--- _id: '561' abstract: - lang: eng text: 'We present a privacy-friendly architecture for a future cloud computing scenario where software licensing and software payment plays a major role. We show how digital rights management as a technical solution for software licensing can be achieved in a privacy-friendly manner. In our scenario, users who buy software from software providers and execute it at computing centres stay anonymous. At the same time, our approach guarantees that software licenses are bound to users and that their validity is checked before execution. Thus, DRM constitutes an incentive for software providers to take part in such a future cloud computing scenario. We employ a software re-encryption scheme so that computing centres are not able to build profiles of their users – not even under a pseudonym. We make sure that malicious users are unable to relay software to others. ' author: - first_name: Ronald full_name: Petrlic, Ronald last_name: Petrlic - first_name: Stephan full_name: Sekula, Stephan last_name: Sekula - first_name: Christoph full_name: Sorge, Christoph last_name: Sorge citation: ama: Petrlic R, Sekula S, Sorge C. A privacy-friendly Architecture for future Cloud Computing. International Journal of Grid and Utility Computing. 2013;(4):265-277. doi:10.1504/IJGUC.2013.057120 apa: Petrlic, R., Sekula, S., & Sorge, C. (2013). A privacy-friendly Architecture for future Cloud Computing. International Journal of Grid and Utility Computing, (4), 265–277. https://doi.org/10.1504/IJGUC.2013.057120 bibtex: '@article{Petrlic_Sekula_Sorge_2013, title={A privacy-friendly Architecture for future Cloud Computing}, DOI={10.1504/IJGUC.2013.057120}, number={4}, journal={International Journal of Grid and Utility Computing}, publisher={InderScience}, author={Petrlic, Ronald and Sekula, Stephan and Sorge, Christoph}, year={2013}, pages={265–277} }' chicago: 'Petrlic, Ronald, Stephan Sekula, and Christoph Sorge. “A Privacy-Friendly Architecture for Future Cloud Computing.” International Journal of Grid and Utility Computing, no. 4 (2013): 265–77. https://doi.org/10.1504/IJGUC.2013.057120.' ieee: R. Petrlic, S. Sekula, and C. Sorge, “A privacy-friendly Architecture for future Cloud Computing,” International Journal of Grid and Utility Computing, no. 4, pp. 265–277, 2013. mla: Petrlic, Ronald, et al. “A Privacy-Friendly Architecture for Future Cloud Computing.” International Journal of Grid and Utility Computing, no. 4, InderScience, 2013, pp. 265–77, doi:10.1504/IJGUC.2013.057120. short: R. Petrlic, S. Sekula, C. Sorge, International Journal of Grid and Utility Computing (2013) 265–277. date_created: 2017-10-17T12:42:41Z date_updated: 2022-01-06T07:02:07Z ddc: - '040' doi: 10.1504/IJGUC.2013.057120 file: - access_level: closed content_type: application/pdf creator: florida date_created: 2018-03-15T10:26:14Z date_updated: 2018-03-15T10:26:14Z file_id: '1280' file_name: 561-authorFinalVersion.pdf file_size: 1036554 relation: main_file success: 1 file_date_updated: 2018-03-15T10:26:14Z has_accepted_license: '1' issue: '4' main_file_link: - url: http://www.inderscience.com/offer.php?id=57120 page: 265-277 project: - _id: '1' name: SFB 901 - _id: '13' name: SFB 901 - Subprojekt C1 - _id: '4' name: SFB 901 - Project Area C publication: International Journal of Grid and Utility Computing publisher: InderScience status: public title: A privacy-friendly Architecture for future Cloud Computing type: journal_article user_id: '477' year: '2013' ... --- _id: '562' abstract: - lang: eng text: In Distributed Cloud Computing, applications are deployed across many data centres at topologically diverse locations to improved network-related quality of service (QoS). As we focus on interactive applications, we minimize the latency between users and an application by allocating Cloud resources nearby the customers. Allocating resources at all locations will result in the best latency but also in the highest expenses. So we need to find an optimal subset of locations which reduces the latency but also the expenses – the facility location problem (FLP). In addition, we consider resource capacity restrictions, as a resource can only serve a limited amount of users. An FLP can be globally solved. Additionally, we propose a local, distributed heuristic. This heuristic is running within the network and does not depend on a global component. No distributed, local approximations for the capacitated FLP have been proposed so far due to the complexity of the problem. We compared the heuristic with an optimal solution obtained from a mixed integer program for different network topologies. We investigated the influence of different parameters like overall resource utilization or different latency weights. author: - first_name: Matthias full_name: Keller, Matthias last_name: Keller - first_name: Stefan full_name: Pawlik, Stefan last_name: Pawlik - first_name: Peter full_name: Pietrzyk, Peter last_name: Pietrzyk - first_name: Holger full_name: Karl, Holger id: '126' last_name: Karl citation: ama: 'Keller M, Pawlik S, Pietrzyk P, Karl H. A Local Heuristic for Latency-Optimized Distributed Cloud Deployment. In: Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud Computing. ; 2013:429-434. doi:10.1109/UCC.2013.85' apa: Keller, M., Pawlik, S., Pietrzyk, P., & Karl, H. (2013). A Local Heuristic for Latency-Optimized Distributed Cloud Deployment. In Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing (pp. 429–434). https://doi.org/10.1109/UCC.2013.85 bibtex: '@inproceedings{Keller_Pawlik_Pietrzyk_Karl_2013, title={A Local Heuristic for Latency-Optimized Distributed Cloud Deployment}, DOI={10.1109/UCC.2013.85}, booktitle={Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing}, author={Keller, Matthias and Pawlik, Stefan and Pietrzyk, Peter and Karl, Holger}, year={2013}, pages={429–434} }' chicago: Keller, Matthias, Stefan Pawlik, Peter Pietrzyk, and Holger Karl. “A Local Heuristic for Latency-Optimized Distributed Cloud Deployment.” In Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud Computing, 429–34, 2013. https://doi.org/10.1109/UCC.2013.85. ieee: M. Keller, S. Pawlik, P. Pietrzyk, and H. Karl, “A Local Heuristic for Latency-Optimized Distributed Cloud Deployment,” in Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing, 2013, pp. 429–434. mla: Keller, Matthias, et al. “A Local Heuristic for Latency-Optimized Distributed Cloud Deployment.” Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud Computing, 2013, pp. 429–34, doi:10.1109/UCC.2013.85. short: 'M. Keller, S. Pawlik, P. Pietrzyk, H. Karl, in: Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud Computing, 2013, pp. 429–434.' date_created: 2017-10-17T12:42:41Z date_updated: 2022-01-06T07:02:11Z ddc: - '040' department: - _id: '75' - _id: '63' doi: 10.1109/UCC.2013.85 file: - access_level: closed content_type: application/pdf creator: florida date_created: 2018-03-15T10:25:45Z date_updated: 2018-03-15T10:25:45Z file_id: '1279' file_name: 562-dcc13_paper.pdf file_size: 347873 relation: main_file success: 1 file_date_updated: 2018-03-15T10:25:45Z has_accepted_license: '1' language: - iso: eng page: 429-434 project: - _id: '1' name: SFB 901 - _id: '6' name: SFB 901 - Subprojekt A2 - _id: '5' name: SFB 901 - Subproject A1 - _id: '2' name: SFB 901 - Project Area A publication: Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing status: public title: A Local Heuristic for Latency-Optimized Distributed Cloud Deployment type: conference user_id: '477' year: '2013' ... --- _id: '563' abstract: - lang: eng text: Dominating set based virtual backbones are used for rou-ting in wireless ad-hoc networks. Such backbones receive and transmit messages from/to every node in the network. Existing distributed algorithms only consider undirected graphs, which model symmetric networks with uniform transmission ranges. We are particularly interested in the well-established disk graphs, which model asymmetric networks with non-uniform transmission ranges. The corresponding graph theoretic problem seeks a strongly connected dominating-absorbent set of minimum cardinality in a digraph. A subset of nodes in a digraph is a strongly connected dominating-absorbent set if the subgraph induced by these nodes is strongly connected and each node in the graph is either in the set or has both an in-neighbor and an out-neighbor in it. We introduce the first distributed algorithm for this problem in disk graphs. The algorithm gives an O(k^4) -approximation ratio and has a runtime bound of O(Diam) where Diam is the diameter of the graph and k denotes the transmission ratio r_{max}/r_{min} with r_{max} and r_{min} being the maximum and minimum transmission range, respectively. Moreover, we apply our algorithm on the subgraph of disk graphs consisting of only bidirectional edges. Our algorithm gives an O(ln k) -approximation and a runtime bound of O(k^8 log^∗ n) , which, for bounded k , is an optimal approximation for the problem, following Lenzen and Wattenhofer’s Ω(log^∗ n) runtime lower bound for distributed constant approximation in disk graphs. author: - first_name: Christine full_name: Markarian, Christine id: '37612' last_name: Markarian - first_name: Friedhelm full_name: Meyer auf der Heide, Friedhelm id: '15523' last_name: Meyer auf der Heide - first_name: Michael full_name: Schubert, Michael last_name: Schubert citation: ama: 'Markarian C, Meyer auf der Heide F, Schubert M. A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks. In: Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS). LNCS. ; 2013:217-227. doi:10.1007/978-3-642-45346-5_16' apa: Markarian, C., Meyer auf der Heide, F., & Schubert, M. (2013). A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks. In Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS) (pp. 217–227). https://doi.org/10.1007/978-3-642-45346-5_16 bibtex: '@inproceedings{Markarian_Meyer auf der Heide_Schubert_2013, series={LNCS}, title={A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks}, DOI={10.1007/978-3-642-45346-5_16}, booktitle={Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)}, author={Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert, Michael}, year={2013}, pages={217–227}, collection={LNCS} }' chicago: Markarian, Christine, Friedhelm Meyer auf der Heide, and Michael Schubert. “A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.” In Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS), 217–27. LNCS, 2013. https://doi.org/10.1007/978-3-642-45346-5_16. ieee: C. Markarian, F. Meyer auf der Heide, and M. Schubert, “A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks,” in Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS), 2013, pp. 217–227. mla: Markarian, Christine, et al. “A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.” Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS), 2013, pp. 217–27, doi:10.1007/978-3-642-45346-5_16. short: 'C. Markarian, F. Meyer auf der Heide, M. Schubert, in: Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS), 2013, pp. 217–227.' date_created: 2017-10-17T12:42:42Z date_updated: 2022-01-06T07:02:13Z ddc: - '040' department: - _id: '63' doi: 10.1007/978-3-642-45346-5_16 file: - access_level: closed content_type: application/pdf creator: florida date_created: 2018-03-15T10:25:15Z date_updated: 2018-03-15T10:25:15Z file_id: '1278' file_name: 563-978-3-642-45346-5_16.pdf file_size: 348191 relation: main_file success: 1 file_date_updated: 2018-03-15T10:25:15Z has_accepted_license: '1' page: 217-227 project: - _id: '1' name: SFB 901 - _id: '5' name: SFB 901 - Subprojekt A1 - _id: '2' name: SFB 901 - Project Area A publication: Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS) series_title: LNCS status: public title: A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks type: conference user_id: '477' year: '2013' ... --- _id: '5637' author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen citation: ama: 'Schryen G. Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. European Journal of Information Systems (EJIS). 2013;22(2):139-169.' apa: 'Schryen, G. (2013). Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. European Journal of Information Systems (EJIS), 22(2), 139–169.' bibtex: '@article{Schryen_2013, title={Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there}, volume={22}, number={2}, journal={European Journal of Information Systems (EJIS)}, author={Schryen, Guido}, year={2013}, pages={139–169} }' chicago: 'Schryen, Guido. “Revisiting IS Business Value Research: What We Already Know, What We Still Need to Know, and How We Can Get There.” European Journal of Information Systems (EJIS) 22, no. 2 (2013): 139–69.' ieee: 'G. Schryen, “Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there,” European Journal of Information Systems (EJIS), vol. 22, no. 2, pp. 139–169, 2013.' mla: 'Schryen, Guido. “Revisiting IS Business Value Research: What We Already Know, What We Still Need to Know, and How We Can Get There.” European Journal of Information Systems (EJIS), vol. 22, no. 2, 2013, pp. 139–69.' short: G. Schryen, European Journal of Information Systems (EJIS) 22 (2013) 139–169. date_created: 2018-11-14T14:31:37Z date_updated: 2022-01-06T07:02:16Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-07T11:59:54Z date_updated: 2018-12-13T15:11:53Z file_id: '6048' file_name: EJIS-PAPER.pdf file_size: 792102 relation: main_file file_date_updated: 2018-12-13T15:11:53Z has_accepted_license: '1' intvolume: ' 22' issue: '2' language: - iso: eng oa: '1' page: 139-169 publication: European Journal of Information Systems (EJIS) status: public title: 'Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there' type: journal_article user_id: '61579' volume: 22 year: '2013' ... --- _id: '564' abstract: - lang: eng text: We consider the problem of resource discovery in distributed systems. In particular we give an algorithm, such that each node in a network discovers the add ress of any other node in the network. We model the knowledge of the nodes as a virtual overlay network given by a directed graph such that complete knowledge of all nodes corresponds to a complete graph in the overlay network. Although there are several solutions for resource discovery, our solution is the first that achieves worst-case optimal work for each node, i.e. the number of addresses (O(n)) or bits (O(nlogn)) a node receives or sendscoincides with the lower bound, while ensuring only a linearruntime (O(n)) on the number of rounds. author: - first_name: Sebastian full_name: Kniesburges, Sebastian last_name: Kniesburges - first_name: Andreas full_name: Koutsopoulos, Andreas last_name: Koutsopoulos - first_name: Christian full_name: Scheideler, Christian id: '20792' last_name: Scheideler citation: ama: 'Kniesburges S, Koutsopoulos A, Scheideler C. A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery. In: Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO). Lecture Notes in Computer Science. ; 2013:165-176. doi:10.1007/978-3-319-03578-9_14' apa: Kniesburges, S., Koutsopoulos, A., & Scheideler, C. (2013). A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery. In Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO) (pp. 165–176). https://doi.org/10.1007/978-3-319-03578-9_14 bibtex: '@inproceedings{Kniesburges_Koutsopoulos_Scheideler_2013, series={Lecture Notes in Computer Science}, title={A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery}, DOI={10.1007/978-3-319-03578-9_14}, booktitle={Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler, Christian}, year={2013}, pages={165–176}, collection={Lecture Notes in Computer Science} }' chicago: Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” In Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO), 165–76. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-319-03578-9_14. ieee: S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery,” in Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO), 2013, pp. 165–176. mla: Kniesburges, Sebastian, et al. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO), 2013, pp. 165–76, doi:10.1007/978-3-319-03578-9_14. short: 'S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO), 2013, pp. 165–176.' date_created: 2017-10-17T12:42:42Z date_updated: 2022-01-06T07:02:17Z ddc: - '040' department: - _id: '79' doi: 10.1007/978-3-319-03578-9_14 file: - access_level: closed content_type: application/pdf creator: florida date_created: 2018-03-15T10:24:40Z date_updated: 2018-03-15T10:24:40Z file_id: '1277' file_name: 564-SIROCCO13.pdf file_size: 168884 relation: main_file success: 1 file_date_updated: 2018-03-15T10:24:40Z has_accepted_license: '1' page: 165-176 project: - _id: '1' name: SFB 901 - _id: '5' name: SFB 901 - Subprojekt A1 - _id: '2' name: SFB 901 - Project Area A publication: Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO) series_title: Lecture Notes in Computer Science status: public title: A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery type: conference user_id: '15504' year: '2013' ... --- _id: '6456' author: - first_name: J. J. S. full_name: Higham, J. J. S. last_name: Higham - first_name: H.-Hugo full_name: Kremer, H.-Hugo id: '15280' last_name: Kremer - first_name: D. full_name: Yeomans, D. last_name: Yeomans citation: ama: 'Higham JJS, Kremer H-H, Yeomans D. Exploring Intermediate Vocational Education and Training for 16-19 Year-olds in Germany and England. In: Deitmer L, Hauschildt U, Rauner F, Zelloth H, eds. The Architecture of Innovative Apprenticeship. Dordrecht; 2013:39-50.' apa: Higham, J. J. S., Kremer, H.-H., & Yeomans, D. (2013). Exploring Intermediate Vocational Education and Training for 16-19 Year-olds in Germany and England. In L. Deitmer, U. Hauschildt, F. Rauner, & H. Zelloth (Eds.), The Architecture of Innovative Apprenticeship (pp. 39–50). Dordrecht. bibtex: '@inbook{Higham_Kremer_Yeomans_2013, place={Dordrecht}, title={Exploring Intermediate Vocational Education and Training for 16-19 Year-olds in Germany and England}, booktitle={The Architecture of Innovative Apprenticeship}, author={Higham, J. J. S. and Kremer, H.-Hugo and Yeomans, D.}, editor={Deitmer, L. and Hauschildt, U. and Rauner, F. and Zelloth, H.Editors}, year={2013}, pages={39–50} }' chicago: Higham, J. J. S., H.-Hugo Kremer, and D. Yeomans. “Exploring Intermediate Vocational Education and Training for 16-19 Year-Olds in Germany and England.” In The Architecture of Innovative Apprenticeship, edited by L. Deitmer, U. Hauschildt, F. Rauner, and H. Zelloth, 39–50. Dordrecht, 2013. ieee: J. J. S. Higham, H.-H. Kremer, and D. Yeomans, “Exploring Intermediate Vocational Education and Training for 16-19 Year-olds in Germany and England,” in The Architecture of Innovative Apprenticeship, L. Deitmer, U. Hauschildt, F. Rauner, and H. Zelloth, Eds. Dordrecht, 2013, pp. 39–50. mla: Higham, J. J. S., et al. “Exploring Intermediate Vocational Education and Training for 16-19 Year-Olds in Germany and England.” The Architecture of Innovative Apprenticeship, edited by L. Deitmer et al., 2013, pp. 39–50. short: 'J.J.S. Higham, H.-H. Kremer, D. Yeomans, in: L. Deitmer, U. Hauschildt, F. Rauner, H. Zelloth (Eds.), The Architecture of Innovative Apprenticeship, Dordrecht, 2013, pp. 39–50.' date_created: 2019-01-02T10:33:48Z date_updated: 2022-01-06T07:03:05Z department: - _id: '211' editor: - first_name: L. full_name: Deitmer, L. last_name: Deitmer - first_name: U. full_name: Hauschildt, U. last_name: Hauschildt - first_name: F. full_name: Rauner, F. last_name: Rauner - first_name: H. full_name: Zelloth, H. last_name: Zelloth language: - iso: eng page: 39-50 place: Dordrecht publication: The Architecture of Innovative Apprenticeship status: public title: Exploring Intermediate Vocational Education and Training for 16-19 Year-olds in Germany and England type: book_chapter user_id: '74378' year: '2013' ... --- _id: '6457' author: - first_name: H.-Hugo full_name: Kremer, H.-Hugo id: '15280' last_name: Kremer - first_name: Marc full_name: Beutner, Marc id: '21118' last_name: Beutner - first_name: W. full_name: Wirth, W. last_name: Wirth citation: ama: 'Kremer H-H, Beutner M, Wirth W. Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM. In: Kremer H-H, Beutner M, Wirth W, eds. Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung  - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn; 2013.' apa: Kremer, H.-H., Beutner, M., & Wirth, W. (2013). Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM. In H.-H. Kremer, M. Beutner, & W. Wirth (Eds.), Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung  - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn. bibtex: '@inbook{Kremer_Beutner_Wirth_2013, place={Paderborn}, title={Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM}, booktitle={Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung  - Konzepte zur beruflichen Bildung im Jungtätervollzug}, author={Kremer, H.-Hugo and Beutner, Marc and Wirth, W.}, editor={Kremer, H.-H. and Beutner, M. and Wirth, W.Editors}, year={2013} }' chicago: Kremer, H.-Hugo, Marc Beutner, and W. Wirth. “Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM.” In Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung  - Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer, M. Beutner, and W. Wirth. Paderborn, 2013. ieee: H.-H. Kremer, M. Beutner, and W. Wirth, “Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM,” in Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung  - Konzepte zur beruflichen Bildung im Jungtätervollzug, H.-H. Kremer, M. Beutner, and W. Wirth, Eds. Paderborn, 2013. mla: Kremer, H. Hugo, et al. “Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM.” Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung  - Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer et al., 2013. short: 'H.-H. Kremer, M. Beutner, W. Wirth, in: H.-H. Kremer, M. Beutner, W. Wirth (Eds.), Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung  - Konzepte zur beruflichen Bildung im Jungtätervollzug, Paderborn, 2013.' date_created: 2019-01-02T10:43:00Z date_updated: 2022-01-06T07:03:05Z department: - _id: '211' editor: - first_name: H.-H. full_name: Kremer, H.-H. last_name: Kremer - first_name: M. full_name: Beutner, M. last_name: Beutner - first_name: W. full_name: Wirth, W. last_name: Wirth language: - iso: ger place: Paderborn publication: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug status: public title: Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM type: book_chapter user_id: '74378' year: '2013' ... --- _id: '6458' author: - first_name: H.-Hugo full_name: Kremer, H.-Hugo id: '15280' last_name: Kremer - first_name: Marc full_name: Beutner, Marc id: '21118' last_name: Beutner citation: ama: 'Kremer H-H, Beutner M. Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien. In: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn; 2013.' apa: Kremer, H.-H., & Beutner, M. (2013). Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien. In Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn. bibtex: '@inbook{Kremer_Beutner_2013, place={Paderborn}, title={Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien}, booktitle={Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug}, author={Kremer, H.-Hugo and Beutner, Marc}, year={2013} }' chicago: Kremer, H.-Hugo, and Marc Beutner. “Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien.” In Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn, 2013. ieee: H.-H. Kremer and M. Beutner, “Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien,” in Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, Paderborn, 2013. mla: Kremer, H. Hugo, and Marc Beutner. “Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien.” Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, 2013. short: 'H.-H. Kremer, M. Beutner, in: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, Paderborn, 2013.' date_created: 2019-01-02T10:45:41Z date_updated: 2022-01-06T07:03:05Z department: - _id: '211' language: - iso: ger place: Paderborn publication: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug status: public title: Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien type: book_chapter user_id: '74378' year: '2013' ... --- _id: '6459' author: - first_name: M. full_name: Gebbe, M. last_name: Gebbe - first_name: H.-Hugo full_name: Kremer, H.-Hugo id: '15280' last_name: Kremer citation: ama: 'Gebbe M, Kremer H-H. myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern. In: Kremer H-H, Beutner M, Wirth W, eds. Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn; 2013.' apa: Gebbe, M., & Kremer, H.-H. (2013). myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern. In H.-H. Kremer, M. Beutner, & W. Wirth (Eds.), Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn. bibtex: '@inbook{Gebbe_Kremer_2013, place={Paderborn}, title={myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern}, booktitle={Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug}, author={Gebbe, M. and Kremer, H.-Hugo}, editor={Kremer, H.-H. and Beutner, M. and Wirth, W.Editors}, year={2013} }' chicago: Gebbe, M., and H.-Hugo Kremer. “myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern.” In Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer, M. Beutner, and W. Wirth. Paderborn, 2013. ieee: M. Gebbe and H.-H. Kremer, “myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern,” in Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, H.-H. Kremer, M. Beutner, and W. Wirth, Eds. Paderborn, 2013. mla: Gebbe, M., and H. Hugo Kremer. “myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern.” Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer et al., 2013. short: 'M. Gebbe, H.-H. Kremer, in: H.-H. Kremer, M. Beutner, W. Wirth (Eds.), Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, Paderborn, 2013.' date_created: 2019-01-02T10:48:32Z date_updated: 2022-01-06T07:03:05Z department: - _id: '211' editor: - first_name: H.-H. full_name: Kremer, H.-H. last_name: Kremer - first_name: M. full_name: Beutner, M. last_name: Beutner - first_name: W. full_name: Wirth, W. last_name: Wirth language: - iso: ger place: Paderborn publication: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug status: public title: myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern type: book_chapter user_id: '74378' year: '2013' ... --- _id: '6461' author: - first_name: H.-Hugo full_name: Kremer, H.-Hugo id: '15280' last_name: Kremer - first_name: S. full_name: Knust, S. last_name: Knust citation: ama: 'Kremer H-H, Knust S. Stärkenbasierte Berufsorientierung im Jungtätervollzug . In: Kremer H-H, Beutner M, Wirth W, eds. Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn; 2013.' apa: Kremer, H.-H., & Knust, S. (2013). Stärkenbasierte Berufsorientierung im Jungtätervollzug . In H.-H. Kremer, M. Beutner, & W. Wirth (Eds.), Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn. bibtex: '@inbook{Kremer_Knust_2013, place={Paderborn}, title={Stärkenbasierte Berufsorientierung im Jungtätervollzug }, booktitle={Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug}, author={Kremer, H.-Hugo and Knust, S.}, editor={Kremer, H.-H. and Beutner, M. and Wirth, W.Editors}, year={2013} }' chicago: Kremer, H.-Hugo, and S. Knust. “Stärkenbasierte Berufsorientierung im Jungtätervollzug .” In Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer, M. Beutner, and W. Wirth. Paderborn, 2013. ieee: H.-H. Kremer and S. Knust, “Stärkenbasierte Berufsorientierung im Jungtätervollzug ,” in Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, H.-H. Kremer, M. Beutner, and W. Wirth, Eds. Paderborn, 2013. mla: Kremer, H. Hugo, and S. Knust. “Stärkenbasierte Berufsorientierung im Jungtätervollzug .” Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer et al., 2013. short: 'H.-H. Kremer, S. Knust, in: H.-H. Kremer, M. Beutner, W. Wirth (Eds.), Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug, Paderborn, 2013.' date_created: 2019-01-02T10:52:12Z date_updated: 2022-01-06T07:03:06Z department: - _id: '211' editor: - first_name: H.-H. full_name: Kremer, H.-H. last_name: Kremer - first_name: M. full_name: Beutner, M. last_name: Beutner - first_name: W. full_name: Wirth, W. last_name: Wirth language: - iso: ger place: Paderborn publication: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug status: public title: 'Stärkenbasierte Berufsorientierung im Jungtätervollzug ' type: book_chapter user_id: '74378' year: '2013' ...