[{"page":"1--7","citation":{"bibtex":"@inproceedings{Blömer_Günther_Liske_2014, title={Tampering attacks in pairing-based cryptography}, DOI={<a href=\"https://doi.org/10.1109/FDTC.2014.10\">10.1109/FDTC.2014.10</a>}, booktitle={Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2014}, pages={1--7} }","mla":"Blömer, Johannes, et al. “Tampering Attacks in Pairing-Based Cryptography.” <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 2014, pp. 1--7, doi:<a href=\"https://doi.org/10.1109/FDTC.2014.10\">10.1109/FDTC.2014.10</a>.","short":"J. Blömer, P. Günther, G. Liske, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.","apa":"Blömer, J., Günther, P., &#38; Liske, G. (2014). Tampering attacks in pairing-based cryptography. In <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i> (pp. 1--7). <a href=\"https://doi.org/10.1109/FDTC.2014.10\">https://doi.org/10.1109/FDTC.2014.10</a>","chicago":"Blömer, Johannes, Peter Günther, and Gennadij Liske. “Tampering Attacks in Pairing-Based Cryptography.” In <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 1--7, 2014. <a href=\"https://doi.org/10.1109/FDTC.2014.10\">https://doi.org/10.1109/FDTC.2014.10</a>.","ieee":"J. Blömer, P. Günther, and G. Liske, “Tampering attacks in pairing-based cryptography,” in <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 2014, pp. 1--7.","ama":"Blömer J, Günther P, Liske G. Tampering attacks in pairing-based cryptography. In: <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>. ; 2014:1--7. doi:<a href=\"https://doi.org/10.1109/FDTC.2014.10\">10.1109/FDTC.2014.10</a>"},"year":"2014","has_accepted_license":"1","doi":"10.1109/FDTC.2014.10","title":"Tampering attacks in pairing-based cryptography","date_created":"2017-10-17T12:42:01Z","author":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"},{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"first_name":"Gennadij","last_name":"Liske","full_name":"Liske, Gennadij"}],"date_updated":"2022-01-06T06:59:23Z","status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"355-Bloemer2014.pdf","file_id":"1412","access_level":"closed","file_size":293394,"creator":"florida","date_created":"2018-03-20T07:22:29Z","date_updated":"2018-03-20T07:22:29Z"}],"abstract":[{"text":"In the last decade pairings have become an important, and often indispensable, ingredient in the construction of identity-based and attribute-based cryptosystems, as well as group signatures and credential systems. Consequently, the applicability of timing, power, or fault attacks to implementations of pairings is an important research topic. We will review some of the known results in this area.","lang":"eng"}],"publication":"Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)","type":"conference","file_date_updated":"2018-03-20T07:22:29Z","ddc":["040"],"department":[{"_id":"64"}],"user_id":"25078","_id":"355","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}]},{"status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-20T07:21:58Z","creator":"florida","date_created":"2018-03-20T07:21:58Z","file_size":323838,"file_id":"1411","access_level":"closed","file_name":"356-Lukowski.pdf"}],"abstract":[{"text":"Decentralized algorithms are often used in the cooperative robotics field, especially by large swarm systems. We present a distributed algorithm for a problem in which a group of autonomous mobile robots must surround a given target. These robots are oblivious, i.e., they have no memory of the past. They use only local sensing and need no dedicated communication among themselves. We introduce, then solve the problem in which the group of autonomous mobile robots must surround a given target – we call it the “discrete multiorbit target surrounding problem” (DMTSP). We evaluate our solution using simulation and prove that our solution invariably ensures that robots enclose the target in finite time. ","lang":"eng"}],"publication":"Journal of Advanced Computational Intelligence and Intelligent Informatics","type":"journal_article","file_date_updated":"2018-03-20T07:21:58Z","ddc":["040"],"user_id":"477","_id":"356","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"page":"315--319","citation":{"ama":"Blazovics L, Lukovszki T, Forstner B. Surrounding robots -- A discrete localized solution for the intruder problem. <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>. 2014;(3):315--319. doi:<a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">10.20965/jaciii.2014.p0315</a>","chicago":"Blazovics, Laszlo, Tamas Lukovszki, and Bertalan  Forstner. “Surrounding Robots -- A Discrete Localized Solution for the Intruder Problem.” <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>, no. 3 (2014): 315--319. <a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">https://doi.org/10.20965/jaciii.2014.p0315</a>.","ieee":"L. Blazovics, T. Lukovszki, and B. Forstner, “Surrounding robots -- A discrete localized solution for the intruder problem,” <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>, no. 3, pp. 315--319, 2014.","bibtex":"@article{Blazovics_Lukovszki_Forstner_2014, title={Surrounding robots -- A discrete localized solution for the intruder problem}, DOI={<a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">10.20965/jaciii.2014.p0315</a>}, number={3}, journal={Journal of Advanced Computational Intelligence and Intelligent Informatics}, publisher={Fuji Technology Press Ltd.}, author={Blazovics, Laszlo and Lukovszki, Tamas and Forstner, Bertalan }, year={2014}, pages={315--319} }","mla":"Blazovics, Laszlo, et al. “Surrounding Robots -- A Discrete Localized Solution for the Intruder Problem.” <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>, no. 3, Fuji Technology Press Ltd., 2014, pp. 315--319, doi:<a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">10.20965/jaciii.2014.p0315</a>.","short":"L. Blazovics, T. Lukovszki, B. Forstner, Journal of Advanced Computational Intelligence and Intelligent Informatics (2014) 315--319.","apa":"Blazovics, L., Lukovszki, T., &#38; Forstner, B. (2014). Surrounding robots -- A discrete localized solution for the intruder problem. <i>Journal of Advanced Computational Intelligence and Intelligent Informatics</i>, (3), 315--319. <a href=\"https://doi.org/10.20965/jaciii.2014.p0315\">https://doi.org/10.20965/jaciii.2014.p0315</a>"},"year":"2014","issue":"3","has_accepted_license":"1","doi":"10.20965/jaciii.2014.p0315","title":"Surrounding robots -- A discrete localized solution for the intruder problem","author":[{"first_name":"Laszlo","full_name":"Blazovics, Laszlo","last_name":"Blazovics"},{"first_name":"Tamas","last_name":"Lukovszki","full_name":"Lukovszki, Tamas"},{"first_name":"Bertalan ","last_name":"Forstner","full_name":"Forstner, Bertalan "}],"date_created":"2017-10-17T12:42:01Z","publisher":"Fuji Technology Press Ltd.","date_updated":"2022-01-06T06:59:25Z"},{"citation":{"apa":"Ebel, O. (2014). <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn.","short":"O. Ebel, Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten, Universität Paderborn, 2014.","mla":"Ebel, Olga. <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn, 2014.","bibtex":"@book{Ebel_2014, title={Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten}, publisher={Universität Paderborn}, author={Ebel, Olga}, year={2014} }","ama":"Ebel O. <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn; 2014.","chicago":"Ebel, Olga. <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn, 2014.","ieee":"O. Ebel, <i>Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten</i>. Universität Paderborn, 2014."},"year":"2014","date_created":"2017-10-17T12:42:01Z","author":[{"full_name":"Ebel, Olga","last_name":"Ebel","first_name":"Olga"}],"date_updated":"2022-01-06T06:59:25Z","publisher":"Universität Paderborn","title":"Struktur und algorithmische Bestimmung stabiler Matchings in one-to-one Matching Märkten","type":"bachelorsthesis","status":"public","user_id":"477","_id":"357","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"language":[{"iso":"ger"}]},{"type":"dissertation","file":[{"date_updated":"2018-03-20T07:21:29Z","creator":"florida","date_created":"2018-03-20T07:21:29Z","file_size":1230059,"access_level":"closed","file_name":"358-DissertationRoehl.pdf","file_id":"1410","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","user_id":"477","department":[{"_id":"19"},{"_id":"205"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"358","file_date_updated":"2018-03-20T07:21:29Z","language":[{"iso":"eng"}],"ddc":["040"],"has_accepted_license":"1","citation":{"ama":"Röhl N. <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn; 2014.","ieee":"N. Röhl, <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn, 2014.","chicago":"Röhl, Nils. <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn, 2014.","apa":"Röhl, N. (2014). <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn.","bibtex":"@book{Röhl_2014, title={Strategic and Cooperative Games in Network Economics}, publisher={Universität Paderborn}, author={Röhl, Nils}, year={2014} }","short":"N. Röhl, Strategic and Cooperative Games in Network Economics, Universität Paderborn, 2014.","mla":"Röhl, Nils. <i>Strategic and Cooperative Games in Network Economics</i>. Universität Paderborn, 2014."},"year":"2014","supervisor":[{"id":"20801","full_name":"Haake, Claus-Jochen","last_name":"Haake","first_name":"Claus-Jochen"}],"author":[{"last_name":"Röhl","full_name":"Röhl, Nils","first_name":"Nils"}],"date_created":"2017-10-17T12:42:01Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:59:25Z","title":"Strategic and Cooperative Games in Network Economics"},{"title":"Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB","author":[{"full_name":"Töws, Manuel","id":"11315","last_name":"Töws","first_name":"Manuel"}],"date_created":"2017-10-17T12:42:02Z","date_updated":"2022-01-06T06:59:26Z","publisher":"Universität Paderborn","citation":{"ieee":"M. Töws, <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn, 2014.","chicago":"Töws, Manuel. <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn, 2014.","ama":"Töws M. <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn; 2014.","short":"M. Töws, Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB, Universität Paderborn, 2014.","bibtex":"@book{Töws_2014, title={Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB}, publisher={Universität Paderborn}, author={Töws, Manuel}, year={2014} }","mla":"Töws, Manuel. <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn, 2014.","apa":"Töws, M. (2014). <i>Statistisches Testen von unbeweisbaren Anforderungen an Programmspezifikationen in SMT-LIB</i>. Universität Paderborn."},"year":"2014","language":[{"iso":"ger"}],"user_id":"15504","_id":"359","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"status":"public","type":"mastersthesis"},{"_id":"3591","user_id":"31722","status":"public","type":"book_chapter","publication":"Professional and Practice-based Learning","title":"Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development","doi":"10.1007/978-94-007-7012-6_2","date_updated":"2022-01-06T06:59:26Z","publisher":"Springer Netherlands","author":[{"first_name":"Christoph","last_name":"Fischer","full_name":"Fischer, Christoph","id":"31722"},{"first_name":"Bridget N.","full_name":"O’Connor, Bridget N.","last_name":"O’Connor"}],"date_created":"2018-07-23T08:28:58Z","place":"Dordrecht","year":"2014","citation":{"apa":"Fischer, C., &#38; O’Connor, B. N. (2014). Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development. In <i>Professional and Practice-based Learning</i> (pp. 11–24). Dordrecht: Springer Netherlands. <a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">https://doi.org/10.1007/978-94-007-7012-6_2</a>","mla":"Fischer, Christoph, and Bridget N. O’Connor. “Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development.” <i>Professional and Practice-Based Learning</i>, Springer Netherlands, 2014, pp. 11–24, doi:<a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">10.1007/978-94-007-7012-6_2</a>.","short":"C. Fischer, B.N. O’Connor, in: Professional and Practice-Based Learning, Springer Netherlands, Dordrecht, 2014, pp. 11–24.","bibtex":"@inbook{Fischer_O’Connor_2014, place={Dordrecht}, title={Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development}, DOI={<a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">10.1007/978-94-007-7012-6_2</a>}, booktitle={Professional and Practice-based Learning}, publisher={Springer Netherlands}, author={Fischer, Christoph and O’Connor, Bridget N.}, year={2014}, pages={11–24} }","ama":"Fischer C, O’Connor BN. Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development. In: <i>Professional and Practice-Based Learning</i>. Dordrecht: Springer Netherlands; 2014:11-24. doi:<a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">10.1007/978-94-007-7012-6_2</a>","chicago":"Fischer, Christoph, and Bridget N. O’Connor. “Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development.” In <i>Professional and Practice-Based Learning</i>, 11–24. Dordrecht: Springer Netherlands, 2014. <a href=\"https://doi.org/10.1007/978-94-007-7012-6_2\">https://doi.org/10.1007/978-94-007-7012-6_2</a>.","ieee":"C. Fischer and B. N. O’Connor, “Informal Learning in Workplaces: Understanding Learning Culture as a Challenge for Organizational and Individual Development,” in <i>Professional and Practice-based Learning</i>, Dordrecht: Springer Netherlands, 2014, pp. 11–24."},"page":"11-24","publication_status":"published","publication_identifier":{"issn":["2210-5549","2210-5557"],"isbn":["9789400770119","9789400770126"]}},{"date_updated":"2022-01-06T06:59:27Z","oa":"1","author":[{"first_name":"Sevil","last_name":"Dräxler","id":"31764","full_name":"Dräxler, Sevil"},{"full_name":"Keller, Matthias","last_name":"Keller","first_name":"Matthias"},{"last_name":"Karl","full_name":"Karl, Holger","id":"126","first_name":"Holger"}],"date_created":"2017-10-17T12:42:02Z","title":"Specifying and Placing Chains of Virtual Network Functions","doi":"10.1109/CloudNet.2014.6968961","has_accepted_license":"1","year":"2014","citation":{"ieee":"S. Dräxler, M. Keller, and H. Karl, “Specifying and Placing Chains of Virtual Network Functions,” in <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i>, 2014, pp. 7–13.","chicago":"Dräxler, Sevil, Matthias Keller, and Holger Karl. “Specifying and Placing Chains of Virtual Network Functions.” In <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i>, 7–13, 2014. <a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">https://doi.org/10.1109/CloudNet.2014.6968961</a>.","ama":"Dräxler S, Keller M, Karl H. Specifying and Placing Chains of Virtual Network Functions. In: <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i>. ; 2014:7-13. doi:<a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">10.1109/CloudNet.2014.6968961</a>","apa":"Dräxler, S., Keller, M., &#38; Karl, H. (2014). Specifying and Placing Chains of Virtual Network Functions. In <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i> (pp. 7–13). <a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">https://doi.org/10.1109/CloudNet.2014.6968961</a>","mla":"Dräxler, Sevil, et al. “Specifying and Placing Chains of Virtual Network Functions.” <i>Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)</i>, 2014, pp. 7–13, doi:<a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">10.1109/CloudNet.2014.6968961</a>.","bibtex":"@inproceedings{Dräxler_Keller_Karl_2014, title={Specifying and Placing Chains of Virtual Network Functions}, DOI={<a href=\"https://doi.org/10.1109/CloudNet.2014.6968961\">10.1109/CloudNet.2014.6968961</a>}, booktitle={Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)}, author={Dräxler, Sevil and Keller, Matthias and Karl, Holger}, year={2014}, pages={7–13} }","short":"S. Dräxler, M. Keller, H. Karl, in: Proceedings of the 3rd International Conference on Cloud Networking (CloudNet), 2014, pp. 7–13."},"page":"7-13","project":[{"_id":"1","name":"SFB 901"},{"_id":"6","name":"SFB 901 - Subprojekt A2"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"360","user_id":"31764","department":[{"_id":"75"}],"ddc":["040"],"file_date_updated":"2018-06-25T08:08:44Z","type":"conference","publication":"Proceedings of the 3rd International Conference on Cloud Networking (CloudNet)","abstract":[{"lang":"eng","text":"Network appliances perform different functions on network flows and constitute an important part of an operator’s network. Normally, a set of chained network functions process network flows. Following the trend of virtualization of networks, virtualization of the network functions has also become a topic of interest. We define a model for formalizing the chaining of network functions using a context-free language. We process deployment requests and construct virtual network function graphs that can be mapped to the network. We describe the mapping as a Mixed Integer Quadratically Constrained Program (MIQCP) for finding the placement of the network functions and chaining them together considering the limited network resources and requirements of the functions. We have performed a Pareto set analysis to investigate the possible trade-offs between different optimization objectives. "}],"urn":"3601","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-06-25T08:08:44Z","date_created":"2018-03-20T07:21:01Z","creator":"florida","file_size":422019,"file_id":"1409","access_level":"open_access","file_name":"360-Mehr1410_Specifying_preprint_01.pdf"}],"status":"public"},{"title":"Simulating load-dependent operation of picocells","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:59:27Z","date_created":"2017-10-17T12:42:02Z","author":[{"last_name":"Roeske","full_name":"Roeske, Daniel","first_name":"Daniel"}],"year":"2014","citation":{"mla":"Roeske, Daniel. <i>Simulating Load-Dependent Operation of Picocells</i>. Universität Paderborn, 2014.","short":"D. Roeske, Simulating Load-Dependent Operation of Picocells, Universität Paderborn, 2014.","bibtex":"@book{Roeske_2014, title={Simulating load-dependent operation of picocells}, publisher={Universität Paderborn}, author={Roeske, Daniel}, year={2014} }","apa":"Roeske, D. (2014). <i>Simulating load-dependent operation of picocells</i>. Universität Paderborn.","ama":"Roeske D. <i>Simulating Load-Dependent Operation of Picocells</i>. Universität Paderborn; 2014.","ieee":"D. Roeske, <i>Simulating load-dependent operation of picocells</i>. Universität Paderborn, 2014.","chicago":"Roeske, Daniel. <i>Simulating Load-Dependent Operation of Picocells</i>. Universität Paderborn, 2014."},"project":[{"name":"SFB 901","_id":"1"},{"_id":"6","name":"SFB 901 - Subprojekt A2"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"361","user_id":"15504","department":[{"_id":"75"}],"status":"public","type":"bachelorsthesis"},{"supervisor":[{"id":"37339","full_name":"Hehenkamp, Burkhard","last_name":"Hehenkamp","first_name":"Burkhard"}],"date_created":"2017-10-17T12:42:02Z","author":[{"first_name":"Sarah","last_name":"Kaiser","full_name":"Kaiser, Sarah"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:59:27Z","title":"Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts & Holt und Kübler et. al","citation":{"chicago":"Kaiser, Sarah. <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn, 2014.","ieee":"S. Kaiser, <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn, 2014.","ama":"Kaiser S. <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn; 2014.","mla":"Kaiser, Sarah. <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn, 2014.","bibtex":"@book{Kaiser_2014, title={Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al}, publisher={Universität Paderborn}, author={Kaiser, Sarah}, year={2014} }","short":"S. Kaiser, Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al, Universität Paderborn, 2014.","apa":"Kaiser, S. (2014). <i>Signalisieren und Screening in Arbeitsmärkten - die Experimente von Brandts &#38; Holt und Kübler et. al</i>. Universität Paderborn."},"year":"2014","department":[{"_id":"280"}],"user_id":"42447","_id":"362","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public"},{"has_accepted_license":"1","year":"2014","citation":{"bibtex":"@inproceedings{Arifulina_Becker_Platenius_Walther_2014, title={SeSAME: Modeling and Analyzing High-Quality Service Compositions}, DOI={<a href=\"https://doi.org/10.1145/2642937.2648621\">10.1145/2642937.2648621</a>}, booktitle={Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)}, author={Arifulina, Svetlana and Becker, Matthias and Platenius, Marie Christin and Walther, Sven}, year={2014}, pages={839–842} }","short":"S. Arifulina, M. Becker, M.C. Platenius, S. Walther, in: Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014), 2014, pp. 839–842.","mla":"Arifulina, Svetlana, et al. “SeSAME: Modeling and Analyzing High-Quality Service Compositions.” <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i>, 2014, pp. 839–42, doi:<a href=\"https://doi.org/10.1145/2642937.2648621\">10.1145/2642937.2648621</a>.","apa":"Arifulina, S., Becker, M., Platenius, M. C., &#38; Walther, S. (2014). SeSAME: Modeling and Analyzing High-Quality Service Compositions. In <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i> (pp. 839–842). <a href=\"https://doi.org/10.1145/2642937.2648621\">https://doi.org/10.1145/2642937.2648621</a>","ama":"Arifulina S, Becker M, Platenius MC, Walther S. SeSAME: Modeling and Analyzing High-Quality Service Compositions. In: <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i>. ; 2014:839-842. doi:<a href=\"https://doi.org/10.1145/2642937.2648621\">10.1145/2642937.2648621</a>","ieee":"S. Arifulina, M. Becker, M. C. Platenius, and S. Walther, “SeSAME: Modeling and Analyzing High-Quality Service Compositions,” in <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i>, 2014, pp. 839–842.","chicago":"Arifulina, Svetlana, Matthias Becker, Marie Christin Platenius, and Sven Walther. “SeSAME: Modeling and Analyzing High-Quality Service Compositions.” In <i>Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)</i>, 839–42, 2014. <a href=\"https://doi.org/10.1145/2642937.2648621\">https://doi.org/10.1145/2642937.2648621</a>."},"page":"839-842","date_updated":"2022-01-06T06:59:28Z","author":[{"last_name":"Arifulina","full_name":"Arifulina, Svetlana","first_name":"Svetlana"},{"first_name":"Matthias","full_name":"Becker, Matthias","last_name":"Becker"},{"last_name":"Platenius","full_name":"Platenius, Marie Christin","first_name":"Marie Christin"},{"full_name":"Walther, Sven","last_name":"Walther","first_name":"Sven"}],"date_created":"2017-10-17T12:42:03Z","title":"SeSAME: Modeling and Analyzing High-Quality Service Compositions","doi":"10.1145/2642937.2648621","type":"conference","publication":"Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014)","abstract":[{"text":"Today, software components are traded on markets in form of services. These services can also be service compositions consisting of several services. If a software architect wants to provide such a service composition in the market for trade, she needs to perform several tasks: she needs to model the composition, to discover existing services to be part of that composition, and to analyze the composition's functional correctness as well as its quality, e.g., performance. Up to now, the architect needed to find and use different tools for these tasks. Typically, these tools are not interoperable with each other. We provide the tool SeSAME that supports a software architect in all of these tasks. SeSAME is an integrated Eclipse-based tool-suite providing a comprehensive service specification language to model service compositions and existing services. Furthermore, it includes modules for service matching, functional analysis, and non-functional analysis. SeSAME is the first tool that integrates all these tasks into one tool-suite and, thereby, provides holistic support for trading software services. Thus, it contributes to a software provider's market success.","lang":"eng"}],"file":[{"date_updated":"2018-03-20T07:19:59Z","creator":"florida","date_created":"2018-03-20T07:19:59Z","file_size":473308,"access_level":"closed","file_id":"1407","file_name":"364-ASE2014.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"_id":"11","name":"SFB 901 - Subproject B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"364","user_id":"477","department":[{"_id":"66"},{"_id":"76"}],"ddc":["040"],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-20T07:19:59Z"},{"date_updated":"2022-01-06T06:59:29Z","author":[{"full_name":"Petrlic, Ronald","last_name":"Petrlic","first_name":"Ronald"},{"first_name":"Alexander","last_name":"Jungmann","full_name":"Jungmann, Alexander"},{"full_name":"Platenius, Marie Christin","last_name":"Platenius","first_name":"Marie Christin"},{"full_name":"Schäfer, Wilhelm","last_name":"Schäfer","first_name":"Wilhelm"},{"first_name":"Christoph","last_name":"Sorge","full_name":"Sorge, Christoph"}],"date_created":"2017-10-17T12:42:03Z","title":"Security and Privacy Challenges in On-The-Fly Computing","has_accepted_license":"1","year":"2014","page":"131-142","citation":{"chicago":"Petrlic, Ronald, Alexander Jungmann, Marie Christin Platenius, Wilhelm Schäfer, and Christoph Sorge. “Security and Privacy Challenges in On-The-Fly Computing.” In <i>Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014)</i>, 131–42, 2014.","ieee":"R. Petrlic, A. Jungmann, M. C. Platenius, W. Schäfer, and C. Sorge, “Security and Privacy Challenges in On-The-Fly Computing,” in <i>Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014)</i>, 2014, pp. 131–142.","ama":"Petrlic R, Jungmann A, Platenius MC, Schäfer W, Sorge C. Security and Privacy Challenges in On-The-Fly Computing. In: <i>Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014)</i>. ; 2014:131-142.","short":"R. Petrlic, A. Jungmann, M.C. Platenius, W. Schäfer, C. Sorge, in: Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 2014, pp. 131–142.","bibtex":"@inproceedings{Petrlic_Jungmann_Platenius_Schäfer_Sorge_2014, title={Security and Privacy Challenges in On-The-Fly Computing}, booktitle={Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014)}, author={Petrlic, Ronald and Jungmann, Alexander and Platenius, Marie Christin and Schäfer, Wilhelm and Sorge, Christoph}, year={2014}, pages={131–142} }","mla":"Petrlic, Ronald, et al. “Security and Privacy Challenges in On-The-Fly Computing.” <i>Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014)</i>, 2014, pp. 131–42.","apa":"Petrlic, R., Jungmann, A., Platenius, M. C., Schäfer, W., &#38; Sorge, C. (2014). Security and Privacy Challenges in On-The-Fly Computing. In <i>Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014)</i> (pp. 131–142)."},"_id":"366","project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"10","name":"SFB 901 - Subproject B2"}],"department":[{"_id":"76"}],"user_id":"477","ddc":["040"],"file_date_updated":"2018-03-20T07:18:47Z","language":[{"iso":"eng"}],"publication":"Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014)","type":"conference","abstract":[{"lang":"eng","text":"On-The-Fly (OTF) Computing constitutes an approach towards highly dynamic and individualized software markets. Based on service-oriented computing, OTF Computing is about realizing global markets of services that can be flexibly combined. We report on our current research activities, the security and privacy implications thereof, and our approaches to tackle the challenges. Furthermore, we discuss how the security and privacy challenges are addressed in research projects similar to OTF Computing."}],"status":"public","file":[{"file_name":"366-otf-security-privacy-final.pdf","file_id":"1405","access_level":"closed","file_size":74488,"date_created":"2018-03-20T07:18:47Z","creator":"florida","date_updated":"2018-03-20T07:18:47Z","relation":"main_file","success":1,"content_type":"application/pdf"}]},{"user_id":"27503","department":[{"_id":"452"}],"_id":"3663","type":"journal_article","publication":"Zeitschrift für Erziehungswissenschaft","status":"public","date_created":"2018-07-23T13:02:02Z","author":[{"last_name":"Rausch","full_name":"Rausch, Andreas","first_name":"Andreas"},{"full_name":"Seifried, Jürgen","last_name":"Seifried","first_name":"Jürgen"},{"full_name":"Harteis, Christian","id":"27503","orcid":"https://orcid.org/0000-0002-3570-7626","last_name":"Harteis","first_name":"Christian"}],"volume":17,"date_updated":"2022-01-06T06:59:29Z","title":"Ausbleibende Effekte pädagogischer Professionalisierung des betrieblichen Ausbildungspersonals: Ergebnisse einer Längsschnittstudie","issue":"Sonderheft","citation":{"ieee":"A. Rausch, J. Seifried, and C. Harteis, “Ausbleibende Effekte pädagogischer Professionalisierung des betrieblichen Ausbildungspersonals: Ergebnisse einer Längsschnittstudie,” <i>Zeitschrift für Erziehungswissenschaft</i>, vol. 17, no. Sonderheft, pp. 127--147, 2014.","chicago":"Rausch, Andreas, Jürgen Seifried, and Christian Harteis. “Ausbleibende Effekte Pädagogischer Professionalisierung Des Betrieblichen Ausbildungspersonals: Ergebnisse Einer Längsschnittstudie.” <i>Zeitschrift Für Erziehungswissenschaft</i> 17, no. Sonderheft (2014): 127--147.","ama":"Rausch A, Seifried J, Harteis C. Ausbleibende Effekte pädagogischer Professionalisierung des betrieblichen Ausbildungspersonals: Ergebnisse einer Längsschnittstudie. <i>Zeitschrift für Erziehungswissenschaft</i>. 2014;17(Sonderheft):127--147.","apa":"Rausch, A., Seifried, J., &#38; Harteis, C. (2014). Ausbleibende Effekte pädagogischer Professionalisierung des betrieblichen Ausbildungspersonals: Ergebnisse einer Längsschnittstudie. <i>Zeitschrift Für Erziehungswissenschaft</i>, <i>17</i>(Sonderheft), 127--147.","short":"A. Rausch, J. Seifried, C. Harteis, Zeitschrift Für Erziehungswissenschaft 17 (2014) 127--147.","mla":"Rausch, Andreas, et al. “Ausbleibende Effekte Pädagogischer Professionalisierung Des Betrieblichen Ausbildungspersonals: Ergebnisse Einer Längsschnittstudie.” <i>Zeitschrift Für Erziehungswissenschaft</i>, vol. 17, no. Sonderheft, 2014, pp. 127--147.","bibtex":"@article{Rausch_Seifried_Harteis_2014, title={Ausbleibende Effekte pädagogischer Professionalisierung des betrieblichen Ausbildungspersonals: Ergebnisse einer Längsschnittstudie}, volume={17}, number={Sonderheft}, journal={Zeitschrift für Erziehungswissenschaft}, author={Rausch, Andreas and Seifried, Jürgen and Harteis, Christian}, year={2014}, pages={127--147} }"},"intvolume":"        17","page":"127--147","year":"2014"},{"date_created":"2018-07-23T13:03:54Z","author":[{"last_name":"Gijbels","full_name":"Gijbels, David","first_name":"David"},{"id":"27503","full_name":"Harteis, Christian","orcid":"https://orcid.org/0000-0002-3570-7626","last_name":"Harteis","first_name":"Christian"},{"first_name":"Vincent","last_name":"Donche","full_name":"Donche, Vincent"},{"first_name":"Piet","last_name":"Van den Bossche","full_name":"Van den Bossche, Piet"},{"full_name":"Maes, Steffi","last_name":"Maes","first_name":"Steffi"},{"first_name":"Katrin","last_name":"Temmen","full_name":"Temmen, Katrin"}],"date_updated":"2022-01-06T06:59:29Z","publisher":"Springer","title":"Grasping learning during internships: the case of engineering education","citation":{"bibtex":"@inbook{Gijbels_Harteis_Donche_Van den Bossche_Maes_Temmen_2014, place={Dordrecht}, title={Grasping learning during internships: the case of engineering education}, booktitle={Discourses on Professional Learning}, publisher={Springer}, author={Gijbels, David and Harteis, Christian and Donche, Vincent and Van den Bossche, Piet and Maes, Steffi and Temmen, Katrin}, editor={Harteis, Christian and Seifried, Jürgen and Rausch, AndreasEditors}, year={2014}, pages={177--188} }","mla":"Gijbels, David, et al. “Grasping Learning during Internships: The Case of Engineering Education.” <i>Discourses on Professional Learning</i>, edited by Christian Harteis et al., Springer, 2014, pp. 177--188.","short":"D. Gijbels, C. Harteis, V. Donche, P. Van den Bossche, S. Maes, K. Temmen, in: C. Harteis, J. Seifried, A. Rausch (Eds.), Discourses on Professional Learning, Springer, Dordrecht, 2014, pp. 177--188.","apa":"Gijbels, D., Harteis, C., Donche, V., Van den Bossche, P., Maes, S., &#38; Temmen, K. (2014). Grasping learning during internships: the case of engineering education. In C. Harteis, J. Seifried, &#38; A. Rausch (Eds.), <i>Discourses on Professional Learning</i> (pp. 177--188). Dordrecht: Springer.","ieee":"D. Gijbels, C. Harteis, V. Donche, P. Van den Bossche, S. Maes, and K. Temmen, “Grasping learning during internships: the case of engineering education,” in <i>Discourses on Professional Learning</i>, C. Harteis, J. Seifried, and A. Rausch, Eds. Dordrecht: Springer, 2014, pp. 177--188.","chicago":"Gijbels, David, Christian Harteis, Vincent Donche, Piet Van den Bossche, Steffi Maes, and Katrin Temmen. “Grasping Learning during Internships: The Case of Engineering Education.” In <i>Discourses on Professional Learning</i>, edited by Christian Harteis, Jürgen Seifried, and Andreas Rausch, 177--188. Dordrecht: Springer, 2014.","ama":"Gijbels D, Harteis C, Donche V, Van den Bossche P, Maes S, Temmen K. Grasping learning during internships: the case of engineering education. In: Harteis C, Seifried J, Rausch A, eds. <i>Discourses on Professional Learning</i>. Dordrecht: Springer; 2014:177--188."},"page":"177--188","place":"Dordrecht","year":"2014","user_id":"27503","department":[{"_id":"452"}],"_id":"3664","type":"book_chapter","publication":"Discourses on Professional Learning","status":"public","editor":[{"first_name":"Christian","last_name":"Harteis","full_name":"Harteis, Christian"},{"first_name":"Jürgen","last_name":"Seifried","full_name":"Seifried, Jürgen"},{"first_name":"Andreas","full_name":"Rausch, Andreas","last_name":"Rausch"}]},{"date_created":"2018-07-23T13:05:13Z","author":[{"first_name":"Christian","orcid":"https://orcid.org/0000-0002-3570-7626","last_name":"Harteis","full_name":"Harteis, Christian","id":"27503"},{"last_name":"Rausch","full_name":"Rausch, Andreas","first_name":"Andreas"},{"last_name":"Seifried","full_name":"Seifried, Jürgen","first_name":"Jürgen"}],"publisher":"Springer","date_updated":"2022-01-06T06:59:29Z","title":"Discourses on professional learning: On the boundary between learning and working","page":"1--7","citation":{"bibtex":"@inbook{Harteis_Rausch_Seifried_2014, place={Dordrecht}, title={Discourses on professional learning: On the boundary between learning and working}, booktitle={Discourses on Professional Learning}, publisher={Springer}, author={Harteis, Christian and Rausch, Andreas and Seifried, Jürgen}, editor={Harteis, Christian and Seifried, Jürgen and Rausch, AndreasEditors}, year={2014}, pages={1--7} }","short":"C. Harteis, A. Rausch, J. Seifried, in: C. Harteis, J. Seifried, A. Rausch (Eds.), Discourses on Professional Learning, Springer, Dordrecht, 2014, pp. 1--7.","mla":"Harteis, Christian, et al. “Discourses on Professional Learning: On the Boundary between Learning and Working.” <i>Discourses on Professional Learning</i>, edited by Christian Harteis et al., Springer, 2014, pp. 1--7.","apa":"Harteis, C., Rausch, A., &#38; Seifried, J. (2014). Discourses on professional learning: On the boundary between learning and working. In C. Harteis, J. Seifried, &#38; A. Rausch (Eds.), <i>Discourses on Professional Learning</i> (pp. 1--7). Dordrecht: Springer.","ama":"Harteis C, Rausch A, Seifried J. Discourses on professional learning: On the boundary between learning and working. In: Harteis C, Seifried J, Rausch A, eds. <i>Discourses on Professional Learning</i>. Dordrecht: Springer; 2014:1--7.","chicago":"Harteis, Christian, Andreas Rausch, and Jürgen Seifried. “Discourses on Professional Learning: On the Boundary between Learning and Working.” In <i>Discourses on Professional Learning</i>, edited by Christian Harteis, Jürgen Seifried, and Andreas Rausch, 1--7. Dordrecht: Springer, 2014.","ieee":"C. Harteis, A. Rausch, and J. Seifried, “Discourses on professional learning: On the boundary between learning and working,” in <i>Discourses on Professional Learning</i>, C. Harteis, J. Seifried, and A. Rausch, Eds. Dordrecht: Springer, 2014, pp. 1--7."},"place":"Dordrecht","year":"2014","department":[{"_id":"452"}],"user_id":"27503","_id":"3665","publication":"Discourses on Professional Learning","type":"book_chapter","status":"public","editor":[{"first_name":"Christian","full_name":"Harteis, Christian","last_name":"Harteis"},{"first_name":"Jürgen","full_name":"Seifried, Jürgen","last_name":"Seifried"},{"full_name":"Rausch, Andreas","last_name":"Rausch","first_name":"Andreas"}]},{"date_updated":"2022-01-06T06:59:29Z","publisher":"Springer","_id":"3666","date_created":"2018-07-23T13:07:39Z","user_id":"27503","department":[{"_id":"452"}],"title":"Discourses on professional learning","type":"book_editor","place":"Dordrecht","year":"2014","editor":[{"first_name":"Christian","last_name":"Harteis","orcid":"https://orcid.org/0000-0002-3570-7626","full_name":"Harteis, Christian","id":"27503"},{"first_name":"Andreas","full_name":"Rausch, Andreas","last_name":"Rausch"},{"full_name":"Seifried, Jürgen","last_name":"Seifried","first_name":"Jürgen"}],"citation":{"apa":"Harteis, C., Rausch, A., &#38; Seifried, J. (Eds.). (2014). <i>Discourses on professional learning</i>. Dordrecht: Springer.","mla":"Harteis, Christian, et al., editors. <i>Discourses on Professional Learning</i>. Springer, 2014.","bibtex":"@book{Harteis_Rausch_Seifried_2014, place={Dordrecht}, title={Discourses on professional learning}, publisher={Springer}, year={2014} }","short":"C. Harteis, A. Rausch, J. Seifried, eds., Discourses on Professional Learning, Springer, Dordrecht, 2014.","chicago":"Harteis, Christian, Andreas Rausch, and Jürgen Seifried, eds. <i>Discourses on Professional Learning</i>. Dordrecht: Springer, 2014.","ieee":"C. Harteis, A. Rausch, and J. Seifried, Eds., <i>Discourses on professional learning</i>. Dordrecht: Springer, 2014.","ama":"Harteis C, Rausch A, Seifried J, eds. <i>Discourses on Professional Learning</i>. Dordrecht: Springer; 2014."},"status":"public"},{"title":"Learning from errors at work","author":[{"first_name":"Christian","full_name":"Harteis, Christian","id":"27503","last_name":"Harteis","orcid":"https://orcid.org/0000-0002-3570-7626"},{"first_name":"Johannes","full_name":"Bauer, Johannes","last_name":"Bauer"}],"date_created":"2018-07-23T13:08:09Z","date_updated":"2022-01-06T06:59:29Z","page":"699--732","citation":{"short":"C. Harteis, J. Bauer, in: S. Billett, C. Harteis, H. Gruber (Eds.), International Handbook of Research in Professional and Practice-Based Learning, 2014, pp. 699--732.","bibtex":"@inbook{Harteis_Bauer_2014, title={Learning from errors at work}, booktitle={International handbook of research in professional and practice-based learning}, author={Harteis, Christian and Bauer, Johannes}, editor={Billett, Stephen and Harteis, Christian and Gruber, HansEditors}, year={2014}, pages={699--732} }","mla":"Harteis, Christian, and Johannes Bauer. “Learning from Errors at Work.” <i>International Handbook of Research in Professional and Practice-Based Learning</i>, edited by Stephen Billett et al., 2014, pp. 699--732.","apa":"Harteis, C., &#38; Bauer, J. (2014). Learning from errors at work. In S. Billett, C. Harteis, &#38; H. Gruber (Eds.), <i>International handbook of research in professional and practice-based learning</i> (pp. 699--732).","ama":"Harteis C, Bauer J. Learning from errors at work. In: Billett S, Harteis C, Gruber H, eds. <i>International Handbook of Research in Professional and Practice-Based Learning</i>. ; 2014:699--732.","ieee":"C. Harteis and J. Bauer, “Learning from errors at work,” in <i>International handbook of research in professional and practice-based learning</i>, S. Billett, C. Harteis, and H. Gruber, Eds. 2014, pp. 699--732.","chicago":"Harteis, Christian, and Johannes Bauer. “Learning from Errors at Work.” In <i>International Handbook of Research in Professional and Practice-Based Learning</i>, edited by Stephen Billett, Christian Harteis, and Hans Gruber, 699--732, 2014."},"year":"2014","department":[{"_id":"452"}],"user_id":"27503","_id":"3667","status":"public","editor":[{"last_name":"Billett","full_name":"Billett, Stephen","first_name":"Stephen"},{"full_name":"Harteis, Christian","last_name":"Harteis","first_name":"Christian"},{"last_name":"Gruber","full_name":"Gruber, Hans","first_name":"Hans"}],"publication":"International handbook of research in professional and practice-based learning","type":"book_chapter"},{"_id":"3668","user_id":"27503","department":[{"_id":"452"}],"type":"book_editor","editor":[{"first_name":"Stephen","full_name":"Billett, Stephen","last_name":"Billett"},{"id":"27503","full_name":"Harteis, Christian","last_name":"Harteis","orcid":"https://orcid.org/0000-0002-3570-7626","first_name":"Christian"},{"full_name":"Gruber, Hans","last_name":"Gruber","first_name":"Hans"}],"status":"public","publisher":"Springer","date_updated":"2022-01-06T06:59:29Z","date_created":"2018-07-23T13:10:22Z","title":"International handbook of research in professional and practice-based learning","place":"Dordrecht","year":"2014","citation":{"bibtex":"@book{Billett_Harteis_Gruber_2014, place={Dordrecht}, title={International handbook of research in professional and practice-based learning}, publisher={Springer}, year={2014} }","short":"S. Billett, C. Harteis, H. Gruber, eds., International Handbook of Research in Professional and Practice-Based Learning, Springer, Dordrecht, 2014.","mla":"Billett, Stephen, et al., editors. <i>International Handbook of Research in Professional and Practice-Based Learning</i>. Springer, 2014.","apa":"Billett, S., Harteis, C., &#38; Gruber, H. (Eds.). (2014). <i>International handbook of research in professional and practice-based learning</i>. Dordrecht: Springer.","ama":"Billett S, Harteis C, Gruber H, eds. <i>International Handbook of Research in Professional and Practice-Based Learning</i>. Dordrecht: Springer; 2014.","chicago":"Billett, Stephen, Christian Harteis, and Hans Gruber, eds. <i>International Handbook of Research in Professional and Practice-Based Learning</i>. Dordrecht: Springer, 2014.","ieee":"S. Billett, C. Harteis, and H. Gruber, Eds., <i>International handbook of research in professional and practice-based learning</i>. Dordrecht: Springer, 2014."}},{"has_accepted_license":"1","year":"2014","citation":{"chicago":"Janiuk, Jens, Alexander Mäcker, and Kalman Graffi. “Secure Distributed Data Structures for Peer-to-Peer-Based Social Networks.” In <i>Proceedings of the International Conference on Collaboration Technologies and Systems (CTS)</i>, 396–405, 2014. <a href=\"https://doi.org/10.1109/CTS.2014.6867595\">https://doi.org/10.1109/CTS.2014.6867595</a>.","ieee":"J. Janiuk, A. Mäcker, and K. Graffi, “Secure Distributed Data Structures for Peer-to-Peer-based Social Networks,” in <i>Proceedings of the International Conference on Collaboration Technologies and Systems (CTS)</i>, 2014, pp. 396–405.","ama":"Janiuk J, Mäcker A, Graffi K. Secure Distributed Data Structures for Peer-to-Peer-based Social Networks. In: <i>Proceedings of the International Conference on Collaboration Technologies and Systems (CTS)</i>. ; 2014:396-405. doi:<a href=\"https://doi.org/10.1109/CTS.2014.6867595\">10.1109/CTS.2014.6867595</a>","mla":"Janiuk, Jens, et al. “Secure Distributed Data Structures for Peer-to-Peer-Based Social Networks.” <i>Proceedings of the International Conference on Collaboration Technologies and Systems (CTS)</i>, 2014, pp. 396–405, doi:<a href=\"https://doi.org/10.1109/CTS.2014.6867595\">10.1109/CTS.2014.6867595</a>.","short":"J. Janiuk, A. Mäcker, K. Graffi, in: Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), 2014, pp. 396–405.","bibtex":"@inproceedings{Janiuk_Mäcker_Graffi_2014, title={Secure Distributed Data Structures for Peer-to-Peer-based Social Networks}, DOI={<a href=\"https://doi.org/10.1109/CTS.2014.6867595\">10.1109/CTS.2014.6867595</a>}, booktitle={Proceedings of the International Conference on Collaboration Technologies and Systems (CTS)}, author={Janiuk, Jens and Mäcker, Alexander and Graffi, Kalman}, year={2014}, pages={396–405} }","apa":"Janiuk, J., Mäcker, A., &#38; Graffi, K. (2014). Secure Distributed Data Structures for Peer-to-Peer-based Social Networks. In <i>Proceedings of the International Conference on Collaboration Technologies and Systems (CTS)</i> (pp. 396–405). <a href=\"https://doi.org/10.1109/CTS.2014.6867595\">https://doi.org/10.1109/CTS.2014.6867595</a>"},"page":"396-405","date_updated":"2022-01-06T06:59:29Z","author":[{"last_name":"Janiuk","full_name":"Janiuk, Jens","first_name":"Jens"},{"first_name":"Alexander","last_name":"Mäcker","id":"13536","full_name":"Mäcker, Alexander"},{"first_name":"Kalman","full_name":"Graffi, Kalman","last_name":"Graffi"}],"date_created":"2017-10-17T12:42:03Z","title":"Secure Distributed Data Structures for Peer-to-Peer-based Social Networks","doi":"10.1109/CTS.2014.6867595","type":"conference","publication":"Proceedings of the International Conference on Collaboration Technologies and Systems (CTS)","abstract":[{"lang":"eng","text":"Online social networks are attracting billions of nowadays, both on a global scale as well as in social enterprise networks. Using distributed hash tables and peer-to-peer technology allows online social networks to be operated securely and efficiently only by using the resources of the user devices, thus alleviating censorship or data misuse by a single network operator. In this paper, we address the challenges that arise in implementing reliably and conveniently to use distributed data structures, such as lists or sets, in such a distributed hash-tablebased online social network. We present a secure, distributed list data structure that manages the list entries in several buckets in the distributed hash table. The list entries are authenticated, integrity is maintained and access control for single users and also groups is integrated. The approach for secure distributed lists is also applied for prefix trees and sets, and implemented and evaluated in a peer-to-peer framework for social networks. Evaluation shows that the distributed data structure is convenient and efficient to use and that the requirements on security hold."}],"file":[{"date_updated":"2018-03-20T07:18:12Z","date_created":"2018-03-20T07:18:12Z","creator":"florida","file_size":647997,"file_id":"1404","access_level":"closed","file_name":"367-cts_conf.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"367","user_id":"477","department":[{"_id":"79"}],"ddc":["040"],"file_date_updated":"2018-03-20T07:18:12Z","language":[{"iso":"eng"}]},{"user_id":"27503","department":[{"_id":"452"}],"_id":"3678","type":"book_chapter","publication":"E-Learning 2.0 Technologies and Web Applications in Higher Education","status":"public","editor":[{"first_name":"J.-E.","last_name":"Pelet","full_name":"Pelet, J.-E."}],"author":[{"first_name":"Anna Liza","last_name":"Daunert","full_name":"Daunert, Anna Liza"},{"first_name":"Christian","last_name":"Harteis","orcid":"https://orcid.org/0000-0002-3570-7626","full_name":"Harteis, Christian","id":"27503"}],"date_created":"2018-07-23T13:24:44Z","publisher":"IGI Global","date_updated":"2022-01-06T06:59:29Z","title":"Pre-service teachers’ perspectives and practices in utilizing ubiquitous technologies for academic-oriented learning and knowledge management","citation":{"short":"A.L. Daunert, C. Harteis, in: J.-E. Pelet (Ed.), E-Learning 2.0 Technologies and Web Applications in Higher Education, IGI Global, Hershey, 2014, pp. 254--272.","mla":"Daunert, Anna Liza, and Christian Harteis. “Pre-Service Teachers’ Perspectives and Practices in Utilizing Ubiquitous Technologies for Academic-Oriented Learning and Knowledge Management.” <i>E-Learning 2.0 Technologies and Web Applications in Higher Education</i>, edited by J.-E. Pelet, IGI Global, 2014, pp. 254--272.","bibtex":"@inbook{Daunert_Harteis_2014, place={Hershey}, title={Pre-service teachers’ perspectives and practices in utilizing ubiquitous technologies for academic-oriented learning and knowledge management}, booktitle={E-Learning 2.0 Technologies and Web Applications in Higher Education}, publisher={IGI Global}, author={Daunert, Anna Liza and Harteis, Christian}, editor={Pelet, J.-E.Editor}, year={2014}, pages={254--272} }","apa":"Daunert, A. L., &#38; Harteis, C. (2014). Pre-service teachers’ perspectives and practices in utilizing ubiquitous technologies for academic-oriented learning and knowledge management. In J.-E. Pelet (Ed.), <i>E-Learning 2.0 Technologies and Web Applications in Higher Education</i> (pp. 254--272). Hershey: IGI Global.","ieee":"A. L. Daunert and C. Harteis, “Pre-service teachers’ perspectives and practices in utilizing ubiquitous technologies for academic-oriented learning and knowledge management,” in <i>E-Learning 2.0 Technologies and Web Applications in Higher Education</i>, J.-E. Pelet, Ed. Hershey: IGI Global, 2014, pp. 254--272.","chicago":"Daunert, Anna Liza, and Christian Harteis. “Pre-Service Teachers’ Perspectives and Practices in Utilizing Ubiquitous Technologies for Academic-Oriented Learning and Knowledge Management.” In <i>E-Learning 2.0 Technologies and Web Applications in Higher Education</i>, edited by J.-E. Pelet, 254--272. Hershey: IGI Global, 2014.","ama":"Daunert AL, Harteis C. Pre-service teachers’ perspectives and practices in utilizing ubiquitous technologies for academic-oriented learning and knowledge management. In: Pelet J-E, ed. <i>E-Learning 2.0 Technologies and Web Applications in Higher Education</i>. Hershey: IGI Global; 2014:254--272."},"page":"254--272","place":"Hershey","year":"2014"},{"abstract":[{"lang":"eng","text":"We consider the problem of scheduling a number of jobs on $m$ identical processors sharing a continuously divisible resource. Each job j comes with a resource requirement r_j \\in {0,1}. The job can be processed at full speed if granted its full resource requirement. If receiving only an x-portion of r_j, it is processed at an x-fraction of the full speed. Our goal is to find a resource assignment that minimizes the makespan (i.e., the latest completion time). Variants of such problems, relating the resource assignment of jobs to their \\emph{processing speeds}, have been studied under the term discrete-continuous scheduling. Known results are either very pessimistic or heuristic in nature.In this paper, we suggest and analyze a slightly simplified model. It focuses on the assignment of shared continuous resources to the processors. The job assignment to processors and the ordering of the jobs have already been fixed. It is shown that, even for unit size jobs, finding an optimal solution is NP-hard if the number of processors is part of the input. Positive results for unit size jobs include an efficient optimal algorithm for 2 processors. Moreover, we prove that balanced schedules yield a 2-1/m-approximation for a fixed number of processors. Such schedules are computed by our GreedyBalance algorithm, for which the bound is tight."}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-20T07:17:38Z","creator":"florida","date_created":"2018-03-20T07:17:38Z","file_size":485767,"access_level":"closed","file_name":"368-BKMNRS14.pdf","file_id":"1403"}],"status":"public","type":"conference","publication":"Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)","ddc":["040"],"file_date_updated":"2018-03-20T07:17:38Z","language":[{"iso":"eng"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C4","_id":"16"},{"name":"SFB 901 - Subproject C2","_id":"14"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"368","user_id":"15415","department":[{"_id":"63"}],"year":"2014","citation":{"ama":"Brinkmann A, Kling P, Meyer auf der Heide F, Nagel L, Riechers S, Suess T. Scheduling Shared Continuous Resources on Many-Cores. In: <i>Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. ; 2014:128-137. doi:<a href=\"https://doi.org/10.1145/2612669.2612698\">10.1145/2612669.2612698</a>","chicago":"Brinkmann, Andre, Peter Kling, Friedhelm Meyer auf der Heide, Lars Nagel, Sören Riechers, and Tim  Suess. “Scheduling Shared Continuous Resources on Many-Cores.” In <i>Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 128–37, 2014. <a href=\"https://doi.org/10.1145/2612669.2612698\">https://doi.org/10.1145/2612669.2612698</a>.","ieee":"A. Brinkmann, P. Kling, F. Meyer auf der Heide, L. Nagel, S. Riechers, and T. Suess, “Scheduling Shared Continuous Resources on Many-Cores,” in <i>Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 2014, pp. 128–137, doi: <a href=\"https://doi.org/10.1145/2612669.2612698\">10.1145/2612669.2612698</a>.","short":"A. Brinkmann, P. Kling, F. Meyer auf der Heide, L. Nagel, S. Riechers, T. Suess, in: Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2014, pp. 128–137.","mla":"Brinkmann, Andre, et al. “Scheduling Shared Continuous Resources on Many-Cores.” <i>Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 2014, pp. 128–37, doi:<a href=\"https://doi.org/10.1145/2612669.2612698\">10.1145/2612669.2612698</a>.","bibtex":"@inproceedings{Brinkmann_Kling_Meyer auf der Heide_Nagel_Riechers_Suess_2014, title={Scheduling Shared Continuous Resources on Many-Cores}, DOI={<a href=\"https://doi.org/10.1145/2612669.2612698\">10.1145/2612669.2612698</a>}, booktitle={Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}, author={Brinkmann, Andre and Kling, Peter and Meyer auf der Heide, Friedhelm and Nagel, Lars and Riechers, Sören and Suess, Tim }, year={2014}, pages={128–137} }","apa":"Brinkmann, A., Kling, P., Meyer auf der Heide, F., Nagel, L., Riechers, S., &#38; Suess, T. (2014). Scheduling Shared Continuous Resources on Many-Cores. <i>Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 128–137. <a href=\"https://doi.org/10.1145/2612669.2612698\">https://doi.org/10.1145/2612669.2612698</a>"},"page":"128-137","has_accepted_license":"1","title":"Scheduling Shared Continuous Resources on Many-Cores","doi":"10.1145/2612669.2612698","date_updated":"2022-01-06T06:59:30Z","date_created":"2017-10-17T12:42:03Z","author":[{"first_name":"Andre","last_name":"Brinkmann","full_name":"Brinkmann, Andre"},{"full_name":"Kling, Peter","last_name":"Kling","first_name":"Peter"},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"},{"first_name":"Lars","last_name":"Nagel","full_name":"Nagel, Lars"},{"last_name":"Riechers","full_name":"Riechers, Sören","first_name":"Sören"},{"first_name":"Tim ","last_name":"Suess","full_name":"Suess, Tim "}]}]
