---
_id: '561'
abstract:
- lang: eng
text: 'We present a privacy-friendly architecture for a future cloud computing scenario
where software licensing and software payment plays a major role. We show how
digital rights management as a technical solution for software licensing can be
achieved in a privacy-friendly manner. In our scenario, users who buy software
from software providers and execute it at computing centres stay anonymous. At
the same time, our approach guarantees that software licenses are bound to users
and that their validity is checked before execution. Thus, DRM constitutes an
incentive for software providers to take part in such a future cloud computing
scenario. We employ a software re-encryption scheme so that computing centres
are not able to build profiles of their users – not even under a pseudonym. We
make sure that malicious users are unable to relay software to others. '
author:
- first_name: Ronald
full_name: Petrlic, Ronald
last_name: Petrlic
- first_name: Stephan
full_name: Sekula, Stephan
last_name: Sekula
- first_name: Christoph
full_name: Sorge, Christoph
last_name: Sorge
citation:
ama: Petrlic R, Sekula S, Sorge C. A privacy-friendly Architecture for future Cloud
Computing. International Journal of Grid and Utility Computing. 2013;(4):265-277.
doi:10.1504/IJGUC.2013.057120
apa: Petrlic, R., Sekula, S., & Sorge, C. (2013). A privacy-friendly Architecture
for future Cloud Computing. International Journal of Grid and Utility Computing,
(4), 265–277. https://doi.org/10.1504/IJGUC.2013.057120
bibtex: '@article{Petrlic_Sekula_Sorge_2013, title={A privacy-friendly Architecture
for future Cloud Computing}, DOI={10.1504/IJGUC.2013.057120},
number={4}, journal={International Journal of Grid and Utility Computing}, publisher={InderScience},
author={Petrlic, Ronald and Sekula, Stephan and Sorge, Christoph}, year={2013},
pages={265–277} }'
chicago: 'Petrlic, Ronald, Stephan Sekula, and Christoph Sorge. “A Privacy-Friendly
Architecture for Future Cloud Computing.” International Journal of Grid and
Utility Computing, no. 4 (2013): 265–77. https://doi.org/10.1504/IJGUC.2013.057120.'
ieee: R. Petrlic, S. Sekula, and C. Sorge, “A privacy-friendly Architecture for
future Cloud Computing,” International Journal of Grid and Utility Computing,
no. 4, pp. 265–277, 2013.
mla: Petrlic, Ronald, et al. “A Privacy-Friendly Architecture for Future Cloud Computing.”
International Journal of Grid and Utility Computing, no. 4, InderScience,
2013, pp. 265–77, doi:10.1504/IJGUC.2013.057120.
short: R. Petrlic, S. Sekula, C. Sorge, International Journal of Grid and Utility
Computing (2013) 265–277.
date_created: 2017-10-17T12:42:41Z
date_updated: 2022-01-06T07:02:07Z
ddc:
- '040'
doi: 10.1504/IJGUC.2013.057120
file:
- access_level: closed
content_type: application/pdf
creator: florida
date_created: 2018-03-15T10:26:14Z
date_updated: 2018-03-15T10:26:14Z
file_id: '1280'
file_name: 561-authorFinalVersion.pdf
file_size: 1036554
relation: main_file
success: 1
file_date_updated: 2018-03-15T10:26:14Z
has_accepted_license: '1'
issue: '4'
main_file_link:
- url: http://www.inderscience.com/offer.php?id=57120
page: 265-277
project:
- _id: '1'
name: SFB 901
- _id: '13'
name: SFB 901 - Subprojekt C1
- _id: '4'
name: SFB 901 - Project Area C
publication: International Journal of Grid and Utility Computing
publisher: InderScience
status: public
title: A privacy-friendly Architecture for future Cloud Computing
type: journal_article
user_id: '477'
year: '2013'
...
---
_id: '562'
abstract:
- lang: eng
text: In Distributed Cloud Computing, applications are deployed across many data
centres at topologically diverse locations to improved network-related quality
of service (QoS). As we focus on interactive applications, we minimize the latency
between users and an application by allocating Cloud resources nearby the customers.
Allocating resources at all locations will result in the best latency but also
in the highest expenses. So we need to find an optimal subset of locations which
reduces the latency but also the expenses – the facility location problem (FLP).
In addition, we consider resource capacity restrictions, as a resource can only
serve a limited amount of users. An FLP can be globally solved. Additionally,
we propose a local, distributed heuristic. This heuristic is running within the
network and does not depend on a global component. No distributed, local approximations
for the capacitated FLP have been proposed so far due to the complexity of the
problem. We compared the heuristic with an optimal solution obtained from a mixed
integer program for different network topologies. We investigated the influence
of different parameters like overall resource utilization or different latency
weights.
author:
- first_name: Matthias
full_name: Keller, Matthias
last_name: Keller
- first_name: Stefan
full_name: Pawlik, Stefan
last_name: Pawlik
- first_name: Peter
full_name: Pietrzyk, Peter
last_name: Pietrzyk
- first_name: Holger
full_name: Karl, Holger
id: '126'
last_name: Karl
citation:
ama: 'Keller M, Pawlik S, Pietrzyk P, Karl H. A Local Heuristic for Latency-Optimized
Distributed Cloud Deployment. In: Proceedings of the 6th International Conference
on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud Computing.
; 2013:429-434. doi:10.1109/UCC.2013.85'
apa: Keller, M., Pawlik, S., Pietrzyk, P., & Karl, H. (2013). A Local Heuristic
for Latency-Optimized Distributed Cloud Deployment. In Proceedings of the 6th
International Conference on Utility and Cloud Computing (UCC) workshop on Distributed
cloud computing (pp. 429–434). https://doi.org/10.1109/UCC.2013.85
bibtex: '@inproceedings{Keller_Pawlik_Pietrzyk_Karl_2013, title={A Local Heuristic
for Latency-Optimized Distributed Cloud Deployment}, DOI={10.1109/UCC.2013.85},
booktitle={Proceedings of the 6th International Conference on Utility and Cloud
Computing (UCC) workshop on Distributed cloud computing}, author={Keller, Matthias
and Pawlik, Stefan and Pietrzyk, Peter and Karl, Holger}, year={2013}, pages={429–434}
}'
chicago: Keller, Matthias, Stefan Pawlik, Peter Pietrzyk, and Holger Karl. “A Local
Heuristic for Latency-Optimized Distributed Cloud Deployment.” In Proceedings
of the 6th International Conference on Utility and Cloud Computing (UCC) Workshop
on Distributed Cloud Computing, 429–34, 2013. https://doi.org/10.1109/UCC.2013.85.
ieee: M. Keller, S. Pawlik, P. Pietrzyk, and H. Karl, “A Local Heuristic for Latency-Optimized
Distributed Cloud Deployment,” in Proceedings of the 6th International Conference
on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing,
2013, pp. 429–434.
mla: Keller, Matthias, et al. “A Local Heuristic for Latency-Optimized Distributed
Cloud Deployment.” Proceedings of the 6th International Conference on Utility
and Cloud Computing (UCC) Workshop on Distributed Cloud Computing, 2013, pp.
429–34, doi:10.1109/UCC.2013.85.
short: 'M. Keller, S. Pawlik, P. Pietrzyk, H. Karl, in: Proceedings of the 6th International
Conference on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud
Computing, 2013, pp. 429–434.'
date_created: 2017-10-17T12:42:41Z
date_updated: 2022-01-06T07:02:11Z
ddc:
- '040'
department:
- _id: '75'
- _id: '63'
doi: 10.1109/UCC.2013.85
file:
- access_level: closed
content_type: application/pdf
creator: florida
date_created: 2018-03-15T10:25:45Z
date_updated: 2018-03-15T10:25:45Z
file_id: '1279'
file_name: 562-dcc13_paper.pdf
file_size: 347873
relation: main_file
success: 1
file_date_updated: 2018-03-15T10:25:45Z
has_accepted_license: '1'
language:
- iso: eng
page: 429-434
project:
- _id: '1'
name: SFB 901
- _id: '6'
name: SFB 901 - Subprojekt A2
- _id: '5'
name: SFB 901 - Subproject A1
- _id: '2'
name: SFB 901 - Project Area A
publication: Proceedings of the 6th International Conference on Utility and Cloud
Computing (UCC) workshop on Distributed cloud computing
status: public
title: A Local Heuristic for Latency-Optimized Distributed Cloud Deployment
type: conference
user_id: '477'
year: '2013'
...
---
_id: '563'
abstract:
- lang: eng
text: Dominating set based virtual backbones are used for rou-ting in wireless ad-hoc
networks. Such backbones receive and transmit messages from/to every node in the
network. Existing distributed algorithms only consider undirected graphs, which
model symmetric networks with uniform transmission ranges. We are particularly
interested in the well-established disk graphs, which model asymmetric networks
with non-uniform transmission ranges. The corresponding graph theoretic problem
seeks a strongly connected dominating-absorbent set of minimum cardinality in
a digraph. A subset of nodes in a digraph is a strongly connected dominating-absorbent
set if the subgraph induced by these nodes is strongly connected and each node
in the graph is either in the set or has both an in-neighbor and an out-neighbor
in it. We introduce the first distributed algorithm for this problem in disk graphs.
The algorithm gives an O(k^4) -approximation ratio and has a runtime bound of
O(Diam) where Diam is the diameter of the graph and k denotes the transmission
ratio r_{max}/r_{min} with r_{max} and r_{min} being the maximum and minimum transmission
range, respectively. Moreover, we apply our algorithm on the subgraph of disk
graphs consisting of only bidirectional edges. Our algorithm gives an O(ln k)
-approximation and a runtime bound of O(k^8 log^∗ n) , which, for bounded k ,
is an optimal approximation for the problem, following Lenzen and Wattenhofer’s
Ω(log^∗ n) runtime lower bound for distributed constant approximation in disk
graphs.
author:
- first_name: Christine
full_name: Markarian, Christine
id: '37612'
last_name: Markarian
- first_name: Friedhelm
full_name: Meyer auf der Heide, Friedhelm
id: '15523'
last_name: Meyer auf der Heide
- first_name: Michael
full_name: Schubert, Michael
last_name: Schubert
citation:
ama: 'Markarian C, Meyer auf der Heide F, Schubert M. A Distributed Approximation
Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless
Ad-Hoc Networks. In: Proceedings of the 9th International Symposium on Algorithms
and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics
(ALGOSENSORS). LNCS. ; 2013:217-227. doi:10.1007/978-3-642-45346-5_16'
apa: Markarian, C., Meyer auf der Heide, F., & Schubert, M. (2013). A Distributed
Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric
Wireless Ad-Hoc Networks. In Proceedings of the 9th International Symposium
on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed
Robotics (ALGOSENSORS) (pp. 217–227). https://doi.org/10.1007/978-3-642-45346-5_16
bibtex: '@inproceedings{Markarian_Meyer auf der Heide_Schubert_2013, series={LNCS},
title={A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent
Sets in Asymmetric Wireless Ad-Hoc Networks}, DOI={10.1007/978-3-642-45346-5_16},
booktitle={Proceedings of the 9th International Symposium on Algorithms and Experiments
for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)},
author={Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert,
Michael}, year={2013}, pages={217–227}, collection={LNCS} }'
chicago: Markarian, Christine, Friedhelm Meyer auf der Heide, and Michael Schubert.
“A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent
Sets in Asymmetric Wireless Ad-Hoc Networks.” In Proceedings of the 9th International
Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks
and Distributed Robotics (ALGOSENSORS), 217–27. LNCS, 2013. https://doi.org/10.1007/978-3-642-45346-5_16.
ieee: C. Markarian, F. Meyer auf der Heide, and M. Schubert, “A Distributed Approximation
Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless
Ad-Hoc Networks,” in Proceedings of the 9th International Symposium on Algorithms
and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics
(ALGOSENSORS), 2013, pp. 217–227.
mla: Markarian, Christine, et al. “A Distributed Approximation Algorithm for Strongly
Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.” Proceedings
of the 9th International Symposium on Algorithms and Experiments for Sensor Systems,
Wireless Networks and Distributed Robotics (ALGOSENSORS), 2013, pp. 217–27,
doi:10.1007/978-3-642-45346-5_16.
short: 'C. Markarian, F. Meyer auf der Heide, M. Schubert, in: Proceedings of the
9th International Symposium on Algorithms and Experiments for Sensor Systems,
Wireless Networks and Distributed Robotics (ALGOSENSORS), 2013, pp. 217–227.'
date_created: 2017-10-17T12:42:42Z
date_updated: 2022-01-06T07:02:13Z
ddc:
- '040'
department:
- _id: '63'
doi: 10.1007/978-3-642-45346-5_16
file:
- access_level: closed
content_type: application/pdf
creator: florida
date_created: 2018-03-15T10:25:15Z
date_updated: 2018-03-15T10:25:15Z
file_id: '1278'
file_name: 563-978-3-642-45346-5_16.pdf
file_size: 348191
relation: main_file
success: 1
file_date_updated: 2018-03-15T10:25:15Z
has_accepted_license: '1'
page: 217-227
project:
- _id: '1'
name: SFB 901
- _id: '5'
name: SFB 901 - Subprojekt A1
- _id: '2'
name: SFB 901 - Project Area A
publication: Proceedings of the 9th International Symposium on Algorithms and Experiments
for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)
series_title: LNCS
status: public
title: A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent
Sets in Asymmetric Wireless Ad-Hoc Networks
type: conference
user_id: '477'
year: '2013'
...
---
_id: '5637'
author:
- first_name: Guido
full_name: Schryen, Guido
id: '72850'
last_name: Schryen
citation:
ama: 'Schryen G. Revisiting IS Business Value Research: What we already know, what
we still need to know, and how we can get there. European Journal of Information
Systems (EJIS). 2013;22(2):139-169.'
apa: 'Schryen, G. (2013). Revisiting IS Business Value Research: What we already
know, what we still need to know, and how we can get there. European Journal
of Information Systems (EJIS), 22(2), 139–169.'
bibtex: '@article{Schryen_2013, title={Revisiting IS Business Value Research: What
we already know, what we still need to know, and how we can get there}, volume={22},
number={2}, journal={European Journal of Information Systems (EJIS)}, author={Schryen,
Guido}, year={2013}, pages={139–169} }'
chicago: 'Schryen, Guido. “Revisiting IS Business Value Research: What We Already
Know, What We Still Need to Know, and How We Can Get There.” European Journal
of Information Systems (EJIS) 22, no. 2 (2013): 139–69.'
ieee: 'G. Schryen, “Revisiting IS Business Value Research: What we already know,
what we still need to know, and how we can get there,” European Journal of
Information Systems (EJIS), vol. 22, no. 2, pp. 139–169, 2013.'
mla: 'Schryen, Guido. “Revisiting IS Business Value Research: What We Already Know,
What We Still Need to Know, and How We Can Get There.” European Journal of
Information Systems (EJIS), vol. 22, no. 2, 2013, pp. 139–69.'
short: G. Schryen, European Journal of Information Systems (EJIS) 22 (2013) 139–169.
date_created: 2018-11-14T14:31:37Z
date_updated: 2022-01-06T07:02:16Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
content_type: application/pdf
creator: hsiemes
date_created: 2018-12-07T11:59:54Z
date_updated: 2018-12-13T15:11:53Z
file_id: '6048'
file_name: EJIS-PAPER.pdf
file_size: 792102
relation: main_file
file_date_updated: 2018-12-13T15:11:53Z
has_accepted_license: '1'
intvolume: ' 22'
issue: '2'
language:
- iso: eng
oa: '1'
page: 139-169
publication: European Journal of Information Systems (EJIS)
status: public
title: 'Revisiting IS Business Value Research: What we already know, what we still
need to know, and how we can get there'
type: journal_article
user_id: '61579'
volume: 22
year: '2013'
...
---
_id: '564'
abstract:
- lang: eng
text: We consider the problem of resource discovery in distributed systems. In particular
we give an algorithm, such that each node in a network discovers the add ress
of any other node in the network. We model the knowledge of the nodes as a virtual
overlay network given by a directed graph such that complete knowledge of all
nodes corresponds to a complete graph in the overlay network. Although there are
several solutions for resource discovery, our solution is the first that achieves
worst-case optimal work for each node, i.e. the number of addresses (O(n)) or
bits (O(nlogn)) a node receives or sendscoincides with the lower bound, while
ensuring only a linearruntime (O(n)) on the number of rounds.
author:
- first_name: Sebastian
full_name: Kniesburges, Sebastian
last_name: Kniesburges
- first_name: Andreas
full_name: Koutsopoulos, Andreas
last_name: Koutsopoulos
- first_name: Christian
full_name: Scheideler, Christian
id: '20792'
last_name: Scheideler
citation:
ama: 'Kniesburges S, Koutsopoulos A, Scheideler C. A Deterministic Worst-Case Message
Complexity Optimal Solution for Resource Discovery. In: Proceedings of 20th
International Colloqium on Structural Information and Communication Complexity
(SIROCCO). Lecture Notes in Computer Science. ; 2013:165-176. doi:10.1007/978-3-319-03578-9_14'
apa: Kniesburges, S., Koutsopoulos, A., & Scheideler, C. (2013). A Deterministic
Worst-Case Message Complexity Optimal Solution for Resource Discovery. In Proceedings
of 20th International Colloqium on Structural Information and Communication Complexity
(SIROCCO) (pp. 165–176). https://doi.org/10.1007/978-3-319-03578-9_14
bibtex: '@inproceedings{Kniesburges_Koutsopoulos_Scheideler_2013, series={Lecture
Notes in Computer Science}, title={A Deterministic Worst-Case Message Complexity
Optimal Solution for Resource Discovery}, DOI={10.1007/978-3-319-03578-9_14},
booktitle={Proceedings of 20th International Colloqium on Structural Information
and Communication Complexity (SIROCCO)}, author={Kniesburges, Sebastian and Koutsopoulos,
Andreas and Scheideler, Christian}, year={2013}, pages={165–176}, collection={Lecture
Notes in Computer Science} }'
chicago: Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler.
“A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.”
In Proceedings of 20th International Colloqium on Structural Information and
Communication Complexity (SIROCCO), 165–76. Lecture Notes in Computer Science,
2013. https://doi.org/10.1007/978-3-319-03578-9_14.
ieee: S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “A Deterministic Worst-Case
Message Complexity Optimal Solution for Resource Discovery,” in Proceedings
of 20th International Colloqium on Structural Information and Communication Complexity
(SIROCCO), 2013, pp. 165–176.
mla: Kniesburges, Sebastian, et al. “A Deterministic Worst-Case Message Complexity
Optimal Solution for Resource Discovery.” Proceedings of 20th International
Colloqium on Structural Information and Communication Complexity (SIROCCO),
2013, pp. 165–76, doi:10.1007/978-3-319-03578-9_14.
short: 'S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of 20th
International Colloqium on Structural Information and Communication Complexity
(SIROCCO), 2013, pp. 165–176.'
date_created: 2017-10-17T12:42:42Z
date_updated: 2022-01-06T07:02:17Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1007/978-3-319-03578-9_14
file:
- access_level: closed
content_type: application/pdf
creator: florida
date_created: 2018-03-15T10:24:40Z
date_updated: 2018-03-15T10:24:40Z
file_id: '1277'
file_name: 564-SIROCCO13.pdf
file_size: 168884
relation: main_file
success: 1
file_date_updated: 2018-03-15T10:24:40Z
has_accepted_license: '1'
page: 165-176
project:
- _id: '1'
name: SFB 901
- _id: '5'
name: SFB 901 - Subprojekt A1
- _id: '2'
name: SFB 901 - Project Area A
publication: Proceedings of 20th International Colloqium on Structural Information
and Communication Complexity (SIROCCO)
series_title: Lecture Notes in Computer Science
status: public
title: A Deterministic Worst-Case Message Complexity Optimal Solution for Resource
Discovery
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '6456'
author:
- first_name: J. J. S.
full_name: Higham, J. J. S.
last_name: Higham
- first_name: H.-Hugo
full_name: Kremer, H.-Hugo
id: '15280'
last_name: Kremer
- first_name: D.
full_name: Yeomans, D.
last_name: Yeomans
citation:
ama: 'Higham JJS, Kremer H-H, Yeomans D. Exploring Intermediate Vocational Education
and Training for 16-19 Year-olds in Germany and England. In: Deitmer L, Hauschildt
U, Rauner F, Zelloth H, eds. The Architecture of Innovative Apprenticeship.
Dordrecht; 2013:39-50.'
apa: Higham, J. J. S., Kremer, H.-H., & Yeomans, D. (2013). Exploring Intermediate
Vocational Education and Training for 16-19 Year-olds in Germany and England.
In L. Deitmer, U. Hauschildt, F. Rauner, & H. Zelloth (Eds.), The Architecture
of Innovative Apprenticeship (pp. 39–50). Dordrecht.
bibtex: '@inbook{Higham_Kremer_Yeomans_2013, place={Dordrecht}, title={Exploring
Intermediate Vocational Education and Training for 16-19 Year-olds in Germany
and England}, booktitle={The Architecture of Innovative Apprenticeship}, author={Higham,
J. J. S. and Kremer, H.-Hugo and Yeomans, D.}, editor={Deitmer, L. and Hauschildt,
U. and Rauner, F. and Zelloth, H.Editors}, year={2013}, pages={39–50} }'
chicago: Higham, J. J. S., H.-Hugo Kremer, and D. Yeomans. “Exploring Intermediate
Vocational Education and Training for 16-19 Year-Olds in Germany and England.”
In The Architecture of Innovative Apprenticeship, edited by L. Deitmer,
U. Hauschildt, F. Rauner, and H. Zelloth, 39–50. Dordrecht, 2013.
ieee: J. J. S. Higham, H.-H. Kremer, and D. Yeomans, “Exploring Intermediate Vocational
Education and Training for 16-19 Year-olds in Germany and England,” in The
Architecture of Innovative Apprenticeship, L. Deitmer, U. Hauschildt, F. Rauner,
and H. Zelloth, Eds. Dordrecht, 2013, pp. 39–50.
mla: Higham, J. J. S., et al. “Exploring Intermediate Vocational Education and Training
for 16-19 Year-Olds in Germany and England.” The Architecture of Innovative
Apprenticeship, edited by L. Deitmer et al., 2013, pp. 39–50.
short: 'J.J.S. Higham, H.-H. Kremer, D. Yeomans, in: L. Deitmer, U. Hauschildt,
F. Rauner, H. Zelloth (Eds.), The Architecture of Innovative Apprenticeship, Dordrecht,
2013, pp. 39–50.'
date_created: 2019-01-02T10:33:48Z
date_updated: 2022-01-06T07:03:05Z
department:
- _id: '211'
editor:
- first_name: L.
full_name: Deitmer, L.
last_name: Deitmer
- first_name: U.
full_name: Hauschildt, U.
last_name: Hauschildt
- first_name: F.
full_name: Rauner, F.
last_name: Rauner
- first_name: H.
full_name: Zelloth, H.
last_name: Zelloth
language:
- iso: eng
page: 39-50
place: Dordrecht
publication: The Architecture of Innovative Apprenticeship
status: public
title: Exploring Intermediate Vocational Education and Training for 16-19 Year-olds
in Germany and England
type: book_chapter
user_id: '74378'
year: '2013'
...
---
_id: '6457'
author:
- first_name: H.-Hugo
full_name: Kremer, H.-Hugo
id: '15280'
last_name: Kremer
- first_name: Marc
full_name: Beutner, Marc
id: '21118'
last_name: Beutner
- first_name: W.
full_name: Wirth, W.
last_name: Wirth
citation:
ama: 'Kremer H-H, Beutner M, Wirth W. Lernen im Justizvollzug. Vorstellung und Grundidee
des Modellprojektes TANDEM. In: Kremer H-H, Beutner M, Wirth W, eds. Berufsorientierung,
Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung
im Jungtätervollzug. Paderborn; 2013.'
apa: Kremer, H.-H., Beutner, M., & Wirth, W. (2013). Lernen im Justizvollzug.
Vorstellung und Grundidee des Modellprojektes TANDEM. In H.-H. Kremer, M. Beutner,
& W. Wirth (Eds.), Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung
- Konzepte zur beruflichen Bildung im Jungtätervollzug. Paderborn.
bibtex: '@inbook{Kremer_Beutner_Wirth_2013, place={Paderborn}, title={Lernen im
Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM}, booktitle={Berufsorientierung,
Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung
im Jungtätervollzug}, author={Kremer, H.-Hugo and Beutner, Marc and Wirth, W.},
editor={Kremer, H.-H. and Beutner, M. and Wirth, W.Editors}, year={2013} }'
chicago: Kremer, H.-Hugo, Marc Beutner, and W. Wirth. “Lernen im Justizvollzug.
Vorstellung und Grundidee des Modellprojektes TANDEM.” In Berufsorientierung,
Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung
im Jungtätervollzug, edited by H.-H. Kremer, M. Beutner, and W. Wirth. Paderborn,
2013.
ieee: H.-H. Kremer, M. Beutner, and W. Wirth, “Lernen im Justizvollzug. Vorstellung
und Grundidee des Modellprojektes TANDEM,” in Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug,
H.-H. Kremer, M. Beutner, and W. Wirth, Eds. Paderborn, 2013.
mla: Kremer, H. Hugo, et al. “Lernen im Justizvollzug. Vorstellung und Grundidee
des Modellprojektes TANDEM.” Berufsorientierung, Gewaltsensibilisierung und
Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug,
edited by H.-H. Kremer et al., 2013.
short: 'H.-H. Kremer, M. Beutner, W. Wirth, in: H.-H. Kremer, M. Beutner, W. Wirth
(Eds.), Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung -
Konzepte zur beruflichen Bildung im Jungtätervollzug, Paderborn, 2013.'
date_created: 2019-01-02T10:43:00Z
date_updated: 2022-01-06T07:03:05Z
department:
- _id: '211'
editor:
- first_name: H.-H.
full_name: Kremer, H.-H.
last_name: Kremer
- first_name: M.
full_name: Beutner, M.
last_name: Beutner
- first_name: W.
full_name: Wirth, W.
last_name: Wirth
language:
- iso: ger
place: Paderborn
publication: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung -
Konzepte zur beruflichen Bildung im Jungtätervollzug
status: public
title: Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM
type: book_chapter
user_id: '74378'
year: '2013'
...
---
_id: '6458'
author:
- first_name: H.-Hugo
full_name: Kremer, H.-Hugo
id: '15280'
last_name: Kremer
- first_name: Marc
full_name: Beutner, Marc
id: '21118'
last_name: Beutner
citation:
ama: 'Kremer H-H, Beutner M. Berufsorientierung im Jungtätervollzug - Rahmenkonzept
und übergreifenden Prinzipien. In: Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug.
Paderborn; 2013.'
apa: Kremer, H.-H., & Beutner, M. (2013). Berufsorientierung im Jungtätervollzug
- Rahmenkonzept und übergreifenden Prinzipien. In Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug.
Paderborn.
bibtex: '@inbook{Kremer_Beutner_2013, place={Paderborn}, title={Berufsorientierung
im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien}, booktitle={Berufsorientierung,
Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung
im Jungtätervollzug}, author={Kremer, H.-Hugo and Beutner, Marc}, year={2013}
}'
chicago: Kremer, H.-Hugo, and Marc Beutner. “Berufsorientierung im Jungtätervollzug
- Rahmenkonzept und übergreifenden Prinzipien.” In Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug.
Paderborn, 2013.
ieee: H.-H. Kremer and M. Beutner, “Berufsorientierung im Jungtätervollzug - Rahmenkonzept
und übergreifenden Prinzipien,” in Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug,
Paderborn, 2013.
mla: Kremer, H. Hugo, and Marc Beutner. “Berufsorientierung im Jungtätervollzug
- Rahmenkonzept und übergreifenden Prinzipien.” Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug,
2013.
short: 'H.-H. Kremer, M. Beutner, in: Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug,
Paderborn, 2013.'
date_created: 2019-01-02T10:45:41Z
date_updated: 2022-01-06T07:03:05Z
department:
- _id: '211'
language:
- iso: ger
place: Paderborn
publication: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung -
Konzepte zur beruflichen Bildung im Jungtätervollzug
status: public
title: Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien
type: book_chapter
user_id: '74378'
year: '2013'
...
---
_id: '6459'
author:
- first_name: M.
full_name: Gebbe, M.
last_name: Gebbe
- first_name: H.-Hugo
full_name: Kremer, H.-Hugo
id: '15280'
last_name: Kremer
citation:
ama: 'Gebbe M, Kremer H-H. myflux.eu - Ein Instrument zur Förderung von Zielorientierung,
Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern. In:
Kremer H-H, Beutner M, Wirth W, eds. Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug.
Paderborn; 2013.'
apa: Gebbe, M., & Kremer, H.-H. (2013). myflux.eu - Ein Instrument zur Förderung
von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess
von Jungtätern. In H.-H. Kremer, M. Beutner, & W. Wirth (Eds.), Berufsorientierung,
Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung
im Jungtätervollzug. Paderborn.
bibtex: '@inbook{Gebbe_Kremer_2013, place={Paderborn}, title={myflux.eu - Ein Instrument
zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess
von Jungtätern}, booktitle={Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung
- Konzepte zur beruflichen Bildung im Jungtätervollzug}, author={Gebbe, M. and
Kremer, H.-Hugo}, editor={Kremer, H.-H. and Beutner, M. and Wirth, W.Editors},
year={2013} }'
chicago: Gebbe, M., and H.-Hugo Kremer. “myflux.eu - Ein Instrument zur Förderung
von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess
von Jungtätern.” In Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung
- Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer,
M. Beutner, and W. Wirth. Paderborn, 2013.
ieee: M. Gebbe and H.-H. Kremer, “myflux.eu - Ein Instrument zur Förderung von Zielorientierung,
Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern,” in
Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte
zur beruflichen Bildung im Jungtätervollzug, H.-H. Kremer, M. Beutner, and
W. Wirth, Eds. Paderborn, 2013.
mla: Gebbe, M., and H. Hugo Kremer. “myflux.eu - Ein Instrument zur Förderung von
Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von
Jungtätern.” Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung
- Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer
et al., 2013.
short: 'M. Gebbe, H.-H. Kremer, in: H.-H. Kremer, M. Beutner, W. Wirth (Eds.), Berufsorientierung,
Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung
im Jungtätervollzug, Paderborn, 2013.'
date_created: 2019-01-02T10:48:32Z
date_updated: 2022-01-06T07:03:05Z
department:
- _id: '211'
editor:
- first_name: H.-H.
full_name: Kremer, H.-H.
last_name: Kremer
- first_name: M.
full_name: Beutner, M.
last_name: Beutner
- first_name: W.
full_name: Wirth, W.
last_name: Wirth
language:
- iso: ger
place: Paderborn
publication: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung -
Konzepte zur beruflichen Bildung im Jungtätervollzug
status: public
title: myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und
Verantwortung im Berufsorientierungsprozess von Jungtätern
type: book_chapter
user_id: '74378'
year: '2013'
...
---
_id: '6461'
author:
- first_name: H.-Hugo
full_name: Kremer, H.-Hugo
id: '15280'
last_name: Kremer
- first_name: S.
full_name: Knust, S.
last_name: Knust
citation:
ama: 'Kremer H-H, Knust S. Stärkenbasierte Berufsorientierung im Jungtätervollzug
. In: Kremer H-H, Beutner M, Wirth W, eds. Berufsorientierung, Gewaltsensibilisierung
und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug.
Paderborn; 2013.'
apa: Kremer, H.-H., & Knust, S. (2013). Stärkenbasierte Berufsorientierung im
Jungtätervollzug . In H.-H. Kremer, M. Beutner, & W. Wirth (Eds.), Berufsorientierung,
Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung
im Jungtätervollzug. Paderborn.
bibtex: '@inbook{Kremer_Knust_2013, place={Paderborn}, title={Stärkenbasierte Berufsorientierung
im Jungtätervollzug }, booktitle={Berufsorientierung, Gewaltsensibilisierung und
Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug},
author={Kremer, H.-Hugo and Knust, S.}, editor={Kremer, H.-H. and Beutner, M.
and Wirth, W.Editors}, year={2013} }'
chicago: Kremer, H.-Hugo, and S. Knust. “Stärkenbasierte Berufsorientierung im Jungtätervollzug
.” In Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung -
Konzepte zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer,
M. Beutner, and W. Wirth. Paderborn, 2013.
ieee: H.-H. Kremer and S. Knust, “Stärkenbasierte Berufsorientierung im Jungtätervollzug
,” in Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung -
Konzepte zur beruflichen Bildung im Jungtätervollzug, H.-H. Kremer, M. Beutner,
and W. Wirth, Eds. Paderborn, 2013.
mla: Kremer, H. Hugo, and S. Knust. “Stärkenbasierte Berufsorientierung im Jungtätervollzug
.” Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte
zur beruflichen Bildung im Jungtätervollzug, edited by H.-H. Kremer et al.,
2013.
short: 'H.-H. Kremer, S. Knust, in: H.-H. Kremer, M. Beutner, W. Wirth (Eds.), Berufsorientierung,
Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung
im Jungtätervollzug, Paderborn, 2013.'
date_created: 2019-01-02T10:52:12Z
date_updated: 2022-01-06T07:03:06Z
department:
- _id: '211'
editor:
- first_name: H.-H.
full_name: Kremer, H.-H.
last_name: Kremer
- first_name: M.
full_name: Beutner, M.
last_name: Beutner
- first_name: W.
full_name: Wirth, W.
last_name: Wirth
language:
- iso: ger
place: Paderborn
publication: Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung -
Konzepte zur beruflichen Bildung im Jungtätervollzug
status: public
title: 'Stärkenbasierte Berufsorientierung im Jungtätervollzug '
type: book_chapter
user_id: '74378'
year: '2013'
...