[{"citation":{"ama":"Blömer J, Gomes da Silva R, Günther P, Krämer J, Seifert J-P. A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In: <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>. ; 2014:123--136. doi:<a href=\"https://doi.org/10.1109/FDTC.2014.22\">10.1109/FDTC.2014.22</a>","ieee":"J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, and J.-P. Seifert, “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation,” in <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 2014, pp. 123--136.","chicago":"Blömer, Johannes, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, and Jean-Pierre Seifert. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” In <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 123--136, 2014. <a href=\"https://doi.org/10.1109/FDTC.2014.22\">https://doi.org/10.1109/FDTC.2014.22</a>.","mla":"Blömer, Johannes, et al. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 2014, pp. 123--136, doi:<a href=\"https://doi.org/10.1109/FDTC.2014.22\">10.1109/FDTC.2014.22</a>.","short":"J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.","bibtex":"@inproceedings{Blömer_Gomes da Silva_Günther_Krämer_Seifert_2014, title={A Practical Second-Order Fault Attack against a Real-World Pairing Implementation}, DOI={<a href=\"https://doi.org/10.1109/FDTC.2014.22\">10.1109/FDTC.2014.22</a>}, booktitle={Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)}, author={Blömer, Johannes and Gomes da Silva, Ricardo and Günther, Peter and Krämer, Juliane and Seifert, Jean-Pierre}, year={2014}, pages={123--136} }","apa":"Blömer, J., Gomes da Silva, R., Günther, P., Krämer, J., &#38; Seifert, J.-P. (2014). A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i> (pp. 123--136). <a href=\"https://doi.org/10.1109/FDTC.2014.22\">https://doi.org/10.1109/FDTC.2014.22</a>"},"page":"123--136","year":"2014","has_accepted_license":"1","doi":"10.1109/FDTC.2014.22","title":"A Practical Second-Order Fault Attack against a Real-World Pairing Implementation","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"full_name":"Gomes da Silva, Ricardo","last_name":"Gomes da Silva","first_name":"Ricardo"},{"full_name":"Günther, Peter","last_name":"Günther","first_name":"Peter"},{"first_name":"Juliane","last_name":"Krämer","full_name":"Krämer, Juliane"},{"last_name":"Seifert","full_name":"Seifert, Jean-Pierre","first_name":"Jean-Pierre"}],"date_created":"2017-10-17T12:42:22Z","date_updated":"2022-01-06T07:01:16Z","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-16T11:20:54Z","creator":"florida","date_updated":"2018-03-16T11:20:54Z","file_id":"1336","access_level":"closed","file_name":"463-FDTC14.pdf","file_size":437518}],"status":"public","abstract":[{"lang":"eng","text":"Several fault attacks against pairing-based cryptography have been described theoretically in recent years. Interestingly, none of these have been practically evaluated. We accomplished this task and prove that fault attacks against pairing-based cryptography are indeed possible and are even practical — thus posing a serious threat. Moreover, we successfully conducted a second-order fault attack against an open source implementation of the eta pairing on an AVR XMEGA A1. We injected the first fault into the computation of the Miller Algorithm and applied the second fault to skip the final exponentiation completely. We introduce a low-cost setup that allowed us to generate multiple independent faults in one computation. The setup implements these faults by clock glitches which induce instruction skips. With this setup we conducted the first practical fault attack against a complete pairing computation."}],"type":"conference","publication":"Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)","file_date_updated":"2018-03-16T11:20:54Z","ddc":["040"],"user_id":"25078","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"463"},{"year":"2014","issue":"1","title":"A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization","date_created":"2017-10-17T12:42:22Z","publisher":"Springer","file":[{"file_name":"464-GJRSST2014.pdf","access_level":"closed","file_id":"1334","file_size":947484,"creator":"florida","date_created":"2018-03-16T11:19:45Z","date_updated":"2018-03-16T11:19:45Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"abstract":[{"text":"Topological self-stabilization is an important concept to build robust open distributed systems (such as peer-to-peer systems) where nodes can organize themselves into meaningful network topologies. The goal is to devise distributed algorithms where nodes forward, insert, and delete links to neighboring nodes, and that converge quickly to such a desirable topology, independently of the initial network configuration. This article proposes a new model to study the parallel convergence time. Our model sheds light on the achievable parallelism by avoiding bottlenecks of existing models that can yield a distorted picture. As a case study, we consider local graph linearization—i.e., how to build a sorted list of the nodes of a connected graph in a distributed and self-stabilizing manner. In order to study the main structure and properties of our model, we propose two variants of a most simple local linearization algorithm. For each of these variants, we present analyses of the worst-case and bestcase parallel time complexities, as well as the performance under a greedy selection of the actions to be executed. It turns out that the analysis is non-trivial despite the simple setting, and to complement our formal insights we report on our experiments which indicate that the runtimes may be better in the average case.","lang":"eng"}],"publication":"Theory of Computing Systems","ddc":["040"],"page":"110-135","citation":{"chicago":"Gall, Dominik, Riko Jacob, Andrea W. Richa, Christian Scheideler, Stefan Schmid, and Hanjo  Täubig. “A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization.” <i>Theory of Computing Systems</i>, no. 1 (2014): 110–35. <a href=\"https://doi.org/10.1007/s00224-013-9504-x\">https://doi.org/10.1007/s00224-013-9504-x</a>.","ieee":"D. Gall, R. Jacob, A. W. Richa, C. Scheideler, S. Schmid, and H. Täubig, “A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization,” <i>Theory of Computing Systems</i>, no. 1, pp. 110–135, 2014.","ama":"Gall D, Jacob R, Richa AW, Scheideler C, Schmid S, Täubig H. A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization. <i>Theory of Computing Systems</i>. 2014;(1):110-135. doi:<a href=\"https://doi.org/10.1007/s00224-013-9504-x\">10.1007/s00224-013-9504-x</a>","short":"D. Gall, R. Jacob, A.W. Richa, C. Scheideler, S. Schmid, H. Täubig, Theory of Computing Systems (2014) 110–135.","mla":"Gall, Dominik, et al. “A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization.” <i>Theory of Computing Systems</i>, no. 1, Springer, 2014, pp. 110–35, doi:<a href=\"https://doi.org/10.1007/s00224-013-9504-x\">10.1007/s00224-013-9504-x</a>.","bibtex":"@article{Gall_Jacob_Richa_Scheideler_Schmid_Täubig_2014, title={A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization}, DOI={<a href=\"https://doi.org/10.1007/s00224-013-9504-x\">10.1007/s00224-013-9504-x</a>}, number={1}, journal={Theory of Computing Systems}, publisher={Springer}, author={Gall, Dominik and Jacob, Riko and Richa, Andrea W. and Scheideler, Christian and Schmid, Stefan and Täubig, Hanjo }, year={2014}, pages={110–135} }","apa":"Gall, D., Jacob, R., Richa, A. W., Scheideler, C., Schmid, S., &#38; Täubig, H. (2014). A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization. <i>Theory of Computing Systems</i>, (1), 110–135. <a href=\"https://doi.org/10.1007/s00224-013-9504-x\">https://doi.org/10.1007/s00224-013-9504-x</a>"},"has_accepted_license":"1","doi":"10.1007/s00224-013-9504-x","author":[{"last_name":"Gall","full_name":"Gall, Dominik","first_name":"Dominik"},{"last_name":"Jacob","full_name":"Jacob, Riko","first_name":"Riko"},{"last_name":"Richa","full_name":"Richa, Andrea W.","first_name":"Andrea W."},{"first_name":"Christian","id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler"},{"full_name":"Schmid, Stefan","last_name":"Schmid","first_name":"Stefan"},{"full_name":"Täubig, Hanjo ","last_name":"Täubig","first_name":"Hanjo "}],"date_updated":"2022-01-06T07:01:16Z","status":"public","type":"journal_article","file_date_updated":"2018-03-16T11:19:45Z","department":[{"_id":"79"}],"user_id":"477","_id":"464","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}]},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"15","name":"SFB 901 - Subprojekt C3"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"465","user_id":"15504","ddc":["040"],"file_date_updated":"2018-03-16T11:20:22Z","type":"report","abstract":[{"text":"This article presents a novel Mixed Integer Nonlinear Programming (MINLP) approach for ﬁnding a renewal plan of pipes in a water distribution system. We formulate a MINLP model for ﬁnding the times of renewal and suited measurements of pipe dimensions in a multi-year planning horizon. The model includes a multi-period hydraulic simulation of the distribution systems behaviour thereby respecting the friction caused headloss as a nonlinear constraint. We apply the MINLP solver Bonmin to a test network and present ﬁrst numerical results. The models embedding into a general solution framework for water network problems consisting of network reduction and simulation steps in an interated way, is beign discussed. This latter discussion corresponds well to the recent results by C. Hallmann for the problem of tank planning within the mentioned solution framework that has been presented there for the ﬁrst time.","lang":"eng"}],"file":[{"file_id":"1335","file_name":"465-2014_-_Stapel__Suhl_-_TechReport_MINLP_Water.pdf","access_level":"closed","file_size":435976,"creator":"florida","date_created":"2018-03-16T11:20:22Z","date_updated":"2018-03-16T11:20:22Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:16Z","date_created":"2017-10-17T12:42:22Z","author":[{"last_name":"Stapel","full_name":"Stapel, Florian","first_name":"Florian"},{"first_name":"Leena","last_name":"Suhl","full_name":"Suhl, Leena"}],"title":"A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks","has_accepted_license":"1","year":"2014","citation":{"short":"F. Stapel, L. Suhl, A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks, Universität Paderborn, 2014.","bibtex":"@book{Stapel_Suhl_2014, title={A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks}, publisher={Universität Paderborn}, author={Stapel, Florian and Suhl, Leena}, year={2014} }","mla":"Stapel, Florian, and Leena Suhl. <i>A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks</i>. Universität Paderborn, 2014.","apa":"Stapel, F., &#38; Suhl, L. (2014). <i>A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks</i>. Universität Paderborn.","ieee":"F. Stapel and L. Suhl, <i>A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks</i>. Universität Paderborn, 2014.","chicago":"Stapel, Florian, and Leena Suhl. <i>A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks</i>. Universität Paderborn, 2014.","ama":"Stapel F, Suhl L. <i>A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks</i>. Universität Paderborn; 2014."}},{"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"_id":"466","project":[{"name":"SFB 901","_id":"1"},{"_id":"14","name":"SFB 901 - Subprojekt C2"},{"_id":"4","name":"SFB 901 - Project Area C"}],"user_id":"477","year":"2014","citation":{"apa":"Brand, M. (2014). <i>A generalized loop accelerator implemented as a coarse grained array</i>. Universität Paderborn.","mla":"Brand, Marcel. <i>A Generalized Loop Accelerator Implemented as a Coarse Grained Array</i>. Universität Paderborn, 2014.","short":"M. Brand, A Generalized Loop Accelerator Implemented as a Coarse Grained Array, Universität Paderborn, 2014.","bibtex":"@book{Brand_2014, title={A generalized loop accelerator implemented as a coarse grained array}, publisher={Universität Paderborn}, author={Brand, Marcel}, year={2014} }","ieee":"M. Brand, <i>A generalized loop accelerator implemented as a coarse grained array</i>. Universität Paderborn, 2014.","chicago":"Brand, Marcel. <i>A Generalized Loop Accelerator Implemented as a Coarse Grained Array</i>. Universität Paderborn, 2014.","ama":"Brand M. <i>A Generalized Loop Accelerator Implemented as a Coarse Grained Array</i>. Universität Paderborn; 2014."},"title":"A generalized loop accelerator implemented as a coarse grained array","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:17Z","author":[{"last_name":"Brand","full_name":"Brand, Marcel","first_name":"Marcel"}],"date_created":"2017-10-17T12:42:22Z"},{"conference":{"location":"University of Pisa, Italy","end_date":"8.12.2014","start_date":"6.12.2014","name":"Conference on Computational and Financial Econometrics"},"title":"Data-driven estimation of realized kernels under dependent microstructure noise and further analysis using the Semi-FI-Log-ACD","author":[{"last_name":"Zhou","full_name":"Zhou, Chen","first_name":"Chen"},{"first_name":"Yuanhua","last_name":"Feng","id":"20760","full_name":"Feng, Yuanhua"}],"date_created":"2018-10-11T12:20:17Z","date_updated":"2022-01-06T07:01:17Z","citation":{"ieee":"C. Zhou and Y. Feng, “Data-driven estimation of realized kernels under dependent microstructure noise and further analysis using the Semi-FI-Log-ACD.” 2014.","chicago":"Zhou, Chen, and Yuanhua Feng. “Data-Driven Estimation of Realized Kernels under Dependent Microstructure Noise and Further Analysis Using the Semi-FI-Log-ACD.” Book of Abstracts, 2014.","ama":"Zhou C, Feng Y. Data-driven estimation of realized kernels under dependent microstructure noise and further analysis using the Semi-FI-Log-ACD. 2014.","short":"C. Zhou, Y. Feng, (2014).","bibtex":"@article{Zhou_Feng_2014, series={Book of Abstracts}, title={Data-driven estimation of realized kernels under dependent microstructure noise and further analysis using the Semi-FI-Log-ACD}, author={Zhou, Chen and Feng, Yuanhua}, year={2014}, collection={Book of Abstracts} }","mla":"Zhou, Chen, and Yuanhua Feng. <i>Data-Driven Estimation of Realized Kernels under Dependent Microstructure Noise and Further Analysis Using the Semi-FI-Log-ACD</i>. 2014.","apa":"Zhou, C., &#38; Feng, Y. (2014). Data-driven estimation of realized kernels under dependent microstructure noise and further analysis using the Semi-FI-Log-ACD. Presented at the Conference on Computational and Financial Econometrics, University of Pisa, Italy."},"year":"2014","language":[{"iso":"eng"}],"user_id":"10075","series_title":"Book of Abstracts","department":[{"_id":"206"}],"_id":"4664","status":"public","type":"conference"},{"language":[{"iso":"eng"}],"ddc":["000"],"publication":"Future Generation Computer Systems","file":[{"creator":"ups","date_created":"2018-11-02T15:46:17Z","date_updated":"2018-11-02T15:46:17Z","file_name":"KünsemöllerKarl.pdf","file_id":"5312","access_level":"closed","file_size":698992,"content_type":"application/pdf","relation":"main_file","success":1}],"abstract":[{"lang":"eng","text":"Financial beneﬁts are an important factor when cloud infrastructure is considered to meet processing demand. The dynamics of on-demand pricing and service usage are investigated in a two-stage game model for a monopoly Infrastructure-as-a-Service (IaaS) market. The possibility of hybrid clouds (public clouds plus own infrastructure) turns out to be essential in order that not only the provider but also the clients have signiﬁcant beneﬁts from on-demand services. Even if the client meets all demand in the public cloud, the threat of building a hybrid cloud keeps the instance price low. This is not the case when reserved instances are oﬀered as well. Parameters like load proﬁles and economies of scale have a huge eﬀect on likely future pricing and on a cost-optimal split-up of client demand between either a client’s own data center and a public cloud service or between reserved and on-demand cloud instances."}],"date_created":"2017-10-17T12:42:23Z","publisher":"Elsevier","title":"A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service","year":"2014","department":[{"_id":"75"}],"user_id":"477","_id":"467","project":[{"_id":"1","name":"SFB 901"},{"_id":"6","name":"SFB 901 - Subprojekt A2"},{"name":"SFB 901 - Project Area A","_id":"2"}],"file_date_updated":"2018-11-02T15:46:17Z","type":"journal_article","status":"public","author":[{"first_name":"Jörn","last_name":"Künsemöller","full_name":"Künsemöller, Jörn"},{"first_name":"Holger","last_name":"Karl","full_name":"Karl, Holger","id":"126"}],"date_updated":"2022-01-06T07:01:17Z","doi":"10.1016/j.future.2014.03.005","has_accepted_license":"1","page":"44--52","citation":{"ieee":"J. Künsemöller and H. Karl, “A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service,” <i>Future Generation Computer Systems</i>, pp. 44--52, 2014.","chicago":"Künsemöller, Jörn, and Holger Karl. “A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service.” <i>Future Generation Computer Systems</i>, 2014, 44--52. <a href=\"https://doi.org/10.1016/j.future.2014.03.005\">https://doi.org/10.1016/j.future.2014.03.005</a>.","ama":"Künsemöller J, Karl H. A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service. <i>Future Generation Computer Systems</i>. 2014:44--52. doi:<a href=\"https://doi.org/10.1016/j.future.2014.03.005\">10.1016/j.future.2014.03.005</a>","short":"J. Künsemöller, H. Karl, Future Generation Computer Systems (2014) 44--52.","bibtex":"@article{Künsemöller_Karl_2014, title={A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service}, DOI={<a href=\"https://doi.org/10.1016/j.future.2014.03.005\">10.1016/j.future.2014.03.005</a>}, journal={Future Generation Computer Systems}, publisher={Elsevier}, author={Künsemöller, Jörn and Karl, Holger}, year={2014}, pages={44--52} }","mla":"Künsemöller, Jörn, and Holger Karl. “A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service.” <i>Future Generation Computer Systems</i>, Elsevier, 2014, pp. 44--52, doi:<a href=\"https://doi.org/10.1016/j.future.2014.03.005\">10.1016/j.future.2014.03.005</a>.","apa":"Künsemöller, J., &#38; Karl, H. (2014). A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service. <i>Future Generation Computer Systems</i>, 44--52. <a href=\"https://doi.org/10.1016/j.future.2014.03.005\">https://doi.org/10.1016/j.future.2014.03.005</a>"}},{"extern":"1","language":[{"iso":"eng"}],"_id":"4694","user_id":"72849","status":"public","type":"journal_article","publication":"Business Process Management Journal","title":"New frontiers in business process management","doi":"10.1108/BPMJ-02-2014-0015","date_updated":"2022-01-06T07:01:18Z","date_created":"2018-10-12T08:30:24Z","author":[{"last_name":"Kohlborn","full_name":"Kohlborn, T","first_name":"T"},{"full_name":"Müller, Oliver","id":"72849","last_name":"Müller","first_name":"Oliver"},{"first_name":"J","full_name":"Pöppelbuss, J","last_name":"Pöppelbuss"},{"first_name":"M","last_name":"Röglinger","full_name":"Röglinger, M"}],"year":"2014","citation":{"apa":"Kohlborn, T., Müller, O., Pöppelbuss, J., &#38; Röglinger, M. (2014). New frontiers in business process management. <i>Business Process Management Journal</i>, (4), 3--6. <a href=\"https://doi.org/10.1108/BPMJ-02-2014-0015\">https://doi.org/10.1108/BPMJ-02-2014-0015</a>","short":"T. Kohlborn, O. Müller, J. Pöppelbuss, M. Röglinger, Business Process Management Journal (2014) 3--6.","bibtex":"@article{Kohlborn_Müller_Pöppelbuss_Röglinger_2014, title={New frontiers in business process management}, DOI={<a href=\"https://doi.org/10.1108/BPMJ-02-2014-0015\">10.1108/BPMJ-02-2014-0015</a>}, number={4}, journal={Business Process Management Journal}, author={Kohlborn, T and Müller, Oliver and Pöppelbuss, J and Röglinger, M}, year={2014}, pages={3--6} }","mla":"Kohlborn, T., et al. “New Frontiers in Business Process Management.” <i>Business Process Management Journal</i>, no. 4, 2014, pp. 3--6, doi:<a href=\"https://doi.org/10.1108/BPMJ-02-2014-0015\">10.1108/BPMJ-02-2014-0015</a>.","ama":"Kohlborn T, Müller O, Pöppelbuss J, Röglinger M. New frontiers in business process management. <i>Business Process Management Journal</i>. 2014;(4):3--6. doi:<a href=\"https://doi.org/10.1108/BPMJ-02-2014-0015\">10.1108/BPMJ-02-2014-0015</a>","ieee":"T. Kohlborn, O. Müller, J. Pöppelbuss, and M. Röglinger, “New frontiers in business process management,” <i>Business Process Management Journal</i>, no. 4, pp. 3--6, 2014.","chicago":"Kohlborn, T, Oliver Müller, J Pöppelbuss, and M Röglinger. “New Frontiers in Business Process Management.” <i>Business Process Management Journal</i>, no. 4 (2014): 3--6. <a href=\"https://doi.org/10.1108/BPMJ-02-2014-0015\">https://doi.org/10.1108/BPMJ-02-2014-0015</a>."},"page":"3--6","publication_identifier":{"issn":["1463-7154"]},"issue":"4"},{"title":"Comparing business intelligence and big data skills: A text mining study using job advertisements","doi":"10.1007/s12599-014-0344-2","date_updated":"2022-01-06T07:01:18Z","author":[{"last_name":"Debortoli","full_name":"Debortoli, Stefan","first_name":"Stefan"},{"first_name":"Oliver","last_name":"Müller","id":"72849","full_name":"Müller, Oliver"},{"full_name":"vom Brocke, Jan","last_name":"vom Brocke","first_name":"Jan"}],"date_created":"2018-10-12T08:30:31Z","year":"2014","citation":{"apa":"Debortoli, S., Müller, O., &#38; vom Brocke, J. (2014). Comparing business intelligence and big data skills: A text mining study using job advertisements. <i>Business and Information Systems Engineering</i>, (5), 289--300. <a href=\"https://doi.org/10.1007/s12599-014-0344-2\">https://doi.org/10.1007/s12599-014-0344-2</a>","bibtex":"@article{Debortoli_Müller_vom Brocke_2014, title={Comparing business intelligence and big data skills: A text mining study using job advertisements}, DOI={<a href=\"https://doi.org/10.1007/s12599-014-0344-2\">10.1007/s12599-014-0344-2</a>}, number={5}, journal={Business and Information Systems Engineering}, author={Debortoli, Stefan and Müller, Oliver and vom Brocke, Jan}, year={2014}, pages={289--300} }","mla":"Debortoli, Stefan, et al. “Comparing Business Intelligence and Big Data Skills: A Text Mining Study Using Job Advertisements.” <i>Business and Information Systems Engineering</i>, no. 5, 2014, pp. 289--300, doi:<a href=\"https://doi.org/10.1007/s12599-014-0344-2\">10.1007/s12599-014-0344-2</a>.","short":"S. Debortoli, O. Müller, J. vom Brocke, Business and Information Systems Engineering (2014) 289--300.","ama":"Debortoli S, Müller O, vom Brocke J. Comparing business intelligence and big data skills: A text mining study using job advertisements. <i>Business and Information Systems Engineering</i>. 2014;(5):289--300. doi:<a href=\"https://doi.org/10.1007/s12599-014-0344-2\">10.1007/s12599-014-0344-2</a>","chicago":"Debortoli, Stefan, Oliver Müller, and Jan vom Brocke. “Comparing Business Intelligence and Big Data Skills: A Text Mining Study Using Job Advertisements.” <i>Business and Information Systems Engineering</i>, no. 5 (2014): 289--300. <a href=\"https://doi.org/10.1007/s12599-014-0344-2\">https://doi.org/10.1007/s12599-014-0344-2</a>.","ieee":"S. Debortoli, O. Müller, and J. vom Brocke, “Comparing business intelligence and big data skills: A text mining study using job advertisements,” <i>Business and Information Systems Engineering</i>, no. 5, pp. 289--300, 2014."},"page":"289--300","publication_identifier":{"issn":["18670202"],"isbn":["0910-8327 (Print)$\\backslash$n0910-8327 (Linking)"]},"issue":"5","keyword":["Big data","Business intelligence","Competencies","Latent semantic analysis","Text mining"],"extern":"1","language":[{"iso":"eng"}],"_id":"4695","user_id":"72849","status":"public","type":"journal_article","publication":"Business and Information Systems Engineering"},{"user_id":"72849","_id":"4696","language":[{"iso":"eng"}],"extern":"1","keyword":["Advanced business analytics","Big Data","Business intelligence","IT business value","In-memory technology","OLAP","OLTP","Realtime analytics","Sentiment analysis"],"type":"journal_article","publication":"Communications of the Association for Information Systems","status":"public","date_created":"2018-10-12T08:30:38Z","author":[{"full_name":"vom Brocke, Jan","last_name":"vom Brocke","first_name":"Jan"},{"last_name":"Debortoli","full_name":"Debortoli, Stefan","first_name":"Stefan"},{"first_name":"Nadine","full_name":"Reuter, Nadine","last_name":"Reuter"},{"id":"72849","full_name":"Müller, Oliver","last_name":"Müller","first_name":"Oliver"}],"date_updated":"2022-01-06T07:01:18Z","doi":"10.17705/1CAIS.03407","title":"How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti","publication_identifier":{"issn":["15293181"]},"citation":{"chicago":"Brocke, Jan vom, Stefan Debortoli, Nadine Reuter, and Oliver Müller. “How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti.” <i>Communications of the Association for Information Systems</i>, 2014, 151--167. <a href=\"https://doi.org/10.17705/1CAIS.03407\">https://doi.org/10.17705/1CAIS.03407</a>.","ieee":"J. vom Brocke, S. Debortoli, N. Reuter, and O. Müller, “How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti,” <i>Communications of the Association for Information Systems</i>, pp. 151--167, 2014.","ama":"vom Brocke J, Debortoli S, Reuter N, Müller O. How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti. <i>Communications of the Association for Information Systems</i>. 2014:151--167. doi:<a href=\"https://doi.org/10.17705/1CAIS.03407\">10.17705/1CAIS.03407</a>","apa":"vom Brocke, J., Debortoli, S., Reuter, N., &#38; Müller, O. (2014). How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti. <i>Communications of the Association for Information Systems</i>, 151--167. <a href=\"https://doi.org/10.17705/1CAIS.03407\">https://doi.org/10.17705/1CAIS.03407</a>","short":"J. vom Brocke, S. Debortoli, N. Reuter, O. Müller, Communications of the Association for Information Systems (2014) 151--167.","mla":"vom Brocke, Jan, et al. “How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti.” <i>Communications of the Association for Information Systems</i>, 2014, pp. 151--167, doi:<a href=\"https://doi.org/10.17705/1CAIS.03407\">10.17705/1CAIS.03407</a>.","bibtex":"@article{vom Brocke_Debortoli_Reuter_Müller_2014, title={How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti}, DOI={<a href=\"https://doi.org/10.17705/1CAIS.03407\">10.17705/1CAIS.03407</a>}, journal={Communications of the Association for Information Systems}, author={vom Brocke, Jan and Debortoli, Stefan and Reuter, Nadine and Müller, Oliver}, year={2014}, pages={151--167} }"},"page":"151--167","year":"2014"},{"citation":{"apa":"Sommerauer, P., &#38; Müller, O. (2014). Augmented reality in informal learning environments: A field experiment in a mathematics exhibition. <i>Computers and Education</i>, 59--68. <a href=\"https://doi.org/10.1016/j.compedu.2014.07.013\">https://doi.org/10.1016/j.compedu.2014.07.013</a>","mla":"Sommerauer, Peter, and Oliver Müller. “Augmented Reality in Informal Learning Environments: A Field Experiment in a Mathematics Exhibition.” <i>Computers and Education</i>, 2014, pp. 59--68, doi:<a href=\"https://doi.org/10.1016/j.compedu.2014.07.013\">10.1016/j.compedu.2014.07.013</a>.","short":"P. Sommerauer, O. Müller, Computers and Education (2014) 59--68.","bibtex":"@article{Sommerauer_Müller_2014, title={Augmented reality in informal learning environments: A field experiment in a mathematics exhibition}, DOI={<a href=\"https://doi.org/10.1016/j.compedu.2014.07.013\">10.1016/j.compedu.2014.07.013</a>}, journal={Computers and Education}, author={Sommerauer, Peter and Müller, Oliver}, year={2014}, pages={59--68} }","ieee":"P. Sommerauer and O. Müller, “Augmented reality in informal learning environments: A field experiment in a mathematics exhibition,” <i>Computers and Education</i>, pp. 59--68, 2014.","chicago":"Sommerauer, Peter, and Oliver Müller. “Augmented Reality in Informal Learning Environments: A Field Experiment in a Mathematics Exhibition.” <i>Computers and Education</i>, 2014, 59--68. <a href=\"https://doi.org/10.1016/j.compedu.2014.07.013\">https://doi.org/10.1016/j.compedu.2014.07.013</a>.","ama":"Sommerauer P, Müller O. Augmented reality in informal learning environments: A field experiment in a mathematics exhibition. <i>Computers and Education</i>. 2014:59--68. doi:<a href=\"https://doi.org/10.1016/j.compedu.2014.07.013\">10.1016/j.compedu.2014.07.013</a>"},"page":"59--68","year":"2014","publication_identifier":{"isbn":["0360-1315"],"issn":["03601315"]},"doi":"10.1016/j.compedu.2014.07.013","title":"Augmented reality in informal learning environments: A field experiment in a mathematics exhibition","date_created":"2018-10-12T08:30:44Z","author":[{"last_name":"Sommerauer","full_name":"Sommerauer, Peter","first_name":"Peter"},{"last_name":"Müller","full_name":"Müller, Oliver","first_name":"Oliver"}],"date_updated":"2022-01-06T07:01:18Z","status":"public","type":"journal_article","publication":"Computers and Education","extern":"1","language":[{"iso":"eng"}],"keyword":["Augmented reality","Cognitive theory of multimedia learning","Field experiment","Informal learning","Museum"],"user_id":"72849","_id":"4697"},{"type":"working_paper","status":"public","user_id":"61801","series_title":"arqus, Quantitative Research in Taxation","department":[{"_id":"590"},{"_id":"187"},{"_id":"635"}],"_id":"4750","language":[{"iso":"eng"}],"citation":{"mla":"Ortmann, Regina, and Caren Sureth-Sloane. <i>Can the CCCTB Alleviate Tax Discrimination against Loss-Making European Multinational Groups?</i> Vol. 165, 2014.","bibtex":"@book{Ortmann_Sureth-Sloane_2014, series={arqus, Quantitative Research in Taxation}, title={Can the CCCTB Alleviate Tax Discrimination against Loss-Making European Multinational Groups?}, volume={165}, author={Ortmann, Regina and Sureth-Sloane, Caren}, year={2014}, collection={arqus, Quantitative Research in Taxation} }","short":"R. Ortmann, C. Sureth-Sloane, Can the CCCTB Alleviate Tax Discrimination against Loss-Making European Multinational Groups?, 2014.","apa":"Ortmann, R., &#38; Sureth-Sloane, C. (2014). <i>Can the CCCTB Alleviate Tax Discrimination against Loss-Making European Multinational Groups?</i> (Vol. 165).","ieee":"R. Ortmann and C. Sureth-Sloane, <i>Can the CCCTB Alleviate Tax Discrimination against Loss-Making European Multinational Groups?</i>, vol. 165. 2014.","chicago":"Ortmann, Regina, and Caren Sureth-Sloane. <i>Can the CCCTB Alleviate Tax Discrimination against Loss-Making European Multinational Groups?</i> Vol. 165. Arqus, Quantitative Research in Taxation, 2014.","ama":"Ortmann R, Sureth-Sloane C. <i>Can the CCCTB Alleviate Tax Discrimination against Loss-Making European Multinational Groups?</i> Vol 165.; 2014."},"intvolume":"       165","year":"2014","author":[{"first_name":"Regina","last_name":"Ortmann","id":"10020","full_name":"Ortmann, Regina"},{"first_name":"Caren","last_name":"Sureth-Sloane","id":"530","full_name":"Sureth-Sloane, Caren"}],"date_created":"2018-10-15T11:07:03Z","volume":165,"date_updated":"2022-01-06T07:01:21Z","title":"Can the CCCTB Alleviate Tax Discrimination against Loss-Making European Multinational Groups?"},{"_id":"4760","publication_date":"2014-09-01","department":[{"_id":"187"}],"user_id":"21222","language":[{"iso":"ger"}],"publication":"Frankfurter Allgemeine Zeitung","type":"newspaper_article","status":"public","date_updated":"2022-01-06T07:01:21Z","volume":202,"date_created":"2018-10-15T13:11:26Z","author":[{"first_name":"Caren","full_name":"Sureth-Sloane, Caren","id":"530","last_name":"Sureth-Sloane"}],"title":"Der Wandel wird zur Daueraufgabe","year":"2014","page":"16","intvolume":"       202","citation":{"chicago":"Sureth-Sloane, Caren. “Der Wandel wird zur Daueraufgabe.” <i>Frankfurter Allgemeine Zeitung</i>, 2014.","ieee":"C. Sureth-Sloane, “Der Wandel wird zur Daueraufgabe,” <i>Frankfurter Allgemeine Zeitung</i>, vol. 202, 2014.","ama":"Sureth-Sloane C. Der Wandel wird zur Daueraufgabe. <i>Frankfurter Allgemeine Zeitung</i>. 2014.","mla":"Sureth-Sloane, Caren. “Der Wandel wird zur Daueraufgabe.” <i>Frankfurter Allgemeine Zeitung</i>, vol. 202, 2014.","short":"C. Sureth-Sloane, Frankfurter Allgemeine Zeitung 202 (2014).","bibtex":"@article{Sureth-Sloane_2014, title={Der Wandel wird zur Daueraufgabe}, volume={202}, journal={Frankfurter Allgemeine Zeitung}, author={Sureth-Sloane, Caren}, year={2014} }","apa":"Sureth-Sloane, C. (2014). Der Wandel wird zur Daueraufgabe. <i>Frankfurter Allgemeine Zeitung</i>."}},{"date_updated":"2022-01-06T07:01:22Z","author":[{"first_name":"Raphael","id":"4481","full_name":"Grytz, Raphael","last_name":"Grytz"},{"full_name":"Krohn-Grimberghe, Artus","last_name":"Krohn-Grimberghe","first_name":"Artus"}],"date_created":"2018-10-18T19:57:15Z","volume":2,"title":"Business Intelligence bekommt einen Preis","publication_identifier":{"issn":["1862-5789"]},"year":"2014","citation":{"ieee":"R. Grytz and A. Krohn-Grimberghe, “Business Intelligence bekommt einen Preis,” <i>BI-Spektrum</i>, vol. 2, pp. 41–44, 2014.","chicago":"Grytz, Raphael, and Artus Krohn-Grimberghe. “Business Intelligence Bekommt Einen Preis.” <i>BI-Spektrum</i> 2 (2014): 41–44.","ama":"Grytz R, Krohn-Grimberghe A. Business Intelligence bekommt einen Preis. <i>BI-Spektrum</i>. 2014;2:41-44.","apa":"Grytz, R., &#38; Krohn-Grimberghe, A. (2014). Business Intelligence bekommt einen Preis. <i>BI-Spektrum</i>, <i>2</i>, 41–44.","bibtex":"@article{Grytz_Krohn-Grimberghe_2014, title={Business Intelligence bekommt einen Preis}, volume={2}, journal={BI-Spektrum}, author={Grytz, Raphael and Krohn-Grimberghe, Artus}, year={2014}, pages={41–44} }","mla":"Grytz, Raphael, and Artus Krohn-Grimberghe. “Business Intelligence Bekommt Einen Preis.” <i>BI-Spektrum</i>, vol. 2, 2014, pp. 41–44.","short":"R. Grytz, A. Krohn-Grimberghe, BI-Spektrum 2 (2014) 41–44."},"page":"41 - 44","intvolume":"         2","_id":"4782","user_id":"4481","type":"journal_article","publication":"BI-Spektrum","status":"public"},{"year":"2014","issue":"2","title":"The Legal Classification of Identity-Based Signatures","date_created":"2017-10-17T12:42:25Z","publisher":"Elsevier","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-15T14:03:20Z","date_created":"2018-03-15T14:03:20Z","creator":"florida","file_size":194634,"access_level":"closed","file_name":"479-Sorge-Legal-Classification2013.pdf","file_id":"1323"}],"abstract":[{"text":"Identity-based cryptography has attracted attention in the cryptographic research community in recent years. Despite the importance of cryptographic schemes for applications in business and law, the legal implications of identity-based cryptography have not yet been discussed. We investigate how identity-based signatures fit into the legal framework. We focus on the European Signature Directive, but also take the UNCITRAL Model Law on Electronic Signatures into account. In contrast to previous assumptions, identity-based signature schemes can, in principle, be used even for qualified electronic signatures, which can replace handwritten signatures in the member states of the European Union. We derive requirements to be taken into account in the development of future identity-based signature schemes.","lang":"eng"}],"publication":"Computer Law & Security Review","ddc":["040"],"intvolume":"        30","page":"126-136","citation":{"apa":"Sorge, C. (2014). The Legal Classification of Identity-Based Signatures. <i>Computer Law &#38; Security Review</i>, <i>30</i>(2), 126–136. <a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">https://doi.org/10.1016/j.clsr.2014.01.002</a>","mla":"Sorge, Christoph. “The Legal Classification of Identity-Based Signatures.” <i>Computer Law &#38; Security Review</i>, vol. 30, no. 2, Elsevier, 2014, pp. 126–36, doi:<a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">10.1016/j.clsr.2014.01.002</a>.","bibtex":"@article{Sorge_2014, title={The Legal Classification of Identity-Based Signatures}, volume={30}, DOI={<a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">10.1016/j.clsr.2014.01.002</a>}, number={2}, journal={Computer Law &#38; Security Review}, publisher={Elsevier}, author={Sorge, Christoph}, year={2014}, pages={126–136} }","short":"C. Sorge, Computer Law &#38; Security Review 30 (2014) 126–136.","ieee":"C. Sorge, “The Legal Classification of Identity-Based Signatures,” <i>Computer Law &#38; Security Review</i>, vol. 30, no. 2, pp. 126–136, 2014.","chicago":"Sorge, Christoph. “The Legal Classification of Identity-Based Signatures.” <i>Computer Law &#38; Security Review</i> 30, no. 2 (2014): 126–36. <a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">https://doi.org/10.1016/j.clsr.2014.01.002</a>.","ama":"Sorge C. The Legal Classification of Identity-Based Signatures. <i>Computer Law &#38; Security Review</i>. 2014;30(2):126-136. doi:<a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">10.1016/j.clsr.2014.01.002</a>"},"has_accepted_license":"1","doi":"10.1016/j.clsr.2014.01.002","volume":30,"author":[{"last_name":"Sorge","full_name":"Sorge, Christoph","first_name":"Christoph"}],"date_updated":"2022-01-06T07:01:22Z","status":"public","type":"journal_article","file_date_updated":"2018-03-15T14:03:20Z","user_id":"477","_id":"479","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}]},{"user_id":"42514","_id":"4824","language":[{"iso":"eng"}],"type":"journal_article","publication":"physica status solidi (b)","status":"public","author":[{"last_name":"Wecker","full_name":"Wecker, T.","first_name":"T."},{"first_name":"F.","last_name":"Hörich","full_name":"Hörich, F."},{"last_name":"Feneberg","full_name":"Feneberg, M.","first_name":"M."},{"last_name":"Goldhahn","full_name":"Goldhahn, R.","first_name":"R."},{"first_name":"Dirk","id":"37763","full_name":"Reuter, Dirk","last_name":"Reuter"},{"first_name":"Donat Josef","last_name":"As","orcid":"0000-0003-1121-3565","full_name":"As, Donat Josef","id":"14"}],"date_created":"2018-10-24T08:59:33Z","volume":252,"publisher":"Wiley","date_updated":"2022-01-06T07:01:25Z","doi":"10.1002/pssb.201451531","title":"Structural and optical properties of MBE-grown asymmetric cubic GaN/AlxGa1-xN double quantum wells","issue":"5","publication_status":"published","publication_identifier":{"issn":["0370-1972"]},"citation":{"ama":"Wecker T, Hörich F, Feneberg M, Goldhahn R, Reuter D, As DJ. Structural and optical properties of MBE-grown asymmetric cubic GaN/AlxGa1-xN double quantum wells. <i>physica status solidi (b)</i>. 2014;252(5):873-878. doi:<a href=\"https://doi.org/10.1002/pssb.201451531\">10.1002/pssb.201451531</a>","ieee":"T. Wecker, F. Hörich, M. Feneberg, R. Goldhahn, D. Reuter, and D. J. As, “Structural and optical properties of MBE-grown asymmetric cubic GaN/AlxGa1-xN double quantum wells,” <i>physica status solidi (b)</i>, vol. 252, no. 5, pp. 873–878, 2014.","chicago":"Wecker, T., F. Hörich, M. Feneberg, R. Goldhahn, Dirk Reuter, and Donat Josef As. “Structural and Optical Properties of MBE-Grown Asymmetric Cubic GaN/AlxGa1-XN Double Quantum Wells.” <i>Physica Status Solidi (B)</i> 252, no. 5 (2014): 873–78. <a href=\"https://doi.org/10.1002/pssb.201451531\">https://doi.org/10.1002/pssb.201451531</a>.","short":"T. Wecker, F. Hörich, M. Feneberg, R. Goldhahn, D. Reuter, D.J. As, Physica Status Solidi (B) 252 (2014) 873–878.","mla":"Wecker, T., et al. “Structural and Optical Properties of MBE-Grown Asymmetric Cubic GaN/AlxGa1-XN Double Quantum Wells.” <i>Physica Status Solidi (B)</i>, vol. 252, no. 5, Wiley, 2014, pp. 873–78, doi:<a href=\"https://doi.org/10.1002/pssb.201451531\">10.1002/pssb.201451531</a>.","bibtex":"@article{Wecker_Hörich_Feneberg_Goldhahn_Reuter_As_2014, title={Structural and optical properties of MBE-grown asymmetric cubic GaN/AlxGa1-xN double quantum wells}, volume={252}, DOI={<a href=\"https://doi.org/10.1002/pssb.201451531\">10.1002/pssb.201451531</a>}, number={5}, journal={physica status solidi (b)}, publisher={Wiley}, author={Wecker, T. and Hörich, F. and Feneberg, M. and Goldhahn, R. and Reuter, Dirk and As, Donat Josef}, year={2014}, pages={873–878} }","apa":"Wecker, T., Hörich, F., Feneberg, M., Goldhahn, R., Reuter, D., &#38; As, D. J. (2014). Structural and optical properties of MBE-grown asymmetric cubic GaN/AlxGa1-xN double quantum wells. <i>Physica Status Solidi (B)</i>, <i>252</i>(5), 873–878. <a href=\"https://doi.org/10.1002/pssb.201451531\">https://doi.org/10.1002/pssb.201451531</a>"},"intvolume":"       252","page":"873-878","year":"2014"},{"user_id":"57352","department":[{"_id":"180"}],"_id":"4850","type":"journal_article","publication":"Journal of Service Research","status":"public","author":[{"first_name":"Andreas","full_name":"Eggert, Andreas","last_name":"Eggert"},{"full_name":"Hogreve, Jens","last_name":"Hogreve","first_name":"Jens"},{"full_name":"Ulaga, Wolfgang","last_name":"Ulaga","first_name":"Wolfgang"},{"last_name":"Muenkhoff","full_name":"Muenkhoff, Eva","first_name":"Eva"}],"date_created":"2018-10-25T09:35:42Z","date_updated":"2022-01-06T07:01:27Z","title":"Revenue and profit implications of industrial service strategies","issue":"1","citation":{"apa":"Eggert, A., Hogreve, J., Ulaga, W., &#38; Muenkhoff, E. (2014). Revenue and profit implications of industrial service strategies. <i>Journal of Service Research</i>, (1), 23--39.","bibtex":"@article{Eggert_Hogreve_Ulaga_Muenkhoff_2014, title={Revenue and profit implications of industrial service strategies}, number={1}, journal={Journal of Service Research}, author={Eggert, Andreas and Hogreve, Jens and Ulaga, Wolfgang and Muenkhoff, Eva}, year={2014}, pages={23--39} }","short":"A. Eggert, J. Hogreve, W. Ulaga, E. Muenkhoff, Journal of Service Research (2014) 23--39.","mla":"Eggert, Andreas, et al. “Revenue and Profit Implications of Industrial Service Strategies.” <i>Journal of Service Research</i>, no. 1, 2014, pp. 23--39.","ama":"Eggert A, Hogreve J, Ulaga W, Muenkhoff E. Revenue and profit implications of industrial service strategies. <i>Journal of Service Research</i>. 2014;(1):23--39.","chicago":"Eggert, Andreas, Jens Hogreve, Wolfgang Ulaga, and Eva Muenkhoff. “Revenue and Profit Implications of Industrial Service Strategies.” <i>Journal of Service Research</i>, no. 1 (2014): 23--39.","ieee":"A. Eggert, J. Hogreve, W. Ulaga, and E. Muenkhoff, “Revenue and profit implications of industrial service strategies,” <i>Journal of Service Research</i>, no. 1, pp. 23--39, 2014."},"page":"23--39","year":"2014"},{"department":[{"_id":"178"},{"_id":"179"}],"user_id":"69384","_id":"4872","publication":"Value in Health","type":"journal_article","status":"public","volume":"17 ","date_created":"2018-10-26T07:08:21Z","author":[{"last_name":"Djawadi","full_name":"Djawadi, Behnud Mir","first_name":"Behnud Mir"},{"last_name":"Fahr","id":"111","full_name":"Fahr, Rene","first_name":"Rene"},{"last_name":"Turk","full_name":"Turk, Florian","first_name":"Florian"}],"date_updated":"2022-01-06T07:01:28Z","title":"\"Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change\"","issue":"8","page":"814-822","citation":{"bibtex":"@article{Djawadi_Fahr_Turk_2014, title={“Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change”}, volume={17}, number={8}, journal={Value in Health}, author={Djawadi, Behnud Mir and Fahr, Rene and Turk, Florian}, year={2014}, pages={814–822} }","short":"B.M. Djawadi, R. Fahr, F. Turk, Value in Health 17 (2014) 814–822.","mla":"Djawadi, Behnud Mir, et al. “‘Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change.’” <i>Value in Health</i>, vol. 17, no. 8, 2014, pp. 814–22.","apa":"Djawadi, B. M., Fahr, R., &#38; Turk, F. (2014). “Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change.” <i>Value in Health</i>, <i>17</i>(8), 814–822.","ieee":"B. M. Djawadi, R. Fahr, and F. Turk, “‘Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change,’” <i>Value in Health</i>, vol. 17, no. 8, pp. 814–822, 2014.","chicago":"Djawadi, Behnud Mir, Rene Fahr, and Florian Turk. “‘Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change.’” <i>Value in Health</i> 17, no. 8 (2014): 814–22.","ama":"Djawadi BM, Fahr R, Turk F. “Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change.” <i>Value in Health</i>. 2014;17(8):814-822."},"year":"2014"},{"year":"2014","status":"public","citation":{"short":"E. Janssen, R. Fahr, The Wage Effects of Social Norms-Evidence of Deviations from Peers’ Body Mass in Europe, 2014.","bibtex":"@book{Janssen_Fahr_2014, title={The Wage Effects of Social Norms-Evidence of Deviations from Peers’ Body Mass in Europe}, author={Janssen, Elmar and Fahr, Rene}, year={2014} }","mla":"Janssen, Elmar, and Rene Fahr. <i>The Wage Effects of Social Norms-Evidence of Deviations from Peers’ Body Mass in Europe</i>. 2014.","apa":"Janssen, E., &#38; Fahr, R. (2014). <i>The Wage Effects of Social Norms-Evidence of Deviations from Peers’ Body Mass in Europe</i>.","ieee":"E. Janssen and R. Fahr, <i>The Wage Effects of Social Norms-Evidence of Deviations from Peers’ Body Mass in Europe</i>. 2014.","chicago":"Janssen, Elmar, and Rene Fahr. <i>The Wage Effects of Social Norms-Evidence of Deviations from Peers’ Body Mass in Europe</i>, 2014.","ama":"Janssen E, Fahr R. <i>The Wage Effects of Social Norms-Evidence of Deviations from Peers’ Body Mass in Europe</i>.; 2014."},"type":"report","title":"The Wage Effects of Social Norms-Evidence of Deviations from Peers' Body Mass in Europe","_id":"4922","date_updated":"2022-01-06T07:01:29Z","department":[{"_id":"178"},{"_id":"179"}],"author":[{"first_name":"Elmar","last_name":"Janssen","full_name":"Janssen, Elmar"},{"id":"111","full_name":"Fahr, Rene","last_name":"Fahr","first_name":"Rene"}],"user_id":"69384","date_created":"2018-10-26T09:02:18Z"},{"status":"public","type":"journal_article","publication":"Colum. J. Eur. L.","_id":"4970","user_id":"69384","department":[{"_id":"178"},{"_id":"184"}],"year":"2014","citation":{"short":"K. Thommes, M. Faure, K. Heine, Colum. J. Eur. L. (2014) 47.","bibtex":"@article{Thommes_Faure_Heine_2014, title={The internal market and the consumer: what consumers actually choose}, journal={Colum. J. Eur. L.}, author={Thommes, Kirsten and Faure, Michael and Heine, Klaus}, year={2014}, pages={47} }","mla":"Thommes, Kirsten, et al. “The Internal Market and the Consumer: What Consumers Actually Choose.” <i>Colum. J. Eur. L.</i>, 2014, p. 47.","apa":"Thommes, K., Faure, M., &#38; Heine, K. (2014). The internal market and the consumer: what consumers actually choose. <i>Colum. J. Eur. L.</i>, 47.","ama":"Thommes K, Faure M, Heine K. The internal market and the consumer: what consumers actually choose. <i>Colum J Eur L</i>. 2014:47.","chicago":"Thommes, Kirsten, Michael Faure, and Klaus Heine. “The Internal Market and the Consumer: What Consumers Actually Choose.” <i>Colum. J. Eur. L.</i>, 2014, 47.","ieee":"K. Thommes, M. Faure, and K. Heine, “The internal market and the consumer: what consumers actually choose,” <i>Colum. J. Eur. L.</i>, p. 47, 2014."},"page":"47","title":"The internal market and the consumer: what consumers actually choose","date_updated":"2022-01-06T07:01:32Z","author":[{"first_name":"Kirsten","full_name":"Thommes, Kirsten","id":"72497","last_name":"Thommes"},{"full_name":"Faure, Michael","last_name":"Faure","first_name":"Michael"},{"first_name":"Klaus","full_name":"Heine, Klaus","last_name":"Heine"}],"date_created":"2018-10-29T09:11:09Z"},{"user_id":"69384","department":[{"_id":"178"},{"_id":"184"}],"_id":"4971","status":"public","type":"journal_article","publication":"Industrial relations journal","title":"The dark side of solidarity: social norms and social relations in the aftermath of strikes","date_created":"2018-10-29T09:12:12Z","author":[{"first_name":"Kirsten","id":"72497","full_name":"Thommes, Kirsten","last_name":"Thommes"},{"first_name":"Agnes","full_name":"Akkerman, Agnes","last_name":"Akkerman"},{"first_name":"Ren{\\'e}","last_name":"Torenvlied","full_name":"Torenvlied, Ren{\\'e}"},{"last_name":"Born","full_name":"Born, Marieke","first_name":"Marieke"}],"date_updated":"2022-01-06T07:01:32Z","citation":{"ama":"Thommes K, Akkerman A, Torenvlied R, Born M. The dark side of solidarity: social norms and social relations in the aftermath of strikes. <i>Industrial relations journal</i>. 2014;(4):348--367.","chicago":"Thommes, Kirsten, Agnes Akkerman, Ren{\\’e} Torenvlied, and Marieke Born. “The Dark Side of Solidarity: Social Norms and Social Relations in the Aftermath of Strikes.” <i>Industrial Relations Journal</i>, no. 4 (2014): 348--367.","ieee":"K. Thommes, A. Akkerman, R. Torenvlied, and M. Born, “The dark side of solidarity: social norms and social relations in the aftermath of strikes,” <i>Industrial relations journal</i>, no. 4, pp. 348--367, 2014.","apa":"Thommes, K., Akkerman, A., Torenvlied, R., &#38; Born, M. (2014). The dark side of solidarity: social norms and social relations in the aftermath of strikes. <i>Industrial Relations Journal</i>, (4), 348--367.","short":"K. Thommes, A. Akkerman, R. Torenvlied, M. Born, Industrial Relations Journal (2014) 348--367.","mla":"Thommes, Kirsten, et al. “The Dark Side of Solidarity: Social Norms and Social Relations in the Aftermath of Strikes.” <i>Industrial Relations Journal</i>, no. 4, 2014, pp. 348--367.","bibtex":"@article{Thommes_Akkerman_Torenvlied_Born_2014, title={The dark side of solidarity: social norms and social relations in the aftermath of strikes}, number={4}, journal={Industrial relations journal}, author={Thommes, Kirsten and Akkerman, Agnes and Torenvlied, Ren{\\’e} and Born, Marieke}, year={2014}, pages={348--367} }"},"page":"348--367","year":"2014","issue":"4"}]
