Ninth International ACM Sigsoft Conference on the Quality of Software Architectures. QoSA 2013. New York, NY, USA: ACM New York, NY, USA; 2013:43-52."},"type":"conference","year":"2013","page":"43-52","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:03:50Z","_id":"8063"},{"date_updated":"2022-01-06T07:03:52Z","_id":"8222","series_title":"IBM Research Report","report_number":"RZ 3846","language":[{"iso":"eng"}],"type":"report","year":"2013","citation":{"chicago":"Küster, Jochen, Dániel Kovács, Eduard Bauer, and Christian Gerth. Integrating Coverage Analysis into Test-Driven Development of Model Transformations. IBM Research Report. Zurich: IBM Research, 2013.","apa":"Küster, J., Kovács, D., Bauer, E., & Gerth, C. (2013). Integrating Coverage Analysis into Test-driven Development of Model Transformations. Zurich: IBM Research.","ama":"Küster J, Kovács D, Bauer E, Gerth C. Integrating Coverage Analysis into Test-Driven Development of Model Transformations. Zurich: IBM Research; 2013.","bibtex":"@book{Küster_Kovács_Bauer_Gerth_2013, place={Zurich}, series={IBM Research Report}, title={Integrating Coverage Analysis into Test-driven Development of Model Transformations}, publisher={IBM Research}, author={Küster, Jochen and Kovács, Dániel and Bauer, Eduard and Gerth, Christian}, year={2013}, collection={IBM Research Report} }","mla":"Küster, Jochen, et al. Integrating Coverage Analysis into Test-Driven Development of Model Transformations. IBM Research, 2013.","short":"J. Küster, D. Kovács, E. Bauer, C. Gerth, Integrating Coverage Analysis into Test-Driven Development of Model Transformations, IBM Research, Zurich, 2013.","ieee":"J. Küster, D. Kovács, E. Bauer, and C. Gerth, Integrating Coverage Analysis into Test-driven Development of Model Transformations. Zurich: IBM Research, 2013."},"place":"Zurich","user_id":"52534","title":"Integrating Coverage Analysis into Test-driven Development of Model Transformations","department":[{"_id":"66"}],"publisher":"IBM Research","author":[{"last_name":"Küster","first_name":"Jochen","full_name":"Küster, Jochen"},{"full_name":"Kovács, Dániel","first_name":"Dániel","last_name":"Kovács"},{"last_name":"Bauer","first_name":"Eduard","full_name":"Bauer, Eduard"},{"first_name":"Christian","full_name":"Gerth, Christian","last_name":"Gerth"}],"date_created":"2019-03-03T16:13:22Z","status":"public"},{"report_number":"tr-ri-13-333","language":[{"iso":"eng"}],"citation":{"chicago":"Huma, Zille, Christian Gerth, and Gregor Engels. Automated Service Discovery and Composition for On-the-Fly SOAs. University of Paderborn, Germany, 2013.","ama":"Huma Z, Gerth C, Engels G. Automated Service Discovery and Composition for On-the-Fly SOAs. University of Paderborn, Germany; 2013.","apa":"Huma, Z., Gerth, C., & Engels, G. (2013). Automated Service Discovery and Composition for On-the-Fly SOAs. University of Paderborn, Germany.","mla":"Huma, Zille, et al. Automated Service Discovery and Composition for On-the-Fly SOAs. University of Paderborn, Germany, 2013.","bibtex":"@book{Huma_Gerth_Engels_2013, title={Automated Service Discovery and Composition for On-the-Fly SOAs}, publisher={University of Paderborn, Germany}, author={Huma, Zille and Gerth, Christian and Engels, Gregor}, year={2013} }","short":"Z. Huma, C. Gerth, G. Engels, Automated Service Discovery and Composition for On-the-Fly SOAs, University of Paderborn, Germany, 2013.","ieee":"Z. Huma, C. Gerth, and G. Engels, Automated Service Discovery and Composition for On-the-Fly SOAs. University of Paderborn, Germany, 2013."},"type":"report","year":"2013","_id":"8223","date_updated":"2022-01-06T07:03:52Z","date_created":"2019-03-03T16:13:23Z","status":"public","department":[{"_id":"66"}],"publisher":"University of Paderborn, Germany","author":[{"last_name":"Huma","first_name":"Zille","full_name":"Huma, Zille"},{"full_name":"Gerth, Christian","first_name":"Christian","last_name":"Gerth"},{"last_name":"Engels","id":"107","first_name":"Gregor","full_name":"Engels, Gregor"}],"user_id":"52534","title":"Automated Service Discovery and Composition for On-the-Fly SOAs"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:32Z","oa":"1","department":[{"_id":"277"}],"title":"Sicherheitsherausforderungen in hochverteilten Systemen","citation":{"ieee":"H. de Meer et al., “Sicherheitsherausforderungen in hochverteilten Systemen,” PIK - Praxis der Informationsverarbeitung und Kommunikation, vol. 36, no. 3, pp. 153–159, 2013.","short":"H. de Meer, M. Diener, R. Herkenhöner, M. Kucera, M. Niedermeier, A. Reisser, G. Schryen, M. Vetter, T. Waas, E. Yasasin, PIK - Praxis Der Informationsverarbeitung Und Kommunikation 36 (2013) 153–159.","mla":"de Meer, Hermann, et al. “Sicherheitsherausforderungen in Hochverteilten Systemen.” PIK - Praxis Der Informationsverarbeitung Und Kommunikation, vol. 36, no. 3, de Gruyter, 2013, pp. 153–59.","bibtex":"@article{de Meer_Diener_Herkenhöner_Kucera_Niedermeier_Reisser_Schryen_Vetter_Waas_Yasasin_2013, title={Sicherheitsherausforderungen in hochverteilten Systemen}, volume={36}, number={3}, journal={PIK - Praxis der Informationsverarbeitung und Kommunikation}, publisher={de Gruyter}, author={de Meer, Hermann and Diener, Michael and Herkenhöner, Ralph and Kucera, Markus and Niedermeier, Michael and Reisser, Andreas and Schryen, Guido and Vetter, Michael and Waas, Thomas and Yasasin, Emrah}, year={2013}, pages={153–159} }","apa":"de Meer, H., Diener, M., Herkenhöner, R., Kucera, M., Niedermeier, M., Reisser, A., … Yasasin, E. (2013). Sicherheitsherausforderungen in hochverteilten Systemen. PIK - Praxis Der Informationsverarbeitung Und Kommunikation, 36(3), 153–159.","ama":"de Meer H, Diener M, Herkenhöner R, et al. Sicherheitsherausforderungen in hochverteilten Systemen. PIK - Praxis der Informationsverarbeitung und Kommunikation. 2013;36(3):153-159.","chicago":"Meer, Hermann de, Michael Diener, Ralph Herkenhöner, Markus Kucera, Michael Niedermeier, Andreas Reisser, Guido Schryen, Michael Vetter, Thomas Waas, and Emrah Yasasin. “Sicherheitsherausforderungen in Hochverteilten Systemen.” PIK - Praxis Der Informationsverarbeitung Und Kommunikation 36, no. 3 (2013): 153–59."},"year":"2013","type":"journal_article","page":"153-159","intvolume":" 36","_id":"5682","issue":"3","author":[{"first_name":"Hermann","full_name":"de Meer, Hermann","last_name":"de Meer"},{"last_name":"Diener","first_name":"Michael","full_name":"Diener, Michael"},{"full_name":"Herkenhöner, Ralph","first_name":"Ralph","last_name":"Herkenhöner"},{"first_name":"Markus","full_name":"Kucera, Markus","last_name":"Kucera"},{"first_name":"Michael","full_name":"Niedermeier, Michael","last_name":"Niedermeier"},{"full_name":"Reisser, Andreas","first_name":"Andreas","last_name":"Reisser"},{"last_name":"Schryen","id":"72850","first_name":"Guido","full_name":"Schryen, Guido"},{"full_name":"Vetter, Michael","first_name":"Michael","last_name":"Vetter"},{"first_name":"Thomas","full_name":"Waas, Thomas","last_name":"Waas"},{"last_name":"Yasasin","first_name":"Emrah","full_name":"Yasasin, Emrah"}],"publisher":"de Gruyter","file_date_updated":"2018-12-13T15:12:17Z","publication":"PIK - Praxis der Informationsverarbeitung und Kommunikation","file":[{"access_level":"open_access","file_name":"pik-2013-0015.pdf","date_created":"2018-12-07T12:01:06Z","relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:12:17Z","creator":"hsiemes","file_id":"6050","file_size":203924}],"volume":36,"has_accepted_license":"1","status":"public","date_created":"2018-11-14T15:43:13Z","extern":"1","ddc":["000"],"user_id":"61579"},{"page":"3-20","citation":{"chicago":"Wünderlich, Nancy, Florian V Wangenheim, and Mary Jo Bitner. “High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.” Journal of Service Research 16, no. 1 (2013): 3–20.","apa":"Wünderlich, N., Wangenheim, F. V., & Bitner, M. J. (2013). High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services. Journal of Service Research, 16(1), 3–20.","ama":"Wünderlich N, Wangenheim FV, Bitner MJ. High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services. Journal of Service Research. 2013;16(1):3-20.","bibtex":"@article{Wünderlich_Wangenheim_Bitner_2013, title={High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.}, volume={16}, number={1}, journal={Journal of Service Research}, publisher={SAGE Publications Sage CA: Los Angeles, CA}, author={Wünderlich, Nancy and Wangenheim, Florian V and Bitner, Mary Jo}, year={2013}, pages={3–20} }","mla":"Wünderlich, Nancy, et al. “High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.” Journal of Service Research, vol. 16, no. 1, SAGE Publications Sage CA: Los Angeles, CA, 2013, pp. 3–20.","short":"N. Wünderlich, F.V. Wangenheim, M.J. Bitner, Journal of Service Research 16 (2013) 3–20.","ieee":"N. Wünderlich, F. V. Wangenheim, and M. J. Bitner, “High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services.,” Journal of Service Research, vol. 16, no. 1, pp. 3–20, 2013."},"year":"2013","type":"journal_article","_id":"5715","intvolume":" 16","issue":"1","keyword":["service technology","technology-mediated service","service counterpart","smart service","remote service","technology adoption"],"publication":"Journal of Service Research","publisher":"SAGE Publications Sage CA: Los Angeles, CA","author":[{"full_name":"Wünderlich, Nancy","first_name":"Nancy","id":"36392","last_name":"Wünderlich"},{"last_name":"Wangenheim","full_name":"Wangenheim, Florian V","first_name":"Florian V"},{"last_name":"Bitner","full_name":"Bitner, Mary Jo","first_name":"Mary Jo"}],"date_created":"2018-11-16T09:31:00Z","status":"public","volume":16,"abstract":[{"lang":"eng","text":"Smart interactive services, in contrast with other technology-based services, require significant human-to-human interaction and collaboration in addition to the service provided by the embedded technology itself. The authors’ foundational Delphi study confirms smart interactive services (e.g., remote diagnosis, remote repair of equipment, and telemedicine) are a rapidly growing innovation category across industries. Yet, gaining user acceptance of these types of services presents a significant challenge for managers. To address this challenge, the authors employ a grounded theory approach, drawing on depth interviews, to develop a framework of barriers and facilitators to users’ attitudinal and behavioral responses to smart interactive services. The findings reveal a new set of beliefs that are critical in this context. These beliefs are tied to the human element and specifically pertain to beliefs about the “service counterpart (SC),” who is the provider’s employee controlling the technology. Control, trustworthiness, and collaboration beliefs emerge jointly as important and interrelated influencers tied to the SC. Contrary to conventional wisdom that focuses on features of the technology itself to gain user acceptance, this research encourages providers to emphasize the interpersonal elements of the service by providing control cues, raising social presence, and enhancing human trust mechanisms."}],"article_type":"original","user_id":"37741","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:37Z","department":[{"_id":"181"}],"publication_status":"published","title":"High Tech and High Touch: A Framework for Understanding User Attitudes and Behaviors Related to Smart Interactive Services."},{"department":[{"_id":"66"}],"publication":"Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland","author":[{"first_name":"Enes","orcid":"0000-0002-5967-833X","full_name":"Yigitbas, Enes","last_name":"Yigitbas","id":"8447"},{"first_name":"Christian","full_name":"Gerth, Christian","last_name":"Gerth"},{"full_name":"Sauer, Stefan","first_name":"Stefan","id":"447","last_name":"Sauer"}],"date_created":"2018-11-19T15:18:20Z","status":"public","user_id":"8447","title":"Konzeption modellbasierter Benutzungsschnittstellen für verteilte Selbstbedienungssysteme","language":[{"iso":"eng"}],"page":"2714-2723","year":"2013","type":"conference","citation":{"short":"E. Yigitbas, C. Gerth, S. Sauer, in: Informatik 2013, 43. Jahrestagung Der Gesellschaft Für Informatik e.V. (GI), Informatik Angepasst an Mensch, Organisation Und Umwelt, 16.-20. September 2013, Koblenz, Deutschland, 2013, pp. 2714–2723.","ieee":"E. Yigitbas, C. Gerth, and S. Sauer, “Konzeption modellbasierter Benutzungsschnittstellen für verteilte Selbstbedienungssysteme,” in Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland, 2013, pp. 2714–2723.","chicago":"Yigitbas, Enes, Christian Gerth, and Stefan Sauer. “Konzeption Modellbasierter Benutzungsschnittstellen Für Verteilte Selbstbedienungssysteme.” In Informatik 2013, 43. Jahrestagung Der Gesellschaft Für Informatik e.V. (GI), Informatik Angepasst an Mensch, Organisation Und Umwelt, 16.-20. September 2013, Koblenz, Deutschland, 2714–23, 2013.","apa":"Yigitbas, E., Gerth, C., & Sauer, S. (2013). Konzeption modellbasierter Benutzungsschnittstellen für verteilte Selbstbedienungssysteme. In Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland (pp. 2714–2723).","ama":"Yigitbas E, Gerth C, Sauer S. Konzeption modellbasierter Benutzungsschnittstellen für verteilte Selbstbedienungssysteme. In: Informatik 2013, 43. Jahrestagung Der Gesellschaft Für Informatik e.V. (GI), Informatik Angepasst an Mensch, Organisation Und Umwelt, 16.-20. September 2013, Koblenz, Deutschland. ; 2013:2714-2723.","mla":"Yigitbas, Enes, et al. “Konzeption Modellbasierter Benutzungsschnittstellen Für Verteilte Selbstbedienungssysteme.” Informatik 2013, 43. Jahrestagung Der Gesellschaft Für Informatik e.V. (GI), Informatik Angepasst an Mensch, Organisation Und Umwelt, 16.-20. September 2013, Koblenz, Deutschland, 2013, pp. 2714–23.","bibtex":"@inproceedings{Yigitbas_Gerth_Sauer_2013, title={Konzeption modellbasierter Benutzungsschnittstellen für verteilte Selbstbedienungssysteme}, booktitle={Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland}, author={Yigitbas, Enes and Gerth, Christian and Sauer, Stefan}, year={2013}, pages={2714–2723} }"},"date_updated":"2022-01-06T07:02:38Z","_id":"5752"},{"place":"Pisa","extern":"1","user_id":"59649","title":"Releasing multimodal data as Linguistic Linked Open Data: An experience report","department":[{"_id":"115"}],"publication":"Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and linking lexicons, terminologies and other language data","author":[{"last_name":"Menke","id":"59649","first_name":"Peter","full_name":"Menke, Peter"},{"last_name":"McCrae","full_name":"McCrae, John","first_name":"John"},{"last_name":"Cimiano","first_name":"Philipp","full_name":"Cimiano, Philipp"}],"publisher":"ACL","date_created":"2018-12-07T15:16:08Z","status":"public","publication_status":"published","date_updated":"2022-01-06T07:02:51Z","_id":"6054","language":[{"iso":"eng"}],"page":"44-52","type":"conference","year":"2013","citation":{"ieee":"P. Menke, J. McCrae, and P. Cimiano, “Releasing multimodal data as Linguistic Linked Open Data: An experience report,” in Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and linking lexicons, terminologies and other language data, 2013, pp. 44–52.","short":"P. Menke, J. McCrae, P. Cimiano, in: Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and Linking Lexicons, Terminologies and Other Language Data, ACL, Pisa, 2013, pp. 44–52.","bibtex":"@inproceedings{Menke_McCrae_Cimiano_2013, place={Pisa}, title={Releasing multimodal data as Linguistic Linked Open Data: An experience report}, booktitle={Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and linking lexicons, terminologies and other language data}, publisher={ACL}, author={Menke, Peter and McCrae, John and Cimiano, Philipp}, year={2013}, pages={44–52} }","mla":"Menke, Peter, et al. “Releasing Multimodal Data as Linguistic Linked Open Data: An Experience Report.” Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and Linking Lexicons, Terminologies and Other Language Data, ACL, 2013, pp. 44–52.","chicago":"Menke, Peter, John McCrae, and Philipp Cimiano. “Releasing Multimodal Data as Linguistic Linked Open Data: An Experience Report.” In Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and Linking Lexicons, Terminologies and Other Language Data, 44–52. Pisa: ACL, 2013.","apa":"Menke, P., McCrae, J., & Cimiano, P. (2013). Releasing multimodal data as Linguistic Linked Open Data: An experience report. In Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and linking lexicons, terminologies and other language data (pp. 44–52). Pisa: ACL.","ama":"Menke P, McCrae J, Cimiano P. Releasing multimodal data as Linguistic Linked Open Data: An experience report. In: Proceedings of the 2nd Workshop on Linked Data in Linguistics (LDL-2013): Representing and Linking Lexicons, Terminologies and Other Language Data. Pisa: ACL; 2013:44-52."}},{"user_id":"46632","title":"Editorial: Internationales Personalmanagement: Den kulturellen Kontext gestalten","date_created":"2018-12-10T10:56:16Z","status":"public","volume":65,"publication":"PERSONALquartely","department":[{"_id":"274"}],"author":[{"id":"42362","last_name":"Kabst","full_name":"Kabst, Rüdiger","first_name":"Rüdiger"},{"first_name":"M C","full_name":"Wehner, M C","last_name":"Wehner"}],"issue":"4","date_updated":"2022-01-06T07:02:53Z","_id":"6101","intvolume":" 65","language":[{"iso":"eng"}],"page":"34-39","type":"journal_article","citation":{"short":"R. Kabst, M.C. Wehner, PERSONALquartely 65 (2013) 34–39.","ieee":"R. Kabst and M. C. Wehner, “Editorial: Internationales Personalmanagement: Den kulturellen Kontext gestalten,” PERSONALquartely, vol. 65, no. 4, pp. 34–39, 2013.","ama":"Kabst R, Wehner MC. Editorial: Internationales Personalmanagement: Den kulturellen Kontext gestalten. PERSONALquartely. 2013;65(4):34-39.","apa":"Kabst, R., & Wehner, M. C. (2013). Editorial: Internationales Personalmanagement: Den kulturellen Kontext gestalten. PERSONALquartely, 65(4), 34–39.","chicago":"Kabst, Rüdiger, and M C Wehner. “Editorial: Internationales Personalmanagement: Den Kulturellen Kontext Gestalten.” PERSONALquartely 65, no. 4 (2013): 34–39.","bibtex":"@article{Kabst_Wehner_2013, title={Editorial: Internationales Personalmanagement: Den kulturellen Kontext gestalten}, volume={65}, number={4}, journal={PERSONALquartely}, author={Kabst, Rüdiger and Wehner, M C}, year={2013}, pages={34–39} }","mla":"Kabst, Rüdiger, and M. C. Wehner. “Editorial: Internationales Personalmanagement: Den Kulturellen Kontext Gestalten.” PERSONALquartely, vol. 65, no. 4, 2013, pp. 34–39."},"year":"2013"},{"user_id":"46632","title":"Unterstützung von Kommunalverwaltung bei Bürgerbeteiligung","place":"Baden-Baden","status":"public","date_created":"2018-12-11T10:57:53Z","editor":[{"last_name":"Hill","full_name":"Hill, Hermann","first_name":"Hermann"}],"author":[{"last_name":"Weber","full_name":"Weber, P","first_name":"P"},{"full_name":"Kabst, Rüdiger","first_name":"Rüdiger","id":"42362","last_name":"Kabst"}],"publisher":"Nomos","publication":"Verwaltungskommunikation - Wissenschaftliche Analyse und praktische Beispiele","department":[{"_id":"274"}],"_id":"6147","date_updated":"2022-01-06T07:02:53Z","language":[{"iso":"eng"}],"type":"book_chapter","citation":{"short":"P. Weber, R. Kabst, in: H. Hill (Ed.), Verwaltungskommunikation - Wissenschaftliche Analyse Und Praktische Beispiele, Nomos, Baden-Baden, 2013, pp. 145–152.","ieee":"P. Weber and R. Kabst, “Unterstützung von Kommunalverwaltung bei Bürgerbeteiligung,” in Verwaltungskommunikation - Wissenschaftliche Analyse und praktische Beispiele, H. Hill, Ed. Baden-Baden: Nomos, 2013, pp. 145–152.","apa":"Weber, P., & Kabst, R. (2013). Unterstützung von Kommunalverwaltung bei Bürgerbeteiligung. In H. Hill (Ed.), Verwaltungskommunikation - Wissenschaftliche Analyse und praktische Beispiele (pp. 145–152). Baden-Baden: Nomos.","ama":"Weber P, Kabst R. Unterstützung von Kommunalverwaltung bei Bürgerbeteiligung. In: Hill H, ed. Verwaltungskommunikation - Wissenschaftliche Analyse Und Praktische Beispiele. Baden-Baden: Nomos; 2013:145-152.","chicago":"Weber, P, and Rüdiger Kabst. “Unterstützung von Kommunalverwaltung Bei Bürgerbeteiligung.” In Verwaltungskommunikation - Wissenschaftliche Analyse Und Praktische Beispiele, edited by Hermann Hill, 145–52. Baden-Baden: Nomos, 2013.","bibtex":"@inbook{Weber_Kabst_2013, place={Baden-Baden}, title={Unterstützung von Kommunalverwaltung bei Bürgerbeteiligung}, booktitle={Verwaltungskommunikation - Wissenschaftliche Analyse und praktische Beispiele}, publisher={Nomos}, author={Weber, P and Kabst, Rüdiger}, editor={Hill, HermannEditor}, year={2013}, pages={145–152} }","mla":"Weber, P., and Rüdiger Kabst. “Unterstützung von Kommunalverwaltung Bei Bürgerbeteiligung.” Verwaltungskommunikation - Wissenschaftliche Analyse Und Praktische Beispiele, edited by Hermann Hill, Nomos, 2013, pp. 145–52."},"year":"2013","page":"145-152"},{"issue":"28","_id":"6166","citation":{"ieee":"F. Wex and G. Schryen, “Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung,” Blick in die Wissenschaft, no. 28, pp. 27–32, 2013.","short":"F. Wex, G. Schryen, Blick in Die Wissenschaft (2013) 27–32.","bibtex":"@article{Wex_Schryen_2013, title={Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung}, number={28}, journal={Blick in die Wissenschaft}, author={Wex, Felix and Schryen, Guido}, year={2013}, pages={27–32} }","mla":"Wex, Felix, and Guido Schryen. “Effektiver Einsatz von Rettungskräften Bei Naturkatastrophen - Modelle Und Verfahren Zur Entscheidungsunterstützung.” Blick in Die Wissenschaft, no. 28, 2013, pp. 27–32.","chicago":"Wex, Felix, and Guido Schryen. “Effektiver Einsatz von Rettungskräften Bei Naturkatastrophen - Modelle Und Verfahren Zur Entscheidungsunterstützung.” Blick in Die Wissenschaft, no. 28 (2013): 27–32.","ama":"Wex F, Schryen G. Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung. Blick in die Wissenschaft. 2013;(28):27-32.","apa":"Wex, F., & Schryen, G. (2013). Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung. Blick in Die Wissenschaft, (28), 27–32."},"type":"journal_article","year":"2013","page":"27-32","ddc":["000"],"user_id":"61579","extern":"1","status":"public","has_accepted_license":"1","date_created":"2018-12-11T13:43:18Z","author":[{"first_name":"Felix","full_name":"Wex, Felix","last_name":"Wex"},{"full_name":"Schryen, Guido","first_name":"Guido","id":"72850","last_name":"Schryen"}],"publication":"Blick in die Wissenschaft","file_date_updated":"2018-12-13T15:20:50Z","file":[{"access_level":"open_access","date_created":"2018-12-11T13:44:17Z","file_name":"Schreyen_Wex.pdf","content_type":"application/pdf","date_updated":"2018-12-13T15:20:50Z","relation":"main_file","file_size":835076,"file_id":"6167","creator":"hsiemes"}],"oa":"1","date_updated":"2022-01-06T07:02:55Z","language":[{"iso":"eng"}],"title":"Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung","department":[{"_id":"277"}]},{"title":"Institutional Determinants of Work-Family Practices: An International Comparative Examination. ","user_id":"46632","author":[{"full_name":"Weber, H","first_name":"H","last_name":"Weber"},{"last_name":"Wehner","full_name":"Wehner, M","first_name":"M"},{"last_name":"Kabst","id":"42362","first_name":"Rüdiger","full_name":"Kabst, Rüdiger"}],"department":[{"_id":"274"}],"status":"public","date_created":"2018-12-18T12:32:57Z","date_updated":"2022-01-06T07:02:59Z","_id":"6271","citation":{"ama":"Weber H, Wehner M, Kabst R. Institutional Determinants of Work-Family Practices: An International Comparative Examination. . In: ; 2013.","apa":"Weber, H., Wehner, M., & Kabst, R. (2013). Institutional Determinants of Work-Family Practices: An International Comparative Examination. .","chicago":"Weber, H, M Wehner, and Rüdiger Kabst. “Institutional Determinants of Work-Family Practices: An International Comparative Examination. ,” 2013.","mla":"Weber, H., et al. Institutional Determinants of Work-Family Practices: An International Comparative Examination. . 2013.","bibtex":"@inproceedings{Weber_Wehner_Kabst_2013, title={Institutional Determinants of Work-Family Practices: An International Comparative Examination. }, author={Weber, H and Wehner, M and Kabst, Rüdiger}, year={2013} }","short":"H. Weber, M. Wehner, R. Kabst, in: 2013.","ieee":"H. Weber, M. Wehner, and R. Kabst, “Institutional Determinants of Work-Family Practices: An International Comparative Examination. ,” 2013."},"type":"conference","year":"2013","language":[{"iso":"eng"}]},{"author":[{"last_name":"Golubovic","full_name":"Golubovic, S","first_name":"S"},{"last_name":"Wehner","first_name":"M","full_name":"Wehner, M"},{"last_name":"Baum","full_name":"Baum, M","first_name":"M"},{"first_name":"Rüdiger","full_name":"Kabst, Rüdiger","last_name":"Kabst","id":"42362"}],"department":[{"_id":"274"}],"status":"public","date_created":"2018-12-18T12:34:44Z","user_id":"46632","title":"HR-Praktiken und Innovation: Wie können Wissens- und Technologievorsprünge im Unternehmen generiert werden?","language":[{"iso":"eng"}],"year":"2013","type":"conference","citation":{"ieee":"S. Golubovic, M. Wehner, M. Baum, and R. Kabst, “HR-Praktiken und Innovation: Wie können Wissens- und Technologievorsprünge im Unternehmen generiert werden?,” 2013.","short":"S. Golubovic, M. Wehner, M. Baum, R. Kabst, in: 2013.","mla":"Golubovic, S., et al. HR-Praktiken Und Innovation: Wie Können Wissens- Und Technologievorsprünge Im Unternehmen Generiert Werden? 2013.","bibtex":"@inproceedings{Golubovic_Wehner_Baum_Kabst_2013, title={HR-Praktiken und Innovation: Wie können Wissens- und Technologievorsprünge im Unternehmen generiert werden?}, author={Golubovic, S and Wehner, M and Baum, M and Kabst, Rüdiger}, year={2013} }","chicago":"Golubovic, S, M Wehner, M Baum, and Rüdiger Kabst. “HR-Praktiken Und Innovation: Wie Können Wissens- Und Technologievorsprünge Im Unternehmen Generiert Werden?,” 2013.","apa":"Golubovic, S., Wehner, M., Baum, M., & Kabst, R. (2013). HR-Praktiken und Innovation: Wie können Wissens- und Technologievorsprünge im Unternehmen generiert werden?","ama":"Golubovic S, Wehner M, Baum M, Kabst R. HR-Praktiken und Innovation: Wie können Wissens- und Technologievorsprünge im Unternehmen generiert werden? In: ; 2013."},"date_updated":"2022-01-06T07:02:59Z","_id":"6272"},{"date_updated":"2022-01-06T07:02:59Z","_id":"6274","type":"conference","citation":{"ieee":"R. Isidor, M. Wehner, C. Li, and R. Kabst, “Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany,” 2013.","short":"R. Isidor, M. Wehner, C. Li, R. Kabst, in: 2013.","bibtex":"@inproceedings{Isidor_Wehner_Li_Kabst_2013, title={Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany}, author={Isidor, R and Wehner, M and Li, C and Kabst, Rüdiger}, year={2013} }","mla":"Isidor, R., et al. Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany. 2013.","ama":"Isidor R, Wehner M, Li C, Kabst R. Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany. In: ; 2013.","apa":"Isidor, R., Wehner, M., Li, C., & Kabst, R. (2013). Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany.","chicago":"Isidor, R, M Wehner, C Li, and Rüdiger Kabst. “Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany,” 2013."},"year":"2013","language":[{"iso":"eng"}],"title":"Institutional Pressures and Interorganizational Imitation: A Quasilongitudinal Analyses of Temporary Work in the UK and Germany","user_id":"46632","date_created":"2018-12-18T12:41:41Z","status":"public","department":[{"_id":"274"}],"author":[{"last_name":"Isidor","full_name":"Isidor, R","first_name":"R"},{"full_name":"Wehner, M","first_name":"M","last_name":"Wehner"},{"full_name":"Li, C","first_name":"C","last_name":"Li"},{"id":"42362","last_name":"Kabst","full_name":"Kabst, Rüdiger","first_name":"Rüdiger"}]},{"doi":"10.1007/978-3-642-39351-8_4","date_updated":"2022-01-06T07:02:59Z","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","title":"A Taxonomy-Based Approach towards NUI Interaction Design","place":"Berlin, Heidelberg","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642393501","9783642393518"]},"publication_status":"published","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"conference":{"location":"Las Vegas, USA","name":"International Conference on Distributed, Ambient, and Pervasive Interactions (DAPI) as part of HCI International 2013","start_date":"2013-07-21","end_date":"2013-07-26"},"_id":"6276","intvolume":" 8028","page":"32-41","type":"book_chapter","year":"2013","citation":{"chicago":"Klompmaker, Florian, Volker Paelke, and Holger Gerhard Fischer. “A Taxonomy-Based Approach towards NUI Interaction Design.” In Distributed, Ambient, and Pervasive Interactions, 8028:32–41. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-39351-8_4.","apa":"Klompmaker, F., Paelke, V., & Fischer, H. G. (2013). A Taxonomy-Based Approach towards NUI Interaction Design. In Distributed, Ambient, and Pervasive Interactions (Vol. 8028, pp. 32–41). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-39351-8_4","ama":"Klompmaker F, Paelke V, Fischer HG. A Taxonomy-Based Approach towards NUI Interaction Design. In: Distributed, Ambient, and Pervasive Interactions. Vol 8028. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:32-41. doi:10.1007/978-3-642-39351-8_4","bibtex":"@inbook{Klompmaker_Paelke_Fischer_2013, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={A Taxonomy-Based Approach towards NUI Interaction Design}, volume={8028}, DOI={10.1007/978-3-642-39351-8_4}, booktitle={Distributed, Ambient, and Pervasive Interactions}, publisher={Springer Berlin Heidelberg}, author={Klompmaker, Florian and Paelke, Volker and Fischer, Holger Gerhard}, year={2013}, pages={32–41}, collection={Lecture Notes in Computer Science} }","mla":"Klompmaker, Florian, et al. “A Taxonomy-Based Approach towards NUI Interaction Design.” Distributed, Ambient, and Pervasive Interactions, vol. 8028, Springer Berlin Heidelberg, 2013, pp. 32–41, doi:10.1007/978-3-642-39351-8_4.","short":"F. Klompmaker, V. Paelke, H.G. Fischer, in: Distributed, Ambient, and Pervasive Interactions, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 32–41.","ieee":"F. Klompmaker, V. Paelke, and H. G. Fischer, “A Taxonomy-Based Approach towards NUI Interaction Design,” in Distributed, Ambient, and Pervasive Interactions, vol. 8028, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 32–41."},"user_id":"30457","date_created":"2018-12-18T12:42:33Z","status":"public","volume":8028,"publication":"Distributed, Ambient, and Pervasive Interactions","author":[{"full_name":"Klompmaker, Florian","first_name":"Florian","last_name":"Klompmaker"},{"last_name":"Paelke","full_name":"Paelke, Volker","first_name":"Volker"},{"last_name":"Fischer","id":"30457","first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard"}],"publisher":"Springer Berlin Heidelberg"},{"user_id":"30457","status":"public","date_created":"2018-12-18T12:44:48Z","volume":8012,"author":[{"full_name":"Fischer, Holger Gerhard","first_name":"Holger Gerhard","id":"30457","last_name":"Fischer"},{"last_name":"Strenge","full_name":"Strenge, Benjamin","first_name":"Benjamin"},{"last_name":"Nebe","full_name":"Nebe, Karsten","first_name":"Karsten"}],"publisher":"Springer Berlin Heidelberg","publication":"Design, User Experience, and Usability. Design Philosophy, Methods, and Tools","intvolume":" 8012","_id":"6279","conference":{"end_date":"2013-07-26","location":"Las Vegas, USA","start_date":"2013-07-21","name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2013"},"citation":{"short":"H.G. Fischer, B. Strenge, K. Nebe, in: Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 252–261.","ieee":"H. G. Fischer, B. Strenge, and K. Nebe, “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design,” in Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, vol. 8012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 252–261.","apa":"Fischer, H. G., Strenge, B., & Nebe, K. (2013). Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. In Design, User Experience, and Usability. Design Philosophy, Methods, and Tools (Vol. 8012, pp. 252–261). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-39229-0_28","ama":"Fischer HG, Strenge B, Nebe K. Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. In: Design, User Experience, and Usability. Design Philosophy, Methods, and Tools. Vol 8012. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:252-261. doi:10.1007/978-3-642-39229-0_28","chicago":"Fischer, Holger Gerhard, Benjamin Strenge, and Karsten Nebe. “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design.” In Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, 8012:252–61. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-39229-0_28.","bibtex":"@inbook{Fischer_Strenge_Nebe_2013, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design}, volume={8012}, DOI={10.1007/978-3-642-39229-0_28}, booktitle={Design, User Experience, and Usability. Design Philosophy, Methods, and Tools}, publisher={Springer Berlin Heidelberg}, author={Fischer, Holger Gerhard and Strenge, Benjamin and Nebe, Karsten}, year={2013}, pages={252–261}, collection={Lecture Notes in Computer Science} }","mla":"Fischer, Holger Gerhard, et al. “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design.” Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, vol. 8012, Springer Berlin Heidelberg, 2013, pp. 252–61, doi:10.1007/978-3-642-39229-0_28."},"type":"book_chapter","year":"2013","page":"252-261","title":"Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design","place":"Berlin, Heidelberg","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642392283","9783642392290"]},"publication_status":"published","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"doi":"10.1007/978-3-642-39229-0_28","date_updated":"2022-01-06T07:02:59Z","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science"},{"date_updated":"2022-01-06T07:02:59Z","_id":"6284","language":[{"iso":"ger"}],"year":"2013","citation":{"short":"H.G. Fischer, T. Geis, R. Molich, O. Kluge, R. Heimgärtner, P. Hunkirchen, in: Jahresband Usability Professionals, German UPA, 2013, pp. 28–34.","ieee":"H. G. Fischer, T. Geis, R. Molich, O. Kluge, R. Heimgärtner, and P. Hunkirchen, “Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA,” in Jahresband Usability Professionals, 2013, pp. 28–34.","ama":"Fischer HG, Geis T, Molich R, Kluge O, Heimgärtner R, Hunkirchen P. Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA. In: Jahresband Usability Professionals. German UPA; 2013:28-34.","apa":"Fischer, H. G., Geis, T., Molich, R., Kluge, O., Heimgärtner, R., & Hunkirchen, P. (2013). Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA. In Jahresband Usability Professionals (pp. 28–34). German UPA.","chicago":"Fischer, Holger Gerhard, Thomas Geis, Rolf Molich, Oliver Kluge, Rüdiger Heimgärtner, and Peter Hunkirchen. “Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA.” In Jahresband Usability Professionals, 28–34. German UPA, 2013.","bibtex":"@inproceedings{Fischer_Geis_Molich_Kluge_Heimgärtner_Hunkirchen_2013, title={Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA}, booktitle={Jahresband Usability Professionals}, publisher={German UPA}, author={Fischer, Holger Gerhard and Geis, Thomas and Molich, Rolf and Kluge, Oliver and Heimgärtner, Rüdiger and Hunkirchen, Peter}, year={2013}, pages={28–34} }","mla":"Fischer, Holger Gerhard, et al. “Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA.” Jahresband Usability Professionals, German UPA, 2013, pp. 28–34."},"type":"conference","page":"28-34","user_id":"30457","title":"Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA","status":"public","date_created":"2018-12-18T12:48:22Z","publisher":"German UPA","author":[{"first_name":"Holger Gerhard","full_name":"Fischer, Holger Gerhard","last_name":"Fischer","id":"30457"},{"first_name":"Thomas","full_name":"Geis, Thomas","last_name":"Geis"},{"last_name":"Molich","first_name":"Rolf","full_name":"Molich, Rolf"},{"last_name":"Kluge","first_name":"Oliver","full_name":"Kluge, Oliver"},{"first_name":"Rüdiger","full_name":"Heimgärtner, Rüdiger","last_name":"Heimgärtner"},{"first_name":"Peter","full_name":"Hunkirchen, Peter","last_name":"Hunkirchen"}],"publication":"Jahresband Usability Professionals","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}]},{"date_created":"2019-01-02T09:43:45Z","status":"public","editor":[{"full_name":"Feng, X.","first_name":"X.","last_name":"Feng"},{"last_name":"Rützel","first_name":"J.","full_name":"Rützel, J."},{"first_name":"H.-H.","full_name":"Kremer, H.-H.","last_name":"Kremer"}],"publication":"Standardization, professionalizationn and the measurements","department":[{"_id":"211"}],"author":[{"last_name":"Kremer","id":"15280","first_name":"H.-Hugo","full_name":"Kremer, H.-Hugo"}],"user_id":"74378","title":"Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen","place":"Shanghai","language":[{"iso":"ger"}],"page":"51-71","citation":{"chicago":"Kremer, H.-Hugo. “Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen.” In Standardization, professionalizationn and the measurements, edited by X. Feng, J. Rützel, and H.-H. Kremer, 51–71. Shanghai, 2013.","ama":"Kremer H-H. Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen. In: Feng X, Rützel J, Kremer H-H, eds. Standardization, professionalizationn and the measurements. Shanghai; 2013:51-71.","apa":"Kremer, H.-H. (2013). Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen. In X. Feng, J. Rützel, & H.-H. Kremer (Eds.), Standardization, professionalizationn and the measurements (pp. 51–71). Shanghai.","mla":"Kremer, H. Hugo. “Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen.” Standardization, professionalizationn and the measurements, edited by X. Feng et al., 2013, pp. 51–71.","bibtex":"@inbook{Kremer_2013, place={Shanghai}, title={Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen}, booktitle={Standardization, professionalizationn and the measurements}, author={Kremer, H.-Hugo}, editor={Feng, X. and Rützel, J. and Kremer, H.-H.Editors}, year={2013}, pages={51–71} }","short":"H.-H. Kremer, in: X. Feng, J. Rützel, H.-H. Kremer (Eds.), Standardization, professionalizationn and the measurements, Shanghai, 2013, pp. 51–71.","ieee":"H.-H. Kremer, “Kompetenzorientierte Lehrerbildung - Zur Gestaltung des Praxissemesters in wirtschaftspädagogischen Studiengängen,” in Standardization, professionalizationn and the measurements, X. Feng, J. Rützel, and H.-H. Kremer, Eds. Shanghai, 2013, pp. 51–71."},"year":"2013","type":"book_chapter","_id":"6448","date_updated":"2022-01-06T07:03:05Z"},{"date_updated":"2022-01-06T07:03:05Z","_id":"6449","page":"151-171","year":"2013","citation":{"bibtex":"@inbook{Kremer_2013, place={Shanghai}, title={Social Media: Potenziale und Herausforderungen für die berufliche Bildung}, booktitle={Standardization, professionalization and the measurements}, author={Kremer, H.-Hugo}, editor={Feng, X. and Rützel, J. and Kremer, H.-H.Editors}, year={2013}, pages={151–171} }","mla":"Kremer, H. Hugo. “Social Media: Potenziale und Herausforderungen für die berufliche Bildung.” Standardization, professionalization and the measurements, edited by X. Feng et al., 2013, pp. 151–71.","chicago":"Kremer, H.-Hugo. “Social Media: Potenziale und Herausforderungen für die berufliche Bildung.” In Standardization, professionalization and the measurements, edited by X. Feng, J. Rützel, and H.-H. Kremer, 151–71. Shanghai, 2013.","ama":"Kremer H-H. Social Media: Potenziale und Herausforderungen für die berufliche Bildung. In: Feng X, Rützel J, Kremer H-H, eds. Standardization, professionalization and the measurements. Shanghai; 2013:151-171.","apa":"Kremer, H.-H. (2013). Social Media: Potenziale und Herausforderungen für die berufliche Bildung. In X. Feng, J. Rützel, & H.-H. Kremer (Eds.), Standardization, professionalization and the measurements (pp. 151–171). Shanghai.","ieee":"H.-H. Kremer, “Social Media: Potenziale und Herausforderungen für die berufliche Bildung,” in Standardization, professionalization and the measurements, X. Feng, J. Rützel, and H.-H. Kremer, Eds. Shanghai, 2013, pp. 151–171.","short":"H.-H. Kremer, in: X. Feng, J. Rützel, H.-H. Kremer (Eds.), Standardization, professionalization and the measurements, Shanghai, 2013, pp. 151–171."},"type":"book_chapter","language":[{"iso":"ger"}],"place":"Shanghai","title":"Social Media: Potenziale und Herausforderungen für die berufliche Bildung","user_id":"74378","publication":"Standardization, professionalization and the measurements","department":[{"_id":"211"}],"author":[{"id":"15280","last_name":"Kremer","full_name":"Kremer, H.-Hugo","first_name":"H.-Hugo"}],"editor":[{"last_name":"Feng","first_name":"X.","full_name":"Feng, X."},{"last_name":"Rützel","full_name":"Rützel, J.","first_name":"J."},{"last_name":"Kremer","first_name":"H.-H.","full_name":"Kremer, H.-H."}],"date_created":"2019-01-02T09:46:34Z","status":"public"},{"_id":"6450","date_updated":"2022-01-06T07:03:05Z","year":"2013","type":"book_chapter","citation":{"short":"H.-H. Kremer, A. Zoyke, in: G. Niedermair (Ed.), Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven, Linz, 2013, pp. 359–382.","ieee":"H.-H. Kremer and A. Zoyke, “Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs,” in Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven, G. Niedermair, Ed. Linz, 2013, pp. 359–382.","chicago":"Kremer, H.-Hugo, and A. Zoyke. “Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs.” In Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven, edited by G. Niedermair, 359–82. Linz, 2013.","ama":"Kremer H-H, Zoyke A. Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs. In: Niedermair G, ed. Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven. Linz; 2013:359-382.","apa":"Kremer, H.-H., & Zoyke, A. (2013). Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs. In G. Niedermair (Ed.), Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven (pp. 359–382). Linz.","bibtex":"@inbook{Kremer_Zoyke_2013, place={Linz}, title={Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs}, booktitle={Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven}, author={Kremer, H.-Hugo and Zoyke, A.}, editor={Niedermair, G.Editor}, year={2013}, pages={359–382} }","mla":"Kremer, H. Hugo, and A. Zoyke. “Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs.” Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven, edited by G. Niedermair, 2013, pp. 359–82."},"page":"359-382","language":[{"iso":"ger"}],"title":"Forschung in Innovationsarenen: Individuelle Förderung als Herausforderung in der Bildungsarbeit in der Ausbildungsvorbereitung an Berufskollegs","user_id":"74378","place":"Linz","editor":[{"last_name":"Niedermair","full_name":"Niedermair, G.","first_name":"G."}],"status":"public","date_created":"2019-01-02T10:14:15Z","author":[{"id":"15280","last_name":"Kremer","full_name":"Kremer, H.-Hugo","first_name":"H.-Hugo"},{"full_name":"Zoyke, A.","first_name":"A.","last_name":"Zoyke"}],"department":[{"_id":"211"}],"publication":"Facetten berufs- und wirtschaftspädagogischer Forschung. Grundlagen - Herausfoderungen - Perspektiven"},{"author":[{"id":"21118","last_name":"Beutner","full_name":"Beutner, Marc","first_name":"Marc"},{"first_name":"H.-Hugo","full_name":"Kremer, H.-Hugo","last_name":"Kremer","id":"15280"},{"last_name":"Zoyke","full_name":"Zoyke, A.","first_name":"A."}],"publication":"Transitions in Vocational Education, Research in Vocational Education","department":[{"_id":"211"}],"status":"public","date_created":"2019-01-02T10:22:15Z","editor":[{"full_name":"Seifried, J.","first_name":"J.","last_name":"Seifried"},{"full_name":"Wuttke, E.","first_name":"E.","last_name":"Wuttke"}],"place":"Berlin, Farmington Hills","user_id":"74378","title":"Exploring Personalized Learning in the Context of the Transition System, vol. 2. Opladen","language":[{"iso":"eng"}],"type":"book_chapter","citation":{"mla":"Beutner, Marc, et al. “Exploring Personalized Learning in the Context of the Transition System, Vol. 2. Opladen.” Transitions in Vocational Education, Research in Vocational Education, edited by J. Seifried and E. Wuttke, 2013.","bibtex":"@inbook{Beutner_Kremer_Zoyke_2013, place={Berlin, Farmington Hills}, title={Exploring Personalized Learning in the Context of the Transition System, vol. 2. Opladen}, booktitle={Transitions in Vocational Education, Research in Vocational Education}, author={Beutner, Marc and Kremer, H.-Hugo and Zoyke, A.}, editor={Seifried, J. and Wuttke, E.Editors}, year={2013} }","chicago":"Beutner, Marc, H.-Hugo Kremer, and A. Zoyke. “Exploring Personalized Learning in the Context of the Transition System, Vol. 2. Opladen.” In Transitions in Vocational Education, Research in Vocational Education, edited by J. Seifried and E. Wuttke. Berlin, Farmington Hills, 2013.","apa":"Beutner, M., Kremer, H.-H., & Zoyke, A. (2013). Exploring Personalized Learning in the Context of the Transition System, vol. 2. Opladen. In J. Seifried & E. Wuttke (Eds.), Transitions in Vocational Education, Research in Vocational Education. Berlin, Farmington Hills.","ama":"Beutner M, Kremer H-H, Zoyke A. Exploring Personalized Learning in the Context of the Transition System, vol. 2. Opladen. In: Seifried J, Wuttke E, eds. Transitions in Vocational Education, Research in Vocational Education. Berlin, Farmington Hills; 2013.","ieee":"M. Beutner, H.-H. Kremer, and A. Zoyke, “Exploring Personalized Learning in the Context of the Transition System, vol. 2. Opladen,” in Transitions in Vocational Education, Research in Vocational Education, J. Seifried and E. Wuttke, Eds. Berlin, Farmington Hills, 2013.","short":"M. Beutner, H.-H. Kremer, A. Zoyke, in: J. Seifried, E. Wuttke (Eds.), Transitions in Vocational Education, Research in Vocational Education, Berlin, Farmington Hills, 2013."},"year":"2013","date_updated":"2022-01-06T07:03:05Z","_id":"6452"},{"editor":[{"last_name":"Seufert","full_name":"Seufert, S.","first_name":"S."},{"last_name":"Metzger","full_name":"Metzger, C.","first_name":"C."}],"date_created":"2019-01-02T10:27:08Z","status":"public","publication":"Kompetenzentwicklung in unterschiedlichen Lernkulturen","department":[{"_id":"211"}],"author":[{"full_name":"Kremer, H.-Hugo","first_name":"H.-Hugo","id":"15280","last_name":"Kremer"}],"title":"Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung ","user_id":"74378","place":"Paderborn","page":"357-373","type":"book_chapter","citation":{"chicago":"Kremer, H.-Hugo. “Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung .” In Kompetenzentwicklung in unterschiedlichen Lernkulturen, edited by S. Seufert and C. Metzger, 357–73. Paderborn, 2013.","apa":"Kremer, H.-H. (2013). Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung . In S. Seufert & C. Metzger (Eds.), Kompetenzentwicklung in unterschiedlichen Lernkulturen (pp. 357–373). Paderborn.","ama":"Kremer H-H. Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung . In: Seufert S, Metzger C, eds. Kompetenzentwicklung in unterschiedlichen Lernkulturen. Paderborn; 2013:357-373.","bibtex":"@inbook{Kremer_2013, place={Paderborn}, title={Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung }, booktitle={Kompetenzentwicklung in unterschiedlichen Lernkulturen}, author={Kremer, H.-Hugo}, editor={Seufert, S. and Metzger, C.Editors}, year={2013}, pages={357–373} }","mla":"Kremer, H. Hugo. “Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung .” Kompetenzentwicklung in unterschiedlichen Lernkulturen, edited by S. Seufert and C. Metzger, 2013, pp. 357–73.","short":"H.-H. Kremer, in: S. Seufert, C. Metzger (Eds.), Kompetenzentwicklung in unterschiedlichen Lernkulturen, Paderborn, 2013, pp. 357–373.","ieee":"H.-H. Kremer, “Berufsbildung im Übergang - Kompetenzentwicklung in der Ausbildungsvorbereitung ,” in Kompetenzentwicklung in unterschiedlichen Lernkulturen, S. Seufert and C. Metzger, Eds. Paderborn, 2013, pp. 357–373."},"year":"2013","language":[{"iso":"ger"}],"_id":"6454","date_updated":"2022-01-06T07:03:05Z"},{"place":"Rotterdam","title":"Social Media: Potentials and Challenges for Vocational Education","user_id":"74378","author":[{"full_name":"Kremer, H.-Hugo","first_name":"H.-Hugo","id":"15280","last_name":"Kremer"}],"publication":"From Diagnostics to Learning Success. Proceedings in Vocational Education and Training","department":[{"_id":"211"}],"editor":[{"first_name":"K.","full_name":"Beck, K.","last_name":"Beck"},{"full_name":"Zlatkin-Troitschanskaia, O.","first_name":"O.","last_name":"Zlatkin-Troitschanskaia"}],"status":"public","date_created":"2019-01-02T10:29:57Z","date_updated":"2022-01-06T07:03:05Z","_id":"6455","type":"book_chapter","year":"2013","citation":{"chicago":"Kremer, H.-Hugo. “Social Media: Potentials and Challenges for Vocational Education.” In From Diagnostics to Learning Success. Proceedings in Vocational Education and Training, edited by K. Beck and O. Zlatkin-Troitschanskaia. Rotterdam, 2013.","apa":"Kremer, H.-H. (2013). Social Media: Potentials and Challenges for Vocational Education. In K. Beck & O. Zlatkin-Troitschanskaia (Eds.), From Diagnostics to Learning Success. Proceedings in Vocational Education and Training. Rotterdam.","ama":"Kremer H-H. Social Media: Potentials and Challenges for Vocational Education. In: Beck K, Zlatkin-Troitschanskaia O, eds. From Diagnostics to Learning Success. Proceedings in Vocational Education and Training. Rotterdam; 2013.","mla":"Kremer, H. Hugo. “Social Media: Potentials and Challenges for Vocational Education.” From Diagnostics to Learning Success. Proceedings in Vocational Education and Training, edited by K. Beck and O. Zlatkin-Troitschanskaia, 2013.","bibtex":"@inbook{Kremer_2013, place={Rotterdam}, title={Social Media: Potentials and Challenges for Vocational Education}, booktitle={From Diagnostics to Learning Success. Proceedings in Vocational Education and Training}, author={Kremer, H.-Hugo}, editor={Beck, K. and Zlatkin-Troitschanskaia, O.Editors}, year={2013} }","short":"H.-H. Kremer, in: K. Beck, O. Zlatkin-Troitschanskaia (Eds.), From Diagnostics to Learning Success. Proceedings in Vocational Education and Training, Rotterdam, 2013.","ieee":"H.-H. Kremer, “Social Media: Potentials and Challenges for Vocational Education,” in From Diagnostics to Learning Success. Proceedings in Vocational Education and Training, K. Beck and O. Zlatkin-Troitschanskaia, Eds. Rotterdam, 2013."},"language":[{"iso":"eng"}]},{"intvolume":" 8","_id":"4427","issue":"1","page":"7-14","citation":{"ieee":"T. Brahm and T. Jenert, “Herausforderungen der Kompetenzorientierung in der Studienprogrammentwicklung,” Zeitschrift für Hochschulentwicklung, vol. 8, no. 1, pp. 7–14, 2013.","short":"T. Brahm, T. Jenert, Zeitschrift Für Hochschulentwicklung 8 (2013) 7–14.","bibtex":"@article{Brahm_Jenert_2013, title={Herausforderungen der Kompetenzorientierung in der Studienprogrammentwicklung}, volume={8}, number={1}, journal={Zeitschrift für Hochschulentwicklung}, publisher={Österreichische Gesellschaft für Hochschuldidaktik}, author={Brahm, Taiga and Jenert, Tobias}, year={2013}, pages={7–14} }","mla":"Brahm, Taiga, and Tobias Jenert. “Herausforderungen Der Kompetenzorientierung in Der Studienprogrammentwicklung.” Zeitschrift Für Hochschulentwicklung, vol. 8, no. 1, Österreichische Gesellschaft für Hochschuldidaktik, 2013, pp. 7–14.","ama":"Brahm T, Jenert T. Herausforderungen der Kompetenzorientierung in der Studienprogrammentwicklung. Zeitschrift für Hochschulentwicklung. 2013;8(1):7-14.","apa":"Brahm, T., & Jenert, T. (2013). Herausforderungen der Kompetenzorientierung in der Studienprogrammentwicklung. Zeitschrift Für Hochschulentwicklung, 8(1), 7–14.","chicago":"Brahm, Taiga, and Tobias Jenert. “Herausforderungen Der Kompetenzorientierung in Der Studienprogrammentwicklung.” Zeitschrift Für Hochschulentwicklung 8, no. 1 (2013): 7–14."},"type":"journal_article","year":"2013","extern":"1","abstract":[{"lang":"ger","text":"Kompetenzorientierung ist ein wichtiges aktuelles Ziel bei der Studienprogrammentwicklung. Allerdings ist die Umsetzung in der Praxis mit zwei wesentlichen Herausforderungen verbunden: So ist zum einen der Wechsel von disziplinären Inhalten hin zu Kompetenzen wenig intuitiv; zum anderen wird die Formulierung so genannter Learning Outcomes als administrative Übung betrachtet. An der Universität St. Gallen wurde ein systematischer Prozess für die Qualitätsentwicklung der Studienprogramme eingeführt. Im Beitrag wird dieser Prozess im Hinblick auf die Kompetenzorientierung reflektiert. Es erscheint wesentlich, den Programmen möglichst viel Freiraum auf ihrem Weg zur Kompetenzorientierung zu überlassen und sie auf diese Weise zu unterstützen."}],"user_id":"51057","publication":"Zeitschrift für Hochschulentwicklung","keyword":["Kompetenzorientierung","Studienprogrammentwicklung","Hochschulentwicklung","Hochschule","Learning Outcomes"],"author":[{"full_name":"Brahm, Taiga","first_name":"Taiga","last_name":"Brahm"},{"last_name":"Jenert","first_name":"Tobias","full_name":"Jenert, Tobias"}],"publisher":"Österreichische Gesellschaft für Hochschuldidaktik","volume":8,"date_created":"2018-09-18T09:17:20Z","status":"public","date_updated":"2022-01-06T07:01:03Z","title":"Herausforderungen der Kompetenzorientierung in der Studienprogrammentwicklung","department":[{"_id":"208"},{"_id":"282"}],"publication_identifier":{"eissn":["2219-6994"]}},{"date_updated":"2022-01-06T07:01:03Z","department":[{"_id":"208"},{"_id":"282"}],"publication_identifier":{"issn":["1681-7028"]},"title":"Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung","citation":{"ieee":"T. Jenert and T. Brahm, “Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung,” Journal für LehrerInnenbildung, vol. 13, no. 4, pp. 29–33, 2013.","short":"T. Jenert, T. Brahm, Journal Für LehrerInnenbildung 13 (2013) 29–33.","bibtex":"@article{Jenert_Brahm_2013, title={Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung}, volume={13}, number={4}, journal={Journal für LehrerInnenbildung}, publisher={Studien-Verlag}, author={Jenert, Tobias and Brahm, Taiga}, year={2013}, pages={29–33} }","mla":"Jenert, Tobias, and Taiga Brahm. “Ein E-Portfolio-Konzept Zur Integration Heterogener Lernvoraussetzungen Und Studienerfahrungen in Der Lehrerbildung.” Journal Für LehrerInnenbildung, vol. 13, no. 4, Studien-Verlag, 2013, pp. 29–33.","apa":"Jenert, T., & Brahm, T. (2013). Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung. Journal Für LehrerInnenbildung, 13(4), 29–33.","ama":"Jenert T, Brahm T. Ein e-Portfolio-Konzept zur Integration heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung. Journal für LehrerInnenbildung. 2013;13(4):29-33.","chicago":"Jenert, Tobias, and Taiga Brahm. “Ein E-Portfolio-Konzept Zur Integration Heterogener Lernvoraussetzungen Und Studienerfahrungen in Der Lehrerbildung.” Journal Für LehrerInnenbildung 13, no. 4 (2013): 29–33."},"year":"2013","type":"journal_article","page":"29-33","_id":"4428","intvolume":" 13","issue":"4","publisher":"Studien-Verlag","author":[{"last_name":"Jenert","first_name":"Tobias","full_name":"Jenert, Tobias"},{"full_name":"Brahm, Taiga","first_name":"Taiga","last_name":"Brahm"}],"keyword":["Portfolio","Lehrerbildung","Wirtschaftspädagogik"],"publication":"Journal für LehrerInnenbildung","volume":13,"status":"public","date_created":"2018-09-18T09:19:16Z","extern":"1","abstract":[{"lang":"ger","text":"Die Auseinandersetzung mit Bildungstechnologien erfolgt häufig ausgehend von einem technologischen Trend bzw. einer Klasse innovativer Werkzeuge (bspw. mobile Technologien). Es geht dann darum, die Potenziale dieser Tools für das Lernen zu ergründen, also letztlich eine Passung zwischen den technologischen Möglichkeiten und pädagogisch-didaktischen Erfordernissen zu konstruieren. In diesem Beitrag kehren wir diese Perspektive um: Ausgehend von einer bestimmten pädagogischen Problemstellung - der Bearbeitung heterogener Lernvoraussetzungen und Studienerfahrungen in der Lehrerbildung - entwickeln wir unterschiedliche didaktische Handlungsoptionen. Am Ende entsteht ein Werkzeug, das sich in Design und Funktionsumfang auf den Kern der pädagogischen Zielsetzung beschränkt."}],"user_id":"51057"},{"publisher":"EARLI European Association for Research on Learning and Instruction","author":[{"first_name":"Tobias","orcid":" https://orcid.org/0000-0001-9262-5646","full_name":"Jenert, Tobias","last_name":"Jenert","id":"71994"},{"last_name":"Brahm","full_name":"Brahm, Taiga","first_name":"Taiga"}],"keyword":["student attitudes","qualitative research","longitudinal study","student motivation"],"department":[{"_id":"208"},{"_id":"282"}],"status":"public","date_created":"2018-09-19T08:19:05Z","extern":"1","abstract":[{"text":"The aim of this qualitative study is first to investigate the attitude development of students in their initial year at university. College effectiveness research has shown that attitudes towards studying as well as to one's university are key factors influencing student engagement. Up to now, little is known about the processes through which such attitudes develop. Based on the theory of planned behaviour (Ajzen & Fishbein, 1980), the study addresses this research gap in three parts: a) development paths of students' attitudes towards studying and the university; b) the normative behaviour of the fellow students as well as significant persons, c) university-related experiences during the first year influencing students' attitude development. \r\nTo answer these research questions, a series of five interviews was conducted throughout the first year with a total of 13 first-year students at the University of St. Gallen/Switzerland. Data analysis was performed referring to the procedures suggested by Neale (2012) for qualitative longitudinal data. To master the challenge of displaying developments over time, graphical analysis was used to construct a case history (cf. Henderson, Holland et al., 2012) for each individual. Regarding the students' developments over time, the analysis shows the participants' attitudes towards the university became more differentiated over time. A second major result concerns frictions between students' own attitudes and what they perceive to be the dominant normative behaviour. It became obvious that this developmental process is influenced by concrete incidents students experience during the first year and thus, can be shaped by structural changes.","lang":"eng"}],"title":"How Business Students Attitudes towards their University and Studying Develop during the First Year: A Qualitative Longitudinal Study","user_id":"51057","year":"2013","type":"conference","citation":{"ieee":"T. Jenert and T. Brahm, “How Business Students Attitudes towards their University and Studying Develop during the First Year: A Qualitative Longitudinal Study,” presented at the 15th Biennial EARLI Conference, München, 2013.","short":"T. Jenert, T. Brahm, in: EARLI European Association for Research on Learning and Instruction, 2013.","bibtex":"@inproceedings{Jenert_Brahm_2013, title={How Business Students Attitudes towards their University and Studying Develop during the First Year: A Qualitative Longitudinal Study}, publisher={EARLI European Association for Research on Learning and Instruction}, author={Jenert, Tobias and Brahm, Taiga}, year={2013} }","mla":"Jenert, Tobias, and Taiga Brahm. How Business Students Attitudes towards Their University and Studying Develop during the First Year: A Qualitative Longitudinal Study. EARLI European Association for Research on Learning and Instruction, 2013.","chicago":"Jenert, Tobias, and Taiga Brahm. “How Business Students Attitudes towards Their University and Studying Develop during the First Year: A Qualitative Longitudinal Study.” EARLI European Association for Research on Learning and Instruction, 2013.","ama":"Jenert T, Brahm T. How Business Students Attitudes towards their University and Studying Develop during the First Year: A Qualitative Longitudinal Study. In: EARLI European Association for Research on Learning and Instruction; 2013.","apa":"Jenert, T., & Brahm, T. (2013). How Business Students Attitudes towards their University and Studying Develop during the First Year: A Qualitative Longitudinal Study. Presented at the 15th Biennial EARLI Conference, München: EARLI European Association for Research on Learning and Instruction."},"_id":"4477","date_updated":"2022-01-06T07:01:06Z","conference":{"name":"15th Biennial EARLI Conference","start_date":"2013-08-27","location":"München","end_date":"2013-08-31"}},{"date_updated":"2022-01-06T07:01:06Z","_id":"4478","conference":{"location":"München ","name":"15th Biennial EARLI Conference","start_date":"2013-08-27","end_date":"2013-08-31"},"citation":{"ama":"Brahm T, Jenert T, Euler D. On the assessment of attitudes towards the study process and the university: Attitudes towards the Study Environment Questionnaire (ASEQ). In: EARLI European Association for Research on Learning and Instruction; 2013.","apa":"Brahm, T., Jenert, T., & Euler, D. (2013). On the assessment of attitudes towards the study process and the university: Attitudes towards the Study Environment Questionnaire (ASEQ). Presented at the 15th Biennial EARLI Conference, München : EARLI European Association for Research on Learning and Instruction.","chicago":"Brahm, Taiga, Tobias Jenert, and Dieter Euler. “On the Assessment of Attitudes towards the Study Process and the University: Attitudes towards the Study Environment Questionnaire (ASEQ).” EARLI European Association for Research on Learning and Instruction, 2013.","mla":"Brahm, Taiga, et al. On the Assessment of Attitudes towards the Study Process and the University: Attitudes towards the Study Environment Questionnaire (ASEQ). EARLI European Association for Research on Learning and Instruction, 2013.","bibtex":"@inproceedings{Brahm_Jenert_Euler_2013, title={On the assessment of attitudes towards the study process and the university: Attitudes towards the Study Environment Questionnaire (ASEQ)}, publisher={EARLI European Association for Research on Learning and Instruction}, author={Brahm, Taiga and Jenert, Tobias and Euler, Dieter}, year={2013} }","short":"T. Brahm, T. Jenert, D. Euler, in: EARLI European Association for Research on Learning and Instruction, 2013.","ieee":"T. Brahm, T. Jenert, and D. Euler, “On the assessment of attitudes towards the study process and the university: Attitudes towards the Study Environment Questionnaire (ASEQ),” presented at the 15th Biennial EARLI Conference, München , 2013."},"type":"conference","year":"2013","title":"On the assessment of attitudes towards the study process and the university: Attitudes towards the Study Environment Questionnaire (ASEQ)","user_id":"51057","extern":"1","abstract":[{"lang":"eng","text":"The purpose of the research was to develop and validate an instrument for the assessment of attitudes towards the study environment in higher education contexts. The questionnaire is designed to measure students' attitudes towards two particular objects: the university (or Higher Education Institution) and the process of studying. Five studies at two different universities were conducted to develop and validate the Attitudes towards the Study Environment Questionnaire (ASEQ). In total, 1640 students filled in the questionnaire. Reliability tests and exploratory factor analysis as well as confirmatory factor analysis showed satisfactory psychometric characteristics of the ASEQ. Each part of the questionnaire is internally consistent and construct validity of the scales is supported by correlations with other constructs as assumed by current theories: Positive attitudinal constructs (normative behavior, autonomy, joy, self-efficacy, and task value) are positively related to intrinsic motivation and the expected study performance while anxiety is negatively related to these constructs. \r\nSince attitudes towards the study situation are connected to student engagement and motivation, the study contributes to the theory of student learning by providing a validated instrument to assess attitudes. Thus, the ASEQ can support further research on student performance and development by providing an instrument for the hitherto neglected but nonetheless extremely relevant domain of attitudes. Also, the questionnaire can be used as a diagnostic instrument for higher education faculty and administration to trace students' attitudinal development over time - a factor of prime importance for student socialization during the introductory phase of studying."}],"status":"public","date_created":"2018-09-19T08:22:51Z","author":[{"last_name":"Brahm","full_name":"Brahm, Taiga","first_name":"Taiga"},{"last_name":"Jenert","id":"71994","first_name":"Tobias","orcid":" https://orcid.org/0000-0001-9262-5646","full_name":"Jenert, Tobias"},{"first_name":"Dieter","full_name":"Euler, Dieter","last_name":"Euler"}],"publisher":"EARLI European Association for Research on Learning and Instruction","keyword":["attitudes","teaching and learning","studying","higher education institution","theory of planned behavior","instrument development"],"department":[{"_id":"208"},{"_id":"282"}]},{"status":"public","date_created":"2018-09-19T08:27:05Z","author":[{"last_name":"Brahm","full_name":"Brahm, Taiga","first_name":"Taiga"},{"id":"71994","last_name":"Jenert","full_name":"Jenert, Tobias","orcid":" https://orcid.org/0000-0001-9262-5646","first_name":"Tobias"}],"publisher":"EARLI European Association for Research on Learning and Instruction","keyword":["motivation","intrinsic motivation","extrinsic motivation","latent growth curve modeling","longitudinal data analysis","ASEQ","higher education","studying"],"department":[{"_id":"208"},{"_id":"282"}],"user_id":"51057","title":"A latent growth curve analysis of Business students' intrinsic and extrinsic motivation","abstract":[{"lang":"eng","text":"The proposed paper aims to investigate the longitudinal development of students' motivation over the first year of their studies at a business school by using latent growth curve modeling. The study tackles the following core research questions: How do first-year university students' intrinsic and extrinsic vary over time? Which (motivational) factors are related to students' motivational development? Although motivational dispositions have been analyzed extensively in previous studies, their longitudinal development has hitherto not been examined in the higher education context.\r\n\r\nThis longitudinal study is conducted at the University of St. Gallen in Switzerland. The current sample includes 280 first-year students who have been surveyed three times and who are representative of the first-year student population.\r\n\r\nDescriptive results show that prior to their studies, students were motivated most by intrinsic factors, however, extrinsic motivation was also quite high. Employing latent growth curve modeling, it could be shown that both intrinsic and extrinsic motivation decline significantly over the course of the first year (8 months).\r\n\r\nThe study contributes to motivation theory by providing further insights into the development of academic motivation over time. Latent growth curve modeling as a method can be well used for longitudinal data analysis, thus, excluding measurement error from longitudinal data. Furthermore, the study supports educational developers by determining factors influencing students' motivational development."}],"extern":"1","year":"2013","type":"conference","citation":{"bibtex":"@inproceedings{Brahm_Jenert_2013, title={A latent growth curve analysis of Business students’ intrinsic and extrinsic motivation}, publisher={EARLI European Association for Research on Learning and Instruction}, author={Brahm, Taiga and Jenert, Tobias}, year={2013} }","mla":"Brahm, Taiga, and Tobias Jenert. A Latent Growth Curve Analysis of Business Students’ Intrinsic and Extrinsic Motivation. EARLI European Association for Research on Learning and Instruction, 2013.","chicago":"Brahm, Taiga, and Tobias Jenert. “A Latent Growth Curve Analysis of Business Students’ Intrinsic and Extrinsic Motivation.” EARLI European Association for Research on Learning and Instruction, 2013.","apa":"Brahm, T., & Jenert, T. (2013). A latent growth curve analysis of Business students’ intrinsic and extrinsic motivation. Presented at the 15th Biennial EARLI Conference, München: EARLI European Association for Research on Learning and Instruction.","ama":"Brahm T, Jenert T. A latent growth curve analysis of Business students’ intrinsic and extrinsic motivation. In: EARLI European Association for Research on Learning and Instruction; 2013.","ieee":"T. Brahm and T. Jenert, “A latent growth curve analysis of Business students’ intrinsic and extrinsic motivation,” presented at the 15th Biennial EARLI Conference, München, 2013.","short":"T. Brahm, T. Jenert, in: EARLI European Association for Research on Learning and Instruction, 2013."},"date_updated":"2022-01-06T07:01:06Z","_id":"4480","conference":{"start_date":"2013-08-27","name":"15th Biennial EARLI Conference","location":"München","end_date":"2013-08-31"}},{"user_id":"51057","title":"Die Entwicklung studien-und hochschulbezogener Einstellungen an einer Wirtschaftsuniversität: eine qualitative Längsschnittstudie","abstract":[{"lang":"ger","text":"Die vorliegende Untersuchung an der Universität St. Gallen soll Erkenntnisse über die Verläufe der Einstellungsveränderungen der Studierenden geben (vgl. Brahm & Jenert, 2012). Basierend auf der Theorie des geplanten Verhaltens (Ajzen & Fishbein, 1980) werden drei Forschungsfragen adressiert: (1) Gibt es typische Pfade der Einstellungsentwicklung? (2) Wie wird das normative Verhalten von Mitstudierenden und anderen Personen wahrgenommen? (3) Welche Erfahrungen beeinflussen die Entwicklung? Zur Beantwortung dieser Fragen wurde über das erste Studienjahr hinweg eine Interviewserie mit 13 Studierenden durchgeführt. Die Datenanalyse mithilfe grafischer Case Histories zeigt, dass die Einstellungen der Probanden über die Zeit differenzierter werden. Zudem gibt es Widersprüche zwischen den Einstellungen und dem wahrgenommenen normativen Verhalten. Dabei ist die Einstellungsentwicklung von konkreten Ereignissen geprägt und kann damit durch strukturelle Interventionen beeinflusst werden."}],"extern":"1","status":"public","date_created":"2018-09-19T08:29:59Z","publisher":"Institut für Psychologie","author":[{"first_name":"Tobias","orcid":" https://orcid.org/0000-0001-9262-5646","full_name":"Jenert, Tobias","last_name":"Jenert","id":"71994"},{"last_name":"Brahm","first_name":"Taiga","full_name":"Brahm, Taiga"}],"keyword":["student attitudes","theory of planned behaviour","Einstellungsentwicklung","student motivation"],"department":[{"_id":"208"},{"_id":"282"}],"date_updated":"2022-01-06T07:01:06Z","_id":"4481","conference":{"name":"14. Fachgruppentagung Pädagogische Psychologie der Deutschen Gesellschaft für Psychologie","start_date":"2013-09-23","location":"Hildesheim","end_date":"2013-09-25"},"year":"2013","type":"conference","citation":{"chicago":"Jenert, Tobias, and Taiga Brahm. “Die Entwicklung Studien-Und Hochschulbezogener Einstellungen an Einer Wirtschaftsuniversität: Eine Qualitative Längsschnittstudie.” Institut für Psychologie, 2013.","ama":"Jenert T, Brahm T. Die Entwicklung studien-und hochschulbezogener Einstellungen an einer Wirtschaftsuniversität: eine qualitative Längsschnittstudie. In: Institut für Psychologie; 2013.","apa":"Jenert, T., & Brahm, T. (2013). Die Entwicklung studien-und hochschulbezogener Einstellungen an einer Wirtschaftsuniversität: eine qualitative Längsschnittstudie. Presented at the 14. Fachgruppentagung Pädagogische Psychologie der Deutschen Gesellschaft für Psychologie, Hildesheim: Institut für Psychologie.","mla":"Jenert, Tobias, and Taiga Brahm. Die Entwicklung Studien-Und Hochschulbezogener Einstellungen an Einer Wirtschaftsuniversität: Eine Qualitative Längsschnittstudie. Institut für Psychologie, 2013.","bibtex":"@inproceedings{Jenert_Brahm_2013, title={Die Entwicklung studien-und hochschulbezogener Einstellungen an einer Wirtschaftsuniversität: eine qualitative Längsschnittstudie}, publisher={Institut für Psychologie}, author={Jenert, Tobias and Brahm, Taiga}, year={2013} }","short":"T. Jenert, T. Brahm, in: Institut für Psychologie, 2013.","ieee":"T. Jenert and T. Brahm, “Die Entwicklung studien-und hochschulbezogener Einstellungen an einer Wirtschaftsuniversität: eine qualitative Längsschnittstudie,” presented at the 14. Fachgruppentagung Pädagogische Psychologie der Deutschen Gesellschaft für Psychologie, Hildesheim, 2013."}},{"language":[{"iso":"ger"}],"series_title":"Blickpunkt Hochschuldidaktik","date_updated":"2022-01-06T07:01:07Z","publication_identifier":{"isbn":["978-3-7639-5194-9"]},"editor":[{"last_name":"Spiekermann","full_name":"Spiekermann, Annette","first_name":"Annette"}],"department":[{"_id":"208"},{"_id":"282"}],"edition":"1","title":"Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen ","place":"Bielefeld","page":"69-84 ","year":"2013","citation":{"short":"T. Jenert, T. Brahm , in: A. Spiekermann (Ed.), Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis, 1st ed., W. Bertelsmann Verlag , Bielefeld, 2013, pp. 69–84.","ieee":"T. Jenert and T. Brahm , “Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen ,” in Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis, 1st ed., vol. 124, A. Spiekermann, Ed. Bielefeld: W. Bertelsmann Verlag , 2013, pp. 69–84.","chicago":"Jenert, Tobias, and Taiga Brahm . “Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen .” In Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis, edited by Annette Spiekermann, 1st ed., 124:69–84. Blickpunkt Hochschuldidaktik. Bielefeld: W. Bertelsmann Verlag , 2013.","apa":"Jenert, T., & Brahm , T. (2013). Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen . In A. Spiekermann (Ed.), Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis (1st ed., Vol. 124, pp. 69–84). Bielefeld: W. Bertelsmann Verlag .","ama":"Jenert T, Brahm T. Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen . In: Spiekermann A, ed. Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis. Vol 124. 1st ed. Blickpunkt Hochschuldidaktik. Bielefeld: W. Bertelsmann Verlag ; 2013:69-84.","mla":"Jenert, Tobias, and Taiga Brahm . “Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen .” Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis, edited by Annette Spiekermann, 1st ed., vol. 124, W. Bertelsmann Verlag , 2013, pp. 69–84.","bibtex":"@inbook{Jenert_Brahm _2013, place={Bielefeld}, edition={1}, series={Blickpunkt Hochschuldidaktik}, title={Eine strategische Perspektive auf die Qualitätsentwicklung in Studienumgebungen }, volume={124}, booktitle={Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis}, publisher={W. Bertelsmann Verlag }, author={Jenert, Tobias and Brahm , Taiga}, editor={Spiekermann, AnnetteEditor}, year={2013}, pages={69–84}, collection={Blickpunkt Hochschuldidaktik} }"},"type":"book_chapter","intvolume":" 124","_id":"4509","volume":124,"date_created":"2018-09-19T11:46:55Z","status":"public","publication":"Lehrforschung wird Praxis: Hochschuldidaktische Forschungsergebnisse und ihre Integration in die Praxis","author":[{"last_name":"Jenert","id":"71994","first_name":"Tobias","orcid":" https://orcid.org/0000-0001-9262-5646","full_name":"Jenert, Tobias"},{"last_name":"Brahm ","full_name":"Brahm , Taiga","first_name":"Taiga"}],"publisher":"W. Bertelsmann Verlag ","user_id":"51057","extern":"1"},{"title":"Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm","user_id":"51057","extern":"1","place":"Paderborn","editor":[{"first_name":"Sabine","full_name":"Seuffert, Sabine","last_name":"Seuffert"},{"full_name":"Metzger, Christoph","first_name":"Christoph","last_name":"Metzger"}],"publication_identifier":{"issn":["1613-0677"]},"status":"public","date_created":"2018-09-19T11:55:48Z","publisher":"EUSL","author":[{"last_name":"Jenert","id":"71994","first_name":"Tobias","full_name":"Jenert, Tobias","orcid":" https://orcid.org/0000-0001-9262-5646"},{"last_name":"Gebhardt ","full_name":"Gebhardt , Anja","first_name":"Anja"}],"department":[{"_id":"208"},{"_id":"282"}],"publication":"Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag","date_updated":"2022-01-06T07:01:07Z","_id":"4510","year":"2013","type":"book_chapter","citation":{"ama":"Jenert T, Gebhardt A. Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm. In: Seuffert S, Metzger C, eds. Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag. Paderborn: EUSL; 2013:227-240.","apa":"Jenert, T., & Gebhardt , A. (2013). Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm. In S. Seuffert & C. Metzger (Eds.), Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag (pp. 227–240). Paderborn: EUSL.","chicago":"Jenert, Tobias, and Anja Gebhardt . “Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm.” In Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag, edited by Sabine Seuffert and Christoph Metzger, 227–40. Paderborn: EUSL, 2013.","mla":"Jenert, Tobias, and Anja Gebhardt . “Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm.” Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag, edited by Sabine Seuffert and Christoph Metzger, EUSL, 2013, pp. 227–40.","bibtex":"@inbook{Jenert_Gebhardt _2013, place={Paderborn}, title={Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm}, booktitle={Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag}, publisher={EUSL}, author={Jenert, Tobias and Gebhardt , Anja}, editor={Seuffert, Sabine and Metzger, ChristophEditors}, year={2013}, pages={227–240} }","short":"T. Jenert, A. Gebhardt , in: S. Seuffert, C. Metzger (Eds.), Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag, EUSL, Paderborn, 2013, pp. 227–240.","ieee":"T. Jenert and A. Gebhardt , “Die Erforschung von Lernkulturen an Hochschulen unter Nutzung komplementärer Zugänge: Erste Erfahrungen aus einem Forschungsprogramm,” in Kompetenzentwicklung in unterschiedlichen Lernkulturen, Festschrift für Dieter Euler zum 60. Geburtstag, S. Seuffert and C. Metzger, Eds. Paderborn: EUSL, 2013, pp. 227–240."},"page":"227-240","language":[{"iso":"ger"}]},{"title":"A Tree-form Constant Market Share Model for Growth Causes in International Trade Based on Multi-level Classification","department":[{"_id":"206"}],"publication_status":"published","publication_identifier":{"issn":["1566-1679","1573-7012"]},"date_updated":"2022-01-06T07:01:14Z","doi":"10.1007/s10842-013-0156-y","language":[{"iso":"eng"}],"user_id":"10075","publisher":"Springer Nature","author":[{"last_name":"Feng","id":"20760","first_name":"Yuanhua","full_name":"Feng, Yuanhua"},{"full_name":"Guo, Zhichao","first_name":"Zhichao","last_name":"Guo"},{"id":"2980","last_name":"Peitz","full_name":"Peitz, Christian","first_name":"Christian"}],"publication":"Journal of Industry, Competition and Trade","volume":14,"status":"public","date_created":"2018-10-10T09:48:47Z","intvolume":" 14","_id":"4596","issue":"2","type":"journal_article","citation":{"short":"Y. Feng, Z. Guo, C. Peitz, Journal of Industry, Competition and Trade 14 (2013) 207–228.","ieee":"Y. Feng, Z. Guo, and C. Peitz, “A Tree-form Constant Market Share Model for Growth Causes in International Trade Based on Multi-level Classification,” Journal of Industry, Competition and Trade, vol. 14, no. 2, pp. 207–228, 2013.","chicago":"Feng, Yuanhua, Zhichao Guo, and Christian Peitz. “A Tree-Form Constant Market Share Model for Growth Causes in International Trade Based on Multi-Level Classification.” Journal of Industry, Competition and Trade 14, no. 2 (2013): 207–28. https://doi.org/10.1007/s10842-013-0156-y.","apa":"Feng, Y., Guo, Z., & Peitz, C. (2013). A Tree-form Constant Market Share Model for Growth Causes in International Trade Based on Multi-level Classification. Journal of Industry, Competition and Trade, 14(2), 207–228. https://doi.org/10.1007/s10842-013-0156-y","ama":"Feng Y, Guo Z, Peitz C. A Tree-form Constant Market Share Model for Growth Causes in International Trade Based on Multi-level Classification. Journal of Industry, Competition and Trade. 2013;14(2):207-228. doi:10.1007/s10842-013-0156-y","bibtex":"@article{Feng_Guo_Peitz_2013, title={A Tree-form Constant Market Share Model for Growth Causes in International Trade Based on Multi-level Classification}, volume={14}, DOI={10.1007/s10842-013-0156-y}, number={2}, journal={Journal of Industry, Competition and Trade}, publisher={Springer Nature}, author={Feng, Yuanhua and Guo, Zhichao and Peitz, Christian}, year={2013}, pages={207–228} }","mla":"Feng, Yuanhua, et al. “A Tree-Form Constant Market Share Model for Growth Causes in International Trade Based on Multi-Level Classification.” Journal of Industry, Competition and Trade, vol. 14, no. 2, Springer Nature, 2013, pp. 207–28, doi:10.1007/s10842-013-0156-y."},"year":"2013","page":"207-228"},{"doi":"10.1016/j.econmod.2012.12.015","intvolume":" 31","_id":"4600","date_updated":"2022-01-06T07:01:14Z","language":[{"iso":"eng"}],"citation":{"short":"Z. Guo, Y. Feng, Economic Modelling 31 (2013) 474–483.","ieee":"Z. Guo and Y. Feng, “Modeling of the impact of the financial crisis and China’s accession to WTO on China’s exports to Germany,” Economic Modelling, vol. 31, pp. 474–483, 2013.","chicago":"Guo, Zhichao, and Yuanhua Feng. “Modeling of the Impact of the Financial Crisis and China’s Accession to WTO on China’s Exports to Germany.” Economic Modelling 31 (2013): 474–83. https://doi.org/10.1016/j.econmod.2012.12.015.","ama":"Guo Z, Feng Y. Modeling of the impact of the financial crisis and China’s accession to WTO on China’s exports to Germany. Economic Modelling. 2013;31:474-483. doi:10.1016/j.econmod.2012.12.015","apa":"Guo, Z., & Feng, Y. (2013). Modeling of the impact of the financial crisis and China’s accession to WTO on China’s exports to Germany. Economic Modelling, 31, 474–483. https://doi.org/10.1016/j.econmod.2012.12.015","bibtex":"@article{Guo_Feng_2013, title={Modeling of the impact of the financial crisis and China’s accession to WTO on China’s exports to Germany}, volume={31}, DOI={10.1016/j.econmod.2012.12.015}, journal={Economic Modelling}, publisher={Elsevier BV}, author={Guo, Zhichao and Feng, Yuanhua}, year={2013}, pages={474–483} }","mla":"Guo, Zhichao, and Yuanhua Feng. “Modeling of the Impact of the Financial Crisis and China’s Accession to WTO on China’s Exports to Germany.” Economic Modelling, vol. 31, Elsevier BV, 2013, pp. 474–83, doi:10.1016/j.econmod.2012.12.015."},"type":"journal_article","year":"2013","page":"474-483","user_id":"10075","title":"Modeling of the impact of the financial crisis and China's accession to WTO on China's exports to Germany","status":"public","date_created":"2018-10-10T09:56:47Z","publication_status":"published","volume":31,"publication_identifier":{"issn":["0264-9993"]},"author":[{"last_name":"Guo","full_name":"Guo, Zhichao","first_name":"Zhichao"},{"full_name":"Feng, Yuanhua","first_name":"Yuanhua","id":"20760","last_name":"Feng"}],"publisher":"Elsevier BV","publication":"Economic Modelling","department":[{"_id":"206"}]},{"publication_status":"published","publication_identifier":{"isbn":["9783642355110","9783642355127"]},"date_created":"2018-10-10T11:40:15Z","status":"public","department":[{"_id":"206"}],"author":[{"first_name":"Jan","full_name":"Beran, Jan","last_name":"Beran"},{"first_name":"Yuanhua","full_name":"Feng, Yuanhua","last_name":"Feng","id":"20760"},{"last_name":"Ghosh","full_name":"Ghosh, Sucharita","first_name":"Sucharita"},{"last_name":"Kulik","first_name":"Rafal","full_name":"Kulik, Rafal"}],"publisher":"Springer Berlin Heidelberg","title":"Long-Memory Processes","user_id":"10075","place":"Berlin, Heidelberg","type":"book","year":"2013","citation":{"bibtex":"@book{Beran_Feng_Ghosh_Kulik_2013, place={Berlin, Heidelberg}, title={Long-Memory Processes}, DOI={10.1007/978-3-642-35512-7}, publisher={Springer Berlin Heidelberg}, author={Beran, Jan and Feng, Yuanhua and Ghosh, Sucharita and Kulik, Rafal}, year={2013} }","mla":"Beran, Jan, et al. Long-Memory Processes. Springer Berlin Heidelberg, 2013, doi:10.1007/978-3-642-35512-7.","chicago":"Beran, Jan, Yuanhua Feng, Sucharita Ghosh, and Rafal Kulik. Long-Memory Processes. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-35512-7.","ama":"Beran J, Feng Y, Ghosh S, Kulik R. Long-Memory Processes. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013. doi:10.1007/978-3-642-35512-7","apa":"Beran, J., Feng, Y., Ghosh, S., & Kulik, R. (2013). Long-Memory Processes. Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-35512-7","ieee":"J. Beran, Y. Feng, S. Ghosh, and R. Kulik, Long-Memory Processes. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.","short":"J. Beran, Y. Feng, S. Ghosh, R. Kulik, Long-Memory Processes, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013."},"language":[{"iso":"eng"}],"doi":"10.1007/978-3-642-35512-7","date_updated":"2022-01-06T07:01:15Z","_id":"4628"},{"type":"working_paper","citation":{"short":"Y. Feng, L. Sun, A Semi-APARCH Approach for Comparing Long-Term and Short-Term Risk in Chinese Financial Market and in Mature Financial Markets, 2013.","ieee":"Y. Feng and L. Sun, A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets. 2013.","ama":"Feng Y, Sun L. A Semi-APARCH Approach for Comparing Long-Term and Short-Term Risk in Chinese Financial Market and in Mature Financial Markets.; 2013.","apa":"Feng, Y., & Sun, L. (2013). A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets.","chicago":"Feng, Yuanhua, and Lixin Sun. A Semi-APARCH Approach for Comparing Long-Term and Short-Term Risk in Chinese Financial Market and in Mature Financial Markets, 2013.","mla":"Feng, Yuanhua, and Lixin Sun. A Semi-APARCH Approach for Comparing Long-Term and Short-Term Risk in Chinese Financial Market and in Mature Financial Markets. 2013.","bibtex":"@book{Feng_Sun_2013, title={A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets}, author={Feng, Yuanhua and Sun, Lixin}, year={2013} }"},"year":"2013","language":[{"iso":"eng"}],"_id":"4657","date_updated":"2022-01-06T07:01:16Z","department":[{"_id":"206"},{"_id":"475"}],"author":[{"last_name":"Feng","id":"20760","first_name":"Yuanhua","full_name":"Feng, Yuanhua"},{"full_name":"Sun, Lixin","first_name":"Lixin","last_name":"Sun"}],"date_created":"2018-10-11T11:18:10Z","status":"public","title":"A Semi-APARCH approach for comparing long-term and short-term risk in Chinese financial market and in mature financial markets","user_id":"10075"},{"_id":"4658","date_updated":"2022-01-06T07:01:17Z","language":[{"iso":"eng"}],"year":"2013","citation":{"ieee":"Y. Feng, Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects. 2013.","short":"Y. Feng, Double-Conditional Smoothing of High-Frequency Volatility Surface in a Spatial Multiplicative Component GARCH with Random Effects, 2013.","mla":"Feng, Yuanhua. Double-Conditional Smoothing of High-Frequency Volatility Surface in a Spatial Multiplicative Component GARCH with Random Effects. 2013.","bibtex":"@book{Feng_2013, title={Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects}, author={Feng, Yuanhua}, year={2013} }","apa":"Feng, Y. (2013). Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects.","ama":"Feng Y. Double-Conditional Smoothing of High-Frequency Volatility Surface in a Spatial Multiplicative Component GARCH with Random Effects.; 2013.","chicago":"Feng, Yuanhua. Double-Conditional Smoothing of High-Frequency Volatility Surface in a Spatial Multiplicative Component GARCH with Random Effects, 2013."},"type":"working_paper","user_id":"10075","title":"Double-conditional smoothing of high-frequency volatility surface in a spatial multiplicative component GARCH with random effects","date_created":"2018-10-11T11:19:17Z","status":"public","department":[{"_id":"206"},{"_id":"475"}],"author":[{"last_name":"Feng","id":"20760","first_name":"Yuanhua","full_name":"Feng, Yuanhua"}]},{"user_id":"477","ddc":["040"],"abstract":[{"lang":"eng","text":"Runtime monitoring aims at ensuring program safety by monitoring the program's behaviour during execution and taking appropriate action before a program violates some property.Runtime monitoring is in particular important when an exhaustive formal verification fails. While the approach allows for a safe execution of programs, it may impose a significant runtime overhead.In this paper, we propose a novel technique combining verification and monitoring which incurs no overhead during runtime at all. The technique proceeds by using the inconclusive result of a verification run as the basis for transforming the program into one where all potential points of failure are replaced by HALT statements. The new program is safe by construction, behaviourally equivalent to the original program (except for unsafe behaviour),and has the same performance characteristics."}],"date_created":"2017-10-17T12:42:23Z","status":"public","has_accepted_license":"1","file":[{"content_type":"application/pdf","date_updated":"2018-03-16T11:18:41Z","relation":"main_file","success":1,"file_size":394804,"creator":"florida","file_id":"1332","access_level":"closed","file_name":"469-WSW2013-2.pdf","date_created":"2018-03-16T11:18:41Z"}],"file_date_updated":"2018-03-16T11:18:41Z","publication":"Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)","author":[{"last_name":"Wonisch","full_name":"Wonisch, Daniel","first_name":"Daniel"},{"last_name":"Schremmer","first_name":"Alexander","full_name":"Schremmer, Alexander"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"_id":"469","page":"244-258","year":"2013","citation":{"short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–258.","ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Zero Overhead Runtime Monitoring,” in Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–258.","apa":"Wonisch, D., Schremmer, A., & Wehrheim, H. (2013). Zero Overhead Runtime Monitoring. In Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM) (pp. 244–258). https://doi.org/10.1007/978-3-642-40561-7_17","ama":"Wonisch D, Schremmer A, Wehrheim H. Zero Overhead Runtime Monitoring. In: Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM). LNCS. ; 2013:244-258. doi:10.1007/978-3-642-40561-7_17","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Zero Overhead Runtime Monitoring.” In Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 244–58. LNCS, 2013. https://doi.org/10.1007/978-3-642-40561-7_17.","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2013, series={LNCS}, title={Zero Overhead Runtime Monitoring}, DOI={10.1007/978-3-642-40561-7_17}, booktitle={Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2013}, pages={244–258}, collection={LNCS} }","mla":"Wonisch, Daniel, et al. “Zero Overhead Runtime Monitoring.” Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–58, doi:10.1007/978-3-642-40561-7_17."},"type":"conference","title":"Zero Overhead Runtime Monitoring","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"}],"doi":"10.1007/978-3-642-40561-7_17","date_updated":"2022-01-06T07:01:18Z","language":[{"iso":"eng"}],"series_title":"LNCS"},{"language":[{"iso":"eng"}],"year":"2013","citation":{"bibtex":"@inproceedings{Gregor_Müller_Seidel_2013, title={Reflection, abstraction and theorizing in design and development research}, booktitle={European Conference on Information Systems}, author={Gregor, Shirley and Müller, Oliver and Seidel, Stefan}, year={2013} }","mla":"Gregor, Shirley, et al. “Reflection, Abstraction and Theorizing in Design and Development Research.” European Conference on Information Systems, 2013.","apa":"Gregor, S., Müller, O., & Seidel, S. (2013). Reflection, abstraction and theorizing in design and development research. In European Conference on Information Systems.","ama":"Gregor S, Müller O, Seidel S. Reflection, abstraction and theorizing in design and development research. In: European Conference on Information Systems. ; 2013.","chicago":"Gregor, Shirley, Oliver Müller, and Stefan Seidel. “Reflection, Abstraction and Theorizing in Design and Development Research.” In European Conference on Information Systems, 2013.","ieee":"S. Gregor, O. Müller, and S. Seidel, “Reflection, abstraction and theorizing in design and development research,” in European Conference on Information Systems, 2013.","short":"S. Gregor, O. Müller, S. Seidel, in: European Conference on Information Systems, 2013."},"type":"conference","main_file_link":[{"url":"https://aisel.aisnet.org/ecis2013_cr/74/"}],"date_updated":"2022-01-06T07:01:18Z","_id":"4698","status":"public","date_created":"2018-10-12T08:30:49Z","author":[{"last_name":"Gregor","full_name":"Gregor, Shirley","first_name":"Shirley"},{"full_name":"Müller, Oliver","first_name":"Oliver","id":"72849","last_name":"Müller"},{"last_name":"Seidel","first_name":"Stefan","full_name":"Seidel, Stefan"}],"keyword":["Abstraction","Affordances","Design Science Research","Design Theory","Information Systems Development","Reflection","Theorizing"],"publication":"European Conference on Information Systems","user_id":"72849","title":"Reflection, abstraction and theorizing in design and development research","extern":"1"},{"language":[{"iso":"eng"}],"type":"journal_article","citation":{"mla":"Becker, Jörg, et al. “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach.” Scandinavian Journal of Information Systems, no. 1, 2013, pp. 17--47.","bibtex":"@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuss_2013, title={Designing interaction routines in service networks: A modularity and social construction-based approach}, number={1}, journal={Scandinavian Journal of Information Systems}, author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuss, Jens}, year={2013}, pages={17--47} }","ama":"Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuss J. Designing interaction routines in service networks: A modularity and social construction-based approach. Scandinavian Journal of Information Systems. 2013;(1):17--47.","apa":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., & Pöppelbuss, J. (2013). Designing interaction routines in service networks: A modularity and social construction-based approach. Scandinavian Journal of Information Systems, (1), 17--47.","chicago":"Becker, Jörg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver Müller, and Jens Pöppelbuss. “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach.” Scandinavian Journal of Information Systems, no. 1 (2013): 17--47.","ieee":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuss, “Designing interaction routines in service networks: A modularity and social construction-based approach,” Scandinavian Journal of Information Systems, no. 1, pp. 17--47, 2013.","short":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuss, Scandinavian Journal of Information Systems (2013) 17--47."},"year":"2013","page":"17--47","main_file_link":[{"url":"https://aisel.aisnet.org/sjis/vol25/iss1/2/"}],"issue":"1","date_updated":"2022-01-06T07:01:18Z","_id":"4699","status":"public","date_created":"2018-10-12T08:30:56Z","publication_identifier":{"issn":["09050167"]},"author":[{"last_name":"Becker","first_name":"Jörg","full_name":"Becker, Jörg"},{"first_name":"Daniel","full_name":"Beverungen, Daniel","last_name":"Beverungen","id":"59677"},{"last_name":"Knackstedt","full_name":"Knackstedt, Ralf","first_name":"Ralf"},{"last_name":"Matzner","first_name":"Martin","full_name":"Matzner, Martin"},{"full_name":"Müller, Oliver","first_name":"Oliver","id":"72849","last_name":"Müller"},{"full_name":"Pöppelbuss, Jens","first_name":"Jens","last_name":"Pöppelbuss"}],"keyword":["Business process management","Conceptual modeling","Interaction routines","Modular design","Service networks","Social construction"],"publication":"Scandinavian Journal of Information Systems","user_id":"72849","title":"Designing interaction routines in service networks: A modularity and social construction-based approach","extern":"1"},{"doi":"10.1145/2486001.2491710","date_updated":"2022-01-06T07:01:19Z","series_title":"Digital Library","title":"Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow","project":[{"name":"SFB 901","_id":"1"},{"_id":"6","name":"SFB 901 - Subprojekt A2"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"75"}],"_id":"470","page":"541-542","citation":{"ieee":"P. Wette and H. Karl, “Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow,” in Proceedings of the ACM SIGCOMM ’13, 2013, pp. 541–542.","short":"P. Wette, H. Karl, in: Proceedings of the ACM SIGCOMM ’13, 2013, pp. 541–542.","mla":"Wette, Philip, and Holger Karl. “Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow.” Proceedings of the ACM SIGCOMM ’13, 2013, pp. 541–42, doi:10.1145/2486001.2491710.","bibtex":"@inproceedings{Wette_Karl_2013, series={Digital Library}, title={Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow}, DOI={10.1145/2486001.2491710}, booktitle={Proceedings of the ACM SIGCOMM ’13}, author={Wette, Philip and Karl, Holger}, year={2013}, pages={541–542}, collection={Digital Library} }","ama":"Wette P, Karl H. Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow. In: Proceedings of the ACM SIGCOMM ’13. Digital Library. ; 2013:541-542. doi:10.1145/2486001.2491710","apa":"Wette, P., & Karl, H. (2013). Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow. In Proceedings of the ACM SIGCOMM ’13 (pp. 541–542). https://doi.org/10.1145/2486001.2491710","chicago":"Wette, Philip, and Holger Karl. “Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow.” In Proceedings of the ACM SIGCOMM ’13, 541–42. Digital Library, 2013. https://doi.org/10.1145/2486001.2491710."},"type":"conference","year":"2013","ddc":["040"],"user_id":"15572","abstract":[{"text":"In OpenFlow [1], multiple switches share the same control plane which is centralized atwhat is called the OpenFlow controller. A switch only consists of a forwarding plane. Rules for forwarding individual packets (called ow entries in OpenFlow) are pushed from the controller to the switches. In a network with a high arrival rate of new ows, such as in a data center, the control trac between the switch and controller can become very high. As a consequence, routing of new ows will be slow. One way to reduce control trac is to use wildcarded ow entries. Wildcard ow entries can be used to create default routes in the network. However, since switches do not keep track of ows covered by a wildcard ow entry, the controller no longer has knowledge about individual ows. To nd out about these individual ows we propose an extension to the current OpenFlow standard to enable packet sampling of wildcard ow entries.","lang":"eng"}],"date_created":"2017-10-17T12:42:23Z","status":"public","has_accepted_license":"1","publication":"Proceedings of the ACM SIGCOMM '13","file_date_updated":"2018-03-16T11:18:01Z","author":[{"first_name":"Philip","full_name":"Wette, Philip","last_name":"Wette"},{"first_name":"Holger","full_name":"Karl, Holger","last_name":"Karl","id":"126"}],"file":[{"access_level":"closed","date_created":"2018-03-16T11:18:01Z","file_name":"470-p541-wette_01.pdf","date_updated":"2018-03-16T11:18:01Z","content_type":"application/pdf","relation":"main_file","success":1,"file_size":446835,"creator":"florida","file_id":"1331"}]},{"extern":"1","user_id":"72849","title":"Bridging the gap between manufacturing and service through IT-based boundary objects","author":[{"full_name":"Becker, Jorg","first_name":"Jorg","last_name":"Becker"},{"last_name":"Beverungen","id":"59677","first_name":"Daniel","full_name":"Beverungen, Daniel"},{"full_name":"Knackstedt, Ralf","first_name":"Ralf","last_name":"Knackstedt"},{"last_name":"Matzner","first_name":"Martin","full_name":"Matzner, Martin"},{"last_name":"Müller","id":"72849","first_name":"Oliver","full_name":"Müller, Oliver"},{"first_name":"Jens","full_name":"Pöppelbuss, Jens","last_name":"Pöppelbuss"}],"keyword":["Action research","boundary spanning","business process management (BPM)","service blueprinting","service networks"],"publication":"IEEE Transactions on Engineering Management","status":"public","date_created":"2018-10-12T08:31:02Z","publication_identifier":{"issn":["00189391"],"isbn":["0018-9391"]},"_id":"4700","date_updated":"2022-01-06T07:01:19Z","issue":"3","doi":"10.1109/TEM.2012.2214770","language":[{"iso":"eng"}],"type":"journal_article","citation":{"apa":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., & Pöppelbuss, J. (2013). Bridging the gap between manufacturing and service through IT-based boundary objects. IEEE Transactions on Engineering Management, (3), 468--482. https://doi.org/10.1109/TEM.2012.2214770","ama":"Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuss J. Bridging the gap between manufacturing and service through IT-based boundary objects. IEEE Transactions on Engineering Management. 2013;(3):468--482. doi:10.1109/TEM.2012.2214770","chicago":"Becker, Jorg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver Müller, and Jens Pöppelbuss. “Bridging the Gap between Manufacturing and Service through IT-Based Boundary Objects.” IEEE Transactions on Engineering Management, no. 3 (2013): 468--482. https://doi.org/10.1109/TEM.2012.2214770.","mla":"Becker, Jorg, et al. “Bridging the Gap between Manufacturing and Service through IT-Based Boundary Objects.” IEEE Transactions on Engineering Management, no. 3, 2013, pp. 468--482, doi:10.1109/TEM.2012.2214770.","bibtex":"@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuss_2013, title={Bridging the gap between manufacturing and service through IT-based boundary objects}, DOI={10.1109/TEM.2012.2214770}, number={3}, journal={IEEE Transactions on Engineering Management}, author={Becker, Jorg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuss, Jens}, year={2013}, pages={468--482} }","short":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuss, IEEE Transactions on Engineering Management (2013) 468--482.","ieee":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuss, “Bridging the gap between manufacturing and service through IT-based boundary objects,” IEEE Transactions on Engineering Management, no. 3, pp. 468--482, 2013."},"year":"2013","page":"468--482"},{"year":"2013","type":"bachelorsthesis","citation":{"bibtex":"@book{Tezer_2013, title={Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen}, publisher={Universität Paderborn}, author={Tezer, Alina}, year={2013} }","mla":"Tezer, Alina. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.","chicago":"Tezer, Alina. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.","apa":"Tezer, A. (2013). Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn.","ama":"Tezer A. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn; 2013.","ieee":"A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.","short":"A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013."},"language":[{"iso":"ger"}],"supervisor":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"_id":"471","date_updated":"2022-01-06T07:01:19Z","author":[{"first_name":"Alina","full_name":"Tezer, Alina","last_name":"Tezer"}],"publisher":"Universität Paderborn","department":[{"_id":"64"}],"status":"public","date_created":"2017-10-17T12:42:23Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"43","name":"Securing the Financial Cloud"}],"title":"Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen","user_id":"477"},{"citation":{"short":"M. Engelbrecht, Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern, Universität Paderborn, 2013.","ieee":"M. Engelbrecht, Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern. Universität Paderborn, 2013.","chicago":"Engelbrecht, Marco. Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern. Universität Paderborn, 2013.","ama":"Engelbrecht M. Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern. Universität Paderborn; 2013.","apa":"Engelbrecht, M. (2013). Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern. Universität Paderborn.","bibtex":"@book{Engelbrecht_2013, title={Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern}, publisher={Universität Paderborn}, author={Engelbrecht, Marco}, year={2013} }","mla":"Engelbrecht, Marco. Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern. Universität Paderborn, 2013."},"year":"2013","type":"bachelorsthesis","language":[{"iso":"ger"}],"_id":"472","date_updated":"2022-01-06T07:01:19Z","publisher":"Universität Paderborn","author":[{"first_name":"Marco","full_name":"Engelbrecht, Marco","last_name":"Engelbrecht"}],"status":"public","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}],"date_created":"2017-10-17T12:42:24Z","title":"Vergleichsstudie zur Ausdrucksstärke von SMT-Solvern","user_id":"477"},{"date_updated":"2022-01-06T07:01:19Z","doi":"10.1007/978-3-642-39256-6_21","series_title":"Lecture Notes in Computer Science","title":"Unlinkable content playbacks in a multiparty DRM system","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"editor":[{"last_name":"Wang","first_name":"Lingyu","full_name":"Wang, Lingyu"},{"last_name":"Shafiq","full_name":"Shafiq, Basit","first_name":"Basit"}],"_id":"473","year":"2013","citation":{"bibtex":"@inproceedings{Petrlic_Sekula_2013, series={Lecture Notes in Computer Science}, title={Unlinkable content playbacks in a multiparty DRM system}, DOI={10.1007/978-3-642-39256-6_21}, booktitle={Data and Applications Security and Privacy XXVII}, author={Petrlic, Ronald and Sekula, Stephan}, editor={Wang, Lingyu and Shafiq, BasitEditors}, year={2013}, pages={289–296}, collection={Lecture Notes in Computer Science} }","mla":"Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:10.1007/978-3-642-39256-6_21.","chicago":"Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” In Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 289–96. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-642-39256-6_21.","apa":"Petrlic, R., & Sekula, S. (2013). Unlinkable content playbacks in a multiparty DRM system. In L. Wang & B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII (pp. 289–296). https://doi.org/10.1007/978-3-642-39256-6_21","ama":"Petrlic R, Sekula S. Unlinkable content playbacks in a multiparty DRM system. In: Wang L, Shafiq B, eds. Data and Applications Security and Privacy XXVII. Lecture Notes in Computer Science. ; 2013:289-296. doi:10.1007/978-3-642-39256-6_21","ieee":"R. Petrlic and S. Sekula, “Unlinkable content playbacks in a multiparty DRM system,” in Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.","short":"R. Petrlic, S. Sekula, in: L. Wang, B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII, 2013, pp. 289–296."},"type":"conference","page":"289-296","abstract":[{"text":"We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party - in contrast to most related work on privacy-preserving DRM - is based on a re-encryption scheme that runs on any mobile Android device. Only a minor security-critical part needs to be performed on the device's smartcard which could, for instance, be a SIM card.","lang":"eng"}],"user_id":"15504","ddc":["040"],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-03-16T11:17:30Z","creator":"florida","file_id":"1330","file_size":286049,"access_level":"closed","file_name":"473-drm-general-1-camera-ready.pdf","date_created":"2018-03-16T11:17:30Z"}],"author":[{"full_name":"Petrlic, Ronald","first_name":"Ronald","last_name":"Petrlic"},{"first_name":"Stephan","full_name":"Sekula, Stephan","last_name":"Sekula"}],"publication":"Data and Applications Security and Privacy XXVII","file_date_updated":"2018-03-16T11:17:30Z","has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:42:24Z"},{"citation":{"ama":"Röhl N. Two-Stage Allocation Procedures. Universität Paderborn; 2013.","apa":"Röhl, N. (2013). Two-Stage Allocation Procedures. Universität Paderborn.","chicago":"Röhl, Nils. Two-Stage Allocation Procedures. Universität Paderborn, 2013.","mla":"Röhl, Nils. Two-Stage Allocation Procedures. Universität Paderborn, 2013.","bibtex":"@book{Röhl_2013, title={Two-Stage Allocation Procedures}, publisher={Universität Paderborn}, author={Röhl, Nils}, year={2013} }","short":"N. Röhl, Two-Stage Allocation Procedures, Universität Paderborn, 2013.","ieee":"N. Röhl, Two-Stage Allocation Procedures. Universität Paderborn, 2013."},"type":"report","year":"2013","language":[{"iso":"eng"}],"_id":"474","date_updated":"2022-01-06T07:01:20Z","status":"public","has_accepted_license":"1","project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"date_created":"2017-10-17T12:42:24Z","publisher":"Universität Paderborn","author":[{"last_name":"Röhl","first_name":"Nils","full_name":"Röhl, Nils"}],"department":[{"_id":"205"}],"file_date_updated":"2018-03-16T11:16:59Z","file":[{"creator":"florida","file_id":"1329","file_size":424301,"relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-16T11:16:59Z","date_created":"2018-03-16T11:16:59Z","file_name":"474-WP73.pdf","access_level":"closed"}],"title":"Two-Stage Allocation Procedures","ddc":["040"],"user_id":"477","abstract":[{"text":"Suppose some individuals are allowed to engage in different groups at the same time and they generate a certain welfare by cooperation. Finding appropriate ways for distributing this welfare is a non-trivial issue. The purpose of this work is to analyze two-stage allocation procedures where first each group receives a share of the welfare which is then, subsequently, distributed among the corresponding members. To study these procedures in a structured way, cooperative games and network games are combined in a general framework by using mathematical hypergraphs. Moreover, several convincing requirements on allocation procedures are discussed and formalized. Thereby it will be shown, for example, that the Position Value and iteratively applying the Myerson Value can be characterized by similar axiomatizations.","lang":"eng"}]},{"date_updated":"2022-01-06T07:01:21Z","_id":"475","doi":"10.1109/CCNC.2013.6488456","type":"conference","year":"2013","citation":{"chicago":"Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” In Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 259–64, 2013. https://doi.org/10.1109/CCNC.2013.6488456.","apa":"Joshi, N., & Petrlic, R. (2013). Towards practical privacy-preserving Digital Rights Management for Cloud Computing. In Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC) (pp. 259–264). https://doi.org/10.1109/CCNC.2013.6488456","ama":"Joshi N, Petrlic R. Towards practical privacy-preserving Digital Rights Management for Cloud Computing. In: Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC). ; 2013:259-264. doi:10.1109/CCNC.2013.6488456","mla":"Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–64, doi:10.1109/CCNC.2013.6488456.","bibtex":"@inproceedings{Joshi_Petrlic_2013, title={Towards practical privacy-preserving Digital Rights Management for Cloud Computing}, DOI={10.1109/CCNC.2013.6488456}, booktitle={Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC)}, author={Joshi, Nakul and Petrlic, Ronald}, year={2013}, pages={259–264} }","short":"N. Joshi, R. Petrlic, in: Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–264.","ieee":"N. Joshi and R. Petrlic, “Towards practical privacy-preserving Digital Rights Management for Cloud Computing,” in Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–264."},"page":"259-264","abstract":[{"lang":"eng","text":"We propose a privacy-preserving digital rights management scheme for (future) cloud computing. Users buy software from software providers and execute it at computing centers. Our solution allows software providers to provide different license models, like execute at most n-times models. Users’ anonymity and unlinkability of actions are preserved and thus, profile building is not even possible under (a) pseudonym. Privacy protection in the honest-but-curious model is achieved by combining ring signatures with an anonymous recipient scheme.We employ secret sharing in a unique manner that allows the software provider to expose the user’s identity if the user commits fraud, e.g. by exceeding the execution limit n."}],"ddc":["040"],"title":"Towards practical privacy-preserving Digital Rights Management for Cloud Computing","user_id":"15504","author":[{"first_name":"Nakul","full_name":"Joshi, Nakul","last_name":"Joshi"},{"last_name":"Petrlic","full_name":"Petrlic, Ronald","first_name":"Ronald"}],"file_date_updated":"2018-03-16T11:16:29Z","publication":"Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC)","file":[{"access_level":"closed","file_name":"475-privacy-drm-cloud-5.pdf","date_created":"2018-03-16T11:16:29Z","date_updated":"2018-03-16T11:16:29Z","content_type":"application/pdf","success":1,"relation":"main_file","file_size":370473,"creator":"florida","file_id":"1328"}],"status":"public","has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"date_created":"2017-10-17T12:42:24Z"},{"file":[{"access_level":"closed","date_created":"2018-03-15T14:07:18Z","file_name":"476-tocsrevised3b.pdf","success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-03-15T14:07:18Z","creator":"florida","file_id":"1326","file_size":264308}],"publication":"Theory of Computing Systems","file_date_updated":"2018-03-15T14:07:18Z","publisher":"Springer","author":[{"first_name":"Petr","full_name":"Kolman, Petr","last_name":"Kolman"},{"full_name":"Scheideler, Christian","first_name":"Christian","id":"20792","last_name":"Scheideler"}],"date_created":"2017-10-17T12:42:24Z","has_accepted_license":"1","status":"public","abstract":[{"lang":"eng","text":"An elementary h-route ow, for an integer h 1, is a set of h edge- disjoint paths between a source and a sink, each path carrying a unit of ow, and an h-route ow is a non-negative linear combination of elementary h-routeows. An h-route cut is a set of edges whose removal decreases the maximum h-route ow between a given source-sink pair (or between every source-sink pair in the multicommodity setting) to zero. The main result of this paper is an approximate duality theorem for multicommodity h-route cuts and ows, for h 3: The size of a minimum h-route cut is at least f=h and at most O(log4 k f) where f is the size of the maximum h-routeow and k is the number of commodities. The main step towards the proof of this duality is the design and analysis of a polynomial-time approximation algorithm for the minimum h-route cut problem for h = 3 that has an approximation ratio of O(log4 k). Previously, polylogarithmic approximation was known only for h-route cuts for h 2. A key ingredient of our algorithm is a novel rounding technique that we call multilevel ball-growing. Though the proof of the duality relies on this algorithm, it is not a straightforward corollary of it as in the case of classical multicommodity ows and cuts. Similar results are shown also for the sparsest multiroute cut problem."}],"user_id":"477","ddc":["040"],"page":"341-363","year":"2013","citation":{"ieee":"P. Kolman and C. Scheideler, “Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing,” Theory of Computing Systems, no. 2, pp. 341–363, 2013.","short":"P. Kolman, C. Scheideler, Theory of Computing Systems (2013) 341–363.","bibtex":"@article{Kolman_Scheideler_2013, title={Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing}, DOI={10.1007/s00224-013-9454-3}, number={2}, journal={Theory of Computing Systems}, publisher={Springer}, author={Kolman, Petr and Scheideler, Christian}, year={2013}, pages={341–363} }","mla":"Kolman, Petr, and Christian Scheideler. “Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing.” Theory of Computing Systems, no. 2, Springer, 2013, pp. 341–63, doi:10.1007/s00224-013-9454-3.","apa":"Kolman, P., & Scheideler, C. (2013). Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing. Theory of Computing Systems, (2), 341–363. https://doi.org/10.1007/s00224-013-9454-3","ama":"Kolman P, Scheideler C. Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing. Theory of Computing Systems. 2013;(2):341-363. doi:10.1007/s00224-013-9454-3","chicago":"Kolman, Petr, and Christian Scheideler. “Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing.” Theory of Computing Systems, no. 2 (2013): 341–63. https://doi.org/10.1007/s00224-013-9454-3."},"type":"journal_article","_id":"476","issue":"2","department":[{"_id":"79"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Project Area A","_id":"2"}],"title":"Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing","date_updated":"2022-01-06T07:01:21Z","doi":"10.1007/s00224-013-9454-3"},{"_id":"477","page":"22-34","type":"conference","citation":{"bibtex":"@inproceedings{Abshoff_Benter_Cord-Landwehr_Malatyali_Meyer auf der Heide_2013, series={Lecture Notes in Computer Science}, title={Token Dissemination in Geometric Dynamic Networks}, DOI={10.1007/978-3-642-45346-5_3}, booktitle={Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers}, author={Abshoff, Sebastian and Benter, Markus and Cord-Landwehr, Andreas and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}, year={2013}, pages={22–34}, collection={Lecture Notes in Computer Science} }","mla":"Abshoff, Sebastian, et al. “Token Dissemination in Geometric Dynamic Networks.” Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers, 2013, pp. 22–34, doi:10.1007/978-3-642-45346-5_3.","apa":"Abshoff, S., Benter, M., Cord-Landwehr, A., Malatyali, M., & Meyer auf der Heide, F. (2013). Token Dissemination in Geometric Dynamic Networks. In Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers (pp. 22–34). https://doi.org/10.1007/978-3-642-45346-5_3","ama":"Abshoff S, Benter M, Cord-Landwehr A, Malatyali M, Meyer auf der Heide F. Token Dissemination in Geometric Dynamic Networks. In: Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers. Lecture Notes in Computer Science. ; 2013:22-34. doi:10.1007/978-3-642-45346-5_3","chicago":"Abshoff, Sebastian, Markus Benter, Andreas Cord-Landwehr, Manuel Malatyali, and Friedhelm Meyer auf der Heide. “Token Dissemination in Geometric Dynamic Networks.” In Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers, 22–34. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-642-45346-5_3.","ieee":"S. Abshoff, M. Benter, A. Cord-Landwehr, M. Malatyali, and F. Meyer auf der Heide, “Token Dissemination in Geometric Dynamic Networks,” in Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers, 2013, pp. 22–34.","short":"S. Abshoff, M. Benter, A. Cord-Landwehr, M. Malatyali, F. Meyer auf der Heide, in: Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers, 2013, pp. 22–34."},"year":"2013","abstract":[{"text":"We consider the k-token dissemination problem, where k initially arbitrarily distributed tokens have to be disseminated to all nodes in a dynamic network (as introduced by Kuhn et al., STOC 2010). In contrast to general dynamic networks, our dynamic networks are unit disk graphs, i.e., nodes are embedded into the Euclidean plane and two nodes are connected if and only if their distance is at most R. Our worst-case adversary is allowed to move the nodes on the plane, but the maximum velocity v_max of each node is limited and the graph must be connected in each round. For this model, we provide almost tight lower and upper bounds for k-token dissemination if nodes are restricted to send only one token per round. It turns out that the maximum velocity v_max is a meaningful parameter to characterize dynamics in our model.","lang":"eng"}],"user_id":"15504","ddc":["040"],"file":[{"file_size":193169,"file_id":"1325","creator":"florida","content_type":"application/pdf","date_updated":"2018-03-15T14:06:38Z","success":1,"relation":"main_file","date_created":"2018-03-15T14:06:38Z","file_name":"477-geometric-dynamic-networks_01.pdf","access_level":"closed"}],"publication":"Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers","file_date_updated":"2018-03-15T14:06:38Z","author":[{"last_name":"Abshoff","first_name":"Sebastian","full_name":"Abshoff, Sebastian"},{"full_name":"Benter, Markus","first_name":"Markus","last_name":"Benter"},{"first_name":"Andreas","full_name":"Cord-Landwehr, Andreas","last_name":"Cord-Landwehr"},{"first_name":"Manuel","full_name":"Malatyali, Manuel","last_name":"Malatyali"},{"full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"date_created":"2017-10-17T12:42:25Z","status":"public","has_accepted_license":"1","date_updated":"2022-01-06T07:01:21Z","doi":"10.1007/978-3-642-45346-5_3","series_title":"Lecture Notes in Computer Science","title":"Token Dissemination in Geometric Dynamic Networks","department":[{"_id":"63"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}]},{"date_updated":"2022-01-06T07:01:22Z","_id":"478","citation":{"bibtex":"@book{Timm_2013, title={Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems}, publisher={Universität Paderborn}, author={Timm, Nils}, year={2013} }","mla":"Timm, Nils. Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn, 2013.","apa":"Timm, N. (2013). Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn.","ama":"Timm N. Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn; 2013.","chicago":"Timm, Nils. Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn, 2013.","ieee":"N. Timm, Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems. Universität Paderborn, 2013.","short":"N. Timm, Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems, Universität Paderborn, 2013."},"year":"2013","type":"dissertation","supervisor":[{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"abstract":[{"lang":"eng","text":"Software systems are playing an increasing role in our everyday life, and as the amount of software applications grows, so does their complexity and the relevance of their computations. Software components can be found in many systems that are charged with safety-critical tasks, such as control systems for aviation or power plants. Hence, software verification techniques that are capable of proving the absence of critical errors are becoming more and more important in the field software engineering. A well-established approach to software verification is model checking. Applying this technique involves an exhaustive exploration of a state space model corresponding to the system under consideration. The major challenge in model checking is the so-called state explosion problem: The state space of a software system grows exponentially with its size. Thus, the straightforward modelling of real-life systems practically impossible. A common approach to this problem is the application of abstraction techniques, which reduce the original state space by mapping it on a significantly smaller abstract one. Abstraction inherently involves a loss of information, and thus, the resulting abstract model may be too imprecise for a definite result in verification. Therefore, abstraction is typically combined with abstraction refinement: An initially very coarse abstract model is iteratively refined, i.e. enriched with new details about the original system, until a level of abstraction is reached that is precise enough for a definite outcome. Abstraction refinement-based model checking is fully automatable and it is considered as one of the most promising approaches to the state explosion problem in verification. However, it is still faced with a number of challenges. There exist several types of abstraction techniques and not every type is equally well-suited for all kinds of systems and verification tasks. Moreover, the selection of adequate refinement steps is nontrivial and typically the most crucial part of the overall approach: Unfavourable refinement decisions can compromise the state space-reducing effect of abstraction, and as a consequence, can easily lead to the failure of verification. It is, however, hard to predict which refinement steps will eventually be expedient for verification – and which not."}],"ddc":["040"],"title":"Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems","user_id":"477","department":[{"_id":"77"}],"file_date_updated":"2018-03-15T14:06:05Z","author":[{"full_name":"Timm, Nils","first_name":"Nils","last_name":"Timm"}],"publisher":"Universität Paderborn","file":[{"access_level":"closed","date_created":"2018-03-15T14:06:05Z","file_name":"478-Dissertation-Timm.pdf","success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-03-15T14:06:05Z","creator":"florida","file_id":"1324","file_size":931458}],"date_created":"2017-10-17T12:42:25Z","project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"has_accepted_license":"1","status":"public"},{"language":[{"iso":"eng"}],"doi":"10.1007/s11573-013-0652-x","date_updated":"2022-01-06T07:01:24Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Subproject A4","_id":"8"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"183"}],"title":"The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley","page":"101-119","type":"journal_article","citation":{"ieee":"B. Frick and R. Simmons, “The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley,” Journal of Business Economics, vol. 83, no. 2, pp. 101–119, 2013.","short":"B. Frick, R. Simmons, Journal of Business Economics 83 (2013) 101–119.","mla":"Frick, Bernd, and Robert Simmons. “The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley.” Journal of Business Economics, vol. 83, no. 2, Springer, 2013, pp. 101–19, doi:10.1007/s11573-013-0652-x.","bibtex":"@article{Frick_Simmons_2013, title={The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley}, volume={83}, DOI={10.1007/s11573-013-0652-x}, number={2}, journal={Journal of Business Economics}, publisher={Springer}, author={Frick, Bernd and Simmons, Robert}, year={2013}, pages={101–119} }","chicago":"Frick, Bernd, and Robert Simmons. “The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley.” Journal of Business Economics 83, no. 2 (2013): 101–19. https://doi.org/10.1007/s11573-013-0652-x.","apa":"Frick, B., & Simmons, R. (2013). The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley. Journal of Business Economics, 83(2), 101–119. https://doi.org/10.1007/s11573-013-0652-x","ama":"Frick B, Simmons R. The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley. Journal of Business Economics. 2013;83(2):101-119. doi:10.1007/s11573-013-0652-x"},"year":"2013","issue":"2","_id":"480","intvolume":" 83","date_created":"2017-10-17T12:42:25Z","has_accepted_license":"1","status":"public","volume":83,"file":[{"success":1,"relation":"main_file","date_updated":"2018-03-15T14:02:36Z","content_type":"application/pdf","creator":"florida","file_id":"1322","file_size":371437,"access_level":"closed","date_created":"2018-03-15T14:02:36Z","file_name":"480-Frick.pdf"}],"file_date_updated":"2018-03-15T14:02:36Z","publication":"Journal of Business Economics","publisher":"Springer","author":[{"last_name":"Frick","first_name":"Bernd","full_name":"Frick, Bernd"},{"last_name":"Simmons","first_name":"Robert","full_name":"Simmons, Robert"}],"user_id":"477","ddc":["040"],"abstract":[{"text":"Although of considerable practical importance, the separate impact of individual and collective reputation on firm performance (e.g. product prices) has not yet been convincingly demonstrated. We use a sample of some 70 different wineries offering more than 1,300 different Riesling wines from the Mosel valley to isolate the returns to individual reputation (measured by expert ratings in a highly respected wine guide) from the returns to collective reputation (measured by membership in two different professional associations where members are assumed to monitor each other very closely). We find that both effects are statistically significant and economically relevant with the latter being more important in quantitative terms than the former.","lang":"eng"}]},{"has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:42:26Z","file":[{"file_size":1405789,"file_id":"1321","creator":"florida","date_updated":"2018-03-15T14:02:01Z","content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-15T14:02:01Z","file_name":"481-Symbiotic.Coupling.of.P2P.and.Cloud.Systems.The.Wikipedia.Case2.pdf","access_level":"closed"}],"author":[{"last_name":"Graffi","full_name":"Graffi, Kalman","first_name":"Kalman"},{"last_name":"Bremer","full_name":"Bremer, Lars","first_name":"Lars"}],"publication":"Proceedings of the International Conference on Communications (ICC'13)","file_date_updated":"2018-03-15T14:02:01Z","user_id":"477","ddc":["040"],"abstract":[{"lang":"eng","text":"Cloud computing offers high availability, dynamic scalability, and elasticity requiring only very little administration. However, this service comes with financial costs. Peer-to-peer systems, in contrast, operate at very low costs but cannot match the quality of service of the cloud. This paper focuses on the case study of Wikipedia and presents an approach to reduce the operational costs of hosting similar websites in the cloud by using a practical peer-to-peer approach. The visitors of the site are joining a Chord overlay, which acts as first cache for article lookups. Simulation results show, that up to 72% of the article lookups in Wikipedia could be answered by other visitors instead of using the cloud."}],"type":"conference","year":"2013","citation":{"ama":"Graffi K, Bremer L. Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case. In: Proceedings of the International Conference on Communications (ICC’13). ; 2013:3444-3449. doi:10.1109/ICC.2013.6655082","apa":"Graffi, K., & Bremer, L. (2013). Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case. In Proceedings of the International Conference on Communications (ICC’13) (pp. 3444–3449). https://doi.org/10.1109/ICC.2013.6655082","chicago":"Graffi, Kalman, and Lars Bremer. “Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case.” In Proceedings of the International Conference on Communications (ICC’13), 3444–49, 2013. https://doi.org/10.1109/ICC.2013.6655082.","mla":"Graffi, Kalman, and Lars Bremer. “Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case.” Proceedings of the International Conference on Communications (ICC’13), 2013, pp. 3444–49, doi:10.1109/ICC.2013.6655082.","bibtex":"@inproceedings{Graffi_Bremer_2013, title={Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case}, DOI={10.1109/ICC.2013.6655082}, booktitle={Proceedings of the International Conference on Communications (ICC’13)}, author={Graffi, Kalman and Bremer, Lars}, year={2013}, pages={3444–3449} }","short":"K. Graffi, L. Bremer, in: Proceedings of the International Conference on Communications (ICC’13), 2013, pp. 3444–3449.","ieee":"K. Graffi and L. Bremer, “Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case,” in Proceedings of the International Conference on Communications (ICC’13), 2013, pp. 3444–3449."},"page":"3444 - 3449 ","_id":"481","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"79"}],"title":"Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case","language":[{"iso":"eng"}],"doi":"10.1109/ICC.2013.6655082","date_updated":"2022-01-06T07:01:25Z"},{"language":[{"iso":"ger"}],"year":"2013","type":"bachelorsthesis","citation":{"short":"M. Bieshaar, Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen, Universität Paderborn, 2013.","ieee":"M. Bieshaar, Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen. Universität Paderborn, 2013.","chicago":"Bieshaar, Maarten. Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen. Universität Paderborn, 2013.","apa":"Bieshaar, M. (2013). Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen. Universität Paderborn.","ama":"Bieshaar M. Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen. Universität Paderborn; 2013.","bibtex":"@book{Bieshaar_2013, title={Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen}, publisher={Universität Paderborn}, author={Bieshaar, Maarten}, year={2013} }","mla":"Bieshaar, Maarten. Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen. Universität Paderborn, 2013."},"_id":"482","date_updated":"2022-01-06T07:01:25Z","author":[{"full_name":"Bieshaar, Maarten","first_name":"Maarten","last_name":"Bieshaar"}],"publisher":"Universität Paderborn","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B2","_id":"10"},{"name":"SFB 901 - Project Area B","_id":"3"}],"date_created":"2017-10-17T12:42:26Z","status":"public","user_id":"477","title":"Statistisches Planen von Aktionen für autonome mobile Roboter in realen Umgebungen"},{"date_updated":"2022-01-06T07:01:25Z","_id":"483","main_file_link":[{"url":"http://subs.emis.de/LNI/Proceedings/Proceedings213/article35.html"}],"series_title":"Lecture Notes in Informatics (LNI)","type":"conference","year":"2013","citation":{"bibtex":"@inproceedings{Becker_Becker_Meyer_2013, series={Lecture Notes in Informatics (LNI)}, title={SimuLizar: Design-Time modeling and Performance Analysis of Self-Adaptive Systems}, booktitle={Proceedings of the Software Engineering Conference (SE)}, author={Becker, Matthias and Becker, Steffen and Meyer, Joachim}, year={2013}, pages={71–84}, collection={Lecture Notes in Informatics (LNI)} }","mla":"Becker, Matthias, et al. “SimuLizar: Design-Time Modeling and Performance Analysis of Self-Adaptive Systems.” Proceedings of the Software Engineering Conference (SE), 2013, pp. 71–84.","ama":"Becker M, Becker S, Meyer J. SimuLizar: Design-Time modeling and Performance Analysis of Self-Adaptive Systems. In: Proceedings of the Software Engineering Conference (SE). Lecture Notes in Informatics (LNI). ; 2013:71-84.","apa":"Becker, M., Becker, S., & Meyer, J. (2013). SimuLizar: Design-Time modeling and Performance Analysis of Self-Adaptive Systems. In Proceedings of the Software Engineering Conference (SE) (pp. 71–84).","chicago":"Becker, Matthias, Steffen Becker, and Joachim Meyer. “SimuLizar: Design-Time Modeling and Performance Analysis of Self-Adaptive Systems.” In Proceedings of the Software Engineering Conference (SE), 71–84. Lecture Notes in Informatics (LNI), 2013.","ieee":"M. Becker, S. Becker, and J. Meyer, “SimuLizar: Design-Time modeling and Performance Analysis of Self-Adaptive Systems,” in Proceedings of the Software Engineering Conference (SE), 2013, pp. 71–84.","short":"M. Becker, S. Becker, J. Meyer, in: Proceedings of the Software Engineering Conference (SE), 2013, pp. 71–84."},"page":"71-84","abstract":[{"lang":"eng","text":"Modern software systems adapt themselves to changing environments, to meet quality-of-service requirements, such as response time limits. The engineering of the system’s self-adaptation logic does not only require new modeling methods, but also new analyzes of transient phases. Model-driven software performance engineering methods already allow design-time analysis of steady states of non-adaptive system models. In order to validate requirements for transient phases, new modeling and analysis methods are needed. In this paper, we present SimuLizar, our initial model-driven approach to model self-adaptive systems and analyze the performance of their transient phases. Our evaluation of a load balancer toy example shows the applicability of our modeling approach. Additionally, a comparison of our performance analysis with a prototypical implementation of our example system shows that the prediction accuracy is sufficient to identify unsatisfactory self-adaptations."}],"user_id":"15504","ddc":["040"],"title":"SimuLizar: Design-Time modeling and Performance Analysis of Self-Adaptive Systems","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-15T13:58:42Z","creator":"florida","file_id":"1320","file_size":649508,"access_level":"closed","date_created":"2018-03-15T13:58:42Z","file_name":"483-paper.pdf"}],"author":[{"full_name":"Becker, Matthias","first_name":"Matthias","last_name":"Becker"},{"last_name":"Becker","first_name":"Steffen","full_name":"Becker, Steffen"},{"last_name":"Meyer","first_name":"Joachim","full_name":"Meyer, Joachim"}],"file_date_updated":"2018-03-15T13:58:42Z","publication":"Proceedings of the Software Engineering Conference (SE)","has_accepted_license":"1","status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"date_created":"2017-10-17T12:42:26Z"},{"title":"Service Matching under Consideration of Explicitly Specified Service Variants","department":[{"_id":"66"},{"_id":"76"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"_id":"3","name":"SFB 901 - Project Area B"}],"date_updated":"2022-01-06T07:01:27Z","doi":"10.1109/ICWS.2013.98","language":[{"iso":"eng"}],"abstract":[{"text":"One of the main ideas of Service-Oriented Computing (SOC) is the delivery of flexibly composable services provided on world-wide markets. For a successful service discovery,service requests have to be matched with the available service offers. However, in a situation in which no service that completely matches the request can be discovered, the customer may tolerate slight discrepancies between request and offer. Some existing fuzzy matching approaches are able to detectsuch service variants, but they do not allow to explicitly specify which parts of a request are not mandatory. In this paper, we improve an existing service matching approach based onVisual Contracts leveraging our preliminary work of design pattern detection. Thereby, we support explicit specifications of service variants and realize gradual matching results that can be ranked in order to discover the service offer that matches a customer’s request best.","lang":"eng"}],"user_id":"477","ddc":["040"],"file":[{"access_level":"closed","file_name":"484-Platenius_et_al_ICWS2013.pdf","date_created":"2018-03-15T13:57:42Z","content_type":"application/pdf","date_updated":"2018-03-15T13:57:42Z","relation":"main_file","success":1,"file_size":262082,"creator":"florida","file_id":"1319"}],"author":[{"last_name":"Platenius","first_name":"Marie Christin","full_name":"Platenius, Marie Christin"},{"last_name":"von Detten","full_name":"von Detten, Markus","first_name":"Markus"},{"last_name":"Gerth","full_name":"Gerth, Christian","first_name":"Christian"},{"first_name":"Wilhelm","full_name":"Schäfer, Wilhelm","last_name":"Schäfer"},{"last_name":"Engels","id":"107","first_name":"Gregor","full_name":"Engels, Gregor"}],"publication":"IEEE 20th International Conference on Web Services (ICWS 2013)","file_date_updated":"2018-03-15T13:57:42Z","status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:26Z","_id":"484","type":"conference","citation":{"apa":"Platenius, M. C., von Detten, M., Gerth, C., Schäfer, W., & Engels, G. (2013). Service Matching under Consideration of Explicitly Specified Service Variants. In IEEE 20th International Conference on Web Services (ICWS 2013) (pp. 613–614). https://doi.org/10.1109/ICWS.2013.98","ama":"Platenius MC, von Detten M, Gerth C, Schäfer W, Engels G. Service Matching under Consideration of Explicitly Specified Service Variants. In: IEEE 20th International Conference on Web Services (ICWS 2013). ; 2013:613-614. doi:10.1109/ICWS.2013.98","chicago":"Platenius, Marie Christin, Markus von Detten, Christian Gerth, Wilhelm Schäfer, and Gregor Engels. “Service Matching under Consideration of Explicitly Specified Service Variants.” In IEEE 20th International Conference on Web Services (ICWS 2013), 613–14, 2013. https://doi.org/10.1109/ICWS.2013.98.","mla":"Platenius, Marie Christin, et al. “Service Matching under Consideration of Explicitly Specified Service Variants.” IEEE 20th International Conference on Web Services (ICWS 2013), 2013, pp. 613–14, doi:10.1109/ICWS.2013.98.","bibtex":"@inproceedings{Platenius_von Detten_Gerth_Schäfer_Engels_2013, title={Service Matching under Consideration of Explicitly Specified Service Variants}, DOI={10.1109/ICWS.2013.98}, booktitle={IEEE 20th International Conference on Web Services (ICWS 2013)}, author={Platenius, Marie Christin and von Detten, Markus and Gerth, Christian and Schäfer, Wilhelm and Engels, Gregor}, year={2013}, pages={613–614} }","short":"M.C. Platenius, M. von Detten, C. Gerth, W. Schäfer, G. Engels, in: IEEE 20th International Conference on Web Services (ICWS 2013), 2013, pp. 613–614.","ieee":"M. C. Platenius, M. von Detten, C. Gerth, W. Schäfer, and G. Engels, “Service Matching under Consideration of Explicitly Specified Service Variants,” in IEEE 20th International Conference on Web Services (ICWS 2013), 2013, pp. 613–614."},"year":"2013","page":"613-614"},{"department":[{"_id":"355"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"name":"SFB 901 - Project Area B","_id":"3"}],"title":"Semi-Automated Software Composition Through Generated Components","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:01:27Z","doi":"10.1145/2539150.2539235","publication":"Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS)","file_date_updated":"2018-03-15T13:56:49Z","author":[{"last_name":"Mohr","first_name":"Felix","full_name":"Mohr, Felix"},{"last_name":"Kleine Büning","full_name":"Kleine Büning, Hans","first_name":"Hans"}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-15T13:56:49Z","file_id":"1318","creator":"florida","file_size":368152,"access_level":"closed","file_name":"485-paper86_mohr.pdf","date_created":"2018-03-15T13:56:49Z"}],"date_created":"2017-10-17T12:42:26Z","status":"public","has_accepted_license":"1","abstract":[{"text":"Software composition has been studied as a subject of state based planning for decades. Existing composition approaches that are efficient enough to be used in practice are limited to sequential arrangements of software components. This restriction dramatically reduces the number of composition problems that can be solved. However, there are many composition problems that could be solved by existing approaches if they had a possibility to combine components in very simple non-sequential ways. To this end, we present an approach that arranges not only basic components but also composite components. Composite components enhance the structure of the composition by conditional control flows. Through algorithms that are written by experts, composite components are automatically generated before the composition process starts. Therefore, our approach is not a substitute for existing composition algorithms but complements them with a preprocessing step. We verified the validity of our approach through implementation of the presented algorithms.","lang":"eng"}],"ddc":["040"],"user_id":"477","page":"676-680","type":"conference","citation":{"short":"F. Mohr, H. Kleine Büning, in: Proceedings of the 15th International Conference on Information Integration and Web-Based Applications & Services (IiWAS), 2013, pp. 676–680.","ieee":"F. Mohr and H. Kleine Büning, “Semi-Automated Software Composition Through Generated Components,” in Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS), 2013, pp. 676–680.","chicago":"Mohr, Felix, and Hans Kleine Büning. “Semi-Automated Software Composition Through Generated Components.” In Proceedings of the 15th International Conference on Information Integration and Web-Based Applications & Services (IiWAS), 676–80, 2013. https://doi.org/10.1145/2539150.2539235.","ama":"Mohr F, Kleine Büning H. Semi-Automated Software Composition Through Generated Components. In: Proceedings of the 15th International Conference on Information Integration and Web-Based Applications & Services (IiWAS). ; 2013:676-680. doi:10.1145/2539150.2539235","apa":"Mohr, F., & Kleine Büning, H. (2013). Semi-Automated Software Composition Through Generated Components. In Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS) (pp. 676–680). https://doi.org/10.1145/2539150.2539235","mla":"Mohr, Felix, and Hans Kleine Büning. “Semi-Automated Software Composition Through Generated Components.” Proceedings of the 15th International Conference on Information Integration and Web-Based Applications & Services (IiWAS), 2013, pp. 676–80, doi:10.1145/2539150.2539235.","bibtex":"@inproceedings{Mohr_Kleine Büning_2013, title={Semi-Automated Software Composition Through Generated Components}, DOI={10.1145/2539150.2539235}, booktitle={Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS)}, author={Mohr, Felix and Kleine Büning, Hans}, year={2013}, pages={676–680} }"},"year":"2013","_id":"485"},{"issue":"4","date_updated":"2022-01-06T07:01:27Z","_id":"4851","citation":{"ama":"Garnefeld I, Eggert A, Helm SV, Tax SS. Growing existing customers’ revenue streams through customer referral programs. Journal of Marketing. 2013;(4):17--32.","apa":"Garnefeld, I., Eggert, A., Helm, S. V., & Tax, S. S. (2013). Growing existing customers’ revenue streams through customer referral programs. Journal of Marketing, (4), 17--32.","chicago":"Garnefeld, Ina, Andreas Eggert, Sabrina V Helm, and Stephen S Tax. “Growing Existing Customers’ Revenue Streams through Customer Referral Programs.” Journal of Marketing, no. 4 (2013): 17--32.","bibtex":"@article{Garnefeld_Eggert_Helm_Tax_2013, title={Growing existing customers’ revenue streams through customer referral programs}, number={4}, journal={Journal of Marketing}, author={Garnefeld, Ina and Eggert, Andreas and Helm, Sabrina V and Tax, Stephen S}, year={2013}, pages={17--32} }","mla":"Garnefeld, Ina, et al. “Growing Existing Customers’ Revenue Streams through Customer Referral Programs.” Journal of Marketing, no. 4, 2013, pp. 17--32.","short":"I. Garnefeld, A. Eggert, S.V. Helm, S.S. Tax, Journal of Marketing (2013) 17--32.","ieee":"I. Garnefeld, A. Eggert, S. V. Helm, and S. S. Tax, “Growing existing customers’ revenue streams through customer referral programs,” Journal of Marketing, no. 4, pp. 17--32, 2013."},"type":"journal_article","year":"2013","page":"17--32","title":"Growing existing customers' revenue streams through customer referral programs","user_id":"57352","status":"public","date_created":"2018-10-25T09:39:22Z","author":[{"last_name":"Garnefeld","full_name":"Garnefeld, Ina","first_name":"Ina"},{"last_name":"Eggert","full_name":"Eggert, Andreas","first_name":"Andreas"},{"first_name":"Sabrina V","full_name":"Helm, Sabrina V","last_name":"Helm"},{"last_name":"Tax","first_name":"Stephen S","full_name":"Tax, Stephen S"}],"department":[{"_id":"180"}],"publication":"Journal of Marketing"},{"user_id":"57352","title":"Erfolgsfaktor Value-Based Selling—Verkaufen, wenn Kundenorientierung nicht zum Erfolg führt","department":[{"_id":"180"}],"publication":"Marketing Review St. Gallen","author":[{"first_name":"Alexander","full_name":"Haas, Alexander","last_name":"Haas"},{"last_name":"Eggert","first_name":"Andreas","full_name":"Eggert, Andreas"},{"last_name":"Terho","first_name":"Harri","full_name":"Terho, Harri"},{"first_name":"Wolfgang","full_name":"Ulaga, Wolfgang","last_name":"Ulaga"}],"date_created":"2018-10-25T09:40:32Z","status":"public","date_updated":"2022-01-06T07:01:27Z","_id":"4852","issue":"4","language":[{"iso":"eng"}],"page":"64--73","citation":{"short":"A. Haas, A. Eggert, H. Terho, W. Ulaga, Marketing Review St. Gallen (2013) 64--73.","ieee":"A. Haas, A. Eggert, H. Terho, and W. Ulaga, “Erfolgsfaktor Value-Based Selling—Verkaufen, wenn Kundenorientierung nicht zum Erfolg führt,” Marketing Review St. Gallen, no. 4, pp. 64--73, 2013.","ama":"Haas A, Eggert A, Terho H, Ulaga W. Erfolgsfaktor Value-Based Selling—Verkaufen, wenn Kundenorientierung nicht zum Erfolg führt. Marketing Review St Gallen. 2013;(4):64--73.","apa":"Haas, A., Eggert, A., Terho, H., & Ulaga, W. (2013). Erfolgsfaktor Value-Based Selling—Verkaufen, wenn Kundenorientierung nicht zum Erfolg führt. Marketing Review St. Gallen, (4), 64--73.","chicago":"Haas, Alexander, Andreas Eggert, Harri Terho, and Wolfgang Ulaga. “Erfolgsfaktor Value-Based Selling—Verkaufen, Wenn Kundenorientierung Nicht Zum Erfolg Führt.” Marketing Review St. Gallen, no. 4 (2013): 64--73.","bibtex":"@article{Haas_Eggert_Terho_Ulaga_2013, title={Erfolgsfaktor Value-Based Selling—Verkaufen, wenn Kundenorientierung nicht zum Erfolg führt}, number={4}, journal={Marketing Review St. Gallen}, author={Haas, Alexander and Eggert, Andreas and Terho, Harri and Ulaga, Wolfgang}, year={2013}, pages={64--73} }","mla":"Haas, Alexander, et al. “Erfolgsfaktor Value-Based Selling—Verkaufen, Wenn Kundenorientierung Nicht Zum Erfolg Führt.” Marketing Review St. Gallen, no. 4, 2013, pp. 64--73."},"year":"2013","type":"journal_article"},{"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"43","name":"Securing the Financial Cloud"}],"date_created":"2017-10-17T12:42:27Z","status":"public","department":[{"_id":"64"}],"author":[{"last_name":"Otte","full_name":"Otte, Oliver","first_name":"Oliver"}],"publisher":"Universität Paderborn","user_id":"477","title":"Seitenkanalresistenz paarungsbasierter Kryptographie","language":[{"iso":"ger"}],"supervisor":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"citation":{"short":"O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität Paderborn, 2013.","ieee":"O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.","ama":"Otte O. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn; 2013.","apa":"Otte, O. (2013). Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn.","chicago":"Otte, Oliver. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.","mla":"Otte, Oliver. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.","bibtex":"@book{Otte_2013, title={Seitenkanalresistenz paarungsbasierter Kryptographie}, publisher={Universität Paderborn}, author={Otte, Oliver}, year={2013} }"},"type":"bachelorsthesis","year":"2013","date_updated":"2022-01-06T07:01:27Z","_id":"486"},{"citation":{"mla":"Bobolz, Jan. Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn, 2013.","bibtex":"@book{Bobolz_2013, title={Security Proofs for Pairing-Based Cryptography in the Generic Group Model}, publisher={Universität Paderborn}, author={Bobolz, Jan}, year={2013} }","ama":"Bobolz J. Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn; 2013.","apa":"Bobolz, J. (2013). Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn.","chicago":"Bobolz, Jan. Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn, 2013.","ieee":"J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn, 2013.","short":"J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model, Universität Paderborn, 2013."},"type":"bachelorsthesis","year":"2013","oa":"1","_id":"487","date_updated":"2022-01-06T07:01:28Z","urn":"4875","status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:27Z","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"publisher":"Universität Paderborn","author":[{"id":"27207","last_name":"Bobolz","full_name":"Bobolz, Jan","first_name":"Jan"}],"department":[{"_id":"64"}],"file_date_updated":"2018-06-29T09:56:54Z","file":[{"file_name":"thesis_jbobolz_final.pdf","date_created":"2018-04-13T11:42:08Z","access_level":"open_access","file_size":874286,"creator":"jbobolz","file_id":"2346","content_type":"application/pdf","date_updated":"2018-06-29T09:56:54Z","relation":"main_file"}],"title":"Security Proofs for Pairing-Based Cryptography in the Generic Group Model","ddc":["000"],"user_id":"27207"},{"date_updated":"2022-01-06T07:01:28Z","_id":"488","page":"98-105","year":"2013","citation":{"short":"J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.","ieee":"J. Blömer, P. Günther, and V. Krummel, “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study,” in Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.","chicago":"Blömer, Johannes, Peter Günther, and Volker Krummel. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 98–105, 2013.","ama":"Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). ; 2013:98-105.","apa":"Blömer, J., Günther, P., & Krummel, V. (2013). Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) (pp. 98–105).","mla":"Blömer, Johannes, et al. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.","bibtex":"@inproceedings{Blömer_Günther_Krummel_2013, title={Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study}, booktitle={Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker}, year={2013}, pages={98–105} }"},"type":"conference","ddc":["040"],"title":"Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study","user_id":"477","abstract":[{"text":"Unattended systems are key ingredients of various critical infrastruc-tures like networks of self service terminals or automated teller machines.For cost and efficiency reasons they should mostly run autonomously.Unattended systems are attractive and lucrative targets for various kindsof attacks, including attacks on the integrity of their components and thecommunication between components. In this paper, we propose a gen-eral cryptographic framework to protect unattended systems. We alsodemonstrate that instantiating the framework with techniques from iden-tity based cryptography is particularly well-suited to efficiently secureunattended systems.","lang":"eng"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"date_created":"2017-10-17T12:42:27Z","status":"public","has_accepted_license":"1","department":[{"_id":"64"}],"publication":"Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)","file_date_updated":"2018-03-15T13:46:52Z","author":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"},{"full_name":"Günther, Peter","first_name":"Peter","last_name":"Günther"},{"last_name":"Krummel","first_name":"Volker","full_name":"Krummel, Volker"}],"file":[{"date_created":"2018-03-15T13:46:52Z","file_name":"488-MACIS13.pdf","access_level":"closed","file_id":"1317","creator":"florida","file_size":301962,"relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-15T13:46:52Z"}]},{"issue":"19","date_updated":"2022-01-06T07:01:28Z","_id":"4880","citation":{"chicago":"St{\\, Susi, and Rene Fahr. “Individual Determinants of Work Attendance: Evidence on the Role of Personality.” Applied Economics, no. 19 (2013): 2863--2875.","apa":"St{\\, S., & Fahr, R. (2013). Individual determinants of work attendance: Evidence on the role of personality. Applied Economics, (19), 2863--2875.","ama":"St{\\ S, Fahr R. Individual determinants of work attendance: Evidence on the role of personality. Applied Economics. 2013;(19):2863--2875.","bibtex":"@article{St{\\_Fahr_2013, title={Individual determinants of work attendance: Evidence on the role of personality}, number={19}, journal={Applied Economics}, author={St{\\, Susi and Fahr, Rene}, year={2013}, pages={2863--2875} }","mla":"St{\\, Susi, and Rene Fahr. “Individual Determinants of Work Attendance: Evidence on the Role of Personality.” Applied Economics, no. 19, 2013, pp. 2863--2875.","short":"S. St{\\, R. Fahr, Applied Economics (2013) 2863--2875.","ieee":"S. St{\\ and R. Fahr, “Individual determinants of work attendance: Evidence on the role of personality,” Applied Economics, no. 19, pp. 2863--2875, 2013."},"year":"2013","type":"journal_article","page":"2863--2875","user_id":"69384","title":"Individual determinants of work attendance: Evidence on the role of personality","status":"public","date_created":"2018-10-26T07:40:07Z","author":[{"last_name":"St{\\","first_name":"Susi","full_name":"St{\\, Susi"},{"last_name":"Fahr","id":"111","first_name":"Rene","full_name":"Fahr, Rene"}],"department":[{"_id":"178"},{"_id":"179"}],"publication":"Applied Economics"},{"year":"2013","type":"mastersthesis","citation":{"apa":"Knopf, M. (2013). Scheduling Variants with Speed-Scaling via the Primal-Dual Approach. Universität Paderborn.","ama":"Knopf M. Scheduling Variants with Speed-Scaling via the Primal-Dual Approach. Universität Paderborn; 2013.","chicago":"Knopf, Michael. Scheduling Variants with Speed-Scaling via the Primal-Dual Approach. Universität Paderborn, 2013.","mla":"Knopf, Michael. Scheduling Variants with Speed-Scaling via the Primal-Dual Approach. Universität Paderborn, 2013.","bibtex":"@book{Knopf_2013, title={Scheduling Variants with Speed-Scaling via the Primal-Dual Approach}, publisher={Universität Paderborn}, author={Knopf, Michael}, year={2013} }","short":"M. Knopf, Scheduling Variants with Speed-Scaling via the Primal-Dual Approach, Universität Paderborn, 2013.","ieee":"M. Knopf, Scheduling Variants with Speed-Scaling via the Primal-Dual Approach. Universität Paderborn, 2013."},"_id":"489","date_updated":"2022-01-06T07:01:28Z","publisher":"Universität Paderborn","author":[{"first_name":"Michael","full_name":"Knopf, Michael","last_name":"Knopf"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"14","name":"SFB 901 - Subprojekt C2"},{"name":"SFB 901 - Project Area C","_id":"4"}],"date_created":"2017-10-17T12:42:27Z","user_id":"15504","title":"Scheduling Variants with Speed-Scaling via the Primal-Dual Approach"},{"publisher":"Universität Paderborn","author":[{"last_name":"Wallaschek","full_name":"Wallaschek, Felix","first_name":"Felix"}],"department":[{"_id":"75"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"_id":"2","name":"SFB 901 - Project Area A"}],"date_created":"2017-10-17T12:42:27Z","user_id":"477","title":"Routing in heterogenen OpenFlow Netzwerken","language":[{"iso":"ger"}],"type":"bachelorsthesis","year":"2013","citation":{"ieee":"F. Wallaschek, Routing in heterogenen OpenFlow Netzwerken. Universität Paderborn, 2013.","short":"F. Wallaschek, Routing in heterogenen OpenFlow Netzwerken, Universität Paderborn, 2013.","mla":"Wallaschek, Felix. Routing in heterogenen OpenFlow Netzwerken. Universität Paderborn, 2013.","bibtex":"@book{Wallaschek_2013, title={Routing in heterogenen OpenFlow Netzwerken}, publisher={Universität Paderborn}, author={Wallaschek, Felix}, year={2013} }","apa":"Wallaschek, F. (2013). Routing in heterogenen OpenFlow Netzwerken. Universität Paderborn.","ama":"Wallaschek F. Routing in heterogenen OpenFlow Netzwerken. Universität Paderborn; 2013.","chicago":"Wallaschek, Felix. Routing in heterogenen OpenFlow Netzwerken. Universität Paderborn, 2013."},"date_updated":"2022-01-06T07:01:28Z","_id":"490"},{"user_id":"69384","title":"Arbeitskräftebedarf bei hoher Arbeitslosigkeit: ein ökonomisches Zuwanderungskonzept für Deutschland","status":"public","date_created":"2018-10-26T08:46:52Z","author":[{"first_name":"Klaus F","full_name":"Zimmermann, Klaus F","last_name":"Zimmermann"},{"full_name":"Bauer, Thomas K","first_name":"Thomas K","last_name":"Bauer"},{"first_name":"Holger","full_name":"Bonin, Holger","last_name":"Bonin"},{"id":"111","last_name":"Fahr","full_name":"Fahr, Rene","first_name":"Rene"},{"first_name":"Holger","full_name":"Hinte, Holger","last_name":"Hinte"}],"department":[{"_id":"178"},{"_id":"179"}],"_id":"4911","date_updated":"2022-01-06T07:01:29Z","citation":{"bibtex":"@book{Zimmermann_Bauer_Bonin_Fahr_Hinte_2013, title={Arbeitskräftebedarf bei hoher Arbeitslosigkeit: ein ökonomisches Zuwanderungskonzept für Deutschland}, author={Zimmermann, Klaus F and Bauer, Thomas K and Bonin, Holger and Fahr, Rene and Hinte, Holger}, year={2013} }","mla":"Zimmermann, Klaus F., et al. Arbeitskräftebedarf Bei Hoher Arbeitslosigkeit: Ein Ökonomisches Zuwanderungskonzept Für Deutschland. 2013.","chicago":"Zimmermann, Klaus F, Thomas K Bauer, Holger Bonin, Rene Fahr, and Holger Hinte. Arbeitskräftebedarf Bei Hoher Arbeitslosigkeit: Ein Ökonomisches Zuwanderungskonzept Für Deutschland, 2013.","ama":"Zimmermann KF, Bauer TK, Bonin H, Fahr R, Hinte H. Arbeitskräftebedarf Bei Hoher Arbeitslosigkeit: Ein Ökonomisches Zuwanderungskonzept Für Deutschland.; 2013.","apa":"Zimmermann, K. F., Bauer, T. K., Bonin, H., Fahr, R., & Hinte, H. (2013). Arbeitskräftebedarf bei hoher Arbeitslosigkeit: ein ökonomisches Zuwanderungskonzept für Deutschland.","ieee":"K. F. Zimmermann, T. K. Bauer, H. Bonin, R. Fahr, and H. Hinte, Arbeitskräftebedarf bei hoher Arbeitslosigkeit: ein ökonomisches Zuwanderungskonzept für Deutschland. 2013.","short":"K.F. Zimmermann, T.K. Bauer, H. Bonin, R. Fahr, H. Hinte, Arbeitskräftebedarf Bei Hoher Arbeitslosigkeit: Ein Ökonomisches Zuwanderungskonzept Für Deutschland, 2013."},"year":"2013","type":"book"},{"citation":{"ama":"Mir Djawadi B, Fahr R. The Impact of Risk Perception and Risk Attitudes on Corrupt Behavior: Evidence from a Petty Corruption Experiment.; 2013.","apa":"Mir Djawadi, B., & Fahr, R. (2013). The impact of risk perception and risk attitudes on corrupt behavior: Evidence from a petty corruption experiment.","chicago":"Mir Djawadi, Behnud, and Rene Fahr. The Impact of Risk Perception and Risk Attitudes on Corrupt Behavior: Evidence from a Petty Corruption Experiment, 2013.","mla":"Mir Djawadi, Behnud, and Rene Fahr. The Impact of Risk Perception and Risk Attitudes on Corrupt Behavior: Evidence from a Petty Corruption Experiment. 2013.","bibtex":"@book{Mir Djawadi_Fahr_2013, title={The impact of risk perception and risk attitudes on corrupt behavior: Evidence from a petty corruption experiment}, author={Mir Djawadi, Behnud and Fahr, Rene}, year={2013} }","short":"B. Mir Djawadi, R. Fahr, The Impact of Risk Perception and Risk Attitudes on Corrupt Behavior: Evidence from a Petty Corruption Experiment, 2013.","ieee":"B. Mir Djawadi and R. Fahr, The impact of risk perception and risk attitudes on corrupt behavior: Evidence from a petty corruption experiment. 2013."},"year":"2013","type":"working_paper","_id":"4915","date_updated":"2022-01-06T07:01:29Z","status":"public","date_created":"2018-10-26T08:49:05Z","author":[{"last_name":"Mir Djawadi","first_name":"Behnud","full_name":"Mir Djawadi, Behnud"},{"last_name":"Fahr","id":"111","first_name":"Rene","full_name":"Fahr, Rene"}],"department":[{"_id":"178"},{"_id":"179"}],"user_id":"69384","title":"The impact of risk perception and risk attitudes on corrupt behavior: Evidence from a petty corruption experiment"},{"title":"The impact of tax knowledge and budget spending influence on tax compliance","user_id":"69384","date_created":"2018-10-26T08:55:28Z","status":"public","author":[{"first_name":"Behnud Mir","full_name":"Djawadi, Behnud Mir","last_name":"Djawadi"},{"full_name":"Fahr, Rene","first_name":"Rene","id":"111","last_name":"Fahr"}],"_id":"4917","date_updated":"2022-01-06T07:01:29Z","citation":{"bibtex":"@book{Djawadi_Fahr_2013, title={The impact of tax knowledge and budget spending influence on tax compliance}, author={Djawadi, Behnud Mir and Fahr, Rene}, year={2013} }","mla":"Djawadi, Behnud Mir, and Rene Fahr. The Impact of Tax Knowledge and Budget Spending Influence on Tax Compliance. 2013.","apa":"Djawadi, B. M., & Fahr, R. (2013). The impact of tax knowledge and budget spending influence on tax compliance.","ama":"Djawadi BM, Fahr R. The Impact of Tax Knowledge and Budget Spending Influence on Tax Compliance.; 2013.","chicago":"Djawadi, Behnud Mir, and Rene Fahr. The Impact of Tax Knowledge and Budget Spending Influence on Tax Compliance, 2013.","ieee":"B. M. Djawadi and R. Fahr, The impact of tax knowledge and budget spending influence on tax compliance. 2013.","short":"B.M. Djawadi, R. Fahr, The Impact of Tax Knowledge and Budget Spending Influence on Tax Compliance, 2013."},"year":"2013","type":"report"},{"title":"Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case","user_id":"15504","author":[{"first_name":"Christoph","full_name":"Robbert, Christoph","last_name":"Robbert"}],"publisher":"Universität Paderborn","department":[{"_id":"75"}],"status":"public","date_created":"2017-10-17T12:42:28Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"6","name":"SFB 901 - Subprojekt A2"},{"name":"SFB 901 - Project Area A","_id":"2"}],"date_updated":"2022-01-06T07:01:29Z","_id":"492","type":"bachelorsthesis","year":"2013","citation":{"bibtex":"@book{Robbert_2013, title={Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case}, publisher={Universität Paderborn}, author={Robbert, Christoph}, year={2013} }","mla":"Robbert, Christoph. Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case. Universität Paderborn, 2013.","ama":"Robbert C. Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case. Universität Paderborn; 2013.","apa":"Robbert, C. (2013). Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case. Universität Paderborn.","chicago":"Robbert, Christoph. Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case. Universität Paderborn, 2013.","ieee":"C. Robbert, Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case. Universität Paderborn, 2013.","short":"C. Robbert, Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case, Universität Paderborn, 2013."}},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"date_created":"2017-10-17T12:42:28Z","status":"public","author":[{"first_name":"Artjom","full_name":"Terentjew, Artjom","last_name":"Terentjew"}],"publisher":"Universität Paderborn","user_id":"477","title":"Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen","language":[{"iso":"ger"}],"type":"bachelorsthesis","year":"2013","citation":{"ieee":"A. Terentjew, Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen. Universität Paderborn, 2013.","short":"A. Terentjew, Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen, Universität Paderborn, 2013.","bibtex":"@book{Terentjew_2013, title={Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen}, publisher={Universität Paderborn}, author={Terentjew, Artjom}, year={2013} }","mla":"Terentjew, Artjom. Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen. Universität Paderborn, 2013.","chicago":"Terentjew, Artjom. Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen. Universität Paderborn, 2013.","ama":"Terentjew A. Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen. Universität Paderborn; 2013.","apa":"Terentjew, A. (2013). Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen. Universität Paderborn."},"_id":"493","date_updated":"2022-01-06T07:01:29Z"},{"ddc":["040"],"title":"Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies","user_id":"477","abstract":[{"lang":"eng","text":"The maintenance of component-based software systems requires up-to-date models of their concrete architecture, i.e. the architecture that is realised in the source code. These models help in systematically planning, analysing and executing typical reengineering activities. Often no or only outdated architectural models of such systems exist. Therefore, various reverse engineering methods have been developed which try to recover a system's components, subsystems and connectors. However, these reverse engineering methods are severely impacted by design deciencies in the system's code base, especially violations of the component encapsulation. As long as design deciencies are not considered in the reverse engineering process, they reduce the quality of the recovered component structures. Despite this impact of design deciencies, no existing architecture reconstruction approach explicitly integrates a systematic deciency detection and removal into the recovery process. Therefore, I have developed Archimetrix. Archimetrix is a tool-supported architecture reconstruction process. It enhances a clustering-based architecture recovery approach with an extensible, pattern-based deciency detection. After the detection of deciencies, Archimetrix supports the software architect in removing the de ciencies and provides the means to preview the architectural consequences of such a removal. I also provide a process to identify and formalise additional deciencies. I validated the approach on three case studies which show that Archimetrix is able to identify relevant deciencies and that the removal of these deciencies leads to an increased quality of the recovered architectures, i.e. they are closer to the corresponding conceptual architectures."}],"status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:28Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"name":"SFB 901 - Project Area B","_id":"3"}],"author":[{"full_name":"von Detten, Markus","first_name":"Markus","last_name":"von Detten"}],"publisher":"Universität Paderborn","department":[{"_id":"76"}],"file_date_updated":"2018-03-15T13:43:42Z","file":[{"access_level":"closed","file_name":"494-Dissertation-vonDetten.pdf","date_created":"2018-03-15T13:43:42Z","relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-15T13:43:42Z","file_id":"1315","creator":"florida","file_size":11101635}],"_id":"494","date_updated":"2022-01-06T07:01:30Z","citation":{"ama":"von Detten M. Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies. Universität Paderborn; 2013.","apa":"von Detten, M. (2013). Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies. Universität Paderborn.","chicago":"Detten, Markus von. Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies. Universität Paderborn, 2013.","bibtex":"@book{von Detten_2013, title={Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies}, publisher={Universität Paderborn}, author={von Detten, Markus}, year={2013} }","mla":"von Detten, Markus. Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies. Universität Paderborn, 2013.","short":"M. von Detten, Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies, Universität Paderborn, 2013.","ieee":"M. von Detten, Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies. Universität Paderborn, 2013."},"type":"dissertation","year":"2013","supervisor":[{"full_name":"Schäfer, Wilhelm","first_name":"Wilhelm","last_name":"Schäfer"}]},{"citation":{"bibtex":"@inproceedings{Mohr_Lettmann_Kleine Büning_2013, title={Reducing Nondeterminism in Automated Service Composition}, DOI={10.1109/SOCA.2013.25}, booktitle={Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)}, author={Mohr, Felix and Lettmann, Theodor and Kleine Büning, Hans}, year={2013}, pages={154–161} }","mla":"Mohr, Felix, et al. “Reducing Nondeterminism in Automated Service Composition.” Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA), 2013, pp. 154–61, doi:10.1109/SOCA.2013.25.","apa":"Mohr, F., Lettmann, T., & Kleine Büning, H. (2013). Reducing Nondeterminism in Automated Service Composition. In Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA) (pp. 154–161). https://doi.org/10.1109/SOCA.2013.25","ama":"Mohr F, Lettmann T, Kleine Büning H. Reducing Nondeterminism in Automated Service Composition. In: Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA). ; 2013:154-161. doi:10.1109/SOCA.2013.25","chicago":"Mohr, Felix, Theodor Lettmann, and Hans Kleine Büning. “Reducing Nondeterminism in Automated Service Composition.” In Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA), 154–61, 2013. https://doi.org/10.1109/SOCA.2013.25.","ieee":"F. Mohr, T. Lettmann, and H. Kleine Büning, “Reducing Nondeterminism in Automated Service Composition,” in Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA), 2013, pp. 154–161.","short":"F. Mohr, T. Lettmann, H. Kleine Büning, in: Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA), 2013, pp. 154–161."},"type":"conference","year":"2013","page":"154-161","_id":"495","file":[{"date_created":"2018-03-15T13:43:08Z","file_name":"495-paper52_mohr.pdf","access_level":"closed","file_size":603822,"file_id":"1314","creator":"florida","content_type":"application/pdf","date_updated":"2018-03-15T13:43:08Z","relation":"main_file","success":1}],"author":[{"last_name":"Mohr","first_name":"Felix","full_name":"Mohr, Felix"},{"first_name":"Theodor","full_name":"Lettmann, Theodor","orcid":"0000-0001-5859-2457","last_name":"Lettmann","id":"315"},{"last_name":"Kleine Büning","full_name":"Kleine Büning, Hans","first_name":"Hans"}],"publication":"Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)","file_date_updated":"2018-03-15T13:43:08Z","status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:28Z","abstract":[{"lang":"eng","text":"Automated service composition has been studied as a subject of state based planning for a decade. A great deal of service composition tasks can only be solved if concrete output values of the services are considered in the composition process. However, the fact that those values are not known before runtime leads to nondeterministic planning problems, which have proven to be notoriously difficult in practical automated service composition applications. Even though this problem is frequently recognized, it has still received remarkably few attention and remains unsolved.This paper shows how nondeterminism in automated service composition can be reduced. We introduce context rules as a means to derive semantic knowledge from output values of services. These rules enable us to replace nondeterministic composition operations by less nondeterministic or even completely deterministic ones. We show the validity of our solutions not only theoretically but also have evaluated them practically through implementation."}],"user_id":"477","ddc":["040"],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:01:30Z","doi":"10.1109/SOCA.2013.25","department":[{"_id":"355"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B2","_id":"10"},{"name":"SFB 901 - Project Area B","_id":"3"}],"title":"Reducing Nondeterminism in Automated Service Composition"},{"doi":"10.1109/INFCOM.2013.6567022","_id":"496","date_updated":"2022-01-06T07:01:31Z","year":"2013","citation":{"mla":"Benter, Markus, et al. “Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks.” Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), 2013, pp. 2193–201, doi:10.1109/INFCOM.2013.6567022.","bibtex":"@inproceedings{Benter_Neumann_Frey_2013, title={Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks}, DOI={10.1109/INFCOM.2013.6567022}, booktitle={Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)}, author={Benter, Markus and Neumann, Florentin and Frey, Hannes}, year={2013}, pages={2193–2201} }","chicago":"Benter, Markus, Florentin Neumann, and Hannes Frey. “Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks.” In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), 2193–2201, 2013. https://doi.org/10.1109/INFCOM.2013.6567022.","ama":"Benter M, Neumann F, Frey H. Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks. In: Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM). ; 2013:2193-2201. doi:10.1109/INFCOM.2013.6567022","apa":"Benter, M., Neumann, F., & Frey, H. (2013). Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks. In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM) (pp. 2193–2201). https://doi.org/10.1109/INFCOM.2013.6567022","ieee":"M. Benter, F. Neumann, and H. Frey, “Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks,” in Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), 2013, pp. 2193–2201.","short":"M. Benter, F. Neumann, H. Frey, in: Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), 2013, pp. 2193–2201."},"type":"conference","page":"2193-2201","title":"Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks","ddc":["040"],"user_id":"15504","abstract":[{"text":"Within reactive topology control, a node determines its adjacent edges of a network subgraph without prior knowledge of its neighborhood. The goal is to construct a local view on a topology which provides certain desired properties such as planarity. During algorithm execution, a node, in general, is not allowed to determine all its neighbors of the network graph. There are well-known reactive algorithms for computing planar subgraphs. However, the subgraphs obtained do not have constant Euclidean spanning ratio. This means that routing along these subgraphs may result in potentially long detours. So far, it has been unknown if planar spanners can be constructed reactively. In this work, we show that at least under the unit disk network model, this is indeed possible, by proposing an algorithm for reactive construction of the partial Delaunay triangulation, which recently turned out to be a spanner. Furthermore, we show that our algorithm is message-optimal as a node will only exchange messages with nodes that are also neighbors in the spanner. The algorithm’s presentation is complemented by a rigorous proof of correctness.","lang":"eng"}],"status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:42:29Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"name":"SFB 901 - Project Area A","_id":"2"}],"author":[{"last_name":"Benter","first_name":"Markus","full_name":"Benter, Markus"},{"first_name":"Florentin","full_name":"Neumann, Florentin","last_name":"Neumann"},{"first_name":"Hannes","full_name":"Frey, Hannes","last_name":"Frey"}],"file_date_updated":"2018-03-15T13:41:34Z","department":[{"_id":"75"}],"publication":"Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)","file":[{"file_name":"496-reactivePDT-copyright.pdf","date_created":"2018-03-15T13:41:34Z","access_level":"closed","creator":"florida","file_id":"1312","file_size":352571,"relation":"main_file","success":1,"date_updated":"2018-03-15T13:41:34Z","content_type":"application/pdf"}]},{"title":"Programs from Proofs – A PCC Alternative","department":[{"_id":"77"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"date_updated":"2022-01-06T07:01:32Z","doi":"10.1007/978-3-642-39799-8_65","series_title":"LNCS","language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space."}],"user_id":"477","ddc":["040"],"file":[{"file_name":"498-WonischSchremmerWehrheim2013.pdf","date_created":"2018-03-15T13:42:30Z","access_level":"closed","file_id":"1313","creator":"florida","file_size":487617,"success":1,"relation":"main_file","date_updated":"2018-03-15T13:42:30Z","content_type":"application/pdf"}],"publication":"Proceedings of the 25th International Conference on Computer Aided Verification (CAV)","file_date_updated":"2018-03-15T13:42:30Z","author":[{"last_name":"Wonisch","first_name":"Daniel","full_name":"Wonisch, Daniel"},{"full_name":"Schremmer, Alexander","first_name":"Alexander","last_name":"Schremmer"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"date_created":"2017-10-17T12:42:29Z","status":"public","has_accepted_license":"1","_id":"498","page":"912-927","citation":{"ama":"Wonisch D, Schremmer A, Wehrheim H. Programs from Proofs – A PCC Alternative. In: Proceedings of the 25th International Conference on Computer Aided Verification (CAV). LNCS. ; 2013:912-927. doi:10.1007/978-3-642-39799-8_65","apa":"Wonisch, D., Schremmer, A., & Wehrheim, H. (2013). Programs from Proofs – A PCC Alternative. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV) (pp. 912–927). https://doi.org/10.1007/978-3-642-39799-8_65","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Programs from Proofs – A PCC Alternative.” In Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 912–27. LNCS, 2013. https://doi.org/10.1007/978-3-642-39799-8_65.","mla":"Wonisch, Daniel, et al. “Programs from Proofs – A PCC Alternative.” Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 2013, pp. 912–27, doi:10.1007/978-3-642-39799-8_65.","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2013, series={LNCS}, title={Programs from Proofs – A PCC Alternative}, DOI={10.1007/978-3-642-39799-8_65}, booktitle={Proceedings of the 25th International Conference on Computer Aided Verification (CAV)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2013}, pages={912–927}, collection={LNCS} }","short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 2013, pp. 912–927.","ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Programs from Proofs – A PCC Alternative,” in Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 2013, pp. 912–927."},"type":"conference","year":"2013"},{"publication":"Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)","file_date_updated":"2018-03-15T13:40:02Z","author":[{"last_name":"Kling","first_name":"Peter","full_name":"Kling, Peter"},{"first_name":"Peter","full_name":"Pietrzyk, Peter","last_name":"Pietrzyk"}],"file":[{"file_id":"1310","creator":"florida","file_size":558661,"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-03-15T13:40:02Z","date_created":"2018-03-15T13:40:02Z","file_name":"499-P._Kling__P._Pietryzk_-_Profitable_Scheduling_on_Multiple_Speed-scalable_Processors__2013_.pdf","access_level":"closed"}],"date_created":"2017-10-17T12:42:29Z","status":"public","has_accepted_license":"1","abstract":[{"lang":"eng","text":"We present a new online algorithm for profit-oriented scheduling on multiple speed-scalable processors.Moreover, we provide a tight analysis of the algorithm's competitiveness.Our results generalize and improve upon work by \\citet{Chan:2010}, which considers a single speed-scalable processor.Using significantly different techniques, we can not only extend their model to multiprocessors but also prove an enhanced and tight competitive ratio for our algorithm.In our scheduling problem, jobs arrive over time and are preemptable.They have different workloads, values, and deadlines.The scheduler may decide not to finish a job but instead to suffer a loss equaling the job's value.However, to process a job's workload until its deadline the scheduler must invest a certain amount of energy.The cost of a schedule is the sum of lost values and invested energy.In order to finish a job the scheduler has to determine which processors to use and set their speeds accordingly.A processor's energy consumption is power $\\Power{s}$ integrated over time, where $\\Power{s}=s^{\\alpha}$ is the power consumption when running at speed $s$.Since we consider the online variant of the problem, the scheduler has no knowledge about future jobs.This problem was introduced by~\\citet{Chan:2010} for the case of a single processor.They presented an online algorithm which is $\\alpha^{\\alpha}+2e\\alpha$-competitive.We provide an online algorithm for the case of multiple processors with an improved competitive ratio of $\\alpha^{\\alpha}$."}],"ddc":["040"],"user_id":"477","page":"251-260 ","type":"conference","year":"2013","citation":{"short":"P. Kling, P. Pietrzyk, in: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 251–260.","ieee":"P. Kling and P. Pietrzyk, “Profitable Scheduling on Multiple Speed-Scalable Processors,” in Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 251–260.","ama":"Kling P, Pietrzyk P. Profitable Scheduling on Multiple Speed-Scalable Processors. In: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). ; 2013:251-260. doi:10.1145/2486159.2486183","apa":"Kling, P., & Pietrzyk, P. (2013). Profitable Scheduling on Multiple Speed-Scalable Processors. In Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (pp. 251–260). https://doi.org/10.1145/2486159.2486183","chicago":"Kling, Peter, and Peter Pietrzyk. “Profitable Scheduling on Multiple Speed-Scalable Processors.” In Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 251–60, 2013. https://doi.org/10.1145/2486159.2486183.","mla":"Kling, Peter, and Peter Pietrzyk. “Profitable Scheduling on Multiple Speed-Scalable Processors.” Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 251–60, doi:10.1145/2486159.2486183.","bibtex":"@inproceedings{Kling_Pietrzyk_2013, title={Profitable Scheduling on Multiple Speed-Scalable Processors}, DOI={10.1145/2486159.2486183}, booktitle={Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}, author={Kling, Peter and Pietrzyk, Peter}, year={2013}, pages={251–260} }"},"_id":"499","department":[{"_id":"63"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subproject C4","_id":"16"},{"name":"SFB 901 - Subproject C2","_id":"14"},{"name":"SFB 901 - Project Area C","_id":"4"}],"title":"Profitable Scheduling on Multiple Speed-Scalable Processors","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:01:34Z","doi":"10.1145/2486159.2486183"},{"issue":"1","_id":"4991","date_updated":"2022-01-06T07:01:34Z","type":"conference","citation":{"ieee":"S. Oertel, K. Thommes, and P. Walgenbach, “Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations,” in Academy of Management Proceedings, 2013, no. 1, p. 11642.","short":"S. Oertel, K. Thommes, P. Walgenbach, in: Academy of Management Proceedings, 2013, p. 11642.","mla":"Oertel, Simon, et al. “Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations.” Academy of Management Proceedings, no. 1, 2013, p. 11642.","bibtex":"@inproceedings{Oertel_Thommes_Walgenbach_2013, title={Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations}, number={1}, booktitle={Academy of Management Proceedings}, author={Oertel, Simon and Thommes, Kirsten and Walgenbach, Peter}, year={2013}, pages={11642} }","chicago":"Oertel, Simon, Kirsten Thommes, and Peter Walgenbach. “Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations.” In Academy of Management Proceedings, 11642, 2013.","ama":"Oertel S, Thommes K, Walgenbach P. Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations. In: Academy of Management Proceedings. ; 2013:11642.","apa":"Oertel, S., Thommes, K., & Walgenbach, P. (2013). Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations. In Academy of Management Proceedings (p. 11642)."},"year":"2013","page":"11642","user_id":"69384","title":"Born in the GDR: Imprinting, Structural Inertia and the Survival Chances of Organizations","status":"public","date_created":"2018-10-29T11:00:15Z","author":[{"full_name":"Oertel, Simon","first_name":"Simon","last_name":"Oertel"},{"last_name":"Thommes","full_name":"Thommes, Kirsten","first_name":"Kirsten"},{"full_name":"Walgenbach, Peter","first_name":"Peter","last_name":"Walgenbach"}],"department":[{"_id":"178"},{"_id":"184"}],"publication":"Academy of Management Proceedings"},{"title":"The after effects of strikes on team collaboration-experimental evidence","user_id":"69384","author":[{"id":"72497","last_name":"Thommes","full_name":"Thommes, Kirsten","first_name":"Kirsten"},{"first_name":"Agnes","full_name":"Akkerman, Agnes","last_name":"Akkerman"},{"last_name":"Vyrastekova","full_name":"Vyrastekova, Jana","first_name":"Jana"}],"department":[{"_id":"178"},{"_id":"184"}],"publication":"Academy of Management Proceedings","status":"public","date_created":"2018-10-29T11:01:28Z","_id":"4992","date_updated":"2022-01-06T07:01:34Z","issue":"1","type":"conference","citation":{"short":"K. Thommes, A. Akkerman, J. Vyrastekova, in: Academy of Management Proceedings, 2013, p. 12251.","ieee":"K. Thommes, A. Akkerman, and J. Vyrastekova, “The after effects of strikes on team collaboration-experimental evidence,” in Academy of Management Proceedings, 2013, no. 1, p. 12251.","apa":"Thommes, K., Akkerman, A., & Vyrastekova, J. (2013). The after effects of strikes on team collaboration-experimental evidence. In Academy of Management Proceedings (p. 12251).","ama":"Thommes K, Akkerman A, Vyrastekova J. The after effects of strikes on team collaboration-experimental evidence. In: Academy of Management Proceedings. ; 2013:12251.","chicago":"Thommes, Kirsten, Agnes Akkerman, and Jana Vyrastekova. “The after Effects of Strikes on Team Collaboration-Experimental Evidence.” In Academy of Management Proceedings, 12251, 2013.","mla":"Thommes, Kirsten, et al. “The after Effects of Strikes on Team Collaboration-Experimental Evidence.” Academy of Management Proceedings, no. 1, 2013, p. 12251.","bibtex":"@inproceedings{Thommes_Akkerman_Vyrastekova_2013, title={The after effects of strikes on team collaboration-experimental evidence}, number={1}, booktitle={Academy of Management Proceedings}, author={Thommes, Kirsten and Akkerman, Agnes and Vyrastekova, Jana}, year={2013}, pages={12251} }"},"year":"2013","page":"12251"},{"department":[{"_id":"211"}],"status":"public","date_created":"2019-01-25T09:50:54Z","editor":[{"full_name":"Beutner, Marc","first_name":"Marc","id":"21118","last_name":"Beutner"},{"id":"15280","last_name":"Kremer","full_name":"Kremer, H.-Hugo","first_name":"H.-Hugo"},{"last_name":"Wirth","first_name":"W.","full_name":"Wirth, W."}],"place":"Paderborn","user_id":"74378","title":"Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug","language":[{"iso":"ger"}],"citation":{"ieee":"M. Beutner, H.-H. Kremer, and W. Wirth, Eds., Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug. Paderborn, 2013.","short":"M. Beutner, H.-H. Kremer, W. Wirth, eds., Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug, Paderborn, 2013.","bibtex":"@book{Beutner_Kremer_Wirth_2013, place={Paderborn}, title={Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug}, year={2013} }","mla":"Beutner, Marc, et al., editors. Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug. 2013.","chicago":"Beutner, Marc, H.-Hugo Kremer, and W. Wirth, eds. Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug. Paderborn, 2013.","apa":"Beutner, M., Kremer, H.-H., & Wirth, W. (Eds.). (2013). Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug. Paderborn.","ama":"Beutner M, Kremer H-H, Wirth W, eds. Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im JUngtätervollzug. Paderborn; 2013."},"type":"book_editor","year":"2013","date_updated":"2022-01-06T07:03:25Z","_id":"6984"},{"language":[{"iso":"ger"}],"type":"journal_article","year":"2013","citation":{"short":"H.-H. Kremer, M. Fischer, T. Tramm, bwp@ Berufs- und Wirtschaftspädagogik - online (2013).","ieee":"H.-H. Kremer, M. Fischer, and T. Tramm, “Didaktik beruflicher Bildung,” bwp@ Berufs- und Wirtschaftspädagogik - online, no. 24, 2013.","chicago":"Kremer, H.-Hugo, M. Fischer, and T. Tramm. “Didaktik beruflicher Bildung.” bwp@ Berufs- und Wirtschaftspädagogik - online, no. 24 (2013).","apa":"Kremer, H.-H., Fischer, M., & Tramm, T. (2013). Didaktik beruflicher Bildung. bwp@ Berufs- und Wirtschaftspädagogik - online, (24).","ama":"Kremer H-H, Fischer M, Tramm T. Didaktik beruflicher Bildung. bwp@ Berufs- und Wirtschaftspädagogik - online. 2013;(24).","mla":"Kremer, H. Hugo, et al. “Didaktik beruflicher Bildung.” bwp@ Berufs- und Wirtschaftspädagogik - online, no. 24, 2013.","bibtex":"@article{Kremer_Fischer_Tramm_2013, title={Didaktik beruflicher Bildung}, number={24}, journal={bwp@ Berufs- und Wirtschaftspädagogik - online}, author={Kremer, H.-Hugo and Fischer, M. and Tramm, T.}, year={2013} }"},"issue":"24","_id":"6985","date_updated":"2022-01-06T07:03:25Z","date_created":"2019-01-25T10:11:51Z","status":"public","publication":"bwp@ Berufs- und Wirtschaftspädagogik - online","department":[{"_id":"211"}],"author":[{"last_name":"Kremer","id":"15280","first_name":"H.-Hugo","full_name":"Kremer, H.-Hugo"},{"full_name":"Fischer, M.","first_name":"M.","last_name":"Fischer"},{"last_name":"Tramm","first_name":"T.","full_name":"Tramm, T."}],"user_id":"74378","title":"Didaktik beruflicher Bildung"},{"department":[{"_id":"211"}],"editor":[{"last_name":"Feng","full_name":"Feng, X.","first_name":"X."},{"full_name":"Rützel, J.","first_name":"J.","last_name":"Rützel"},{"last_name":"Kremer","id":"15280","first_name":"H.-Hugo","full_name":"Kremer, H.-Hugo"}],"date_created":"2019-01-25T10:23:55Z","status":"public","place":"Shanghai","title":"Standardization, professionalization and the measurements","user_id":"74378","year":"2013","citation":{"ama":"Feng X, Rützel J, Kremer H-H, eds. Standardization, Professionalization and the Measurements. Shanghai; 2013.","apa":"Feng, X., Rützel, J., & Kremer, H.-H. (Eds.). (2013). Standardization, professionalization and the measurements. Shanghai.","chicago":"Feng, X., J. Rützel, and H.-Hugo Kremer, eds. Standardization, Professionalization and the Measurements. Shanghai, 2013.","mla":"Feng, X., et al., editors. Standardization, Professionalization and the Measurements. 2013.","bibtex":"@book{Feng_Rützel_Kremer_2013, place={Shanghai}, title={Standardization, professionalization and the measurements}, year={2013} }","short":"X. Feng, J. Rützel, H.-H. Kremer, eds., Standardization, Professionalization and the Measurements, Shanghai, 2013.","ieee":"X. Feng, J. Rützel, and H.-H. Kremer, Eds., Standardization, professionalization and the measurements. Shanghai, 2013."},"type":"book_editor","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:03:25Z","_id":"6986"},{"language":[{"iso":"eng"}],"page":"S7-S11","type":"journal_article","year":"2013","citation":{"apa":"Lo, F.-Y., Guo, J.-Y., Huang, C.-D., Chou, K.-C., Liu, H.-L., Ney, V., … Massies, J. (2013). Evidences of defect contribution in magnetically ordered Sm-implanted GaN. Current Applied Physics, 14, S7–S11. https://doi.org/10.1016/j.cap.2013.11.051","ama":"Lo F-Y, Guo J-Y, Huang C-D, et al. Evidences of defect contribution in magnetically ordered Sm-implanted GaN. Current Applied Physics. 2013;14:S7-S11. doi:10.1016/j.cap.2013.11.051","chicago":"Lo, Fang-Yuh, Jhong-Yu Guo, Cheng-De Huang, Kai-Chieh Chou, Hsiang-Lin Liu, Verena Ney, Andreas Ney, et al. “Evidences of Defect Contribution in Magnetically Ordered Sm-Implanted GaN.” Current Applied Physics 14 (2013): S7–11. https://doi.org/10.1016/j.cap.2013.11.051.","bibtex":"@article{Lo_Guo_Huang_Chou_Liu_Ney_Ney_Chern_Shvarkov_Reuter_et al._2013, title={Evidences of defect contribution in magnetically ordered Sm-implanted GaN}, volume={14}, DOI={10.1016/j.cap.2013.11.051}, journal={Current Applied Physics}, publisher={Elsevier BV}, author={Lo, Fang-Yuh and Guo, Jhong-Yu and Huang, Cheng-De and Chou, Kai-Chieh and Liu, Hsiang-Lin and Ney, Verena and Ney, Andreas and Chern, Ming-Yau and Shvarkov, Stepan and Reuter, Dirk and et al.}, year={2013}, pages={S7–S11} }","mla":"Lo, Fang-Yuh, et al. “Evidences of Defect Contribution in Magnetically Ordered Sm-Implanted GaN.” Current Applied Physics, vol. 14, Elsevier BV, 2013, pp. S7–11, doi:10.1016/j.cap.2013.11.051.","short":"F.-Y. Lo, J.-Y. Guo, C.-D. Huang, K.-C. Chou, H.-L. Liu, V. Ney, A. Ney, M.-Y. Chern, S. Shvarkov, D. Reuter, A.D. Wieck, S. Pezzagna, J. Massies, Current Applied Physics 14 (2013) S7–S11.","ieee":"F.-Y. Lo et al., “Evidences of defect contribution in magnetically ordered Sm-implanted GaN,” Current Applied Physics, vol. 14, pp. S7–S11, 2013."},"doi":"10.1016/j.cap.2013.11.051","date_updated":"2022-01-06T07:03:30Z","_id":"7236","intvolume":" 14","date_created":"2019-01-29T12:43:55Z","status":"public","publication_status":"published","publication_identifier":{"issn":["1567-1739"]},"volume":14,"publication":"Current Applied Physics","department":[{"_id":"15"},{"_id":"230"}],"publisher":"Elsevier BV","author":[{"last_name":"Lo","full_name":"Lo, Fang-Yuh","first_name":"Fang-Yuh"},{"full_name":"Guo, Jhong-Yu","first_name":"Jhong-Yu","last_name":"Guo"},{"last_name":"Huang","first_name":"Cheng-De","full_name":"Huang, Cheng-De"},{"first_name":"Kai-Chieh","full_name":"Chou, Kai-Chieh","last_name":"Chou"},{"first_name":"Hsiang-Lin","full_name":"Liu, Hsiang-Lin","last_name":"Liu"},{"last_name":"Ney","first_name":"Verena","full_name":"Ney, Verena"},{"last_name":"Ney","first_name":"Andreas","full_name":"Ney, Andreas"},{"last_name":"Chern","full_name":"Chern, Ming-Yau","first_name":"Ming-Yau"},{"last_name":"Shvarkov","full_name":"Shvarkov, Stepan","first_name":"Stepan"},{"last_name":"Reuter","id":"37763","first_name":"Dirk","full_name":"Reuter, Dirk"},{"last_name":"Wieck","first_name":"Andreas D.","full_name":"Wieck, Andreas D."},{"last_name":"Pezzagna","first_name":"Sébastien","full_name":"Pezzagna, Sébastien"},{"first_name":"Jean","full_name":"Massies, Jean","last_name":"Massies"}],"user_id":"42514","title":"Evidences of defect contribution in magnetically ordered Sm-implanted GaN"},{"year":"2013","citation":{"chicago":"Steinhoff, A., H. Kurtze, P. Gartner, M. Florian, Dirk Reuter, A. D. Wieck, M. Bayer, and F. Jahnke. “Combined Influence of Coulomb Interaction and Polarons on the Carrier Dynamics in InGaAs Quantum Dots.” Physical Review B 88, no. 20 (2013). https://doi.org/10.1103/physrevb.88.205309.","apa":"Steinhoff, A., Kurtze, H., Gartner, P., Florian, M., Reuter, D., Wieck, A. D., … Jahnke, F. (2013). Combined influence of Coulomb interaction and polarons on the carrier dynamics in InGaAs quantum dots. Physical Review B, 88(20). https://doi.org/10.1103/physrevb.88.205309","ama":"Steinhoff A, Kurtze H, Gartner P, et al. Combined influence of Coulomb interaction and polarons on the carrier dynamics in InGaAs quantum dots. Physical Review B. 2013;88(20). doi:10.1103/physrevb.88.205309","bibtex":"@article{Steinhoff_Kurtze_Gartner_Florian_Reuter_Wieck_Bayer_Jahnke_2013, title={Combined influence of Coulomb interaction and polarons on the carrier dynamics in InGaAs quantum dots}, volume={88}, DOI={10.1103/physrevb.88.205309}, number={20}, journal={Physical Review B}, publisher={American Physical Society (APS)}, author={Steinhoff, A. and Kurtze, H. and Gartner, P. and Florian, M. and Reuter, Dirk and Wieck, A. D. and Bayer, M. and Jahnke, F.}, year={2013} }","mla":"Steinhoff, A., et al. “Combined Influence of Coulomb Interaction and Polarons on the Carrier Dynamics in InGaAs Quantum Dots.” Physical Review B, vol. 88, no. 20, American Physical Society (APS), 2013, doi:10.1103/physrevb.88.205309.","short":"A. Steinhoff, H. Kurtze, P. Gartner, M. Florian, D. Reuter, A.D. Wieck, M. Bayer, F. Jahnke, Physical Review B 88 (2013).","ieee":"A. Steinhoff et al., “Combined influence of Coulomb interaction and polarons on the carrier dynamics in InGaAs quantum dots,” Physical Review B, vol. 88, no. 20, 2013."},"type":"journal_article","language":[{"iso":"eng"}],"doi":"10.1103/physrevb.88.205309","issue":"20","_id":"7239","intvolume":" 88","date_updated":"2022-01-06T07:03:30Z","publication_status":"published","publication_identifier":{"issn":["1098-0121","1550-235X"]},"volume":88,"status":"public","date_created":"2019-01-29T14:01:47Z","publisher":"American Physical Society (APS)","author":[{"last_name":"Steinhoff","full_name":"Steinhoff, A.","first_name":"A."},{"last_name":"Kurtze","full_name":"Kurtze, H.","first_name":"H."},{"full_name":"Gartner, P.","first_name":"P.","last_name":"Gartner"},{"last_name":"Florian","full_name":"Florian, M.","first_name":"M."},{"full_name":"Reuter, Dirk","first_name":"Dirk","id":"37763","last_name":"Reuter"},{"last_name":"Wieck","first_name":"A. D.","full_name":"Wieck, A. D."},{"full_name":"Bayer, M.","first_name":"M.","last_name":"Bayer"},{"full_name":"Jahnke, F.","first_name":"F.","last_name":"Jahnke"}],"department":[{"_id":"15"},{"_id":"230"}],"publication":"Physical Review B","title":"Combined influence of Coulomb interaction and polarons on the carrier dynamics in InGaAs quantum dots","user_id":"42514"},{"user_id":"42514","title":"Picosecond real-space imaging of electron spin diffusion in GaAs","date_created":"2019-01-29T14:04:19Z","status":"public","publication_status":"published","volume":88,"publication_identifier":{"issn":["1098-0121","1550-235X"]},"publication":"Physical Review B","department":[{"_id":"15"},{"_id":"230"}],"author":[{"last_name":"Henn","full_name":"Henn, T.","first_name":"T."},{"last_name":"Kiessling","first_name":"T.","full_name":"Kiessling, T."},{"first_name":"W.","full_name":"Ossau, W.","last_name":"Ossau"},{"first_name":"L. W.","full_name":"Molenkamp, L. W.","last_name":"Molenkamp"},{"id":"37763","last_name":"Reuter","full_name":"Reuter, Dirk","first_name":"Dirk"},{"last_name":"Wieck","first_name":"A. D.","full_name":"Wieck, A. D."}],"publisher":"American Physical Society (APS)","issue":"19","doi":"10.1103/physrevb.88.195202","_id":"7240","date_updated":"2022-01-06T07:03:30Z","intvolume":" 88","language":[{"iso":"eng"}],"year":"2013","citation":{"short":"T. Henn, T. Kiessling, W. Ossau, L.W. Molenkamp, D. Reuter, A.D. Wieck, Physical Review B 88 (2013).","ieee":"T. Henn, T. Kiessling, W. Ossau, L. W. Molenkamp, D. Reuter, and A. D. Wieck, “Picosecond real-space imaging of electron spin diffusion in GaAs,” Physical Review B, vol. 88, no. 19, 2013.","chicago":"Henn, T., T. Kiessling, W. Ossau, L. W. Molenkamp, Dirk Reuter, and A. D. Wieck. “Picosecond Real-Space Imaging of Electron Spin Diffusion in GaAs.” Physical Review B 88, no. 19 (2013). https://doi.org/10.1103/physrevb.88.195202.","apa":"Henn, T., Kiessling, T., Ossau, W., Molenkamp, L. W., Reuter, D., & Wieck, A. D. (2013). Picosecond real-space imaging of electron spin diffusion in GaAs. Physical Review B, 88(19). https://doi.org/10.1103/physrevb.88.195202","ama":"Henn T, Kiessling T, Ossau W, Molenkamp LW, Reuter D, Wieck AD. Picosecond real-space imaging of electron spin diffusion in GaAs. Physical Review B. 2013;88(19). doi:10.1103/physrevb.88.195202","mla":"Henn, T., et al. “Picosecond Real-Space Imaging of Electron Spin Diffusion in GaAs.” Physical Review B, vol. 88, no. 19, American Physical Society (APS), 2013, doi:10.1103/physrevb.88.195202.","bibtex":"@article{Henn_Kiessling_Ossau_Molenkamp_Reuter_Wieck_2013, title={Picosecond real-space imaging of electron spin diffusion in GaAs}, volume={88}, DOI={10.1103/physrevb.88.195202}, number={19}, journal={Physical Review B}, publisher={American Physical Society (APS)}, author={Henn, T. and Kiessling, T. and Ossau, W. and Molenkamp, L. W. and Reuter, Dirk and Wieck, A. D.}, year={2013} }"},"type":"journal_article"},{"date_updated":"2022-01-06T07:03:30Z","_id":"7258","intvolume":" 88","issue":"8","doi":"10.1103/physrevb.88.085303","language":[{"iso":"eng"}],"year":"2013","type":"journal_article","citation":{"mla":"Henn, T., et al. “Hot Carrier Effects on the Magneto-Optical Detection of Electron Spins in GaAs.” Physical Review B, vol. 88, no. 8, American Physical Society (APS), 2013, doi:10.1103/physrevb.88.085303.","bibtex":"@article{Henn_Heckel_Beck_Kiessling_Ossau_Molenkamp_Reuter_Wieck_2013, title={Hot carrier effects on the magneto-optical detection of electron spins in GaAs}, volume={88}, DOI={10.1103/physrevb.88.085303}, number={8}, journal={Physical Review B}, publisher={American Physical Society (APS)}, author={Henn, T. and Heckel, A. and Beck, M. and Kiessling, T. and Ossau, W. and Molenkamp, L. W. and Reuter, Dirk and Wieck, A. D.}, year={2013} }","ama":"Henn T, Heckel A, Beck M, et al. Hot carrier effects on the magneto-optical detection of electron spins in GaAs. Physical Review B. 2013;88(8). doi:10.1103/physrevb.88.085303","apa":"Henn, T., Heckel, A., Beck, M., Kiessling, T., Ossau, W., Molenkamp, L. W., … Wieck, A. D. (2013). Hot carrier effects on the magneto-optical detection of electron spins in GaAs. Physical Review B, 88(8). https://doi.org/10.1103/physrevb.88.085303","chicago":"Henn, T., A. Heckel, M. Beck, T. Kiessling, W. Ossau, L. W. Molenkamp, Dirk Reuter, and A. D. Wieck. “Hot Carrier Effects on the Magneto-Optical Detection of Electron Spins in GaAs.” Physical Review B 88, no. 8 (2013). https://doi.org/10.1103/physrevb.88.085303.","ieee":"T. Henn et al., “Hot carrier effects on the magneto-optical detection of electron spins in GaAs,” Physical Review B, vol. 88, no. 8, 2013.","short":"T. Henn, A. Heckel, M. Beck, T. Kiessling, W. Ossau, L.W. Molenkamp, D. Reuter, A.D. Wieck, Physical Review B 88 (2013)."},"user_id":"42514","title":"Hot carrier effects on the magneto-optical detection of electron spins in GaAs","publication":"Physical Review B","department":[{"_id":"15"},{"_id":"230"}],"publisher":"American Physical Society (APS)","author":[{"last_name":"Henn","full_name":"Henn, T.","first_name":"T."},{"first_name":"A.","full_name":"Heckel, A.","last_name":"Heckel"},{"last_name":"Beck","first_name":"M.","full_name":"Beck, M."},{"first_name":"T.","full_name":"Kiessling, T.","last_name":"Kiessling"},{"full_name":"Ossau, W.","first_name":"W.","last_name":"Ossau"},{"last_name":"Molenkamp","full_name":"Molenkamp, L. W.","first_name":"L. W."},{"id":"37763","last_name":"Reuter","full_name":"Reuter, Dirk","first_name":"Dirk"},{"last_name":"Wieck","full_name":"Wieck, A. D.","first_name":"A. D."}],"date_created":"2019-01-30T12:54:43Z","status":"public","publication_identifier":{"issn":["1098-0121","1550-235X"]},"publication_status":"published","volume":88},{"status":"public","date_created":"2019-01-30T12:56:20Z","volume":103,"publisher":"AIP Publishing","author":[{"last_name":"Buß","first_name":"J. H.","full_name":"Buß, J. H."},{"last_name":"Rudolph","full_name":"Rudolph, J.","first_name":"J."},{"first_name":"S.","full_name":"Shvarkov, S.","last_name":"Shvarkov"},{"last_name":"Semond","first_name":"F.","full_name":"Semond, F."},{"full_name":"Reuter, Dirk","first_name":"Dirk","id":"37763","last_name":"Reuter"},{"first_name":"A. D.","full_name":"Wieck, A. D.","last_name":"Wieck"},{"last_name":"Hägele","full_name":"Hägele, D.","first_name":"D."}],"publication":"Applied Physics Letters","user_id":"42514","year":"2013","type":"journal_article","citation":{"short":"J.H. Buß, J. Rudolph, S. Shvarkov, F. Semond, D. Reuter, A.D. Wieck, D. Hägele, Applied Physics Letters 103 (2013).","ieee":"J. H. Buß et al., “Magneto-optical studies of Gd-implanted GaN: No spin alignment of conduction band electrons,” Applied Physics Letters, vol. 103, no. 9, 2013.","chicago":"Buß, J. H., J. Rudolph, S. Shvarkov, F. Semond, Dirk Reuter, A. D. Wieck, and D. Hägele. “Magneto-Optical Studies of Gd-Implanted GaN: No Spin Alignment of Conduction Band Electrons.” Applied Physics Letters 103, no. 9 (2013). https://doi.org/10.1063/1.4819767.","apa":"Buß, J. H., Rudolph, J., Shvarkov, S., Semond, F., Reuter, D., Wieck, A. D., & Hägele, D. (2013). Magneto-optical studies of Gd-implanted GaN: No spin alignment of conduction band electrons. Applied Physics Letters, 103(9). https://doi.org/10.1063/1.4819767","ama":"Buß JH, Rudolph J, Shvarkov S, et al. Magneto-optical studies of Gd-implanted GaN: No spin alignment of conduction band electrons. Applied Physics Letters. 2013;103(9). doi:10.1063/1.4819767","mla":"Buß, J. H., et al. “Magneto-Optical Studies of Gd-Implanted GaN: No Spin Alignment of Conduction Band Electrons.” Applied Physics Letters, vol. 103, no. 9, 092401, AIP Publishing, 2013, doi:10.1063/1.4819767.","bibtex":"@article{Buß_Rudolph_Shvarkov_Semond_Reuter_Wieck_Hägele_2013, title={Magneto-optical studies of Gd-implanted GaN: No spin alignment of conduction band electrons}, volume={103}, DOI={10.1063/1.4819767}, number={9092401}, journal={Applied Physics Letters}, publisher={AIP Publishing}, author={Buß, J. H. and Rudolph, J. and Shvarkov, S. and Semond, F. and Reuter, Dirk and Wieck, A. D. and Hägele, D.}, year={2013} }"},"issue":"9","article_number":"092401","intvolume":" 103","_id":"7259","publication_status":"published","publication_identifier":{"issn":["0003-6951","1077-3118"]},"department":[{"_id":"15"},{"_id":"230"}],"title":"Magneto-optical studies of Gd-implanted GaN: No spin alignment of conduction band electrons","language":[{"iso":"eng"}],"doi":"10.1063/1.4819767","date_updated":"2022-01-06T07:03:30Z"},{"publication_identifier":{"issn":["0953-8984","1361-648X"]},"publication_status":"published","department":[{"_id":"15"},{"_id":"230"}],"title":"The effect of (NH4)2Sxpassivation on the (311)A GaAs surface and its use in AlGaAs/GaAs heterostructure devices","language":[{"iso":"eng"}],"doi":"10.1088/0953-8984/25/32/325304","date_updated":"2022-01-06T07:03:31Z","status":"public","date_created":"2019-01-30T12:57:16Z","volume":25,"publisher":"IOP Publishing","author":[{"first_name":"D J","full_name":"Carrad, D J","last_name":"Carrad"},{"full_name":"Burke, A M","first_name":"A M","last_name":"Burke"},{"full_name":"Reece, P J","first_name":"P J","last_name":"Reece"},{"full_name":"Lyttleton, R W","first_name":"R W","last_name":"Lyttleton"},{"last_name":"Waddington","full_name":"Waddington, D E J","first_name":"D E J"},{"last_name":"Rai","first_name":"A","full_name":"Rai, A"},{"id":"37763","last_name":"Reuter","full_name":"Reuter, Dirk","first_name":"Dirk"},{"first_name":"A D","full_name":"Wieck, A D","last_name":"Wieck"},{"last_name":"Micolich","full_name":"Micolich, A P","first_name":"A P"}],"publication":"Journal of Physics: Condensed Matter","user_id":"42514","type":"journal_article","year":"2013","citation":{"short":"D.J. Carrad, A.M. Burke, P.J. Reece, R.W. Lyttleton, D.E.J. Waddington, A. Rai, D. Reuter, A.D. Wieck, A.P. Micolich, Journal of Physics: Condensed Matter 25 (2013).","ieee":"D. J. Carrad et al., “The effect of (NH4)2Sxpassivation on the (311)A GaAs surface and its use in AlGaAs/GaAs heterostructure devices,” Journal of Physics: Condensed Matter, vol. 25, no. 32, 2013.","chicago":"Carrad, D J, A M Burke, P J Reece, R W Lyttleton, D E J Waddington, A Rai, Dirk Reuter, A D Wieck, and A P Micolich. “The Effect of (NH4)2Sxpassivation on the (311)A GaAs Surface and Its Use in AlGaAs/GaAs Heterostructure Devices.” Journal of Physics: Condensed Matter 25, no. 32 (2013). https://doi.org/10.1088/0953-8984/25/32/325304.","apa":"Carrad, D. J., Burke, A. M., Reece, P. J., Lyttleton, R. W., Waddington, D. E. J., Rai, A., … Micolich, A. P. (2013). The effect of (NH4)2Sxpassivation on the (311)A GaAs surface and its use in AlGaAs/GaAs heterostructure devices. Journal of Physics: Condensed Matter, 25(32). https://doi.org/10.1088/0953-8984/25/32/325304","ama":"Carrad DJ, Burke AM, Reece PJ, et al. The effect of (NH4)2Sxpassivation on the (311)A GaAs surface and its use in AlGaAs/GaAs heterostructure devices. Journal of Physics: Condensed Matter. 2013;25(32). doi:10.1088/0953-8984/25/32/325304","mla":"Carrad, D. J., et al. “The Effect of (NH4)2Sxpassivation on the (311)A GaAs Surface and Its Use in AlGaAs/GaAs Heterostructure Devices.” Journal of Physics: Condensed Matter, vol. 25, no. 32, 325304, IOP Publishing, 2013, doi:10.1088/0953-8984/25/32/325304.","bibtex":"@article{Carrad_Burke_Reece_Lyttleton_Waddington_Rai_Reuter_Wieck_Micolich_2013, title={The effect of (NH4)2Sxpassivation on the (311)A GaAs surface and its use in AlGaAs/GaAs heterostructure devices}, volume={25}, DOI={10.1088/0953-8984/25/32/325304}, number={32325304}, journal={Journal of Physics: Condensed Matter}, publisher={IOP Publishing}, author={Carrad, D J and Burke, A M and Reece, P J and Lyttleton, R W and Waddington, D E J and Rai, A and Reuter, Dirk and Wieck, A D and Micolich, A P}, year={2013} }"},"issue":"32","article_number":"325304","_id":"7260","intvolume":" 25"},{"citation":{"short":"H. Höpfner, C. Fritsche, A. Ludwig, A. Ludwig, F. Stromberg, H. Wende, W. Keune, D. Reuter, A.D. Wieck, N.C. Gerhardt, M.R. Hofmann, Physica Status Solidi (C) 10 (2013) 1214–1217.","ieee":"H. Höpfner et al., “Spin relaxation length in quantum dot spin LEDs,” physica status solidi (c), vol. 10, no. 9, pp. 1214–1217, 2013.","chicago":"Höpfner, Henning, Carola Fritsche, Arne Ludwig, Astrid Ludwig, Frank Stromberg, Heiko Wende, Werner Keune, et al. “Spin Relaxation Length in Quantum Dot Spin LEDs.” Physica Status Solidi (C) 10, no. 9 (2013): 1214–17. https://doi.org/10.1002/pssc.201200689.","apa":"Höpfner, H., Fritsche, C., Ludwig, A., Ludwig, A., Stromberg, F., Wende, H., … Hofmann, M. R. (2013). Spin relaxation length in quantum dot spin LEDs. Physica Status Solidi (C), 10(9), 1214–1217. https://doi.org/10.1002/pssc.201200689","ama":"Höpfner H, Fritsche C, Ludwig A, et al. Spin relaxation length in quantum dot spin LEDs. physica status solidi (c). 2013;10(9):1214-1217. doi:10.1002/pssc.201200689","bibtex":"@article{Höpfner_Fritsche_Ludwig_Ludwig_Stromberg_Wende_Keune_Reuter_Wieck_Gerhardt_et al._2013, title={Spin relaxation length in quantum dot spin LEDs}, volume={10}, DOI={10.1002/pssc.201200689}, number={9}, journal={physica status solidi (c)}, publisher={Wiley}, author={Höpfner, Henning and Fritsche, Carola and Ludwig, Arne and Ludwig, Astrid and Stromberg, Frank and Wende, Heiko and Keune, Werner and Reuter, Dirk and Wieck, Andreas D. and Gerhardt, Nils C. and et al.}, year={2013}, pages={1214–1217} }","mla":"Höpfner, Henning, et al. “Spin Relaxation Length in Quantum Dot Spin LEDs.” Physica Status Solidi (C), vol. 10, no. 9, Wiley, 2013, pp. 1214–17, doi:10.1002/pssc.201200689."},"type":"journal_article","year":"2013","page":"1214-1217","intvolume":" 10","_id":"7261","issue":"9","author":[{"last_name":"Höpfner","full_name":"Höpfner, Henning","first_name":"Henning"},{"first_name":"Carola","full_name":"Fritsche, Carola","last_name":"Fritsche"},{"last_name":"Ludwig","first_name":"Arne","full_name":"Ludwig, Arne"},{"first_name":"Astrid","full_name":"Ludwig, Astrid","last_name":"Ludwig"},{"full_name":"Stromberg, Frank","first_name":"Frank","last_name":"Stromberg"},{"last_name":"Wende","first_name":"Heiko","full_name":"Wende, Heiko"},{"last_name":"Keune","full_name":"Keune, Werner","first_name":"Werner"},{"first_name":"Dirk","full_name":"Reuter, Dirk","last_name":"Reuter","id":"37763"},{"first_name":"Andreas D.","full_name":"Wieck, Andreas D.","last_name":"Wieck"},{"first_name":"Nils C.","full_name":"Gerhardt, Nils C.","last_name":"Gerhardt"},{"full_name":"Hofmann, Martin R.","first_name":"Martin R.","last_name":"Hofmann"}],"publisher":"Wiley","publication":"physica status solidi (c)","volume":10,"status":"public","date_created":"2019-01-30T12:58:14Z","user_id":"42514","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:03:31Z","doi":"10.1002/pssc.201200689","department":[{"_id":"15"},{"_id":"230"}],"publication_status":"published","publication_identifier":{"issn":["1862-6351"]},"title":"Spin relaxation length in quantum dot spin LEDs"}]