[{"title":"Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems","user_id":"21240","department":[{"_id":"672"}],"publication":"Mechatronics","author":[{"full_name":"Jatzkowski, Jan","first_name":"Jan","last_name":"Jatzkowski"},{"last_name":"Kleinjohann","full_name":"Kleinjohann, Bernd","first_name":"Bernd"}],"publisher":"Elsevier","date_created":"2021-09-28T12:42:40Z","status":"public","conference":{"location":"Mai 2015"},"_id":"25083","date_updated":"2022-01-06T06:56:50Z","year":"2015","citation":{"short":"J. Jatzkowski, B. Kleinjohann, in: Mechatronics, Elsevier, 2015.","ieee":"J. Jatzkowski and B. Kleinjohann, “Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems,” Mai 2015, 2015.","chicago":"Jatzkowski, Jan, and Bernd Kleinjohann. “Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems.” In Mechatronics. Elsevier, 2015.","ama":"Jatzkowski J, Kleinjohann B. Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems. In: Mechatronics. Elsevier; 2015.","apa":"Jatzkowski, J., & Kleinjohann, B. (2015). Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems. Mechatronics.","mla":"Jatzkowski, Jan, and Bernd Kleinjohann. “Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems.” Mechatronics, Elsevier, 2015.","bibtex":"@inproceedings{Jatzkowski_Kleinjohann_2015, title={Self-Reconfiguration of Real-Time Communication within Cyber-Physical Systems}, booktitle={Mechatronics}, publisher={Elsevier}, author={Jatzkowski, Jan and Kleinjohann, Bernd}, year={2015} }"},"type":"conference","language":[{"iso":"eng"}]},{"_id":"251","date_updated":"2022-01-06T06:56:50Z","supervisor":[{"last_name":"Skopalik","id":"40384","first_name":"Alexander","full_name":"Skopalik, Alexander"}],"type":"mastersthesis","year":"2015","citation":{"bibtex":"@book{Pfannschmidt_2015, title={Solving the aggregated bandits problem}, publisher={Universität Paderborn}, author={Pfannschmidt, Karlson}, year={2015} }","mla":"Pfannschmidt, Karlson. Solving the Aggregated Bandits Problem. Universität Paderborn, 2015.","chicago":"Pfannschmidt, Karlson. Solving the Aggregated Bandits Problem. Universität Paderborn, 2015.","ama":"Pfannschmidt K. Solving the Aggregated Bandits Problem. Universität Paderborn; 2015.","apa":"Pfannschmidt, K. (2015). Solving the aggregated bandits problem. Universität Paderborn.","ieee":"K. Pfannschmidt, Solving the aggregated bandits problem. Universität Paderborn, 2015.","short":"K. Pfannschmidt, Solving the Aggregated Bandits Problem, Universität Paderborn, 2015."},"user_id":"14052","title":"Solving the aggregated bandits problem","department":[{"_id":"63"},{"_id":"541"}],"publisher":"Universität Paderborn","author":[{"last_name":"Pfannschmidt","first_name":"Karlson","full_name":"Pfannschmidt, Karlson"}],"date_created":"2017-10-17T12:41:41Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"status":"public"},{"abstract":[{"text":"On-the-fly composition of service-based software solutions is still a challenging task. Even more challenges emerge when facing automatic service composition in markets of composed services for end users. In this paper, we focus on the functional discrepancy between “what a user wants” specified in terms of a request and “what a user gets” when executing a composed service. To meet the challenge of functional discrepancy, we propose the combination of existing symbolic composition approaches with machine learning techniques. We developed a learning recommendation system that expands the capabilities of existing composition algorithms to facilitate adaptivity and consequently reduces functional discrepancy. As a representative of symbolic techniques, an Artificial Intelligence planning based approach produces solutions that are correct with respect to formal specifications. Our learning recommendation system supports the symbolic approach in decision-making. Reinforcement Learning techniques enable the recommendation system to adjust its recommendation strategy over time based on user ratings. We implemented the proposed functionality in terms of a prototypical composition framework. Preliminary results from experiments conducted in the image processing domain illustrate the benefit of combining both complementary techniques.","lang":"eng"}],"title":"An approach towards adaptive service composition in markets of composed services","user_id":"21240","department":[{"_id":"672"}],"publication":"Journal of Internet Services and Applications 6(1)","author":[{"last_name":"Jungmann","first_name":"Alexander","full_name":"Jungmann, Alexander"},{"last_name":"Mohr","full_name":"Mohr, Felix","first_name":"Felix"}],"date_created":"2021-09-29T09:39:32Z","status":"public","_id":"25107","date_updated":"2022-01-06T06:56:51Z","page":"1-18","year":"2015","type":"journal_article","citation":{"ieee":"A. Jungmann and F. Mohr, “An approach towards adaptive service composition in markets of composed services,” Journal of Internet Services and Applications 6(1), pp. 1–18, 2015.","short":"A. Jungmann, F. Mohr, Journal of Internet Services and Applications 6(1) (2015) 1–18.","mla":"Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” Journal of Internet Services and Applications 6(1), 2015, pp. 1–18.","bibtex":"@article{Jungmann_Mohr_2015, title={An approach towards adaptive service composition in markets of composed services}, journal={Journal of Internet Services and Applications 6(1)}, author={Jungmann, Alexander and Mohr, Felix}, year={2015}, pages={1–18} }","apa":"Jungmann, A., & Mohr, F. (2015). An approach towards adaptive service composition in markets of composed services. Journal of Internet Services and Applications 6(1), 1–18.","ama":"Jungmann A, Mohr F. An approach towards adaptive service composition in markets of composed services. Journal of Internet Services and Applications 6(1). Published online 2015:1-18.","chicago":"Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” Journal of Internet Services and Applications 6(1), 2015, 1–18."},"language":[{"iso":"eng"}]},{"user_id":"21240","title":"Online behavior classification for anomaly detection in self-x real-time systems","abstract":[{"lang":"eng","text":"Autonomous adaptation in self-adapting embedded real-time systems introduces novel risks as it may lead to unforeseen system behavior. An anomaly detection framework integrated in a real-time operating system can ease the identification of such suspicious novel behavior and, thereby, offers the potential to enhance the reliability of the considered self-x system. However, anomaly detection is based on knowledge about normal behavior. When dealing with self-reconfiguring applications, normal behavior changes. Hence, knowledge base requires adaptation or even re-construction at runtime. The stringent restrictions of real-time systems considering runtime and memory consumption make this task to a really challenging problem. We present our idea for online construction of application behavior knowledge that does not rely on training phase. The applications' behavior is defined by the application's system call invocations. For the knowledge base, we exploit suffix trees as they offer potentials to represent application behavior patterns and associated information in a compact manner. The online algorithm provided by suffix trees is a basis to construct the knowledge base with low computational effort. Anomaly detection and classification is integrated into the online construction method. New behavioral patterns do not unconditionally update the behavior knowledge base. They are evaluated in a context-related manner inspired by Danger Theory, a special discipline of artificial immune systems. Copyright © 2015 John Wiley & Sons, Ltd."}],"status":"public","date_created":"2021-09-29T09:43:32Z","author":[{"last_name":"Rammig","first_name":"Franz-Josef","full_name":"Rammig, Franz-Josef"},{"last_name":"Stahl","first_name":"Katharina","full_name":"Stahl, Katharina"}],"publication":"Concurrency and Computation: Practice and Experience ","department":[{"_id":"672"}],"date_updated":"2022-01-06T06:56:51Z","_id":"25108","language":[{"iso":"eng"}],"type":"journal_article","citation":{"bibtex":"@article{Rammig_Stahl_2015, title={Online behavior classification for anomaly detection in self-x real-time systems}, journal={Concurrency and Computation: Practice and Experience }, author={Rammig, Franz-Josef and Stahl, Katharina}, year={2015} }","mla":"Rammig, Franz-Josef, and Katharina Stahl. “Online Behavior Classification for Anomaly Detection in Self-x Real-Time Systems.” Concurrency and Computation: Practice and Experience , 2015.","ama":"Rammig F-J, Stahl K. Online behavior classification for anomaly detection in self-x real-time systems. Concurrency and Computation: Practice and Experience . Published online 2015.","apa":"Rammig, F.-J., & Stahl, K. (2015). Online behavior classification for anomaly detection in self-x real-time systems. Concurrency and Computation: Practice and Experience .","chicago":"Rammig, Franz-Josef, and Katharina Stahl. “Online Behavior Classification for Anomaly Detection in Self-x Real-Time Systems.” Concurrency and Computation: Practice and Experience , 2015.","ieee":"F.-J. Rammig and K. Stahl, “Online behavior classification for anomaly detection in self-x real-time systems,” Concurrency and Computation: Practice and Experience , 2015.","short":"F.-J. Rammig, K. Stahl, Concurrency and Computation: Practice and Experience (2015)."},"year":"2015"},{"user_id":"21240","title":"Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System","date_created":"2021-09-29T09:53:25Z","status":"public","publication":"Concurrency and Computation: Practice and Experience ","department":[{"_id":"672"}],"author":[{"last_name":"Sudhakar","full_name":"Sudhakar, Krishna","first_name":"Krishna"},{"full_name":"Zhao, Yuhong","first_name":"Yuhong","last_name":"Zhao"},{"last_name":"Rammig","first_name":"Franz-Josef","full_name":"Rammig, Franz-Josef"}],"_id":"25109","date_updated":"2022-01-06T06:56:51Z","language":[{"iso":"eng"}],"type":"journal_article","citation":{"bibtex":"@article{Sudhakar_Zhao_Rammig_2015, title={Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System}, journal={Concurrency and Computation: Practice and Experience }, author={Sudhakar, Krishna and Zhao, Yuhong and Rammig, Franz-Josef}, year={2015} }","mla":"Sudhakar, Krishna, et al. “Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System.” Concurrency and Computation: Practice and Experience , 2015.","chicago":"Sudhakar, Krishna, Yuhong Zhao, and Franz-Josef Rammig. “Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System.” Concurrency and Computation: Practice and Experience , 2015.","ama":"Sudhakar K, Zhao Y, Rammig F-J. Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System. Concurrency and Computation: Practice and Experience . Published online 2015.","apa":"Sudhakar, K., Zhao, Y., & Rammig, F.-J. (2015). Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System. Concurrency and Computation: Practice and Experience .","ieee":"K. Sudhakar, Y. Zhao, and F.-J. Rammig, “Efficient Integration of Online Model Checking into a Small-Footprint Real-Time Operating System,” Concurrency and Computation: Practice and Experience , 2015.","short":"K. Sudhakar, Y. Zhao, F.-J. Rammig, Concurrency and Computation: Practice and Experience (2015)."},"year":"2015"},{"title":"A hybrid methodology to detect memory leaks in soft real time embedded systems software","user_id":"21240","author":[{"full_name":"Joy, M. tech. Mabel Mary","first_name":"M. tech. Mabel Mary","last_name":"Joy"},{"last_name":"Rammig","full_name":"Rammig, Franz-Josef","first_name":"Franz-Josef"}],"department":[{"_id":"672"}],"publication":"Int. J. of Embedded Systems","status":"public","date_created":"2021-09-29T09:55:59Z","_id":"25110","date_updated":"2022-01-06T06:56:51Z","type":"journal_article","citation":{"ieee":"M. tech. M. M. Joy and F.-J. Rammig, “A hybrid methodology to detect memory leaks in soft real time embedded systems software,” Int. J. of Embedded Systems, 2015.","short":"M. tech. M.M. Joy, F.-J. Rammig, Int. J. of Embedded Systems (2015).","mla":"Joy, M. tech. Mabel Mary, and Franz-Josef Rammig. “A Hybrid Methodology to Detect Memory Leaks in Soft Real Time Embedded Systems Software.” Int. J. of Embedded Systems, 2015.","bibtex":"@article{Joy_Rammig_2015, title={A hybrid methodology to detect memory leaks in soft real time embedded systems software}, journal={Int. J. of Embedded Systems}, author={Joy, M. tech. Mabel Mary and Rammig, Franz-Josef}, year={2015} }","ama":"Joy M tech. MM, Rammig F-J. A hybrid methodology to detect memory leaks in soft real time embedded systems software. Int J of Embedded Systems. Published online 2015.","apa":"Joy, M. tech. M. M., & Rammig, F.-J. (2015). A hybrid methodology to detect memory leaks in soft real time embedded systems software. Int. J. of Embedded Systems.","chicago":"Joy, M. tech. Mabel Mary, and Franz-Josef Rammig. “A Hybrid Methodology to Detect Memory Leaks in Soft Real Time Embedded Systems Software.” Int. J. of Embedded Systems, 2015."},"year":"2015","language":[{"iso":"eng"}]},{"user_id":"21240","title":"Analysis of long-term swarm performance based on short-term experiments","department":[{"_id":"672"}],"publication":"Springer Jounal Soft Computing ","author":[{"first_name":"Yara","full_name":"Khaluf, Yara","last_name":"Khaluf"},{"first_name":"Mauro","full_name":"Birattari, Mauro","last_name":"Birattari"},{"last_name":"Rammig","first_name":"Franz-Josef","full_name":"Rammig, Franz-Josef"}],"date_created":"2021-09-29T09:58:49Z","status":"public","_id":"25111","date_updated":"2022-01-06T06:56:51Z","language":[{"iso":"eng"}],"type":"journal_article","year":"2015","citation":{"bibtex":"@article{Khaluf_Birattari_Rammig_2015, title={Analysis of long-term swarm performance based on short-term experiments}, journal={Springer Jounal Soft Computing }, author={Khaluf, Yara and Birattari, Mauro and Rammig, Franz-Josef}, year={2015} }","mla":"Khaluf, Yara, et al. “Analysis of Long-Term Swarm Performance Based on Short-Term Experiments.” Springer Jounal Soft Computing , 2015.","chicago":"Khaluf, Yara, Mauro Birattari, and Franz-Josef Rammig. “Analysis of Long-Term Swarm Performance Based on Short-Term Experiments.” Springer Jounal Soft Computing , 2015.","apa":"Khaluf, Y., Birattari, M., & Rammig, F.-J. (2015). Analysis of long-term swarm performance based on short-term experiments. Springer Jounal Soft Computing .","ama":"Khaluf Y, Birattari M, Rammig F-J. Analysis of long-term swarm performance based on short-term experiments. Springer Jounal Soft Computing . Published online 2015.","ieee":"Y. Khaluf, M. Birattari, and F.-J. Rammig, “Analysis of long-term swarm performance based on short-term experiments,” Springer Jounal Soft Computing , 2015.","short":"Y. Khaluf, M. Birattari, F.-J. Rammig, Springer Jounal Soft Computing (2015)."}},{"abstract":[{"lang":"eng","text":"Video streaming is in high demand by mobile users. In cellular networks, however, the unreliable wireless channel leads to two major problems. Poor channel states degrade video quality and interrupt the playback when a user cannot sufficiently fill its local playout buffer: buffer underruns occur. In contrast, good channel conditions cause common greedy buffering schemes to buffer too much data. Such over-buffering wastes expensive wireless channel capacity. Assuming that we can anticipate future data rates, we plan the quality and download time of video segments ahead. This anticipatory download scheduling avoids buffer underruns by downloading a large number of segments before a drop in available data rate occurs, without wasting wireless capacity by excessive buffering.We developed a practical anticipatory scheduling algorithm for segmented video streaming protocols (e.g., HLS or MPEG DASH). Simulation results and testbed measurements show that our solution essentially eliminates playback interruptions without significantly decreasing video quality."}],"user_id":"15572","ddc":["040"],"title":"SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming","file":[{"date_created":"2018-03-21T09:44:45Z","file_name":"252-DBDVK15.pdf","access_level":"closed","file_size":587685,"creator":"florida","file_id":"1488","content_type":"application/pdf","date_updated":"2018-03-21T09:44:45Z","relation":"main_file","success":1}],"publication":"Proceedings of the 2nd International Conference on Networked Systems (NetSys)","department":[{"_id":"75"}],"file_date_updated":"2018-03-21T09:44:45Z","author":[{"full_name":"Dräxler, Martin","first_name":"Martin","last_name":"Dräxler"},{"first_name":"Johannes","full_name":"Blobel, Johannes","last_name":"Blobel"},{"last_name":"Dreimann","first_name":"Philipp","full_name":"Dreimann, Philipp"},{"last_name":"Valentin","first_name":"Stefan","full_name":"Valentin, Stefan"},{"id":"126","last_name":"Karl","full_name":"Karl, Holger","first_name":"Holger"}],"date_created":"2017-10-17T12:41:41Z","has_accepted_license":"1","status":"public","_id":"252","date_updated":"2022-01-06T06:56:55Z","doi":"10.1109/NetSys.2015.7089073","main_file_link":[{"url":"http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=7089073"}],"page":"1--8","year":"2015","type":"conference","citation":{"bibtex":"@inproceedings{Dräxler_Blobel_Dreimann_Valentin_Karl_2015, title={SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming}, DOI={10.1109/NetSys.2015.7089073}, booktitle={Proceedings of the 2nd International Conference on Networked Systems (NetSys)}, author={Dräxler, Martin and Blobel, Johannes and Dreimann, Philipp and Valentin, Stefan and Karl, Holger}, year={2015}, pages={1--8} }","mla":"Dräxler, Martin, et al. “SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming.” Proceedings of the 2nd International Conference on Networked Systems (NetSys), 2015, pp. 1--8, doi:10.1109/NetSys.2015.7089073.","chicago":"Dräxler, Martin, Johannes Blobel, Philipp Dreimann, Stefan Valentin, and Holger Karl. “SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming.” In Proceedings of the 2nd International Conference on Networked Systems (NetSys), 1--8, 2015. https://doi.org/10.1109/NetSys.2015.7089073.","ama":"Dräxler M, Blobel J, Dreimann P, Valentin S, Karl H. SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming. In: Proceedings of the 2nd International Conference on Networked Systems (NetSys). ; 2015:1--8. doi:10.1109/NetSys.2015.7089073","apa":"Dräxler, M., Blobel, J., Dreimann, P., Valentin, S., & Karl, H. (2015). SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming. In Proceedings of the 2nd International Conference on Networked Systems (NetSys) (pp. 1--8). https://doi.org/10.1109/NetSys.2015.7089073","ieee":"M. Dräxler, J. Blobel, P. Dreimann, S. Valentin, and H. Karl, “SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming,” in Proceedings of the 2nd International Conference on Networked Systems (NetSys), 2015, pp. 1--8.","short":"M. Dräxler, J. Blobel, P. Dreimann, S. Valentin, H. Karl, in: Proceedings of the 2nd International Conference on Networked Systems (NetSys), 2015, pp. 1--8."}},{"ddc":["000"],"user_id":"13703","abstract":[{"lang":"eng","text":"Group signatures, introduced by Chaum and van Heyst [15], are an important primitive in cryptography. In group signature schemes every group member can anonymously sign messages on behalf of the group. In case of disputes a dedicated opening manager is able to trace signatures - he can extract the identity of the producer of a given signature. A formal model for static group signatures schemes and their security is defined by Bellare, Micciancio, and Warinschi [4], the case of dynamic groups is considered by Bellare, Shi, and Zhang [5]. Both models define group signature schemes with a single opening manager. The main difference between these models is that the number of group members in static schemes is fixed, while in dynamic schemes group members can join the group over time."}],"status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:41:41Z","author":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"},{"id":"48090","last_name":"Juhnke","full_name":"Juhnke, Jakob","first_name":"Jakob"},{"last_name":"Löken","id":"13703","first_name":"Nils","full_name":"Löken, Nils"}],"file_date_updated":"2018-11-02T14:08:23Z","publication":"Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)","file":[{"date_created":"2018-11-02T14:08:23Z","file_name":"ShortGroupSignaturesWithDistri.pdf","access_level":"closed","file_size":262436,"file_id":"5262","creator":"ups","date_updated":"2018-11-02T14:08:23Z","content_type":"application/pdf","relation":"main_file","success":1}],"_id":"253","type":"conference","citation":{"ieee":"J. Blömer, J. Juhnke, and N. Löken, “Short Group Signatures with Distributed Traceability,” in Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.","short":"J. Blömer, J. Juhnke, N. Löken, in: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.","mla":"Blömer, Johannes, et al. “Short Group Signatures with Distributed Traceability.” Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–80, doi:10.1007/978-3-319-32859-1_14.","bibtex":"@inproceedings{Blömer_Juhnke_Löken_2015, series={LNCS}, title={Short Group Signatures with Distributed Traceability}, DOI={10.1007/978-3-319-32859-1_14}, booktitle={Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}, author={Blömer, Johannes and Juhnke, Jakob and Löken, Nils}, year={2015}, pages={166–180}, collection={LNCS} }","chicago":"Blömer, Johannes, Jakob Juhnke, and Nils Löken. “Short Group Signatures with Distributed Traceability.” In Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 166–80. LNCS, 2015. https://doi.org/10.1007/978-3-319-32859-1_14.","ama":"Blömer J, Juhnke J, Löken N. Short Group Signatures with Distributed Traceability. In: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). LNCS. ; 2015:166-180. doi:10.1007/978-3-319-32859-1_14","apa":"Blömer, J., Juhnke, J., & Löken, N. (2015). Short Group Signatures with Distributed Traceability. In Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) (pp. 166–180). https://doi.org/10.1007/978-3-319-32859-1_14"},"year":"2015","page":"166-180","title":"Short Group Signatures with Distributed Traceability","related_material":{"record":[{"status":"public","id":"325","relation":"other"}]},"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"KogniHome - die mitdenkende Wohnung","_id":"44"}],"department":[{"_id":"64"}],"doi":"10.1007/978-3-319-32859-1_14","date_updated":"2022-01-06T06:59:07Z","language":[{"iso":"eng"}],"series_title":"LNCS"},{"user_id":"32","title":"Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein","status":"public","date_created":"2021-10-04T13:39:25Z","publication_status":"published","publication_identifier":{"issn":["0143-7496"]},"author":[{"first_name":"Oliver I.","full_name":"Strube, Oliver I.","last_name":"Strube"},{"last_name":"Rüdiger","full_name":"Rüdiger, Arne A.","first_name":"Arne A."},{"last_name":"Bremser","full_name":"Bremser, Wolfgang","first_name":"Wolfgang"}],"publication":"International Journal of Adhesion and Adhesives","department":[{"_id":"321"},{"_id":"301"}],"doi":"10.1016/j.ijadhadh.2015.08.001","_id":"25312","date_updated":"2022-01-06T06:57:00Z","language":[{"iso":"eng"}],"citation":{"chicago":"Strube, Oliver I., Arne A. Rüdiger, and Wolfgang Bremser. “Buildup of Biobased Adhesive Layers by Enzymatically Controlled Deposition on the Example of Casein.” International Journal of Adhesion and Adhesives, 2015, 9–13. https://doi.org/10.1016/j.ijadhadh.2015.08.001.","apa":"Strube, O. I., Rüdiger, A. A., & Bremser, W. (2015). Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein. International Journal of Adhesion and Adhesives, 9–13. https://doi.org/10.1016/j.ijadhadh.2015.08.001","ama":"Strube OI, Rüdiger AA, Bremser W. Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein. International Journal of Adhesion and Adhesives. Published online 2015:9-13. doi:10.1016/j.ijadhadh.2015.08.001","mla":"Strube, Oliver I., et al. “Buildup of Biobased Adhesive Layers by Enzymatically Controlled Deposition on the Example of Casein.” International Journal of Adhesion and Adhesives, 2015, pp. 9–13, doi:10.1016/j.ijadhadh.2015.08.001.","bibtex":"@article{Strube_Rüdiger_Bremser_2015, title={Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein}, DOI={10.1016/j.ijadhadh.2015.08.001}, journal={International Journal of Adhesion and Adhesives}, author={Strube, Oliver I. and Rüdiger, Arne A. and Bremser, Wolfgang}, year={2015}, pages={9–13} }","short":"O.I. Strube, A.A. Rüdiger, W. Bremser, International Journal of Adhesion and Adhesives (2015) 9–13.","ieee":"O. I. Strube, A. A. Rüdiger, and W. Bremser, “Buildup of biobased adhesive layers by enzymatically controlled deposition on the example of casein,” International Journal of Adhesion and Adhesives, pp. 9–13, 2015, doi: 10.1016/j.ijadhadh.2015.08.001."},"type":"journal_article","year":"2015","page":"9-13"}]