[{"type":"conference","citation":{"short":"R. Plattfaut, T. Kohlborn, S. Hofmann, D. Beverungen, B. Niehaves, M. Räckers, J. Becker, in: Proceedings of the 46th Hawaii International Conference on System Sciences, Maui, Hawaii, USA, 2013, pp. 1983--1991.","ieee":"R. Plattfaut et al., “Unravelling (E-)Government Channel Selection: A Quantitative Analysis of Individual Customer Preferences in Germany and Australia,” in Proceedings of the 46th Hawaii International Conference on System Sciences, Maui, Hawaii, USA, 2013, pp. 1983--1991.","chicago":"Plattfaut, Ralf, Thomas Kohlborn, Sara Hofmann, Daniel Beverungen, Björn Niehaves, Michael Räckers, and Jörg Becker. “Unravelling (E-)Government Channel Selection: A Quantitative Analysis of Individual Customer Preferences in Germany and Australia.” In Proceedings of the 46th Hawaii International Conference on System Sciences, 1983--1991. Maui, Hawaii, USA, 2013. https://doi.org/10.1109/HICSS.2013.585.","apa":"Plattfaut, R., Kohlborn, T., Hofmann, S., Beverungen, D., Niehaves, B., Räckers, M., & Becker, J. (2013). Unravelling (E-)Government Channel Selection: A Quantitative Analysis of Individual Customer Preferences in Germany and Australia. In Proceedings of the 46th Hawaii International Conference on System Sciences (pp. 1983--1991). Maui, Hawaii, USA. https://doi.org/10.1109/HICSS.2013.585","ama":"Plattfaut R, Kohlborn T, Hofmann S, et al. Unravelling (E-)Government Channel Selection: A Quantitative Analysis of Individual Customer Preferences in Germany and Australia. In: Proceedings of the 46th Hawaii International Conference on System Sciences. Maui, Hawaii, USA; 2013:1983--1991. doi:10.1109/HICSS.2013.585","bibtex":"@inproceedings{Plattfaut_Kohlborn_Hofmann_Beverungen_Niehaves_Räckers_Becker_2013, place={Maui, Hawaii, USA}, title={Unravelling (E-)Government Channel Selection: A Quantitative Analysis of Individual Customer Preferences in Germany and Australia}, DOI={10.1109/HICSS.2013.585}, booktitle={Proceedings of the 46th Hawaii International Conference on System Sciences}, author={Plattfaut, Ralf and Kohlborn, Thomas and Hofmann, Sara and Beverungen, Daniel and Niehaves, Björn and Räckers, Michael and Becker, Jörg}, year={2013}, pages={1983--1991} }","mla":"Plattfaut, Ralf, et al. “Unravelling (E-)Government Channel Selection: A Quantitative Analysis of Individual Customer Preferences in Germany and Australia.” Proceedings of the 46th Hawaii International Conference on System Sciences, 2013, pp. 1983--1991, doi:10.1109/HICSS.2013.585."},"year":"2013","page":"1983--1991","doi":"10.1109/HICSS.2013.585","date_updated":"2022-01-06T06:59:17Z","_id":"3448","conference":{"location":"Maui, Hawaii, USA","name":"46th Hawaii International Conference on System Sciences"},"status":"public","date_created":"2018-07-05T13:11:11Z","author":[{"last_name":"Plattfaut","first_name":"Ralf","full_name":"Plattfaut, Ralf"},{"full_name":"Kohlborn, Thomas","first_name":"Thomas","last_name":"Kohlborn"},{"full_name":"Hofmann, Sara","first_name":"Sara","last_name":"Hofmann"},{"id":"59677","last_name":"Beverungen","full_name":"Beverungen, Daniel","first_name":"Daniel"},{"first_name":"Björn","full_name":"Niehaves, Björn","last_name":"Niehaves"},{"last_name":"Räckers","full_name":"Räckers, Michael","first_name":"Michael"},{"full_name":"Becker, Jörg","first_name":"Jörg","last_name":"Becker"}],"publication":"Proceedings of the 46th Hawaii International Conference on System Sciences","department":[{"_id":"526"}],"user_id":"21671","title":"Unravelling (E-)Government Channel Selection: A Quantitative Analysis of Individual Customer Preferences in Germany and Australia","place":"Maui, Hawaii, USA"},{"date_updated":"2022-01-06T06:59:19Z","_id":"3494","issue":"3","doi":"10.1504/IJSOM.2013.056796","page":"407--425","type":"journal_article","citation":{"short":"J. Becker, D. Beverungen, D. Breuker, H.-A. Dietrich, H. Peter Rauer, International Journal of Services and Operations Management (2013) 407--425.","ieee":"J. Becker, D. Beverungen, D. Breuker, H.-A. Dietrich, and H. Peter Rauer, “Guidelines for Reporting Productivity Studies: A Review of the Reproducibility of DEA in the Service Sector,” International Journal of Services and Operations Management, no. 3, pp. 407--425, 2013.","apa":"Becker, J., Beverungen, D., Breuker, D., Dietrich, H.-A., & Peter Rauer, H. (2013). Guidelines for Reporting Productivity Studies: A Review of the Reproducibility of DEA in the Service Sector. International Journal of Services and Operations Management, (3), 407--425. https://doi.org/10.1504/IJSOM.2013.056796","ama":"Becker J, Beverungen D, Breuker D, Dietrich H-A, Peter Rauer H. Guidelines for Reporting Productivity Studies: A Review of the Reproducibility of DEA in the Service Sector. International Journal of Services and Operations Management. 2013;(3):407--425. doi:10.1504/IJSOM.2013.056796","chicago":"Becker, Jörg, Daniel Beverungen, Dominic Breuker, Hanns-Alexander Dietrich, and Hans Peter Rauer. “Guidelines for Reporting Productivity Studies: A Review of the Reproducibility of DEA in the Service Sector.” International Journal of Services and Operations Management, no. 3 (2013): 407--425. https://doi.org/10.1504/IJSOM.2013.056796.","mla":"Becker, Jörg, et al. “Guidelines for Reporting Productivity Studies: A Review of the Reproducibility of DEA in the Service Sector.” International Journal of Services and Operations Management, no. 3, 2013, pp. 407--425, doi:10.1504/IJSOM.2013.056796.","bibtex":"@article{Becker_Beverungen_Breuker_Dietrich_Peter Rauer_2013, title={Guidelines for Reporting Productivity Studies: A Review of the Reproducibility of DEA in the Service Sector}, DOI={10.1504/IJSOM.2013.056796}, number={3}, journal={International Journal of Services and Operations Management}, author={Becker, Jörg and Beverungen, Daniel and Breuker, Dominic and Dietrich, Hanns-Alexander and Peter Rauer, Hans}, year={2013}, pages={407--425} }"},"year":"2013","extern":"1","user_id":"21671","title":"Guidelines for Reporting Productivity Studies: A Review of the Reproducibility of DEA in the Service Sector","department":[{"_id":"526"}],"publication":"International Journal of Services and Operations Management","author":[{"last_name":"Becker","first_name":"Jörg","full_name":"Becker, Jörg"},{"full_name":"Beverungen, Daniel","first_name":"Daniel","id":"59677","last_name":"Beverungen"},{"first_name":"Dominic","full_name":"Breuker, Dominic","last_name":"Breuker"},{"last_name":"Dietrich","first_name":"Hanns-Alexander","full_name":"Dietrich, Hanns-Alexander"},{"last_name":"Peter Rauer","first_name":"Hans","full_name":"Peter Rauer, Hans"}],"date_created":"2018-07-06T10:43:10Z","status":"public"},{"title":"Bridging the Gap Between Manufacturing and Service Through IT-Based Boundary Objects","user_id":"21671","date_created":"2018-07-06T10:44:23Z","status":"public","department":[{"_id":"526"}],"publication":"IEEE Transactions on Engineering Management","author":[{"last_name":"Becker","full_name":"Becker, Jörg","first_name":"Jörg"},{"id":"59677","last_name":"Beverungen","full_name":"Beverungen, Daniel","first_name":"Daniel"},{"last_name":"Knackstedt","first_name":"Ralf","full_name":"Knackstedt, Ralf"},{"last_name":"Matzner","full_name":"Matzner, Martin","first_name":"Martin"},{"id":"72849","last_name":"Müller","full_name":"Müller, Oliver","first_name":"Oliver"},{"last_name":"Pöppelbuß","full_name":"Pöppelbuß, Jens","first_name":"Jens"}],"doi":"10.1109/TEM.2012.2214770","issue":"3","date_updated":"2022-01-06T06:59:19Z","_id":"3495","page":"468--482","year":"2013","citation":{"ieee":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuß, “Bridging the Gap Between Manufacturing and Service Through IT-Based Boundary Objects,” IEEE Transactions on Engineering Management, no. 3, pp. 468--482, 2013.","short":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuß, IEEE Transactions on Engineering Management (2013) 468--482.","mla":"Becker, Jörg, et al. “Bridging the Gap Between Manufacturing and Service Through IT-Based Boundary Objects.” IEEE Transactions on Engineering Management, no. 3, 2013, pp. 468--482, doi:10.1109/TEM.2012.2214770.","bibtex":"@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuß_2013, title={Bridging the Gap Between Manufacturing and Service Through IT-Based Boundary Objects}, DOI={10.1109/TEM.2012.2214770}, number={3}, journal={IEEE Transactions on Engineering Management}, author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuß, Jens}, year={2013}, pages={468--482} }","apa":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., & Pöppelbuß, J. (2013). Bridging the Gap Between Manufacturing and Service Through IT-Based Boundary Objects. IEEE Transactions on Engineering Management, (3), 468--482. https://doi.org/10.1109/TEM.2012.2214770","ama":"Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuß J. Bridging the Gap Between Manufacturing and Service Through IT-Based Boundary Objects. IEEE Transactions on Engineering Management. 2013;(3):468--482. doi:10.1109/TEM.2012.2214770","chicago":"Becker, Jörg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver Müller, and Jens Pöppelbuß. “Bridging the Gap Between Manufacturing and Service Through IT-Based Boundary Objects.” IEEE Transactions on Engineering Management, no. 3 (2013): 468--482. https://doi.org/10.1109/TEM.2012.2214770."},"type":"journal_article","language":[{"iso":"eng"}]},{"page":"37--68","citation":{"mla":"Becker, Jörg, et al. “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach.” Scandinavian Journal of Information Systems, no. 1, 2013, pp. 37--68.","bibtex":"@article{Becker_Beverungen_Knackstedt_Matzner_Müller_Pöppelbuß_2013, title={Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach}, number={1}, journal={Scandinavian Journal of Information Systems}, author={Becker, Jörg and Beverungen, Daniel and Knackstedt, Ralf and Matzner, Martin and Müller, Oliver and Pöppelbuß, Jens}, year={2013}, pages={37--68} }","chicago":"Becker, Jörg, Daniel Beverungen, Ralf Knackstedt, Martin Matzner, Oliver Müller, and Jens Pöppelbuß. “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach.” Scandinavian Journal of Information Systems, no. 1 (2013): 37--68.","ama":"Becker J, Beverungen D, Knackstedt R, Matzner M, Müller O, Pöppelbuß J. Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach. Scandinavian Journal of Information Systems. 2013;(1):37--68.","apa":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., Müller, O., & Pöppelbuß, J. (2013). Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach. Scandinavian Journal of Information Systems, (1), 37--68.","ieee":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, and J. Pöppelbuß, “Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach,” Scandinavian Journal of Information Systems, no. 1, pp. 37--68, 2013.","short":"J. Becker, D. Beverungen, R. Knackstedt, M. Matzner, O. Müller, J. Pöppelbuß, Scandinavian Journal of Information Systems (2013) 37--68."},"type":"journal_article","year":"2013","language":[{"iso":"eng"}],"main_file_link":[{"url":"https://aisel.aisnet.org/sjis/vol25/iss1/2/"}],"issue":"1","date_updated":"2022-01-06T06:59:19Z","_id":"3496","date_created":"2018-07-06T10:45:02Z","status":"public","publication":"Scandinavian Journal of Information Systems","department":[{"_id":"526"}],"author":[{"first_name":"Jörg","full_name":"Becker, Jörg","last_name":"Becker"},{"first_name":"Daniel","full_name":"Beverungen, Daniel","last_name":"Beverungen","id":"59677"},{"first_name":"Ralf","full_name":"Knackstedt, Ralf","last_name":"Knackstedt"},{"last_name":"Matzner","full_name":"Matzner, Martin","first_name":"Martin"},{"id":"72849","last_name":"Müller","full_name":"Müller, Oliver","first_name":"Oliver"},{"first_name":"Jens","full_name":"Pöppelbuß, Jens","last_name":"Pöppelbuß"}],"title":"Designing Interaction Routines in Service Networks: A Modularity and Social Construction-Based Approach","user_id":"72849"},{"year":"2013","type":"journal_article","citation":{"apa":"Beverungen, D., Eggert, M., Voigt, M., & Rosemann, M. (2013). Augmenting Analytical CRM Strategies with Social BI. International Journal of Business Intelligence Research (IJBIR), (3), 32--49. https://doi.org/10.4018/ijbir.2013070103","ama":"Beverungen D, Eggert M, Voigt M, Rosemann M. Augmenting Analytical CRM Strategies with Social BI. International Journal of Business Intelligence Research (IJBIR). 2013;(3):32--49. doi:10.4018/ijbir.2013070103","chicago":"Beverungen, Daniel, Mathias Eggert, Matthias Voigt, and Michael Rosemann. “Augmenting Analytical CRM Strategies with Social BI.” International Journal of Business Intelligence Research (IJBIR), no. 3 (2013): 32--49. https://doi.org/10.4018/ijbir.2013070103.","bibtex":"@article{Beverungen_Eggert_Voigt_Rosemann_2013, title={Augmenting Analytical CRM Strategies with Social BI}, DOI={10.4018/ijbir.2013070103}, number={3}, journal={International Journal of Business Intelligence Research (IJBIR)}, author={Beverungen, Daniel and Eggert, Mathias and Voigt, Matthias and Rosemann, Michael}, year={2013}, pages={32--49} }","mla":"Beverungen, Daniel, et al. “Augmenting Analytical CRM Strategies with Social BI.” International Journal of Business Intelligence Research (IJBIR), no. 3, 2013, pp. 32--49, doi:10.4018/ijbir.2013070103.","short":"D. Beverungen, M. Eggert, M. Voigt, M. Rosemann, International Journal of Business Intelligence Research (IJBIR) (2013) 32--49.","ieee":"D. Beverungen, M. Eggert, M. Voigt, and M. Rosemann, “Augmenting Analytical CRM Strategies with Social BI,” International Journal of Business Intelligence Research (IJBIR), no. 3, pp. 32--49, 2013."},"page":"32--49","issue":"3","doi":"10.4018/ijbir.2013070103","_id":"3497","date_updated":"2022-01-06T06:59:19Z","status":"public","date_created":"2018-07-06T10:45:38Z","author":[{"last_name":"Beverungen","id":"59677","first_name":"Daniel","full_name":"Beverungen, Daniel"},{"first_name":"Mathias","full_name":"Eggert, Mathias","last_name":"Eggert"},{"first_name":"Matthias","full_name":"Voigt, Matthias","last_name":"Voigt"},{"last_name":"Rosemann","first_name":"Michael","full_name":"Rosemann, Michael"}],"department":[{"_id":"526"}],"publication":"International Journal of Business Intelligence Research (IJBIR)","user_id":"21671","title":"Augmenting Analytical CRM Strategies with Social BI","extern":"1"},{"citation":{"apa":"Hofmann, S., Beverungen, D., Räckers, M., & Becker, J. (2013). What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook. Government Information Quarterly, (4), 387--396. https://doi.org/10.1016/j.giq.2013.05.013","ama":"Hofmann S, Beverungen D, Räckers M, Becker J. What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook. Government Information Quarterly. 2013;(4):387--396. doi:10.1016/j.giq.2013.05.013","chicago":"Hofmann, Sara, Daniel Beverungen, Michael Räckers, and Jörg Becker. “What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook.” Government Information Quarterly, no. 4 (2013): 387--396. https://doi.org/10.1016/j.giq.2013.05.013.","bibtex":"@article{Hofmann_Beverungen_Räckers_Becker_2013, title={What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook}, DOI={10.1016/j.giq.2013.05.013}, number={4}, journal={Government Information Quarterly}, author={Hofmann, Sara and Beverungen, Daniel and Räckers, Michael and Becker, Jörg}, year={2013}, pages={387--396} }","mla":"Hofmann, Sara, et al. “What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook.” Government Information Quarterly, no. 4, 2013, pp. 387--396, doi:10.1016/j.giq.2013.05.013.","short":"S. Hofmann, D. Beverungen, M. Räckers, J. Becker, Government Information Quarterly (2013) 387--396.","ieee":"S. Hofmann, D. Beverungen, M. Räckers, and J. Becker, “What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook,” Government Information Quarterly, no. 4, pp. 387--396, 2013."},"type":"journal_article","year":"2013","page":"387--396","issue":"4","doi":"10.1016/j.giq.2013.05.013","date_updated":"2022-01-06T06:59:19Z","_id":"3498","status":"public","date_created":"2018-07-06T10:52:33Z","author":[{"last_name":"Hofmann","full_name":"Hofmann, Sara","first_name":"Sara"},{"first_name":"Daniel","full_name":"Beverungen, Daniel","last_name":"Beverungen","id":"59677"},{"last_name":"Räckers","first_name":"Michael","full_name":"Räckers, Michael"},{"last_name":"Becker","first_name":"Jörg","full_name":"Becker, Jörg"}],"department":[{"_id":"526"}],"publication":"Government Information Quarterly","user_id":"21671","title":"What Makes Local Governments' Online Communications Successful? Insights from a Multi-Method Analysis of Facebook","extern":"1"},{"year":"2013","type":"journal_article","citation":{"mla":"Plattfaut, Ralf, et al. “Verwaltungsdienstleistungen Für Personen Mit Eingeschränkter Mobilität: Von Mobilen Bürgerdiensten Zu E-Government?” EGovernment Review, 2013, pp. 14--15.","bibtex":"@article{Plattfaut_Hofmann_Kohlborn_Beverungen_Räckers_Niehaves_Becker_2013, title={Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government?}, journal={eGovernment Review}, author={Plattfaut, Ralf and Hofmann, Sara and Kohlborn, Thomas and Beverungen, Daniel and Räckers, Michael and Niehaves, Björn and Becker, Jörg}, year={2013}, pages={14--15} }","apa":"Plattfaut, R., Hofmann, S., Kohlborn, T., Beverungen, D., Räckers, M., Niehaves, B., & Becker, J. (2013). Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government? EGovernment Review, 14--15.","ama":"Plattfaut R, Hofmann S, Kohlborn T, et al. Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government? eGovernment Review. 2013:14--15.","chicago":"Plattfaut, Ralf, Sara Hofmann, Thomas Kohlborn, Daniel Beverungen, Michael Räckers, Björn Niehaves, and Jörg Becker. “Verwaltungsdienstleistungen Für Personen Mit Eingeschränkter Mobilität: Von Mobilen Bürgerdiensten Zu E-Government?” EGovernment Review, 2013, 14--15.","ieee":"R. Plattfaut et al., “Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government?,” eGovernment Review, pp. 14--15, 2013.","short":"R. Plattfaut, S. Hofmann, T. Kohlborn, D. Beverungen, M. Räckers, B. Niehaves, J. Becker, EGovernment Review (2013) 14--15."},"page":"14--15","date_updated":"2022-01-06T06:59:19Z","_id":"3499","status":"public","date_created":"2018-07-06T10:57:56Z","author":[{"full_name":"Plattfaut, Ralf","first_name":"Ralf","last_name":"Plattfaut"},{"last_name":"Hofmann","full_name":"Hofmann, Sara","first_name":"Sara"},{"last_name":"Kohlborn","first_name":"Thomas","full_name":"Kohlborn, Thomas"},{"last_name":"Beverungen","id":"59677","first_name":"Daniel","full_name":"Beverungen, Daniel"},{"last_name":"Räckers","first_name":"Michael","full_name":"Räckers, Michael"},{"last_name":"Niehaves","first_name":"Björn","full_name":"Niehaves, Björn"},{"last_name":"Becker","first_name":"Jörg","full_name":"Becker, Jörg"}],"publication":"eGovernment Review","department":[{"_id":"526"}],"user_id":"21671","title":"Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government?","extern":"1"},{"page":"145--157","type":"journal_article","citation":{"apa":"Harteis, C., & Billett, S. (2013). Intuitive expertise: Theories and empirical evidence. Educational Research Review, 9, 145--157.","ama":"Harteis C, Billett S. Intuitive expertise: Theories and empirical evidence. Educational Research Review. 2013;9:145--157.","chicago":"Harteis, Christian, and Stephen Billett. “Intuitive Expertise: Theories and Empirical Evidence.” Educational Research Review 9 (2013): 145--157.","mla":"Harteis, Christian, and Stephen Billett. “Intuitive Expertise: Theories and Empirical Evidence.” Educational Research Review, vol. 9, 2013, pp. 145--157.","bibtex":"@article{Harteis_Billett_2013, title={Intuitive expertise: Theories and empirical evidence}, volume={9}, journal={Educational Research Review}, author={Harteis, Christian and Billett, Stephen}, year={2013}, pages={145--157} }","short":"C. Harteis, S. Billett, Educational Research Review 9 (2013) 145--157.","ieee":"C. Harteis and S. Billett, “Intuitive expertise: Theories and empirical evidence,” Educational Research Review, vol. 9, pp. 145--157, 2013."},"year":"2013","date_updated":"2022-01-06T06:59:29Z","_id":"3660","intvolume":" 9","publication":"Educational Research Review","department":[{"_id":"452"}],"author":[{"id":"27503","last_name":"Harteis","orcid":"https://orcid.org/0000-0002-3570-7626","full_name":"Harteis, Christian","first_name":"Christian"},{"last_name":"Billett","full_name":"Billett, Stephen","first_name":"Stephen"}],"volume":9,"date_created":"2018-07-23T12:56:58Z","status":"public","title":"Intuitive expertise: Theories and empirical evidence","user_id":"27503"},{"publication":"Proceedings of the Sixth International Joint Conference on Natural Language Processing","department":[{"_id":"600"}],"author":[{"last_name":"Wachsmuth","id":"3900","first_name":"Henning","full_name":"Wachsmuth, Henning"},{"last_name":"Stein","first_name":"Benno","full_name":"Stein, Benno"},{"full_name":"Engels, Gregor","first_name":"Gregor","last_name":"Engels"}],"date_created":"2018-08-02T13:38:39Z","status":"public","editor":[{"first_name":"Alexander","full_name":"Gelbukh, Alexander","last_name":"Gelbukh"}],"user_id":"82920","title":"Learning Efficient Information Extraction on Heterogeneous Texts","series_title":"Lecture Notes in Computer Science","main_file_link":[{"url":"https://www.aclweb.org/anthology/I13-1061.pdf"}],"language":[{"iso":"eng"}],"page":"534-542","type":"conference","year":"2013","citation":{"short":"H. Wachsmuth, B. Stein, G. Engels, in: A. Gelbukh (Ed.), Proceedings of the Sixth International Joint Conference on Natural Language Processing, 2013, pp. 534–542.","ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Learning Efficient Information Extraction on Heterogeneous Texts,” in Proceedings of the Sixth International Joint Conference on Natural Language Processing, 2013, pp. 534–542.","chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Learning Efficient Information Extraction on Heterogeneous Texts.” In Proceedings of the Sixth International Joint Conference on Natural Language Processing, edited by Alexander Gelbukh, 534–42. Lecture Notes in Computer Science, 2013.","ama":"Wachsmuth H, Stein B, Engels G. Learning Efficient Information Extraction on Heterogeneous Texts. In: Gelbukh A, ed. Proceedings of the Sixth International Joint Conference on Natural Language Processing. Lecture Notes in Computer Science. ; 2013:534-542.","apa":"Wachsmuth, H., Stein, B., & Engels, G. (2013). Learning Efficient Information Extraction on Heterogeneous Texts. In A. Gelbukh (Ed.), Proceedings of the Sixth International Joint Conference on Natural Language Processing (pp. 534–542).","mla":"Wachsmuth, Henning, et al. “Learning Efficient Information Extraction on Heterogeneous Texts.” Proceedings of the Sixth International Joint Conference on Natural Language Processing, edited by Alexander Gelbukh, 2013, pp. 534–42.","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2013, series={Lecture Notes in Computer Science}, title={Learning Efficient Information Extraction on Heterogeneous Texts}, booktitle={Proceedings of the Sixth International Joint Conference on Natural Language Processing}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={534–542}, collection={Lecture Notes in Computer Science} }"},"_id":"3813","date_updated":"2022-01-06T06:59:37Z"},{"date_updated":"2022-01-06T06:59:37Z","_id":"3814","main_file_link":[{"url":"https://dl.acm.org/doi/pdf/10.1145/2505515.2505557"}],"language":[{"iso":"eng"}],"type":"conference","year":"2013","citation":{"chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Information Extraction as a Filtering Task.” In Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management, 2049–58, 2013.","apa":"Wachsmuth, H., Stein, B., & Engels, G. (2013). Information Extraction as a Filtering Task. In Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management (pp. 2049–2058).","ama":"Wachsmuth H, Stein B, Engels G. Information Extraction as a Filtering Task. In: Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management. ; 2013:2049-2058.","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2013, title={Information Extraction as a Filtering Task}, booktitle={Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, year={2013}, pages={2049–2058} }","mla":"Wachsmuth, Henning, et al. “Information Extraction as a Filtering Task.” Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management, 2013, pp. 2049–58.","short":"H. Wachsmuth, B. Stein, G. Engels, in: Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management, 2013, pp. 2049–2058.","ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Information Extraction as a Filtering Task,” in Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management, 2013, pp. 2049–2058."},"page":"2049-2058","user_id":"82920","title":"Information Extraction as a Filtering Task","author":[{"id":"3900","last_name":"Wachsmuth","full_name":"Wachsmuth, Henning","first_name":"Henning"},{"full_name":"Stein, Benno","first_name":"Benno","last_name":"Stein"},{"last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"}],"department":[{"_id":"600"}],"publication":"Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management","status":"public","date_created":"2018-08-02T13:38:40Z","publication_identifier":{"isbn":["978-1-4503-2263-8"]}},{"_id":"3876","date_updated":"2022-01-06T06:59:47Z","type":"conference","year":"2013","citation":{"bibtex":"@inproceedings{Wachsmuth_Rose_Engels_2013, series={Lecture Notes in Computer Science}, title={Automatic Pipeline Construction for Real-Time Annotation}, booktitle={14th International Conference on Intelligent Text Processing and Computational Linguistics}, author={Wachsmuth, Henning and Rose, Mirko and Engels, Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={38–49}, collection={Lecture Notes in Computer Science} }","mla":"Wachsmuth, Henning, et al. “Automatic Pipeline Construction for Real-Time Annotation.” 14th International Conference on Intelligent Text Processing and Computational Linguistics, edited by Alexander Gelbukh, 2013, pp. 38–49.","chicago":"Wachsmuth, Henning, Mirko Rose, and Gregor Engels. “Automatic Pipeline Construction for Real-Time Annotation.” In 14th International Conference on Intelligent Text Processing and Computational Linguistics, edited by Alexander Gelbukh, 38–49. Lecture Notes in Computer Science, 2013.","apa":"Wachsmuth, H., Rose, M., & Engels, G. (2013). Automatic Pipeline Construction for Real-Time Annotation. In A. Gelbukh (Ed.), 14th International Conference on Intelligent Text Processing and Computational Linguistics (pp. 38–49).","ama":"Wachsmuth H, Rose M, Engels G. Automatic Pipeline Construction for Real-Time Annotation. In: Gelbukh A, ed. 14th International Conference on Intelligent Text Processing and Computational Linguistics. Lecture Notes in Computer Science. ; 2013:38-49.","ieee":"H. Wachsmuth, M. Rose, and G. Engels, “Automatic Pipeline Construction for Real-Time Annotation,” in 14th International Conference on Intelligent Text Processing and Computational Linguistics, 2013, pp. 38–49.","short":"H. Wachsmuth, M. Rose, G. Engels, in: A. Gelbukh (Ed.), 14th International Conference on Intelligent Text Processing and Computational Linguistics, 2013, pp. 38–49."},"page":"38-49","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","main_file_link":[{"url":"https://webis.de/downloads/publications/papers/wachsmuth_2013.pdf"}],"title":"Automatic Pipeline Construction for Real-Time Annotation","user_id":"82920","editor":[{"full_name":"Gelbukh, Alexander","first_name":"Alexander","last_name":"Gelbukh"}],"status":"public","date_created":"2018-08-11T16:12:29Z","author":[{"id":"3900","last_name":"Wachsmuth","full_name":"Wachsmuth, Henning","first_name":"Henning"},{"full_name":"Rose, Mirko","first_name":"Mirko","last_name":"Rose"},{"first_name":"Gregor","full_name":"Engels, Gregor","last_name":"Engels"}],"department":[{"_id":"600"}],"publication":"14th International Conference on Intelligent Text Processing and Computational Linguistics"},{"main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12721"}],"supervisor":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"}],"type":"dissertation","citation":{"apa":"Kuntze, D. (2013). Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn.","ama":"Kuntze D. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn; 2013.","chicago":"Kuntze, Daniel. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn, 2013.","bibtex":"@book{Kuntze_2013, title={Practical algorithms for clustering and modeling large data sets - Analysis and improvements}, publisher={Universität Paderborn}, author={Kuntze, Daniel}, year={2013} }","mla":"Kuntze, Daniel. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn, 2013.","short":"D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.","ieee":"D. Kuntze, Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn, 2013."},"year":"2013","_id":"2909","date_updated":"2022-01-06T06:58:46Z","publisher":"Universität Paderborn","author":[{"first_name":"Daniel","full_name":"Kuntze, Daniel","last_name":"Kuntze"}],"department":[{"_id":"64"}],"status":"public","date_created":"2018-05-25T10:07:42Z","user_id":"25078","title":"Practical algorithms for clustering and modeling large data sets - Analysis and improvements"},{"date_created":"2018-05-25T11:42:38Z","status":"public","department":[{"_id":"64"}],"author":[{"last_name":"Juhnke","id":"48090","first_name":"Jakob","full_name":"Juhnke, Jakob"},{"full_name":"Lefmann, Hanno","first_name":"Hanno","last_name":"Lefmann"},{"last_name":"Strehl","first_name":"Volker","full_name":"Strehl, Volker"}],"publisher":"Fortschritt-Berichte VDI","user_id":"48090","title":"An Approach for Determining Optimal Contrast in Visual Cryptography","extern":"1","year":"2013","type":"report","citation":{"short":"J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography, Fortschritt-Berichte VDI, 2013.","ieee":"J. Juhnke, H. Lefmann, and V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI, 2013.","apa":"Juhnke, J., Lefmann, H., & Strehl, V. (2013). An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI.","ama":"Juhnke J, Lefmann H, Strehl V. An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI; 2013.","chicago":"Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI, 2013.","mla":"Juhnke, Jakob, et al. An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI, 2013.","bibtex":"@book{Juhnke_Lefmann_Strehl_2013, title={An Approach for Determining Optimal Contrast in Visual Cryptography}, publisher={Fortschritt-Berichte VDI}, author={Juhnke, Jakob and Lefmann, Hanno and Strehl, Volker}, year={2013} }"},"date_updated":"2022-01-06T06:58:47Z","_id":"2917"},{"publisher":"Springer Berlin Heidelberg","author":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"},{"full_name":"Günther, Peter","first_name":"Peter","last_name":"Günther"},{"last_name":"Liske","full_name":"Liske, Gennadij","first_name":"Gennadij"}],"department":[{"_id":"64"}],"publication":"Constructive Side-Channel Analysis and Secure Design","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642400254","9783642400261"]},"publication_status":"published","status":"public","date_created":"2018-06-05T07:33:22Z","place":"Berlin, Heidelberg","title":"Improved Side Channel Attacks on Pairing Based Cryptography","user_id":"25078","year":"2013","type":"book_chapter","citation":{"short":"J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.","ieee":"J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in Constructive Side-Channel Analysis and Secure Design, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In Constructive Side-Channel Analysis and Secure Design, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-40026-1_10.","ama":"Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: Constructive Side-Channel Analysis and Secure Design. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:10.1007/978-3-642-40026-1_10","apa":"Blömer, J., Günther, P., & Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In Constructive Side-Channel Analysis and Secure Design (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40026-1_10","bibtex":"@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved Side Channel Attacks on Pairing Based Cryptography}, DOI={10.1007/978-3-642-40026-1_10}, booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2013}, pages={154–168} }","mla":"Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.” Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, 2013, pp. 154–68, doi:10.1007/978-3-642-40026-1_10."},"page":"154-168","_id":"2979","date_updated":"2022-01-06T06:58:49Z","doi":"10.1007/978-3-642-40026-1_10"},{"doi":"10.1007/s00145-012-9120-y","issue":"2","date_updated":"2022-01-06T06:58:57Z","_id":"3129","type":"journal_article","citation":{"mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2, 2013, pp. 225--245, doi:10.1007/s00145-012-9120-y.","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/s00145-012-9120-y}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2 (2013): 225--245. https://doi.org/10.1007/s00145-012-9120-y.","ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J Cryptology. 2013;(2):225--245. doi:10.1007/s00145-012-9120-y","apa":"Jager, T., & Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptology, (2), 225--245. https://doi.org/10.1007/s00145-012-9120-y","ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” J. Cryptology, no. 2, pp. 225--245, 2013.","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245."},"year":"2013","page":"225--245","title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","user_id":"38235","extern":"1","status":"public","date_created":"2018-06-07T09:22:18Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"},{"last_name":"Schwenk","first_name":"Jörg","full_name":"Schwenk, Jörg"}],"publication":"J. Cryptology","department":[{"_id":"558"}]},{"extern":"1","title":"Practical Signatures from Standard Assumptions","user_id":"38235","publication":"Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings","department":[{"_id":"558"}],"author":[{"last_name":"Böhl","first_name":"Florian","full_name":"Böhl, Florian"},{"last_name":"Hofheinz","first_name":"Dennis","full_name":"Hofheinz, Dennis"},{"last_name":"Jager","id":"64669","first_name":"Tibor","full_name":"Jager, Tibor"},{"first_name":"Jessica","full_name":"Koch, Jessica","last_name":"Koch"},{"full_name":"Hong Seo, Jae","first_name":"Jae","last_name":"Hong Seo"},{"first_name":"Christoph","full_name":"Striecks, Christoph","last_name":"Striecks"}],"date_created":"2018-06-07T09:22:39Z","status":"public","date_updated":"2022-01-06T06:58:58Z","_id":"3130","doi":"10.1007/978-3-642-38348-9_28","page":"461--485","citation":{"ieee":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical Signatures from Standard Assumptions,” in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.","short":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.","mla":"Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485, doi:10.1007/978-3-642-38348-9_28.","bibtex":"@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical Signatures from Standard Assumptions}, DOI={10.1007/978-3-642-38348-9_28}, booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}, year={2013}, pages={461--485} }","chicago":"Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 461--485, 2013. https://doi.org/10.1007/978-3-642-38348-9_28.","ama":"Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. ; 2013:461--485. doi:10.1007/978-3-642-38348-9_28","apa":"Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., & Striecks, C. (2013). Practical Signatures from Standard Assumptions. In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 461--485). https://doi.org/10.1007/978-3-642-38348-9_28"},"type":"conference","year":"2013"},{"user_id":"38235","title":"One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography","extern":"1","status":"public","date_created":"2018-06-07T09:23:49Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"},{"full_name":"Paterson, Kenneth G.","first_name":"Kenneth G.","last_name":"Paterson"},{"last_name":"Somorovsky","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"department":[{"_id":"558"}],"publication":"20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013","date_updated":"2022-01-06T06:58:58Z","_id":"3131","citation":{"bibtex":"@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2013} }","mla":"Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.","chicago":"Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.","apa":"Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.","ama":"Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013. ; 2013.","ieee":"T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography,” in 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.","short":"T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013."},"type":"conference","year":"2013"},{"doi":"10.1007/978-3-642-38592-6_13","date_updated":"2022-01-06T06:59:02Z","_id":"3176","citation":{"bibtex":"@inproceedings{Isenberg_Steenken_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={Bounded Model Checking of Graph Transformation Systems via {SMT} Solving}, DOI={10.1007/978-3-642-38592-6_13}, booktitle={Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings}, author={Isenberg, Tobias and Steenken, Dominik and Wehrheim, Heike}, editor={Beyer, Dirk and Boreale, MicheleEditors}, year={2013}, pages={178--192}, collection={Lecture Notes in Computer Science} }","mla":"Isenberg, Tobias, et al. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, edited by Dirk Beyer and Michele Boreale, 2013, pp. 178--192, doi:10.1007/978-3-642-38592-6_13.","apa":"Isenberg, T., Steenken, D., & Wehrheim, H. (2013). Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In D. Beyer & M. Boreale (Eds.), Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings (pp. 178--192). https://doi.org/10.1007/978-3-642-38592-6_13","ama":"Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings. Lecture Notes in Computer Science. ; 2013:178--192. doi:10.1007/978-3-642-38592-6_13","chicago":"Isenberg, Tobias, Dominik Steenken, and Heike Wehrheim. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” In Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, edited by Dirk Beyer and Michele Boreale, 178--192. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-642-38592-6_13.","ieee":"T. Isenberg, D. Steenken, and H. Wehrheim, “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving,” in Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, 2013, pp. 178--192.","short":"T. Isenberg, D. Steenken, H. Wehrheim, in: D. Beyer, M. Boreale (Eds.), Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, 2013, pp. 178--192."},"year":"2013","type":"conference","page":"178--192","series_title":"Lecture Notes in Computer Science","user_id":"29719","title":"Bounded Model Checking of Graph Transformation Systems via {SMT} Solving","status":"public","date_created":"2018-06-13T08:08:39Z","editor":[{"last_name":"Beyer","full_name":"Beyer, Dirk","first_name":"Dirk"},{"first_name":"Michele","full_name":"Boreale, Michele","last_name":"Boreale"}],"author":[{"full_name":"Isenberg, Tobias","first_name":"Tobias","last_name":"Isenberg"},{"last_name":"Steenken","full_name":"Steenken, Dominik","first_name":"Dominik"},{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"department":[{"_id":"77"}],"publication":"Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings"},{"title":"{SPIN} as a Linearizability Checker under Weak Memory Models","user_id":"29719","editor":[{"first_name":"Valeria","full_name":"Bertacco, Valeria","last_name":"Bertacco"},{"last_name":"Legay","first_name":"Axel","full_name":"Legay, Axel"}],"status":"public","date_created":"2018-06-13T08:09:44Z","author":[{"full_name":"Travkin, Oleg","first_name":"Oleg","last_name":"Travkin"},{"full_name":"Mütze, Annika","first_name":"Annika","last_name":"Mütze"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim","id":"573"}],"publication":"Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings","department":[{"_id":"77"}],"doi":"10.1007/978-3-319-03077-7_21","_id":"3177","date_updated":"2022-01-06T06:59:02Z","type":"conference","year":"2013","citation":{"mla":"Travkin, Oleg, et al. “{SPIN} as a Linearizability Checker under Weak Memory Models.” Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, edited by Valeria Bertacco and Axel Legay, 2013, pp. 311--326, doi:10.1007/978-3-319-03077-7_21.","bibtex":"@inproceedings{Travkin_Mütze_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={{SPIN} as a Linearizability Checker under Weak Memory Models}, DOI={10.1007/978-3-319-03077-7_21}, booktitle={Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings}, author={Travkin, Oleg and Mütze, Annika and Wehrheim, Heike}, editor={Bertacco, Valeria and Legay, AxelEditors}, year={2013}, pages={311--326}, collection={Lecture Notes in Computer Science} }","chicago":"Travkin, Oleg, Annika Mütze, and Heike Wehrheim. “{SPIN} as a Linearizability Checker under Weak Memory Models.” In Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, edited by Valeria Bertacco and Axel Legay, 311--326. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-319-03077-7_21.","apa":"Travkin, O., Mütze, A., & Wehrheim, H. (2013). {SPIN} as a Linearizability Checker under Weak Memory Models. In V. Bertacco & A. Legay (Eds.), Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings (pp. 311--326). https://doi.org/10.1007/978-3-319-03077-7_21","ama":"Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under Weak Memory Models. In: Bertacco V, Legay A, eds. Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings. Lecture Notes in Computer Science. ; 2013:311--326. doi:10.1007/978-3-319-03077-7_21","ieee":"O. Travkin, A. Mütze, and H. Wehrheim, “{SPIN} as a Linearizability Checker under Weak Memory Models,” in Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013, pp. 311--326.","short":"O. Travkin, A. Mütze, H. Wehrheim, in: V. Bertacco, A. Legay (Eds.), Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013, pp. 311--326."},"page":"311--326","series_title":"Lecture Notes in Computer Science"},{"title":"A High-Level Semantics for Program Execution under Total Store Order Memory","user_id":"29719","editor":[{"first_name":"Zhiming","full_name":"Liu, Zhiming","last_name":"Liu"},{"last_name":"Woodcock","first_name":"Jim","full_name":"Woodcock, Jim"},{"last_name":"Zhu","first_name":"Huibiao","full_name":"Zhu, Huibiao"}],"status":"public","date_created":"2018-06-13T08:13:31Z","author":[{"first_name":"Brijesh","full_name":"Dongol, Brijesh","last_name":"Dongol"},{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"first_name":"John","full_name":"Derrick, John","last_name":"Derrick"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"publication":"Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings","department":[{"_id":"77"}],"doi":"10.1007/978-3-642-39718-9_11","_id":"3178","date_updated":"2022-01-06T06:59:02Z","citation":{"ama":"Dongol B, Travkin O, Derrick J, Wehrheim H. A High-Level Semantics for Program Execution under Total Store Order Memory. In: Liu Z, Woodcock J, Zhu H, eds. Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings. Lecture Notes in Computer Science. ; 2013:177--194. doi:10.1007/978-3-642-39718-9_11","apa":"Dongol, B., Travkin, O., Derrick, J., & Wehrheim, H. (2013). A High-Level Semantics for Program Execution under Total Store Order Memory. In Z. Liu, J. Woodcock, & H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings (pp. 177--194). https://doi.org/10.1007/978-3-642-39718-9_11","chicago":"Dongol, Brijesh, Oleg Travkin, John Derrick, and Heike Wehrheim. “A High-Level Semantics for Program Execution under Total Store Order Memory.” In Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, edited by Zhiming Liu, Jim Woodcock, and Huibiao Zhu, 177--194. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-642-39718-9_11.","bibtex":"@inproceedings{Dongol_Travkin_Derrick_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={A High-Level Semantics for Program Execution under Total Store Order Memory}, DOI={10.1007/978-3-642-39718-9_11}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, author={Dongol, Brijesh and Travkin, Oleg and Derrick, John and Wehrheim, Heike}, editor={Liu, Zhiming and Woodcock, Jim and Zhu, HuibiaoEditors}, year={2013}, pages={177--194}, collection={Lecture Notes in Computer Science} }","mla":"Dongol, Brijesh, et al. “A High-Level Semantics for Program Execution under Total Store Order Memory.” Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, edited by Zhiming Liu et al., 2013, pp. 177--194, doi:10.1007/978-3-642-39718-9_11.","short":"B. Dongol, O. Travkin, J. Derrick, H. Wehrheim, in: Z. Liu, J. Woodcock, H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194.","ieee":"B. Dongol, O. Travkin, J. Derrick, and H. Wehrheim, “A High-Level Semantics for Program Execution under Total Store Order Memory,” in Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194."},"type":"conference","year":"2013","page":"177--194","series_title":"Lecture Notes in Computer Science"}]