---
_id: '3497'
author:
- first_name: Daniel
  full_name: Beverungen, Daniel
  id: '59677'
  last_name: Beverungen
- first_name: Mathias
  full_name: Eggert, Mathias
  last_name: Eggert
- first_name: Matthias
  full_name: Voigt, Matthias
  last_name: Voigt
- first_name: Michael
  full_name: Rosemann, Michael
  last_name: Rosemann
citation:
  ama: Beverungen D, Eggert M, Voigt M, Rosemann M. Augmenting Analytical CRM Strategies
    with Social BI. <i>International Journal of Business Intelligence Research (IJBIR)</i>.
    2013;(3):32--49. doi:<a href="https://doi.org/10.4018/ijbir.2013070103">10.4018/ijbir.2013070103</a>
  apa: Beverungen, D., Eggert, M., Voigt, M., &#38; Rosemann, M. (2013). Augmenting
    Analytical CRM Strategies with Social BI. <i>International Journal of Business
    Intelligence Research (IJBIR)</i>, (3), 32--49. <a href="https://doi.org/10.4018/ijbir.2013070103">https://doi.org/10.4018/ijbir.2013070103</a>
  bibtex: '@article{Beverungen_Eggert_Voigt_Rosemann_2013, title={Augmenting Analytical
    CRM Strategies with Social BI}, DOI={<a href="https://doi.org/10.4018/ijbir.2013070103">10.4018/ijbir.2013070103</a>},
    number={3}, journal={International Journal of Business Intelligence Research (IJBIR)},
    author={Beverungen, Daniel and Eggert, Mathias and Voigt, Matthias and Rosemann,
    Michael}, year={2013}, pages={32--49} }'
  chicago: 'Beverungen, Daniel, Mathias Eggert, Matthias Voigt, and Michael Rosemann.
    “Augmenting Analytical CRM Strategies with Social BI.” <i>International Journal
    of Business Intelligence Research (IJBIR)</i>, no. 3 (2013): 32--49. <a href="https://doi.org/10.4018/ijbir.2013070103">https://doi.org/10.4018/ijbir.2013070103</a>.'
  ieee: D. Beverungen, M. Eggert, M. Voigt, and M. Rosemann, “Augmenting Analytical
    CRM Strategies with Social BI,” <i>International Journal of Business Intelligence
    Research (IJBIR)</i>, no. 3, pp. 32--49, 2013.
  mla: Beverungen, Daniel, et al. “Augmenting Analytical CRM Strategies with Social
    BI.” <i>International Journal of Business Intelligence Research (IJBIR)</i>, no.
    3, 2013, pp. 32--49, doi:<a href="https://doi.org/10.4018/ijbir.2013070103">10.4018/ijbir.2013070103</a>.
  short: D. Beverungen, M. Eggert, M. Voigt, M. Rosemann, International Journal of
    Business Intelligence Research (IJBIR) (2013) 32--49.
date_created: 2018-07-06T10:45:38Z
date_updated: 2022-01-06T06:59:19Z
department:
- _id: '526'
doi: 10.4018/ijbir.2013070103
extern: '1'
issue: '3'
page: 32--49
publication: International Journal of Business Intelligence Research (IJBIR)
status: public
title: Augmenting Analytical CRM Strategies with Social BI
type: journal_article
user_id: '21671'
year: '2013'
...
---
_id: '3498'
author:
- first_name: Sara
  full_name: Hofmann, Sara
  last_name: Hofmann
- first_name: Daniel
  full_name: Beverungen, Daniel
  id: '59677'
  last_name: Beverungen
- first_name: Michael
  full_name: Räckers, Michael
  last_name: Räckers
- first_name: Jörg
  full_name: Becker, Jörg
  last_name: Becker
citation:
  ama: Hofmann S, Beverungen D, Räckers M, Becker J. What Makes Local Governments’
    Online Communications Successful? Insights from a Multi-Method Analysis of Facebook.
    <i>Government Information Quarterly</i>. 2013;(4):387--396. doi:<a href="https://doi.org/10.1016/j.giq.2013.05.013">10.1016/j.giq.2013.05.013</a>
  apa: Hofmann, S., Beverungen, D., Räckers, M., &#38; Becker, J. (2013). What Makes
    Local Governments’ Online Communications Successful? Insights from a Multi-Method
    Analysis of Facebook. <i>Government Information Quarterly</i>, (4), 387--396.
    <a href="https://doi.org/10.1016/j.giq.2013.05.013">https://doi.org/10.1016/j.giq.2013.05.013</a>
  bibtex: '@article{Hofmann_Beverungen_Räckers_Becker_2013, title={What Makes Local
    Governments’ Online Communications Successful? Insights from a Multi-Method Analysis
    of Facebook}, DOI={<a href="https://doi.org/10.1016/j.giq.2013.05.013">10.1016/j.giq.2013.05.013</a>},
    number={4}, journal={Government Information Quarterly}, author={Hofmann, Sara
    and Beverungen, Daniel and Räckers, Michael and Becker, Jörg}, year={2013}, pages={387--396}
    }'
  chicago: 'Hofmann, Sara, Daniel Beverungen, Michael Räckers, and Jörg Becker. “What
    Makes Local Governments’ Online Communications Successful? Insights from a Multi-Method
    Analysis of Facebook.” <i>Government Information Quarterly</i>, no. 4 (2013):
    387--396. <a href="https://doi.org/10.1016/j.giq.2013.05.013">https://doi.org/10.1016/j.giq.2013.05.013</a>.'
  ieee: S. Hofmann, D. Beverungen, M. Räckers, and J. Becker, “What Makes Local Governments’
    Online Communications Successful? Insights from a Multi-Method Analysis of Facebook,”
    <i>Government Information Quarterly</i>, no. 4, pp. 387--396, 2013.
  mla: Hofmann, Sara, et al. “What Makes Local Governments’ Online Communications
    Successful? Insights from a Multi-Method Analysis of Facebook.” <i>Government
    Information Quarterly</i>, no. 4, 2013, pp. 387--396, doi:<a href="https://doi.org/10.1016/j.giq.2013.05.013">10.1016/j.giq.2013.05.013</a>.
  short: S. Hofmann, D. Beverungen, M. Räckers, J. Becker, Government Information
    Quarterly (2013) 387--396.
date_created: 2018-07-06T10:52:33Z
date_updated: 2022-01-06T06:59:19Z
department:
- _id: '526'
doi: 10.1016/j.giq.2013.05.013
extern: '1'
issue: '4'
page: 387--396
publication: Government Information Quarterly
status: public
title: What Makes Local Governments' Online Communications Successful? Insights from
  a Multi-Method Analysis of Facebook
type: journal_article
user_id: '21671'
year: '2013'
...
---
_id: '3499'
author:
- first_name: Ralf
  full_name: Plattfaut, Ralf
  last_name: Plattfaut
- first_name: Sara
  full_name: Hofmann, Sara
  last_name: Hofmann
- first_name: Thomas
  full_name: Kohlborn, Thomas
  last_name: Kohlborn
- first_name: Daniel
  full_name: Beverungen, Daniel
  id: '59677'
  last_name: Beverungen
- first_name: Michael
  full_name: Räckers, Michael
  last_name: Räckers
- first_name: Björn
  full_name: Niehaves, Björn
  last_name: Niehaves
- first_name: Jörg
  full_name: Becker, Jörg
  last_name: Becker
citation:
  ama: 'Plattfaut R, Hofmann S, Kohlborn T, et al. Verwaltungsdienstleistungen für
    Personen mit eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government?
    <i>eGovernment Review</i>. 2013:14--15.'
  apa: 'Plattfaut, R., Hofmann, S., Kohlborn, T., Beverungen, D., Räckers, M., Niehaves,
    B., &#38; Becker, J. (2013). Verwaltungsdienstleistungen für Personen mit eingeschränkter
    Mobilität: Von mobilen Bürgerdiensten zu E-Government? <i>EGovernment Review</i>,
    14--15.'
  bibtex: '@article{Plattfaut_Hofmann_Kohlborn_Beverungen_Räckers_Niehaves_Becker_2013,
    title={Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität:
    Von mobilen Bürgerdiensten zu E-Government?}, journal={eGovernment Review}, author={Plattfaut,
    Ralf and Hofmann, Sara and Kohlborn, Thomas and Beverungen, Daniel and Räckers,
    Michael and Niehaves, Björn and Becker, Jörg}, year={2013}, pages={14--15} }'
  chicago: 'Plattfaut, Ralf, Sara Hofmann, Thomas Kohlborn, Daniel Beverungen, Michael
    Räckers, Björn Niehaves, and Jörg Becker. “Verwaltungsdienstleistungen Für Personen
    Mit Eingeschränkter Mobilität: Von Mobilen Bürgerdiensten Zu E-Government?” <i>EGovernment
    Review</i>, 2013, 14--15.'
  ieee: 'R. Plattfaut <i>et al.</i>, “Verwaltungsdienstleistungen für Personen mit
    eingeschränkter Mobilität: Von mobilen Bürgerdiensten zu E-Government?,” <i>eGovernment
    Review</i>, pp. 14--15, 2013.'
  mla: 'Plattfaut, Ralf, et al. “Verwaltungsdienstleistungen Für Personen Mit Eingeschränkter
    Mobilität: Von Mobilen Bürgerdiensten Zu E-Government?” <i>EGovernment Review</i>,
    2013, pp. 14--15.'
  short: R. Plattfaut, S. Hofmann, T. Kohlborn, D. Beverungen, M. Räckers, B. Niehaves,
    J. Becker, EGovernment Review (2013) 14--15.
date_created: 2018-07-06T10:57:56Z
date_updated: 2022-01-06T06:59:19Z
department:
- _id: '526'
extern: '1'
page: 14--15
publication: eGovernment Review
status: public
title: 'Verwaltungsdienstleistungen für Personen mit eingeschränkter Mobilität: Von
  mobilen Bürgerdiensten zu E-Government?'
type: journal_article
user_id: '21671'
year: '2013'
...
---
_id: '3660'
author:
- first_name: Christian
  full_name: Harteis, Christian
  id: '27503'
  last_name: Harteis
  orcid: https://orcid.org/0000-0002-3570-7626
- first_name: Stephen
  full_name: Billett, Stephen
  last_name: Billett
citation:
  ama: 'Harteis C, Billett S. Intuitive expertise: Theories and empirical evidence.
    <i>Educational Research Review</i>. 2013;9:145--157.'
  apa: 'Harteis, C., &#38; Billett, S. (2013). Intuitive expertise: Theories and empirical
    evidence. <i>Educational Research Review</i>, <i>9</i>, 145--157.'
  bibtex: '@article{Harteis_Billett_2013, title={Intuitive expertise: Theories and
    empirical evidence}, volume={9}, journal={Educational Research Review}, author={Harteis,
    Christian and Billett, Stephen}, year={2013}, pages={145--157} }'
  chicago: 'Harteis, Christian, and Stephen Billett. “Intuitive Expertise: Theories
    and Empirical Evidence.” <i>Educational Research Review</i> 9 (2013): 145--157.'
  ieee: 'C. Harteis and S. Billett, “Intuitive expertise: Theories and empirical evidence,”
    <i>Educational Research Review</i>, vol. 9, pp. 145--157, 2013.'
  mla: 'Harteis, Christian, and Stephen Billett. “Intuitive Expertise: Theories and
    Empirical Evidence.” <i>Educational Research Review</i>, vol. 9, 2013, pp. 145--157.'
  short: C. Harteis, S. Billett, Educational Research Review 9 (2013) 145--157.
date_created: 2018-07-23T12:56:58Z
date_updated: 2022-01-06T06:59:29Z
department:
- _id: '452'
intvolume: '         9'
page: 145--157
publication: Educational Research Review
status: public
title: 'Intuitive expertise: Theories and empirical evidence'
type: journal_article
user_id: '27503'
volume: 9
year: '2013'
...
---
_id: '3813'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
citation:
  ama: 'Wachsmuth H, Stein B, Engels G. Learning Efficient Information Extraction
    on Heterogeneous Texts. In: Gelbukh A, ed. <i>Proceedings of the Sixth International
    Joint Conference on Natural Language Processing</i>. Lecture Notes in Computer
    Science. ; 2013:534-542.'
  apa: Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Learning Efficient Information
    Extraction on Heterogeneous Texts. In A. Gelbukh (Ed.), <i>Proceedings of the
    Sixth International Joint Conference on Natural Language Processing</i> (pp. 534–542).
  bibtex: '@inproceedings{Wachsmuth_Stein_Engels_2013, series={Lecture Notes in Computer
    Science}, title={Learning Efficient Information Extraction on Heterogeneous Texts},
    booktitle={Proceedings of the Sixth International Joint Conference on Natural
    Language Processing}, author={Wachsmuth, Henning and Stein, Benno and Engels,
    Gregor}, editor={Gelbukh, AlexanderEditor}, year={2013}, pages={534–542}, collection={Lecture
    Notes in Computer Science} }'
  chicago: Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Learning Efficient
    Information Extraction on Heterogeneous Texts.” In <i>Proceedings of the Sixth
    International Joint Conference on Natural Language Processing</i>, edited by Alexander
    Gelbukh, 534–42. Lecture Notes in Computer Science, 2013.
  ieee: H. Wachsmuth, B. Stein, and G. Engels, “Learning Efficient Information Extraction
    on Heterogeneous Texts,” in <i>Proceedings of the Sixth International Joint Conference
    on Natural Language Processing</i>, 2013, pp. 534–542.
  mla: Wachsmuth, Henning, et al. “Learning Efficient Information Extraction on Heterogeneous
    Texts.” <i>Proceedings of the Sixth International Joint Conference on Natural
    Language Processing</i>, edited by Alexander Gelbukh, 2013, pp. 534–42.
  short: 'H. Wachsmuth, B. Stein, G. Engels, in: A. Gelbukh (Ed.), Proceedings of
    the Sixth International Joint Conference on Natural Language Processing, 2013,
    pp. 534–542.'
date_created: 2018-08-02T13:38:39Z
date_updated: 2022-01-06T06:59:37Z
department:
- _id: '600'
editor:
- first_name: Alexander
  full_name: Gelbukh, Alexander
  last_name: Gelbukh
language:
- iso: eng
main_file_link:
- url: https://www.aclweb.org/anthology/I13-1061.pdf
page: 534-542
publication: Proceedings of the Sixth International Joint Conference on Natural Language
  Processing
series_title: Lecture Notes in Computer Science
status: public
title: Learning Efficient Information Extraction on Heterogeneous Texts
type: conference
user_id: '82920'
year: '2013'
...
---
_id: '3814'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
citation:
  ama: 'Wachsmuth H, Stein B, Engels G. Information Extraction as a Filtering Task.
    In: <i>Proceedings of the 22nd ACM International Conference on Conference on Information
    &#38; Knowledge Management</i>. ; 2013:2049-2058.'
  apa: Wachsmuth, H., Stein, B., &#38; Engels, G. (2013). Information Extraction as
    a Filtering Task. In <i>Proceedings of the 22nd ACM International Conference on
    Conference on Information &#38; Knowledge Management</i> (pp. 2049–2058).
  bibtex: '@inproceedings{Wachsmuth_Stein_Engels_2013, title={Information Extraction
    as a Filtering Task}, booktitle={Proceedings of the 22nd ACM International Conference
    on Conference on Information &#38; Knowledge Management}, author={Wachsmuth, Henning
    and Stein, Benno and Engels, Gregor}, year={2013}, pages={2049–2058} }'
  chicago: Wachsmuth, Henning, Benno Stein, and Gregor Engels. “Information Extraction
    as a Filtering Task.” In <i>Proceedings of the 22nd ACM International Conference
    on Conference on Information &#38; Knowledge Management</i>, 2049–58, 2013.
  ieee: H. Wachsmuth, B. Stein, and G. Engels, “Information Extraction as a Filtering
    Task,” in <i>Proceedings of the 22nd ACM International Conference on Conference
    on Information &#38; Knowledge Management</i>, 2013, pp. 2049–2058.
  mla: Wachsmuth, Henning, et al. “Information Extraction as a Filtering Task.” <i>Proceedings
    of the 22nd ACM International Conference on Conference on Information &#38; Knowledge
    Management</i>, 2013, pp. 2049–58.
  short: 'H. Wachsmuth, B. Stein, G. Engels, in: Proceedings of the 22nd ACM International
    Conference on Conference on Information &#38; Knowledge Management, 2013, pp.
    2049–2058.'
date_created: 2018-08-02T13:38:40Z
date_updated: 2022-01-06T06:59:37Z
department:
- _id: '600'
language:
- iso: eng
main_file_link:
- url: https://dl.acm.org/doi/pdf/10.1145/2505515.2505557
page: 2049-2058
publication: Proceedings of the 22nd ACM International Conference on Conference on
  Information & Knowledge Management
publication_identifier:
  isbn:
  - 978-1-4503-2263-8
status: public
title: Information Extraction as a Filtering Task
type: conference
user_id: '82920'
year: '2013'
...
---
_id: '3876'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Mirko
  full_name: Rose, Mirko
  last_name: Rose
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
citation:
  ama: 'Wachsmuth H, Rose M, Engels G. Automatic Pipeline Construction for Real-Time
    Annotation. In: Gelbukh A, ed. <i>14th International Conference on Intelligent
    Text Processing and Computational Linguistics</i>. Lecture Notes in Computer Science.
    ; 2013:38-49.'
  apa: Wachsmuth, H., Rose, M., &#38; Engels, G. (2013). Automatic Pipeline Construction
    for Real-Time Annotation. In A. Gelbukh (Ed.), <i>14th International Conference
    on Intelligent Text Processing and Computational Linguistics</i> (pp. 38–49).
  bibtex: '@inproceedings{Wachsmuth_Rose_Engels_2013, series={Lecture Notes in Computer
    Science}, title={Automatic Pipeline Construction for Real-Time Annotation}, booktitle={14th
    International Conference on Intelligent Text Processing and Computational Linguistics},
    author={Wachsmuth, Henning and Rose, Mirko and Engels, Gregor}, editor={Gelbukh,
    AlexanderEditor}, year={2013}, pages={38–49}, collection={Lecture Notes in Computer
    Science} }'
  chicago: Wachsmuth, Henning, Mirko Rose, and Gregor Engels. “Automatic Pipeline
    Construction for Real-Time Annotation.” In <i>14th International Conference on
    Intelligent Text Processing and Computational Linguistics</i>, edited by Alexander
    Gelbukh, 38–49. Lecture Notes in Computer Science, 2013.
  ieee: H. Wachsmuth, M. Rose, and G. Engels, “Automatic Pipeline Construction for
    Real-Time Annotation,” in <i>14th International Conference on Intelligent Text
    Processing and Computational Linguistics</i>, 2013, pp. 38–49.
  mla: Wachsmuth, Henning, et al. “Automatic Pipeline Construction for Real-Time Annotation.”
    <i>14th International Conference on Intelligent Text Processing and Computational
    Linguistics</i>, edited by Alexander Gelbukh, 2013, pp. 38–49.
  short: 'H. Wachsmuth, M. Rose, G. Engels, in: A. Gelbukh (Ed.), 14th International
    Conference on Intelligent Text Processing and Computational Linguistics, 2013,
    pp. 38–49.'
date_created: 2018-08-11T16:12:29Z
date_updated: 2022-01-06T06:59:47Z
department:
- _id: '600'
editor:
- first_name: Alexander
  full_name: Gelbukh, Alexander
  last_name: Gelbukh
language:
- iso: eng
main_file_link:
- url: https://webis.de/downloads/publications/papers/wachsmuth_2013.pdf
page: 38-49
publication: 14th International Conference on Intelligent Text Processing and Computational
  Linguistics
series_title: Lecture Notes in Computer Science
status: public
title: Automatic Pipeline Construction for Real-Time Annotation
type: conference
user_id: '82920'
year: '2013'
...
---
_id: '2909'
author:
- first_name: Daniel
  full_name: Kuntze, Daniel
  last_name: Kuntze
citation:
  ama: Kuntze D. <i>Practical Algorithms for Clustering and Modeling Large Data Sets
    - Analysis and Improvements</i>. Universität Paderborn; 2013.
  apa: Kuntze, D. (2013). <i>Practical algorithms for clustering and modeling large
    data sets - Analysis and improvements</i>. Universität Paderborn.
  bibtex: '@book{Kuntze_2013, title={Practical algorithms for clustering and modeling
    large data sets - Analysis and improvements}, publisher={Universität Paderborn},
    author={Kuntze, Daniel}, year={2013} }'
  chicago: Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large
    Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.
  ieee: D. Kuntze, <i>Practical algorithms for clustering and modeling large data
    sets - Analysis and improvements</i>. Universität Paderborn, 2013.
  mla: Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data
    Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.
  short: D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets
    - Analysis and Improvements, Universität Paderborn, 2013.
date_created: 2018-05-25T10:07:42Z
date_updated: 2022-01-06T06:58:46Z
department:
- _id: '64'
main_file_link:
- url: http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12721
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Practical algorithms for clustering and modeling large data sets - Analysis
  and improvements
type: dissertation
user_id: '25078'
year: '2013'
...
---
_id: '2917'
author:
- first_name: Jakob
  full_name: Juhnke, Jakob
  id: '48090'
  last_name: Juhnke
- first_name: Hanno
  full_name: Lefmann, Hanno
  last_name: Lefmann
- first_name: Volker
  full_name: Strehl, Volker
  last_name: Strehl
citation:
  ama: Juhnke J, Lefmann H, Strehl V. <i>An Approach for Determining Optimal Contrast
    in Visual Cryptography</i>. Fortschritt-Berichte VDI; 2013.
  apa: Juhnke, J., Lefmann, H., &#38; Strehl, V. (2013). <i>An Approach for Determining
    Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI.
  bibtex: '@book{Juhnke_Lefmann_Strehl_2013, title={An Approach for Determining Optimal
    Contrast in Visual Cryptography}, publisher={Fortschritt-Berichte VDI}, author={Juhnke,
    Jakob and Lefmann, Hanno and Strehl, Volker}, year={2013} }'
  chicago: Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. <i>An Approach for Determining
    Optimal Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  ieee: J. Juhnke, H. Lefmann, and V. Strehl, <i>An Approach for Determining Optimal
    Contrast in Visual Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  mla: Juhnke, Jakob, et al. <i>An Approach for Determining Optimal Contrast in Visual
    Cryptography</i>. Fortschritt-Berichte VDI, 2013.
  short: J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast
    in Visual Cryptography, Fortschritt-Berichte VDI, 2013.
date_created: 2018-05-25T11:42:38Z
date_updated: 2022-01-06T06:58:47Z
department:
- _id: '64'
extern: '1'
publisher: Fortschritt-Berichte VDI
status: public
title: An Approach for Determining Optimal Contrast in Visual Cryptography
type: report
user_id: '48090'
year: '2013'
...
---
_id: '2979'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: 'Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based
    Cryptography. In: <i>Constructive Side-Channel Analysis and Secure Design</i>.
    Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>'
  apa: 'Blömer, J., Günther, P., &#38; Liske, G. (2013). Improved Side Channel Attacks
    on Pairing Based Cryptography. In <i>Constructive Side-Channel Analysis and Secure
    Design</i> (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-642-40026-1_10">https://doi.org/10.1007/978-3-642-40026-1_10</a>'
  bibtex: '@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved
    Side Channel Attacks on Pairing Based Cryptography}, DOI={<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>},
    booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer
    Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij},
    year={2013}, pages={154–168} }'
  chicago: 'Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel
    Attacks on Pairing Based Cryptography.” In <i>Constructive Side-Channel Analysis
    and Secure Design</i>, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg,
    2013. <a href="https://doi.org/10.1007/978-3-642-40026-1_10">https://doi.org/10.1007/978-3-642-40026-1_10</a>.'
  ieee: 'J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing
    Based Cryptography,” in <i>Constructive Side-Channel Analysis and Secure Design</i>,
    Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.'
  mla: Blömer, Johannes, et al. “Improved Side Channel Attacks on Pairing Based Cryptography.”
    <i>Constructive Side-Channel Analysis and Secure Design</i>, Springer Berlin Heidelberg,
    2013, pp. 154–68, doi:<a href="https://doi.org/10.1007/978-3-642-40026-1_10">10.1007/978-3-642-40026-1_10</a>.
  short: 'J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis
    and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.'
date_created: 2018-06-05T07:33:22Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-642-40026-1_10
page: 154-168
place: Berlin, Heidelberg
publication: Constructive Side-Channel Analysis and Secure Design
publication_identifier:
  isbn:
  - '9783642400254'
  - '9783642400261'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Improved Side Channel Attacks on Pairing Based Cryptography
type: book_chapter
user_id: '25078'
year: '2013'
...
---
_id: '3129'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic
    Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>
  apa: Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href="https://doi.org/10.1007/s00145-012-9120-y">https://doi.org/10.1007/s00145-012-9120-y</a>
  bibtex: '@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model}, DOI={<a href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>},
    number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg},
    year={2013}, pages={225--245} }'
  chicago: 'Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href="https://doi.org/10.1007/s00145-012-9120-y">https://doi.org/10.1007/s00145-012-9120-y</a>.'
  ieee: T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in
    the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.
  mla: Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a
    href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>.
  short: T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.
date_created: 2018-06-07T09:22:18Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/s00145-012-9120-y
extern: '1'
issue: '2'
page: 225--245
publication: J. Cryptology
status: public
title: On the Analysis of Cryptographic Assumptions in the Generic Ring Model
type: journal_article
user_id: '38235'
year: '2013'
...
---
_id: '3130'
author:
- first_name: Florian
  full_name: Böhl, Florian
  last_name: Böhl
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jessica
  full_name: Koch, Jessica
  last_name: Koch
- first_name: Jae
  full_name: Hong Seo, Jae
  last_name: Hong Seo
- first_name: Christoph
  full_name: Striecks, Christoph
  last_name: Striecks
citation:
  ama: 'Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures
    from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd
    Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485.
    doi:<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>'
  apa: Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks,
    C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology
    - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications
    of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>
    (pp. 461--485). <a href="https://doi.org/10.1007/978-3-642-38348-9_28">https://doi.org/10.1007/978-3-642-38348-9_28</a>
  bibtex: '@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical
    Signatures from Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Athens,
    Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis
    and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph},
    year={2013}, pages={461--485} }'
  chicago: Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo,
    and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings</i>, 461--485, 2013. <a href="https://doi.org/10.1007/978-3-642-38348-9_28">https://doi.org/10.1007/978-3-642-38348-9_28</a>.
  ieee: F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical
    Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT
    2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.
  mla: Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings</i>, 2013, pp. 461--485, doi:<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>.
  short: 'F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings, 2013, pp. 461--485.'
date_created: 2018-06-07T09:22:39Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-38348-9_28
extern: '1'
page: 461--485
publication: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May
  26-30, 2013. Proceedings
status: public
title: Practical Signatures from Standard Assumptions
type: conference
user_id: '38235'
year: '2013'
...
---
_id: '3131'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Kenneth G.
  full_name: Paterson, Kenneth G.
  last_name: Paterson
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility
    Attacks on State-of-the-Art Cryptography. In: <i>20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013</i>. ; 2013.'
  apa: 'Jager, T., Paterson, K. G., &#38; Somorovsky, J. (2013). One Bad Apple: Backwards
    Compatibility Attacks on State-of-the-Art Cryptography. In <i>20th Annual Network
    and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA,
    February 24-27, 2013</i>.'
  bibtex: '@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards
    Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual
    Network and Distributed System Security Symposium, NDSS 2013, San Diego, California,
    USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and
    Somorovsky, Juraj}, year={2013} }'
  chicago: 'Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple:
    Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In <i>20th
    Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego,
    California, USA, February 24-27, 2013</i>, 2013.'
  ieee: 'T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility
    Attacks on State-of-the-Art Cryptography,” in <i>20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013</i>, 2013.'
  mla: 'Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art
    Cryptography.” <i>20th Annual Network and Distributed System Security Symposium,
    NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.'
  short: 'T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013, 2013.'
date_created: 2018-06-07T09:23:49Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
extern: '1'
publication: 20th Annual Network and Distributed System Security Symposium, NDSS 2013,
  San Diego, California, USA, February 24-27, 2013
status: public
title: 'One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography'
type: conference
user_id: '38235'
year: '2013'
...
---
_id: '3176'
author:
- first_name: Tobias
  full_name: Isenberg, Tobias
  last_name: Isenberg
- first_name: Dominik
  full_name: Steenken, Dominik
  last_name: Steenken
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation
    Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. <i>Formal Techniques for
    Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE}
    2013, Held as Part of the 8th International Federated Conference on Distributed
    Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>.
    Lecture Notes in Computer Science. ; 2013:178--192. doi:<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>'
  apa: Isenberg, T., Steenken, D., &#38; Wehrheim, H. (2013). Bounded Model Checking
    of Graph Transformation Systems via {SMT} Solving. In D. Beyer &#38; M. Boreale
    (Eds.), <i>Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings</i> (pp. 178--192). <a href="https://doi.org/10.1007/978-3-642-38592-6_13">https://doi.org/10.1007/978-3-642-38592-6_13</a>
  bibtex: '@inproceedings{Isenberg_Steenken_Wehrheim_2013, series={Lecture Notes in
    Computer Science}, title={Bounded Model Checking of Graph Transformation Systems
    via {SMT} Solving}, DOI={<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>},
    booktitle={Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings}, author={Isenberg, Tobias and Steenken, Dominik and
    Wehrheim, Heike}, editor={Beyer, Dirk and Boreale, MicheleEditors}, year={2013},
    pages={178--192}, collection={Lecture Notes in Computer Science} }'
  chicago: Isenberg, Tobias, Dominik Steenken, and Heike Wehrheim. “Bounded Model
    Checking of Graph Transformation Systems via {SMT} Solving.” In <i>Formal Techniques
    for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE}
    2013, Held as Part of the 8th International Federated Conference on Distributed
    Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>,
    edited by Dirk Beyer and Michele Boreale, 178--192. Lecture Notes in Computer
    Science, 2013. <a href="https://doi.org/10.1007/978-3-642-38592-6_13">https://doi.org/10.1007/978-3-642-38592-6_13</a>.
  ieee: T. Isenberg, D. Steenken, and H. Wehrheim, “Bounded Model Checking of Graph
    Transformation Systems via {SMT} Solving,” in <i>Formal Techniques for Distributed
    Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013,
    Held as Part of the 8th International Federated Conference on Distributed Computing
    Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, 2013,
    pp. 178--192.
  mla: Isenberg, Tobias, et al. “Bounded Model Checking of Graph Transformation Systems
    via {SMT} Solving.” <i>Formal Techniques for Distributed Systems - Joint {IFIP}
    {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th
    International Federated Conference on Distributed Computing Techniques, DisCoTec
    2013, Florence, Italy, June 3-5, 2013. Proceedings</i>, edited by Dirk Beyer and
    Michele Boreale, 2013, pp. 178--192, doi:<a href="https://doi.org/10.1007/978-3-642-38592-6_13">10.1007/978-3-642-38592-6_13</a>.
  short: 'T. Isenberg, D. Steenken, H. Wehrheim, in: D. Beyer, M. Boreale (Eds.),
    Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
    Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
    Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
    June 3-5, 2013. Proceedings, 2013, pp. 178--192.'
date_created: 2018-06-13T08:08:39Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-642-38592-6_13
editor:
- first_name: Dirk
  full_name: Beyer, Dirk
  last_name: Beyer
- first_name: Michele
  full_name: Boreale, Michele
  last_name: Boreale
page: 178--192
publication: Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International
  Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated
  Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy,
  June 3-5, 2013. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: Bounded Model Checking of Graph Transformation Systems via {SMT} Solving
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3177'
author:
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: Annika
  full_name: Mütze, Annika
  last_name: Mütze
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under
    Weak Memory Models. In: Bertacco V, Legay A, eds. <i>Hardware and Software: Verification
    and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa,
    Israel, November 5-7, 2013, Proceedings</i>. Lecture Notes in Computer Science.
    ; 2013:311--326. doi:<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>'
  apa: 'Travkin, O., Mütze, A., &#38; Wehrheim, H. (2013). {SPIN} as a Linearizability
    Checker under Weak Memory Models. In V. Bertacco &#38; A. Legay (Eds.), <i>Hardware
    and Software: Verification and Testing - 9th International Haifa Verification
    Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings</i> (pp.
    311--326). <a href="https://doi.org/10.1007/978-3-319-03077-7_21">https://doi.org/10.1007/978-3-319-03077-7_21</a>'
  bibtex: '@inproceedings{Travkin_Mütze_Wehrheim_2013, series={Lecture Notes in Computer
    Science}, title={{SPIN} as a Linearizability Checker under Weak Memory Models},
    DOI={<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>},
    booktitle={Hardware and Software: Verification and Testing - 9th International
    Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013,
    Proceedings}, author={Travkin, Oleg and Mütze, Annika and Wehrheim, Heike}, editor={Bertacco,
    Valeria and Legay, AxelEditors}, year={2013}, pages={311--326}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Travkin, Oleg, Annika Mütze, and Heike Wehrheim. “{SPIN} as a Linearizability
    Checker under Weak Memory Models.” In <i>Hardware and Software: Verification and
    Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa,
    Israel, November 5-7, 2013, Proceedings</i>, edited by Valeria Bertacco and Axel
    Legay, 311--326. Lecture Notes in Computer Science, 2013. <a href="https://doi.org/10.1007/978-3-319-03077-7_21">https://doi.org/10.1007/978-3-319-03077-7_21</a>.'
  ieee: 'O. Travkin, A. Mütze, and H. Wehrheim, “{SPIN} as a Linearizability Checker
    under Weak Memory Models,” in <i>Hardware and Software: Verification and Testing
    - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel,
    November 5-7, 2013, Proceedings</i>, 2013, pp. 311--326.'
  mla: 'Travkin, Oleg, et al. “{SPIN} as a Linearizability Checker under Weak Memory
    Models.” <i>Hardware and Software: Verification and Testing - 9th International
    Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013,
    Proceedings</i>, edited by Valeria Bertacco and Axel Legay, 2013, pp. 311--326,
    doi:<a href="https://doi.org/10.1007/978-3-319-03077-7_21">10.1007/978-3-319-03077-7_21</a>.'
  short: 'O. Travkin, A. Mütze, H. Wehrheim, in: V. Bertacco, A. Legay (Eds.), Hardware
    and Software: Verification and Testing - 9th International Haifa Verification
    Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings, 2013,
    pp. 311--326.'
date_created: 2018-06-13T08:09:44Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-319-03077-7_21
editor:
- first_name: Valeria
  full_name: Bertacco, Valeria
  last_name: Bertacco
- first_name: Axel
  full_name: Legay, Axel
  last_name: Legay
page: 311--326
publication: 'Hardware and Software: Verification and Testing - 9th International
  Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: '{SPIN} as a Linearizability Checker under Weak Memory Models'
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3178'
author:
- first_name: Brijesh
  full_name: Dongol, Brijesh
  last_name: Dongol
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Dongol B, Travkin O, Derrick J, Wehrheim H. A High-Level Semantics for Program
    Execution under Total Store Order Memory. In: Liu Z, Woodcock J, Zhu H, eds. <i>Theoretical
    Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai,
    China, September 4-6, 2013. Proceedings</i>. Lecture Notes in Computer Science.
    ; 2013:177--194. doi:<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>'
  apa: Dongol, B., Travkin, O., Derrick, J., &#38; Wehrheim, H. (2013). A High-Level
    Semantics for Program Execution under Total Store Order Memory. In Z. Liu, J.
    Woodcock, &#38; H. Zhu (Eds.), <i>Theoretical Aspects of Computing - {ICTAC} 2013
    - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>
    (pp. 177--194). <a href="https://doi.org/10.1007/978-3-642-39718-9_11">https://doi.org/10.1007/978-3-642-39718-9_11</a>
  bibtex: '@inproceedings{Dongol_Travkin_Derrick_Wehrheim_2013, series={Lecture Notes
    in Computer Science}, title={A High-Level Semantics for Program Execution under
    Total Store Order Memory}, DOI={<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>},
    booktitle={Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
    Colloquium, Shanghai, China, September 4-6, 2013. Proceedings}, author={Dongol,
    Brijesh and Travkin, Oleg and Derrick, John and Wehrheim, Heike}, editor={Liu,
    Zhiming and Woodcock, Jim and Zhu, HuibiaoEditors}, year={2013}, pages={177--194},
    collection={Lecture Notes in Computer Science} }'
  chicago: Dongol, Brijesh, Oleg Travkin, John Derrick, and Heike Wehrheim. “A High-Level
    Semantics for Program Execution under Total Store Order Memory.” In <i>Theoretical
    Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai,
    China, September 4-6, 2013. Proceedings</i>, edited by Zhiming Liu, Jim Woodcock,
    and Huibiao Zhu, 177--194. Lecture Notes in Computer Science, 2013. <a href="https://doi.org/10.1007/978-3-642-39718-9_11">https://doi.org/10.1007/978-3-642-39718-9_11</a>.
  ieee: B. Dongol, O. Travkin, J. Derrick, and H. Wehrheim, “A High-Level Semantics
    for Program Execution under Total Store Order Memory,” in <i>Theoretical Aspects
    of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China,
    September 4-6, 2013. Proceedings</i>, 2013, pp. 177--194.
  mla: Dongol, Brijesh, et al. “A High-Level Semantics for Program Execution under
    Total Store Order Memory.” <i>Theoretical Aspects of Computing - {ICTAC} 2013
    - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings</i>,
    edited by Zhiming Liu et al., 2013, pp. 177--194, doi:<a href="https://doi.org/10.1007/978-3-642-39718-9_11">10.1007/978-3-642-39718-9_11</a>.
  short: 'B. Dongol, O. Travkin, J. Derrick, H. Wehrheim, in: Z. Liu, J. Woodcock,
    H. Zhu (Eds.), Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
    Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, 2013, pp. 177--194.'
date_created: 2018-06-13T08:13:31Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
doi: 10.1007/978-3-642-39718-9_11
editor:
- first_name: Zhiming
  full_name: Liu, Zhiming
  last_name: Liu
- first_name: Jim
  full_name: Woodcock, Jim
  last_name: Woodcock
- first_name: Huibiao
  full_name: Zhu, Huibiao
  last_name: Zhu
page: 177--194
publication: Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International
  Colloquium, Shanghai, China, September 4-6, 2013. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: A High-Level Semantics for Program Execution under Total Store Order Memory
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '3179'
author:
- first_name: Steffen
  full_name: Ziegert, Steffen
  last_name: Ziegert
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Ziegert S, Wehrheim H. Temporal Reconfiguration Plans for Self-Adaptive Systems.
    In: Kowalewski S, Rumpe B, eds. <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>. {LNI}. ; 2013:271--284.'
  apa: 'Ziegert, S., &#38; Wehrheim, H. (2013). Temporal Reconfiguration Plans for
    Self-Adaptive Systems. In S. Kowalewski &#38; B. Rumpe (Eds.), <i>Software Engineering
    2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz
    2013 in Aachen</i> (pp. 271--284).'
  bibtex: '@inproceedings{Ziegert_Wehrheim_2013, series={{LNI}}, title={Temporal Reconfiguration
    Plans for Self-Adaptive Systems}, booktitle={Software Engineering 2013: Fachtagung
    des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen},
    author={Ziegert, Steffen and Wehrheim, Heike}, editor={Kowalewski, Stefan and
    Rumpe, BernhardEditors}, year={2013}, pages={271--284}, collection={{LNI}} }'
  chicago: 'Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans
    for Self-Adaptive Systems.” In <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, edited by Stefan
    Kowalewski and Bernhard Rumpe, 271--284. {LNI}, 2013.'
  ieee: 'S. Ziegert and H. Wehrheim, “Temporal Reconfiguration Plans for Self-Adaptive
    Systems,” in <i>Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik,
    26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, 2013, pp. 271--284.'
  mla: 'Ziegert, Steffen, and Heike Wehrheim. “Temporal Reconfiguration Plans for
    Self-Adaptive Systems.” <i>Software Engineering 2013: Fachtagung Des GI-Fachbereichs
    Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen</i>, edited by Stefan
    Kowalewski and Bernhard Rumpe, 2013, pp. 271--284.'
  short: 'S. Ziegert, H. Wehrheim, in: S. Kowalewski, B. Rumpe (Eds.), Software Engineering
    2013: Fachtagung Des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz
    2013 in Aachen, 2013, pp. 271--284.'
date_created: 2018-06-13T08:15:08Z
date_updated: 2022-01-06T06:59:02Z
department:
- _id: '77'
editor:
- first_name: Stefan
  full_name: Kowalewski, Stefan
  last_name: Kowalewski
- first_name: Bernhard
  full_name: Rumpe, Bernhard
  last_name: Rumpe
page: 271--284
publication: 'Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik,
  26. Februar - 2. M{\"{a}}rz 2013 in Aachen'
series_title: '{LNI}'
status: public
title: Temporal Reconfiguration Plans for Self-Adaptive Systems
type: conference
user_id: '29719'
year: '2013'
...
---
_id: '27043'
abstract:
- lang: eng
  text: <jats:p>Dietary fat intake in childhood may influence the risk for developing
    chronic diseases. The objective of the present study was to examine secular trends
    in the parameters of fat intake between 2000 and 2010 in a sample of German children
    and adolescents (<jats:italic>n</jats:italic> 808) participating in the Dortmund
    Nutritional and Anthropometric Longitudinally Designed (DONALD) Study. Dietary
    data from 4380 3 d weighed dietary records were analysed using repeated-measures
    regression to determine time trends in fat quantity, i.e. the intake of total
    fat, and in fat quality, i.e. the ratios of SFA, MUFA and PUFA. In young children
    (2–3 years) and in adolescents (13–18 years), total fat intake remained stable
    over time, but decreased by 0·08 % of total energy (%E) per year in 4–12-year-old
    children. In 2010, median fat intake was at the upper end of the recommendations.
    SFA intake decreased slightly in 2–3- and 4–12-year-old children by 0·09 and 0·05 %E
    per year, respectively. MUFA and PUFA intakes remained stable in all the age groups
    except in adolescents. Here, PUFA intake decreased initially, but increased between
    2005 and 2010. In 2010, only between 3 and 18 % of the respective age groups had
    an intake of SFA or PUFA within the recommendations. In conclusion, fat quantity
    and quality did not change substantially between 2000 and 2010. Fat quality, in
    particular, needs to be improved, since a large percentage of our sample did not
    meet the recommended intakes for SFA and PUFA.</jats:p>
author:
- first_name: Lars
  full_name: Libuda, Lars
  id: '88682'
  last_name: Libuda
  orcid: 0000-0003-1603-3133
- first_name: Ute
  full_name: Alexy, Ute
  last_name: Alexy
- first_name: Mathilde
  full_name: Kersting, Mathilde
  last_name: Kersting
citation:
  ama: 'Libuda L, Alexy U, Kersting M. Time trends in dietary fat intake in a sample
    of German children and adolescents between 2000 and 2010: not quantity, but quality
    is the issue. <i>British Journal of Nutrition</i>. Published online 2013:141-150.
    doi:<a href="https://doi.org/10.1017/s0007114513002031">10.1017/s0007114513002031</a>'
  apa: 'Libuda, L., Alexy, U., &#38; Kersting, M. (2013). Time trends in dietary fat
    intake in a sample of German children and adolescents between 2000 and 2010: not
    quantity, but quality is the issue. <i>British Journal of Nutrition</i>, 141–150.
    <a href="https://doi.org/10.1017/s0007114513002031">https://doi.org/10.1017/s0007114513002031</a>'
  bibtex: '@article{Libuda_Alexy_Kersting_2013, title={Time trends in dietary fat
    intake in a sample of German children and adolescents between 2000 and 2010: not
    quantity, but quality is the issue}, DOI={<a href="https://doi.org/10.1017/s0007114513002031">10.1017/s0007114513002031</a>},
    journal={British Journal of Nutrition}, author={Libuda, Lars and Alexy, Ute and
    Kersting, Mathilde}, year={2013}, pages={141–150} }'
  chicago: 'Libuda, Lars, Ute Alexy, and Mathilde Kersting. “Time Trends in Dietary
    Fat Intake in a Sample of German Children and Adolescents between 2000 and 2010:
    Not Quantity, but Quality Is the Issue.” <i>British Journal of Nutrition</i>,
    2013, 141–50. <a href="https://doi.org/10.1017/s0007114513002031">https://doi.org/10.1017/s0007114513002031</a>.'
  ieee: 'L. Libuda, U. Alexy, and M. Kersting, “Time trends in dietary fat intake
    in a sample of German children and adolescents between 2000 and 2010: not quantity,
    but quality is the issue,” <i>British Journal of Nutrition</i>, pp. 141–150, 2013,
    doi: <a href="https://doi.org/10.1017/s0007114513002031">10.1017/s0007114513002031</a>.'
  mla: 'Libuda, Lars, et al. “Time Trends in Dietary Fat Intake in a Sample of German
    Children and Adolescents between 2000 and 2010: Not Quantity, but Quality Is the
    Issue.” <i>British Journal of Nutrition</i>, 2013, pp. 141–50, doi:<a href="https://doi.org/10.1017/s0007114513002031">10.1017/s0007114513002031</a>.'
  short: L. Libuda, U. Alexy, M. Kersting, British Journal of Nutrition (2013) 141–150.
date_created: 2021-11-01T20:17:51Z
date_updated: 2022-01-06T06:57:32Z
department:
- _id: '35'
- _id: '22'
- _id: '395'
doi: 10.1017/s0007114513002031
language:
- iso: eng
page: 141-150
publication: British Journal of Nutrition
publication_identifier:
  issn:
  - 0007-1145
  - 1475-2662
publication_status: published
status: public
title: 'Time trends in dietary fat intake in a sample of German children and adolescents
  between 2000 and 2010: not quantity, but quality is the issue'
type: journal_article
user_id: '49428'
year: '2013'
...
---
_id: '27054'
author:
- first_name: Jürgen
  full_name: Gausemeier, Jürgen
  last_name: Gausemeier
- first_name: Michael
  full_name: Grafe, Michael
  last_name: Grafe
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
citation:
  ama: 'Gausemeier J, Grafe M, Meyer auf der Heide F. 11. Paderborner Workshop Augmented
    &#38; Virtual Reality in der Produktentstehung. In: Vol 311. Verlagsschriftenreihe
    des Heinz Nixdorf Instituts, Paderborn, Band 311 ; 2013.'
  apa: Gausemeier, J., Grafe, M., &#38; Meyer auf der Heide, F. (2013). <i>11. Paderborner
    Workshop Augmented &#38; Virtual Reality in der Produktentstehung</i>. <i>311</i>.
  bibtex: '@inproceedings{Gausemeier_Grafe_Meyer auf der Heide_2013, title={11. Paderborner
    Workshop Augmented &#38; Virtual Reality in der Produktentstehung}, volume={311},
    publisher={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band
    311 }, author={Gausemeier, Jürgen and Grafe, Michael and Meyer auf der Heide,
    Friedhelm}, year={2013} }'
  chicago: Gausemeier, Jürgen, Michael Grafe, and Friedhelm Meyer auf der Heide. “11.
    Paderborner Workshop Augmented &#38; Virtual Reality in Der Produktentstehung,”
    Vol. 311. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311
    , 2013.
  ieee: J. Gausemeier, M. Grafe, and F. Meyer auf der Heide, “11. Paderborner Workshop
    Augmented &#38; Virtual Reality in der Produktentstehung,” 2013, vol. 311.
  mla: Gausemeier, Jürgen, et al. <i>11. Paderborner Workshop Augmented &#38; Virtual
    Reality in Der Produktentstehung</i>. Verlagsschriftenreihe des Heinz Nixdorf
    Instituts, Paderborn, Band 311 , 2013.
  short: 'J. Gausemeier, M. Grafe, F. Meyer auf der Heide, in: Verlagsschriftenreihe
    des Heinz Nixdorf Instituts, Paderborn, Band 311 , 2013.'
conference:
  name: 18. - 19. Apr. 2013, Heinz Nixdorf Institut
date_created: 2021-11-02T10:53:04Z
date_updated: 2022-01-06T06:57:33Z
department:
- _id: '672'
intvolume: '       311'
language:
- iso: eng
publisher: 'Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, Band 311 '
status: public
title: 11. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung
type: conference
user_id: '21240'
volume: 311
year: '2013'
...
---
_id: '27061'
author:
- first_name: Lars
  full_name: Libuda, Lars
  id: '88682'
  last_name: Libuda
  orcid: 0000-0003-1603-3133
- first_name: Madlen
  full_name: Stimming, Madlen
  last_name: Stimming
- first_name: Christina
  full_name: Mesch, Christina
  last_name: Mesch
- first_name: Petra
  full_name: Warschburger, Petra
  last_name: Warschburger
- first_name: Hermann
  full_name: Kalhoff, Hermann
  last_name: Kalhoff
- first_name: Berthold Viktor
  full_name: Koletzko, Berthold Viktor
  last_name: Koletzko
- first_name: Mathilde
  full_name: Kersting, Mathilde
  last_name: Kersting
citation:
  ama: Libuda L, Stimming M, Mesch C, et al. Frequencies and demographic determinants
    of breastfeeding and DHA supplementation in a nationwide sample of mothers in
    Germany. <i>European Journal of Nutrition</i>. Published online 2013:1335-1344.
    doi:<a href="https://doi.org/10.1007/s00394-013-0633-4">10.1007/s00394-013-0633-4</a>
  apa: Libuda, L., Stimming, M., Mesch, C., Warschburger, P., Kalhoff, H., Koletzko,
    B. V., &#38; Kersting, M. (2013). Frequencies and demographic determinants of
    breastfeeding and DHA supplementation in a nationwide sample of mothers in Germany.
    <i>European Journal of Nutrition</i>, 1335–1344. <a href="https://doi.org/10.1007/s00394-013-0633-4">https://doi.org/10.1007/s00394-013-0633-4</a>
  bibtex: '@article{Libuda_Stimming_Mesch_Warschburger_Kalhoff_Koletzko_Kersting_2013,
    title={Frequencies and demographic determinants of breastfeeding and DHA supplementation
    in a nationwide sample of mothers in Germany}, DOI={<a href="https://doi.org/10.1007/s00394-013-0633-4">10.1007/s00394-013-0633-4</a>},
    journal={European Journal of Nutrition}, author={Libuda, Lars and Stimming, Madlen
    and Mesch, Christina and Warschburger, Petra and Kalhoff, Hermann and Koletzko,
    Berthold Viktor and Kersting, Mathilde}, year={2013}, pages={1335–1344} }'
  chicago: Libuda, Lars, Madlen Stimming, Christina Mesch, Petra Warschburger, Hermann
    Kalhoff, Berthold Viktor Koletzko, and Mathilde Kersting. “Frequencies and Demographic
    Determinants of Breastfeeding and DHA Supplementation in a Nationwide Sample of
    Mothers in Germany.” <i>European Journal of Nutrition</i>, 2013, 1335–44. <a href="https://doi.org/10.1007/s00394-013-0633-4">https://doi.org/10.1007/s00394-013-0633-4</a>.
  ieee: 'L. Libuda <i>et al.</i>, “Frequencies and demographic determinants of breastfeeding
    and DHA supplementation in a nationwide sample of mothers in Germany,” <i>European
    Journal of Nutrition</i>, pp. 1335–1344, 2013, doi: <a href="https://doi.org/10.1007/s00394-013-0633-4">10.1007/s00394-013-0633-4</a>.'
  mla: Libuda, Lars, et al. “Frequencies and Demographic Determinants of Breastfeeding
    and DHA Supplementation in a Nationwide Sample of Mothers in Germany.” <i>European
    Journal of Nutrition</i>, 2013, pp. 1335–44, doi:<a href="https://doi.org/10.1007/s00394-013-0633-4">10.1007/s00394-013-0633-4</a>.
  short: L. Libuda, M. Stimming, C. Mesch, P. Warschburger, H. Kalhoff, B.V. Koletzko,
    M. Kersting, European Journal of Nutrition (2013) 1335–1344.
date_created: 2021-11-02T20:22:36Z
date_updated: 2022-01-06T06:57:33Z
department:
- _id: '35'
- _id: '22'
- _id: '395'
doi: 10.1007/s00394-013-0633-4
language:
- iso: eng
page: 1335-1344
publication: European Journal of Nutrition
publication_identifier:
  issn:
  - 1436-6207
  - 1436-6215
publication_status: published
status: public
title: Frequencies and demographic determinants of breastfeeding and DHA supplementation
  in a nationwide sample of mothers in Germany
type: journal_article
user_id: '49428'
year: '2013'
...
