[{"_id":"3497","user_id":"21671","department":[{"_id":"526"}],"extern":"1","type":"journal_article","publication":"International Journal of Business Intelligence Research (IJBIR)","status":"public","date_updated":"2022-01-06T06:59:19Z","author":[{"first_name":"Daniel","full_name":"Beverungen, Daniel","id":"59677","last_name":"Beverungen"},{"first_name":"Mathias","last_name":"Eggert","full_name":"Eggert, Mathias"},{"first_name":"Matthias","full_name":"Voigt, Matthias","last_name":"Voigt"},{"full_name":"Rosemann, Michael","last_name":"Rosemann","first_name":"Michael"}],"date_created":"2018-07-06T10:45:38Z","title":"Augmenting Analytical CRM Strategies with Social BI","doi":"10.4018/ijbir.2013070103","issue":"3","year":"2013","citation":{"ama":"Beverungen D, Eggert M, Voigt M, Rosemann M. Augmenting Analytical CRM Strategies with Social BI. <i>International Journal of Business Intelligence Research (IJBIR)</i>. 2013;(3):32--49. doi:<a href=\"https://doi.org/10.4018/ijbir.2013070103\">10.4018/ijbir.2013070103</a>","ieee":"D. Beverungen, M. Eggert, M. Voigt, and M. Rosemann, “Augmenting Analytical CRM Strategies with Social BI,” <i>International Journal of Business Intelligence Research (IJBIR)</i>, no. 3, pp. 32--49, 2013.","chicago":"Beverungen, Daniel, Mathias Eggert, Matthias Voigt, and Michael Rosemann. “Augmenting Analytical CRM Strategies with Social BI.” <i>International Journal of Business Intelligence Research (IJBIR)</i>, no. 3 (2013): 32--49. <a href=\"https://doi.org/10.4018/ijbir.2013070103\">https://doi.org/10.4018/ijbir.2013070103</a>.","apa":"Beverungen, D., Eggert, M., Voigt, M., &#38; Rosemann, M. (2013). Augmenting Analytical CRM Strategies with Social BI. <i>International Journal of Business Intelligence Research (IJBIR)</i>, (3), 32--49. <a href=\"https://doi.org/10.4018/ijbir.2013070103\">https://doi.org/10.4018/ijbir.2013070103</a>","short":"D. Beverungen, M. Eggert, M. Voigt, M. Rosemann, International Journal of Business Intelligence Research (IJBIR) (2013) 32--49.","bibtex":"@article{Beverungen_Eggert_Voigt_Rosemann_2013, title={Augmenting Analytical CRM Strategies with Social BI}, DOI={<a href=\"https://doi.org/10.4018/ijbir.2013070103\">10.4018/ijbir.2013070103</a>}, number={3}, journal={International Journal of Business Intelligence Research (IJBIR)}, author={Beverungen, Daniel and Eggert, Mathias and Voigt, Matthias and Rosemann, Michael}, year={2013}, pages={32--49} }","mla":"Beverungen, Daniel, et al. “Augmenting Analytical CRM Strategies with Social BI.” <i>International Journal of Business Intelligence Research (IJBIR)</i>, no. 3, 2013, pp. 32--49, doi:<a href=\"https://doi.org/10.4018/ijbir.2013070103\">10.4018/ijbir.2013070103</a>."},"page":"32--49"},{"user_id":"21671","department":[{"_id":"526"}],"_id":"3498","extern":"1","type":"journal_article","publication":"Government Information Quarterly","status":"public","date_created":"2018-07-06T10:52:33Z","author":[{"first_name":"Sara","full_name":"Hofmann, Sara","last_name":"Hofmann"},{"id":"59677","full_name":"Beverungen, Daniel","last_name":"Beverungen","first_name":"Daniel"},{"full_name":"Räckers, Michael","last_name":"Räckers","first_name":"Michael"},{"first_name":"Jörg","last_name":"Becker","full_name":"Becker, Jörg"}],"date_updated":"2022-01-06T06:59:19Z","doi":"10.1016/j.giq.2013.05.013","title":"What Makes Local Governments' Online Communications Successful? Insights from a Multi-Method Analysis of Facebook","issue":"4","citation":{"apa":"Hofmann, S., Beverungen, D., Räckers, M., &#38; Becker, J. (2013). What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook. <i>Government Information Quarterly</i>, (4), 387--396. <a href=\"https://doi.org/10.1016/j.giq.2013.05.013\">https://doi.org/10.1016/j.giq.2013.05.013</a>","short":"S. Hofmann, D. Beverungen, M. Räckers, J. Becker, Government Information Quarterly (2013) 387--396.","mla":"Hofmann, Sara, et al. “What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook.” <i>Government Information Quarterly</i>, no. 4, 2013, pp. 387--396, doi:<a href=\"https://doi.org/10.1016/j.giq.2013.05.013\">10.1016/j.giq.2013.05.013</a>.","bibtex":"@article{Hofmann_Beverungen_Räckers_Becker_2013, title={What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook}, DOI={<a href=\"https://doi.org/10.1016/j.giq.2013.05.013\">10.1016/j.giq.2013.05.013</a>}, number={4}, journal={Government Information Quarterly}, author={Hofmann, Sara and Beverungen, Daniel and Räckers, Michael and Becker, Jörg}, year={2013}, pages={387--396} }","chicago":"Hofmann, Sara, Daniel Beverungen, Michael Räckers, and Jörg Becker. “What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook.” <i>Government Information Quarterly</i>, no. 4 (2013): 387--396. <a href=\"https://doi.org/10.1016/j.giq.2013.05.013\">https://doi.org/10.1016/j.giq.2013.05.013</a>.","ieee":"S. Hofmann, D. Beverungen, M. Räckers, and J. Becker, “What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook,” <i>Government Information Quarterly</i>, no. 4, pp. 387--396, 2013.","ama":"Hofmann S, Beverungen D, Räckers M, Becker J. What Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method Analysis of Facebook. <i>Government Information Quarterly</i>. 2013;(4):387--396. doi:<a href=\"https://doi.org/10.1016/j.giq.2013.05.013\">10.1016/j.giq.2013.05.013</a>"},"page":"387--396","year":"2013"},{"type":"journal_article","publication":"eGovernment Review","status":"public","_id":"3499","user_id":"21671","department":[{"_id":"526"}],"extern":"1","year":"2013","citation":{"bibtex":"@article{Plattfaut_Hofmann_Kohlborn_Beverungen_Räckers_Niehaves_Becker_2013, title={Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government?}, journal={eGovernment Review}, author={Plattfaut, Ralf and Hofmann, Sara and Kohlborn, Thomas and Beverungen, Daniel and Räckers, Michael and Niehaves, Björn and Becker, Jörg}, year={2013}, pages={14--15} }","short":"R. Plattfaut, S. Hofmann, T. Kohlborn, D. Beverungen, M. Räckers, B. Niehaves, J. Becker, EGovernment Review (2013) 14--15.","mla":"Plattfaut, Ralf, et al. “Verwaltungsdienstleistungen Für Personen Mit Eingeschränkter Mobilität: Von Mobilen Bürgerdiensten Zu E-Government?” <i>EGovernment Review</i>, 2013, pp. 14--15.","apa":"Plattfaut, R., Hofmann, S., Kohlborn, T., Beverungen, D., Räckers, M., Niehaves, B., &#38; Becker, J. (2013). Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government? <i>EGovernment Review</i>, 14--15.","ama":"Plattfaut R, Hofmann S, Kohlborn T, et al. Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government? <i>eGovernment Review</i>. 2013:14--15.","ieee":"R. Plattfaut <i>et al.</i>, “Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government?,” <i>eGovernment Review</i>, pp. 14--15, 2013.","chicago":"Plattfaut, Ralf, Sara Hofmann, Thomas Kohlborn, Daniel Beverungen, Michael Räckers, Björn Niehaves, and Jörg Becker. “Verwaltungsdienstleistungen Für Personen Mit Eingeschränkter Mobilität: Von Mobilen Bürgerdiensten Zu E-Government?” <i>EGovernment Review</i>, 2013, 14--15."},"page":"14--15","date_updated":"2022-01-06T06:59:19Z","author":[{"first_name":"Ralf","last_name":"Plattfaut","full_name":"Plattfaut, Ralf"},{"full_name":"Hofmann, Sara","last_name":"Hofmann","first_name":"Sara"},{"first_name":"Thomas","last_name":"Kohlborn","full_name":"Kohlborn, Thomas"},{"first_name":"Daniel","last_name":"Beverungen","id":"59677","full_name":"Beverungen, Daniel"},{"first_name":"Michael","last_name":"Räckers","full_name":"Räckers, Michael"},{"first_name":"Björn","full_name":"Niehaves, Björn","last_name":"Niehaves"},{"first_name":"Jörg","last_name":"Becker","full_name":"Becker, Jörg"}],"date_created":"2018-07-06T10:57:56Z","title":"Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government?"},{"volume":9,"date_created":"2018-07-23T12:56:58Z","author":[{"orcid":"https://orcid.org/0000-0002-3570-7626","last_name":"Harteis","id":"27503","full_name":"Harteis, Christian","first_name":"Christian"},{"full_name":"Billett, Stephen","last_name":"Billett","first_name":"Stephen"}],"date_updated":"2022-01-06T06:59:29Z","title":"Intuitive expertise: Theories and empirical evidence","intvolume":"         9","page":"145--157","citation":{"ama":"Harteis C, Billett S. Intuitive expertise: Theories and empirical evidence. <i>Educational Research Review</i>. 2013;9:145--157.","ieee":"C. Harteis and S. Billett, “Intuitive expertise: Theories and empirical evidence,” <i>Educational Research Review</i>, vol. 9, pp. 145--157, 2013.","chicago":"Harteis, Christian, and Stephen Billett. “Intuitive Expertise: Theories and Empirical Evidence.” <i>Educational Research Review</i> 9 (2013): 145--157.","apa":"Harteis, C., &#38; Billett, S. (2013). Intuitive expertise: Theories and empirical evidence. <i>Educational Research Review</i>, <i>9</i>, 145--157.","mla":"Harteis, Christian, and Stephen Billett. “Intuitive Expertise: Theories and Empirical Evidence.” <i>Educational Research Review</i>, vol. 9, 2013, pp. 145--157.","bibtex":"@article{Harteis_Billett_2013, title={Intuitive expertise: Theories and empirical evidence}, volume={9}, journal={Educational Research Review}, author={Harteis, Christian and Billett, Stephen}, year={2013}, pages={145--157} }","short":"C. Harteis, S. Billett, Educational Research Review 9 (2013) 145--157."},"year":"2013","department":[{"_id":"452"}],"user_id":"27503","_id":"3660","publication":"Educational Research Review","type":"journal_article","status":"public"},{"status":"public","editor":[{"full_name":"Gelbukh, Alexander","last_name":"Gelbukh","first_name":"Alexander"}],"type":"conference","publication":"Proceedings of the Sixth International Joint Conference on Natural Language Processing","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","user_id":"82920","department":[{"_id":"600"}],"_id":"3813","citation":{"apa":"Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Learning Efficient Information Extraction on Heterogeneous Texts. In A. Gelbukh (Ed.), <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i> (pp. 534–542).","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2013, series={Lecture Notes in Computer Science}, title={Learning Efficient Information Extraction on Heterogeneous Texts}, booktitle={Proceedings of the Sixth International Joint Conference on Natural Language Processing}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={534–542}, collection={Lecture Notes in Computer Science} }","mla":"Wachsmuth, Henning, et al. “Learning Efficient Information Extraction on Heterogeneous Texts.” <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, edited by Alexander Gelbukh, 2013, pp. 534–42.","short":"H. Wachsmuth, B. Stein, G. Engels, in: A. Gelbukh (Ed.), Proceedings of the Sixth International Joint Conference on Natural Language Processing, 2013, pp. 534–542.","ama":"Wachsmuth H, Stein B, Engels G. Learning Efficient Information Extraction on Heterogeneous Texts. In: Gelbukh A, ed. <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>. Lecture Notes in Computer Science. ; 2013:534-542.","chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Learning Efficient Information Extraction on Heterogeneous Texts.” In <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, edited by Alexander Gelbukh, 534–42. Lecture Notes in Computer Science, 2013.","ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Learning Efficient Information Extraction on Heterogeneous Texts,” in <i>Proceedings of the Sixth International Joint Conference on Natural Language Processing</i>, 2013, pp. 534–542."},"page":"534-542","year":"2013","main_file_link":[{"url":"https://www.aclweb.org/anthology/I13-1061.pdf"}],"title":"Learning Efficient Information Extraction on Heterogeneous Texts","author":[{"first_name":"Henning","id":"3900","full_name":"Wachsmuth, Henning","last_name":"Wachsmuth"},{"first_name":"Benno","last_name":"Stein","full_name":"Stein, Benno"},{"last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"}],"date_created":"2018-08-02T13:38:39Z","date_updated":"2022-01-06T06:59:37Z"},{"type":"conference","publication":"Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management","status":"public","_id":"3814","user_id":"82920","department":[{"_id":"600"}],"language":[{"iso":"eng"}],"publication_identifier":{"isbn":["978-1-4503-2263-8"]},"year":"2013","citation":{"apa":"Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Information Extraction as a Filtering Task. In <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i> (pp. 2049–2058).","short":"H. Wachsmuth, B. Stein, G. Engels, in: Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management, 2013, pp. 2049–2058.","bibtex":"@inproceedings{Wachsmuth_Stein_Engels_2013, title={Information Extraction as a Filtering Task}, booktitle={Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management}, author={Wachsmuth, Henning and Stein, Benno and Engels, Gregor}, year={2013}, pages={2049–2058} }","mla":"Wachsmuth, Henning, et al. “Information Extraction as a Filtering Task.” <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2013, pp. 2049–58.","chicago":"Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Information Extraction as a Filtering Task.” In <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2049–58, 2013.","ieee":"H. Wachsmuth, B. Stein, and G. Engels, “Information Extraction as a Filtering Task,” in <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>, 2013, pp. 2049–2058.","ama":"Wachsmuth H, Stein B, Engels G. Information Extraction as a Filtering Task. In: <i>Proceedings of the 22nd ACM International Conference on Conference on Information &#38; Knowledge Management</i>. ; 2013:2049-2058."},"page":"2049-2058","date_updated":"2022-01-06T06:59:37Z","author":[{"last_name":"Wachsmuth","full_name":"Wachsmuth, Henning","id":"3900","first_name":"Henning"},{"full_name":"Stein, Benno","last_name":"Stein","first_name":"Benno"},{"last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"}],"date_created":"2018-08-02T13:38:40Z","title":"Information Extraction as a Filtering Task","main_file_link":[{"url":"https://dl.acm.org/doi/pdf/10.1145/2505515.2505557"}]},{"year":"2013","page":"38-49","citation":{"short":"H. Wachsmuth, M. Rose, G. Engels, in: A. Gelbukh (Ed.), 14th International Conference on Intelligent Text Processing and Computational Linguistics, 2013, pp. 38–49.","mla":"Wachsmuth, Henning, et al. “Automatic Pipeline Construction for Real-Time Annotation.” <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, edited by Alexander Gelbukh, 2013, pp. 38–49.","bibtex":"@inproceedings{Wachsmuth_Rose_Engels_2013, series={Lecture Notes in Computer Science}, title={Automatic Pipeline Construction for Real-Time Annotation}, booktitle={14th International Conference on Intelligent Text Processing and Computational Linguistics}, author={Wachsmuth, Henning and Rose, Mirko and Engels, Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={38–49}, collection={Lecture Notes in Computer Science} }","apa":"Wachsmuth, H., Rose, M., &#38; Engels, G. (2013). Automatic Pipeline Construction for Real-Time Annotation. In A. Gelbukh (Ed.), <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i> (pp. 38–49).","ieee":"H. Wachsmuth, M. Rose, and G. Engels, “Automatic Pipeline Construction for Real-Time Annotation,” in <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, 2013, pp. 38–49.","chicago":"Wachsmuth, Henning, Mirko Rose, and Gregor Engels. “Automatic Pipeline Construction for Real-Time Annotation.” In <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>, edited by Alexander Gelbukh, 38–49. Lecture Notes in Computer Science, 2013.","ama":"Wachsmuth H, Rose M, Engels G. Automatic Pipeline Construction for Real-Time Annotation. In: Gelbukh A, ed. <i>14th International Conference on Intelligent Text Processing and Computational Linguistics</i>. Lecture Notes in Computer Science. ; 2013:38-49."},"title":"Automatic Pipeline Construction for Real-Time Annotation","main_file_link":[{"url":"https://webis.de/downloads/publications/papers/wachsmuth_2013.pdf"}],"date_updated":"2022-01-06T06:59:47Z","date_created":"2018-08-11T16:12:29Z","author":[{"last_name":"Wachsmuth","full_name":"Wachsmuth, Henning","id":"3900","first_name":"Henning"},{"full_name":"Rose, Mirko","last_name":"Rose","first_name":"Mirko"},{"first_name":"Gregor","last_name":"Engels","full_name":"Engels, Gregor"}],"editor":[{"last_name":"Gelbukh","full_name":"Gelbukh, Alexander","first_name":"Alexander"}],"status":"public","publication":"14th International Conference on Intelligent Text Processing and Computational Linguistics","type":"conference","language":[{"iso":"eng"}],"_id":"3876","department":[{"_id":"600"}],"user_id":"82920","series_title":"Lecture Notes in Computer Science"},{"main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12721"}],"title":"Practical algorithms for clustering and modeling large data sets - Analysis and improvements","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"first_name":"Daniel","last_name":"Kuntze","full_name":"Kuntze, Daniel"}],"date_created":"2018-05-25T10:07:42Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","citation":{"ieee":"D. Kuntze, <i>Practical algorithms for clustering and modeling large data sets - Analysis and improvements</i>. Universität Paderborn, 2013.","chicago":"Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.","ama":"Kuntze D. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn; 2013.","apa":"Kuntze, D. (2013). <i>Practical algorithms for clustering and modeling large data sets - Analysis and improvements</i>. Universität Paderborn.","short":"D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.","bibtex":"@book{Kuntze_2013, title={Practical algorithms for clustering and modeling large data sets - Analysis and improvements}, publisher={Universität Paderborn}, author={Kuntze, Daniel}, year={2013} }","mla":"Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013."},"year":"2013","user_id":"25078","department":[{"_id":"64"}],"_id":"2909","status":"public","type":"dissertation"},{"title":"An Approach for Determining Optimal Contrast in Visual Cryptography","date_updated":"2022-01-06T06:58:47Z","publisher":"Fortschritt-Berichte VDI","date_created":"2018-05-25T11:42:38Z","author":[{"first_name":"Jakob","last_name":"Juhnke","id":"48090","full_name":"Juhnke, Jakob"},{"full_name":"Lefmann, Hanno","last_name":"Lefmann","first_name":"Hanno"},{"first_name":"Volker","full_name":"Strehl, Volker","last_name":"Strehl"}],"year":"2013","citation":{"ama":"Juhnke J, Lefmann H, Strehl V. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI; 2013.","ieee":"J. Juhnke, H. Lefmann, and V. Strehl, <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","chicago":"Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","apa":"Juhnke, J., Lefmann, H., &#38; Strehl, V. (2013). <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI.","bibtex":"@book{Juhnke_Lefmann_Strehl_2013, title={An Approach for Determining Optimal Contrast in Visual Cryptography}, publisher={Fortschritt-Berichte VDI}, author={Juhnke, Jakob and Lefmann, Hanno and Strehl, Volker}, year={2013} }","mla":"Juhnke, Jakob, et al. <i>An Approach for Determining Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.","short":"J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography, Fortschritt-Berichte VDI, 2013."},"extern":"1","_id":"2917","department":[{"_id":"64"}],"user_id":"48090","status":"public","type":"report"},{"type":"book_chapter","publication":"Constructive Side-Channel Analysis and Secure Design","status":"public","user_id":"25078","department":[{"_id":"64"}],"_id":"2979","publication_status":"published","publication_identifier":{"isbn":["9783642400254","9783642400261"],"issn":["0302-9743","1611-3349"]},"citation":{"ama":"Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>.","ieee":"J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.","apa":"Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">https://doi.org/10.1007/978-3-642-40026-1_10</a>","mla":"Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.” <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg, 2013, pp. 154–68, doi:<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>.","bibtex":"@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-40026-1_10\">10.1007/978-3-642-40026-1_10</a>}, booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2013}, pages={154–168} }","short":"J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168."},"page":"154-168","year":"2013","place":"Berlin, Heidelberg","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"first_name":"Gennadij","last_name":"Liske","full_name":"Liske, Gennadij"}],"date_created":"2018-06-05T07:33:22Z","date_updated":"2022-01-06T06:58:49Z","publisher":"Springer Berlin Heidelberg","doi":"10.1007/978-3-642-40026-1_10","title":"Improved Side Channel Attacks on Pairing Based Cryptography"},{"issue":"2","year":"2013","page":"225--245","citation":{"ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>","ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>.","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>.","apa":"Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>"},"date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_created":"2018-06-07T09:22:18Z","title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","doi":"10.1007/s00145-012-9120-y","publication":"J. Cryptology","type":"journal_article","status":"public","_id":"3129","department":[{"_id":"558"}],"user_id":"38235","extern":"1"},{"date_updated":"2022-01-06T06:58:58Z","author":[{"last_name":"Böhl","full_name":"Böhl, Florian","first_name":"Florian"},{"last_name":"Hofheinz","full_name":"Hofheinz, Dennis","first_name":"Dennis"},{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"first_name":"Jessica","full_name":"Koch, Jessica","last_name":"Koch"},{"first_name":"Jae","full_name":"Hong Seo, Jae","last_name":"Hong Seo"},{"full_name":"Striecks, Christoph","last_name":"Striecks","first_name":"Christoph"}],"date_created":"2018-06-07T09:22:39Z","title":"Practical Signatures from Standard Assumptions","doi":"10.1007/978-3-642-38348-9_28","year":"2013","citation":{"ama":"Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485. doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>","ieee":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.","chicago":"Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 461--485, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>.","apa":"Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks, C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i> (pp. 461--485). <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>","mla":"Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485, doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>.","bibtex":"@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical Signatures from Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}, year={2013}, pages={461--485} }","short":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485."},"page":"461--485","_id":"3130","user_id":"38235","department":[{"_id":"558"}],"extern":"1","type":"conference","publication":"Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings","status":"public"},{"author":[{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"},{"last_name":"Paterson","full_name":"Paterson, Kenneth G.","first_name":"Kenneth G."},{"last_name":"Somorovsky","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"date_created":"2018-06-07T09:23:49Z","date_updated":"2022-01-06T06:58:58Z","title":"One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography","citation":{"short":"T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.","mla":"Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","bibtex":"@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2013} }","apa":"Jager, T., Paterson, K. G., &#38; Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>.","ama":"Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>. ; 2013.","ieee":"T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography,” in <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","chicago":"Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013."},"year":"2013","user_id":"38235","department":[{"_id":"558"}],"_id":"3131","extern":"1","type":"conference","publication":"20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013","status":"public"},{"series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3176","status":"public","editor":[{"full_name":"Beyer, Dirk","last_name":"Beyer","first_name":"Dirk"},{"last_name":"Boreale","full_name":"Boreale, Michele","first_name":"Michele"}],"type":"conference","publication":"Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings","doi":"10.1007/978-3-642-38592-6_13","title":"Bounded Model Checking of Graph Transformation Systems via {SMT} Solving","author":[{"full_name":"Isenberg, Tobias","last_name":"Isenberg","first_name":"Tobias"},{"first_name":"Dominik","full_name":"Steenken, Dominik","last_name":"Steenken"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2018-06-13T08:08:39Z","date_updated":"2022-01-06T06:59:02Z","citation":{"ama":"Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>. Lecture Notes in Computer Science. ; 2013:178--192. doi:<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>","ieee":"T. Isenberg, D. Steenken, and H. Wehrheim, “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving,” in <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, 2013, pp. 178--192.","chicago":"Isenberg, Tobias, Dominik Steenken, and Heike Wehrheim. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” In <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and Michele Boreale, 178--192. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">https://doi.org/10.1007/978-3-642-38592-6_13</a>.","apa":"Isenberg, T., Steenken, D., &#38; Wehrheim, H. (2013). Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In D. Beyer &#38; M. Boreale (Eds.), <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i> (pp. 178--192). <a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">https://doi.org/10.1007/978-3-642-38592-6_13</a>","short":"T. Isenberg, D. Steenken, H. Wehrheim, in: D. Beyer, M. Boreale (Eds.), Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, 2013, pp. 178--192.","mla":"Isenberg, Tobias, et al. “Bounded Model Checking of Graph Transformation Systems via {SMT} Solving.” <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and Michele Boreale, 2013, pp. 178--192, doi:<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>.","bibtex":"@inproceedings{Isenberg_Steenken_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={Bounded Model Checking of Graph Transformation Systems via {SMT} Solving}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38592-6_13\">10.1007/978-3-642-38592-6_13</a>}, booktitle={Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings}, author={Isenberg, Tobias and Steenken, Dominik and Wehrheim, Heike}, editor={Beyer, Dirk and Boreale, MicheleEditors}, year={2013}, pages={178--192}, collection={Lecture Notes in Computer Science} }"},"page":"178--192","year":"2013"},{"series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3177","type":"conference","publication":"Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings","status":"public","editor":[{"last_name":"Bertacco","full_name":"Bertacco, Valeria","first_name":"Valeria"},{"first_name":"Axel","full_name":"Legay, Axel","last_name":"Legay"}],"author":[{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"first_name":"Annika","full_name":"Mütze, Annika","last_name":"Mütze"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_created":"2018-06-13T08:09:44Z","date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-319-03077-7_21","title":"{SPIN} as a Linearizability Checker under Weak Memory Models","citation":{"bibtex":"@inproceedings{Travkin_Mütze_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={{SPIN} as a Linearizability Checker under Weak Memory Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>}, booktitle={Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings}, author={Travkin, Oleg and Mütze, Annika and Wehrheim, Heike}, editor={Bertacco, Valeria and Legay, AxelEditors}, year={2013}, pages={311--326}, collection={Lecture Notes in Computer Science} }","short":"O. Travkin, A. Mütze, H. Wehrheim, in: V. Bertacco, A. Legay (Eds.), Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013, pp. 311--326.","mla":"Travkin, Oleg, et al. “{SPIN} as a Linearizability Checker under Weak Memory Models.” <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 2013, pp. 311--326, doi:<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>.","apa":"Travkin, O., Mütze, A., &#38; Wehrheim, H. (2013). {SPIN} as a Linearizability Checker under Weak Memory Models. In V. Bertacco &#38; A. Legay (Eds.), <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i> (pp. 311--326). <a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">https://doi.org/10.1007/978-3-319-03077-7_21</a>","ama":"Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under Weak Memory Models. In: Bertacco V, Legay A, eds. <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>. Lecture Notes in Computer Science. ; 2013:311--326. doi:<a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">10.1007/978-3-319-03077-7_21</a>","chicago":"Travkin, Oleg, Annika Mütze, and Heike Wehrheim. “{SPIN} as a Linearizability Checker under Weak Memory Models.” In <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 311--326. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-319-03077-7_21\">https://doi.org/10.1007/978-3-319-03077-7_21</a>.","ieee":"O. Travkin, A. Mütze, and H. Wehrheim, “{SPIN} as a Linearizability Checker under Weak Memory Models,” in <i>Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i>, 2013, pp. 311--326."},"page":"311--326","year":"2013"},{"type":"conference","publication":"Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings","status":"public","editor":[{"first_name":"Zhiming","full_name":"Liu, Zhiming","last_name":"Liu"},{"last_name":"Woodcock","full_name":"Woodcock, Jim","first_name":"Jim"},{"full_name":"Zhu, Huibiao","last_name":"Zhu","first_name":"Huibiao"}],"series_title":"Lecture Notes in Computer Science","user_id":"29719","department":[{"_id":"77"}],"_id":"3178","citation":{"chicago":"Dongol, Brijesh, Oleg Travkin, John Derrick, and Heike Wehrheim. “A High-Level Semantics for Program Execution under Total Store Order Memory.” In <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu, Jim Woodcock, and Huibiao Zhu, 177--194. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">https://doi.org/10.1007/978-3-642-39718-9_11</a>.","ieee":"B. Dongol, O. Travkin, J. Derrick, and H. Wehrheim, “A High-Level Semantics for Program Execution under Total Store Order Memory,” in <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, 2013, pp. 177--194.","ama":"Dongol B, Travkin O, Derrick J, Wehrheim H. A High-Level Semantics for Program Execution under Total Store Order Memory. In: Liu Z, Woodcock J, Zhu H, eds. <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>. Lecture Notes in Computer Science. ; 2013:177--194. doi:<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>","apa":"Dongol, B., Travkin, O., Derrick, J., &#38; Wehrheim, H. (2013). A High-Level Semantics for Program Execution under Total Store Order Memory. In Z. Liu, J. Woodcock, &#38; H. Zhu (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i> (pp. 177--194). <a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">https://doi.org/10.1007/978-3-642-39718-9_11</a>","bibtex":"@inproceedings{Dongol_Travkin_Derrick_Wehrheim_2013, series={Lecture Notes in Computer Science}, title={A High-Level Semantics for Program Execution under Total Store Order Memory}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>}, booktitle={Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, author={Dongol, Brijesh and Travkin, Oleg and Derrick, John and Wehrheim, Heike}, editor={Liu, Zhiming and Woodcock, Jim and Zhu, HuibiaoEditors}, year={2013}, pages={177--194}, collection={Lecture Notes in Computer Science} }","mla":"Dongol, Brijesh, et al. “A High-Level Semantics for Program Execution under Total Store Order Memory.” <i>Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu et al., 2013, pp. 177--194, doi:<a href=\"https://doi.org/10.1007/978-3-642-39718-9_11\">10.1007/978-3-642-39718-9_11</a>.","short":"B. Dongol, O. Travkin, J. Derrick, H. Wehrheim, in: Z. Liu, J. Woodcock, H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194."},"page":"177--194","year":"2013","date_created":"2018-06-13T08:13:31Z","author":[{"full_name":"Dongol, Brijesh","last_name":"Dongol","first_name":"Brijesh"},{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"last_name":"Derrick","full_name":"Derrick, John","first_name":"John"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"date_updated":"2022-01-06T06:59:02Z","doi":"10.1007/978-3-642-39718-9_11","title":"A High-Level Semantics for Program Execution under Total Store Order Memory"},{"publication":"Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen","type":"conference","status":"public","editor":[{"first_name":"Stefan","last_name":"Kowalewski","full_name":"Kowalewski, Stefan"},{"first_name":"Bernhard","last_name":"Rumpe","full_name":"Rumpe, Bernhard"}],"department":[{"_id":"77"}],"series_title":"{LNI}","user_id":"29719","_id":"3179","page":"271--284","citation":{"bibtex":"@inproceedings{Ziegert_Wehrheim_2013, series={{LNI}}, title={Temporal Reconfiguration Plans for Self-Adaptive Systems}, booktitle={Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen}, author={Ziegert, Steffen and Wehrheim, Heike}, editor={Kowalewski, Stefan and Rumpe, BernhardEditors}, year={2013}, pages={271--284}, collection={{LNI}} }","short":"S. Ziegert, H. Wehrheim, in: S. Kowalewski, B. Rumpe (Eds.), Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen, 2013, pp. 271--284.","mla":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for Self-Adaptive Systems.” <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, edited by Stefan Kowalewski and Bernhard Rumpe, 2013, pp. 271--284.","apa":"Ziegert, S., &#38; Wehrheim, H. (2013). Temporal Reconfiguration Plans for Self-Adaptive Systems. In S. Kowalewski &#38; B. Rumpe (Eds.), <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i> (pp. 271--284).","ieee":"S. Ziegert and H. Wehrheim, “Temporal Reconfiguration Plans for Self-Adaptive Systems,” in <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, 2013, pp. 271--284.","chicago":"Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for Self-Adaptive Systems.” In <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>, edited by Stefan Kowalewski and Bernhard Rumpe, 271--284. {LNI}, 2013.","ama":"Ziegert S, Wehrheim H. Temporal Reconfiguration Plans for Self-Adaptive Systems. In: Kowalewski S, Rumpe B, eds. <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\\\"{a}}rz 2013 in Aachen</i>. {LNI}. ; 2013:271--284."},"year":"2013","date_created":"2018-06-13T08:15:08Z","author":[{"first_name":"Steffen","full_name":"Ziegert, Steffen","last_name":"Ziegert"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"date_updated":"2022-01-06T06:59:02Z","title":"Temporal Reconfiguration Plans for Self-Adaptive Systems"},{"type":"journal_article","publication":"British Journal of Nutrition","abstract":[{"lang":"eng","text":"<jats:p>Dietary fat intake in childhood may influence the risk for developing chronic diseases. The objective of the present study was to examine secular trends in the parameters of fat intake between 2000 and 2010 in a sample of German children and adolescents (<jats:italic>n</jats:italic> 808) participating in the Dortmund Nutritional and Anthropometric Longitudinally Designed (DONALD) Study. Dietary data from 4380 3 d weighed dietary records were analysed using repeated-measures regression to determine time trends in fat quantity, i.e. the intake of total fat, and in fat quality, i.e. the ratios of SFA, MUFA and PUFA. In young children (2–3 years) and in adolescents (13–18 years), total fat intake remained stable over time, but decreased by 0·08 % of total energy (%E) per year in 4–12-year-old children. In 2010, median fat intake was at the upper end of the recommendations. SFA intake decreased slightly in 2–3- and 4–12-year-old children by 0·09 and 0·05 %E per year, respectively. MUFA and PUFA intakes remained stable in all the age groups except in adolescents. Here, PUFA intake decreased initially, but increased between 2005 and 2010. In 2010, only between 3 and 18 % of the respective age groups had an intake of SFA or PUFA within the recommendations. In conclusion, fat quantity and quality did not change substantially between 2000 and 2010. Fat quality, in particular, needs to be improved, since a large percentage of our sample did not meet the recommended intakes for SFA and PUFA.</jats:p>"}],"status":"public","_id":"27043","user_id":"49428","department":[{"_id":"35"},{"_id":"22"},{"_id":"395"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0007-1145","1475-2662"]},"year":"2013","citation":{"apa":"Libuda, L., Alexy, U., &#38; Kersting, M. (2013). Time trends in dietary fat intake in a sample of German children and adolescents between 2000 and 2010: not quantity, but quality is the issue. <i>British Journal of Nutrition</i>, 141–150. <a href=\"https://doi.org/10.1017/s0007114513002031\">https://doi.org/10.1017/s0007114513002031</a>","short":"L. Libuda, U. Alexy, M. Kersting, British Journal of Nutrition (2013) 141–150.","bibtex":"@article{Libuda_Alexy_Kersting_2013, title={Time trends in dietary fat intake in a sample of German children and adolescents between 2000 and 2010: not quantity, but quality is the issue}, DOI={<a href=\"https://doi.org/10.1017/s0007114513002031\">10.1017/s0007114513002031</a>}, journal={British Journal of Nutrition}, author={Libuda, Lars and Alexy, Ute and Kersting, Mathilde}, year={2013}, pages={141–150} }","mla":"Libuda, Lars, et al. “Time Trends in Dietary Fat Intake in a Sample of German Children and Adolescents between 2000 and 2010: Not Quantity, but Quality Is the Issue.” <i>British Journal of Nutrition</i>, 2013, pp. 141–50, doi:<a href=\"https://doi.org/10.1017/s0007114513002031\">10.1017/s0007114513002031</a>.","chicago":"Libuda, Lars, Ute Alexy, and Mathilde Kersting. “Time Trends in Dietary Fat Intake in a Sample of German Children and Adolescents between 2000 and 2010: Not Quantity, but Quality Is the Issue.” <i>British Journal of Nutrition</i>, 2013, 141–50. <a href=\"https://doi.org/10.1017/s0007114513002031\">https://doi.org/10.1017/s0007114513002031</a>.","ieee":"L. Libuda, U. Alexy, and M. Kersting, “Time trends in dietary fat intake in a sample of German children and adolescents between 2000 and 2010: not quantity, but quality is the issue,” <i>British Journal of Nutrition</i>, pp. 141–150, 2013, doi: <a href=\"https://doi.org/10.1017/s0007114513002031\">10.1017/s0007114513002031</a>.","ama":"Libuda L, Alexy U, Kersting M. Time trends in dietary fat intake in a sample of German children and adolescents between 2000 and 2010: not quantity, but quality is the issue. <i>British Journal of Nutrition</i>. Published online 2013:141-150. doi:<a href=\"https://doi.org/10.1017/s0007114513002031\">10.1017/s0007114513002031</a>"},"page":"141-150","date_updated":"2022-01-06T06:57:32Z","date_created":"2021-11-01T20:17:51Z","author":[{"first_name":"Lars","full_name":"Libuda, Lars","id":"88682","orcid":"0000-0003-1603-3133","last_name":"Libuda"},{"first_name":"Ute","last_name":"Alexy","full_name":"Alexy, Ute"},{"last_name":"Kersting","full_name":"Kersting, Mathilde","first_name":"Mathilde"}],"title":"Time trends in dietary fat intake in a sample of German children and adolescents between 2000 and 2010: not quantity, but quality is the issue","doi":"10.1017/s0007114513002031"},{"language":[{"iso":"eng"}],"_id":"27054","department":[{"_id":"672"}],"user_id":"21240","status":"public","type":"conference","title":"11. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung","conference":{"name":"18. - 19. Apr. 2013, Heinz Nixdorf Institut"},"date_updated":"2022-01-06T06:57:33Z","publisher":"Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 ","volume":311,"date_created":"2021-11-02T10:53:04Z","author":[{"first_name":"Jürgen","full_name":"Gausemeier, Jürgen","last_name":"Gausemeier"},{"last_name":"Grafe","full_name":"Grafe, Michael","first_name":"Michael"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"year":"2013","intvolume":"       311","citation":{"ama":"Gausemeier J, Grafe M, Meyer auf der Heide F. 11. Paderborner Workshop Augmented &#38; Virtual Reality in der Produktentstehung. In: Vol 311. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 ; 2013.","chicago":"Gausemeier, Jürgen, Michael Grafe, and Friedhelm Meyer auf der Heide. “11. Paderborner Workshop Augmented &#38; Virtual Reality in Der Produktentstehung,” Vol. 311. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 , 2013.","ieee":"J. Gausemeier, M. Grafe, and F. Meyer auf der Heide, “11. Paderborner Workshop Augmented &#38; Virtual Reality in der Produktentstehung,” 2013, vol. 311.","short":"J. Gausemeier, M. Grafe, F. Meyer auf der Heide, in: Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 , 2013.","bibtex":"@inproceedings{Gausemeier_Grafe_Meyer auf der Heide_2013, title={11. Paderborner Workshop Augmented &#38; Virtual Reality in der Produktentstehung}, volume={311}, publisher={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 }, author={Gausemeier, Jürgen and Grafe, Michael and Meyer auf der Heide, Friedhelm}, year={2013} }","mla":"Gausemeier, Jürgen, et al. <i>11. Paderborner Workshop Augmented &#38; Virtual Reality in Der Produktentstehung</i>. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 , 2013.","apa":"Gausemeier, J., Grafe, M., &#38; Meyer auf der Heide, F. (2013). <i>11. Paderborner Workshop Augmented &#38; Virtual Reality in der Produktentstehung</i>. <i>311</i>."}},{"publication_identifier":{"issn":["1436-6207","1436-6215"]},"publication_status":"published","year":"2013","page":"1335-1344","citation":{"chicago":"Libuda, Lars, Madlen Stimming, Christina Mesch, Petra Warschburger, Hermann Kalhoff, Berthold Viktor Koletzko, and Mathilde Kersting. “Frequencies and Demographic Determinants of Breastfeeding and DHA Supplementation in a Nationwide Sample of Mothers in Germany.” <i>European Journal of Nutrition</i>, 2013, 1335–44. <a href=\"https://doi.org/10.1007/s00394-013-0633-4\">https://doi.org/10.1007/s00394-013-0633-4</a>.","ieee":"L. Libuda <i>et al.</i>, “Frequencies and demographic determinants of breastfeeding and DHA supplementation in a nationwide sample of mothers in Germany,” <i>European Journal of Nutrition</i>, pp. 1335–1344, 2013, doi: <a href=\"https://doi.org/10.1007/s00394-013-0633-4\">10.1007/s00394-013-0633-4</a>.","ama":"Libuda L, Stimming M, Mesch C, et al. Frequencies and demographic determinants of breastfeeding and DHA supplementation in a nationwide sample of mothers in Germany. <i>European Journal of Nutrition</i>. Published online 2013:1335-1344. doi:<a href=\"https://doi.org/10.1007/s00394-013-0633-4\">10.1007/s00394-013-0633-4</a>","apa":"Libuda, L., Stimming, M., Mesch, C., Warschburger, P., Kalhoff, H., Koletzko, B. V., &#38; Kersting, M. (2013). Frequencies and demographic determinants of breastfeeding and DHA supplementation in a nationwide sample of mothers in Germany. <i>European Journal of Nutrition</i>, 1335–1344. <a href=\"https://doi.org/10.1007/s00394-013-0633-4\">https://doi.org/10.1007/s00394-013-0633-4</a>","bibtex":"@article{Libuda_Stimming_Mesch_Warschburger_Kalhoff_Koletzko_Kersting_2013, title={Frequencies and demographic determinants of breastfeeding and DHA supplementation in a nationwide sample of mothers in Germany}, DOI={<a href=\"https://doi.org/10.1007/s00394-013-0633-4\">10.1007/s00394-013-0633-4</a>}, journal={European Journal of Nutrition}, author={Libuda, Lars and Stimming, Madlen and Mesch, Christina and Warschburger, Petra and Kalhoff, Hermann and Koletzko, Berthold Viktor and Kersting, Mathilde}, year={2013}, pages={1335–1344} }","mla":"Libuda, Lars, et al. “Frequencies and Demographic Determinants of Breastfeeding and DHA Supplementation in a Nationwide Sample of Mothers in Germany.” <i>European Journal of Nutrition</i>, 2013, pp. 1335–44, doi:<a href=\"https://doi.org/10.1007/s00394-013-0633-4\">10.1007/s00394-013-0633-4</a>.","short":"L. Libuda, M. Stimming, C. Mesch, P. Warschburger, H. Kalhoff, B.V. Koletzko, M. Kersting, European Journal of Nutrition (2013) 1335–1344."},"date_updated":"2022-01-06T06:57:33Z","date_created":"2021-11-02T20:22:36Z","author":[{"full_name":"Libuda, Lars","id":"88682","last_name":"Libuda","orcid":"0000-0003-1603-3133","first_name":"Lars"},{"full_name":"Stimming, Madlen","last_name":"Stimming","first_name":"Madlen"},{"first_name":"Christina","last_name":"Mesch","full_name":"Mesch, Christina"},{"last_name":"Warschburger","full_name":"Warschburger, Petra","first_name":"Petra"},{"first_name":"Hermann","last_name":"Kalhoff","full_name":"Kalhoff, Hermann"},{"first_name":"Berthold Viktor","full_name":"Koletzko, Berthold Viktor","last_name":"Koletzko"},{"full_name":"Kersting, Mathilde","last_name":"Kersting","first_name":"Mathilde"}],"title":"Frequencies and demographic determinants of breastfeeding and DHA supplementation in a nationwide sample of mothers in Germany","doi":"10.1007/s00394-013-0633-4","publication":"European Journal of Nutrition","type":"journal_article","status":"public","_id":"27061","department":[{"_id":"35"},{"_id":"22"},{"_id":"395"}],"user_id":"49428","language":[{"iso":"eng"}]}]
