@article{17727,
  author       = {{Kytö, Merja and Stenström, Anna-Brita and Mindt, Ilka}},
  journal      = {{ICAME Journal 40}},
  pages        = {{5 -- 8}},
  title        = {{{An interview with Joybrato Mukherjee, the Chair oft he ICAME Board}}},
  year         = {{2016}},
}

@article{17764,
  author       = {{Mindt, Ilka}},
  journal      = {{Silesian Studies in English 2015}},
  location     = {{Opava}},
  pages        = {{38 -- 59}},
  publisher    = {{Silesian University in Opava}},
  title        = {{{The diachronic development of 'COME TO V'}}},
  year         = {{2016}},
}

@misc{178,
  author       = {{Endres, Angelika Elfriede}},
  publisher    = {{Universität Paderborn}},
  title        = {{{On the Design and Defense of Networks - An Experimental Investigation}}},
  year         = {{2016}},
}

@misc{179,
  author       = {{Pehlivan, Muhammet}},
  publisher    = {{Universität Paderborn}},
  title        = {{{On the abuse of market power - an economic perspective of Microsoft antitrust cases}}},
  year         = {{2016}},
}

@misc{187,
  booktitle    = {{Transactions on Parallel Computing (TOPC)}},
  editor       = {{Meyer auf der Heide, Friedhelm}},
  number       = {{1}},
  pages        = {{1}},
  title        = {{{Introduction to the Special Issue on SPAA 2014}}},
  doi          = {{10.1145/2936716}},
  year         = {{2016}},
}

@inbook{18845,
  author       = {{Seng, Eva- Maria}},
  booktitle    = {{Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow}},
  editor       = {{Weichel, Thomas}},
  pages        = {{71--81}},
  title        = {{{Das Eisenacher Regulativ und das Wiesbadener Programm. Die Diskussion um den evangelischen Kirchenbau und die Wiesbadener Kirchenbauten des 19. Jahrhunderts}}},
  year         = {{2016}},
}

@inbook{18847,
  author       = {{Seng, Eva- Maria}},
  booktitle    = {{ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015}},
  editor       = {{Bremer, Thomas}},
  pages        = {{69--79}},
  title        = {{{Palmanova, eine Idealstadt im Friaul}}},
  volume       = {{No.60, Herbst 2015}},
  year         = {{2016}},
}

@inbook{18866,
  author       = {{Seng, Eva- Maria}},
  booktitle    = {{Mutations de la culture patrimoniale}},
  editor       = {{Morice, Jean-René and Sapin, Guy and Vivier, Nadine}},
  pages        = {{61--72}},
  title        = {{{Patrimoine culturel immatériel: plaidoyer pour une vision globale du patrimione culturel}}},
  year         = {{2016}},
}

@inbook{18948,
  author       = {{Seng, Eva- Maria}},
  booktitle    = {{Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz}},
  editor       = {{Zimmermann, Olaf and Geißler, Theo}},
  pages        = {{246--250}},
  title        = {{{Aus Fehlern lernen? Was kann man bei der Vergabe des Titels immaterielles Kulturerbe aus den Erfahrungen mit dem materiellen Kulturerbe ableiten und verbessern?}}},
  year         = {{2016}},
}

@inproceedings{19,
  abstract     = {{Version Control Systems (VCS) are a valuable tool for software development
and document management. Both client/server and distributed (Peer-to-Peer)
models exist, with the latter (e.g., Git and Mercurial) becoming
increasingly popular. Their distributed nature introduces complications,
especially concerning security: it is hard to control the dissemination of
contents stored in distributed VCS as they rely on replication of complete
repositories to any involved user.

We overcome this issue by designing and implementing a concept for
cryptography-enforced access control which is transparent to the user. Use
of field-tested schemes (end-to-end encryption, digital signatures) allows
for strong security, while adoption of convergent encryption and
content-defined chunking retains storage efficiency. The concept is
seamlessly integrated into Mercurial---respecting its distributed storage
concept---to ensure practical usability and compatibility to existing
deployments.}},
  author       = {{Lass, Michael and Leibenger, Dominik and Sorge, Christoph}},
  booktitle    = {{Proc. 41st Conference on Local Computer Networks (LCN)}},
  isbn         = {{978-1-5090-2054-6}},
  keywords     = {{access control, distributed version control systems, mercurial, peer-to-peer, convergent encryption, confidentiality, authenticity}},
  publisher    = {{IEEE}},
  title        = {{{Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension}}},
  doi          = {{10.1109/lcn.2016.11}},
  year         = {{2016}},
}

@article{190,
  abstract     = {{Today, software components are provided by global markets in the form of services. In order to optimally satisfy service requesters and service providers, adequate techniques for automatic service matching are needed. However, a requester’s requirements may be vague and the information available about a provided service may be incomplete. As a consequence, fuzziness is induced into the matching procedure. The contribution of this paper is the development of a systematic matching procedure that leverages concepts and techniques from fuzzy logic and possibility theory based on our formal distinction between different sources and types of fuzziness in the context of service matching. In contrast to existing methods, our approach is able to deal with imprecision and incompleteness in service specifications and to inform users about the extent of induced fuzziness in order to improve the user’s decision-making. We demonstrate our approach on the example of specifications for service reputation based on ratings given by previous users. Our evaluation based on real service ratings shows the utility and applicability of our approach.}},
  author       = {{Platenius, Marie Christin and Shaker, Ammar and Becker, Matthias and Hüllermeier, Eyke and Schäfer, Wilhelm}},
  journal      = {{IEEE Transactions on Software Engineering (TSE), presented at ICSE 2017}},
  number       = {{8}},
  pages        = {{739--759}},
  publisher    = {{IEEE}},
  title        = {{{Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic}}},
  doi          = {{10.1109/TSE.2016.2632115}},
  year         = {{2016}},
}

@book{19014,
  author       = {{Eke, Norbert Otto and Allkemper, Alo}},
  publisher    = {{Fink}},
  title        = {{{Literaturwissenschaft}}},
  year         = {{2016}},
}

@book{19058,
  editor       = {{Eke, Norbert Otto and Füllner, Bernd}},
  pages        = {{308}},
  publisher    = {{Aisthesis}},
  title        = {{{Das Politische und die Politik im Vormärz}}},
  volume       = {{2015}},
  year         = {{2016}},
}

@inproceedings{191,
  abstract     = {{One purpose of requirement refinement is that higher-level requirements have to be translated to something usable by developers. Since customer requirements are often written in natural language by end users, they lack precision, completeness and consistency. Although user stories are often used in the requirement elicitation process in order to describe the possibilities how to interact with the software, there is always something unspoken. Here, we present techniques how to automatically refine vague software descriptions. Thus, we can bridge the gap by first revising natural language utterances from higher-level to more detailed customer requirements, before functionality matters. We therefore focus on the resolution of semantically incomplete user-generated sentences (i.e. non-instantiated arguments of predicates) and provide ontology-based gap-filling suggestions how to complete unverbalized information in the user’s demand.}},
  author       = {{Geierhos, Michaela and Bäumer, Frederik Simon}},
  booktitle    = {{Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB)}},
  editor       = {{Métais, Elisabeth  and Meziane, Farid  and Saraee, Mohamad  and Sugumaran, Vijayan  and Vadera, Sunil }},
  isbn         = {{978-3-319-41753-0}},
  keywords     = {{Requirement refinement, Concept expansion, Ontology-based instantiation of predicate-argument structure}},
  location     = {{Salford, UK}},
  pages        = {{37--47}},
  publisher    = {{Springer}},
  title        = {{{How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement}}},
  doi          = {{10.1007/978-3-319-41754-7_4}},
  volume       = {{9612}},
  year         = {{2016}},
}

@article{1919,
  abstract     = {{We study a game between a network designer, who uses costly links to connect nodes in a network, and a network disruptor who tries to disrupt the resulting network as much as possible by deleting either nodes or links. For low linking costs networks with all nodes in symmetric positions are a best response of the designer under both link deletion and node deletion. For high linking costs the designer builds a star network under link deletion, but for node deletion excludes some nodes from the network to build a smaller but stronger network. For intermediate linking costs the designer again builds a symmetric network under node deletion but a star‐like network with weak spots under link deletion.}},
  author       = {{Hoyer, Britta and De Jaegher, Kris}},
  issn         = {{1097-3923}},
  journal      = {{Journal of Public Economic Theory}},
  number       = {{5}},
  pages        = {{802--830}},
  publisher    = {{Wiley-Blackwell}},
  title        = {{{Strategic Network Disruption and Defense}}},
  doi          = {{10.1111/jpet.12168}},
  volume       = {{18}},
  year         = {{2016}},
}

@misc{192,
  author       = {{Reckhorn, Lena}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling}}},
  year         = {{2016}},
}

@article{19202,
  author       = {{Eke, Norbert Otto}},
  journal      = {{Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans. Hg. von Nadine J. Schmidt und Kalina Kupczyńska}},
  pages        = {{18--29}},
  publisher    = {{edition text & kritik, München}},
  title        = {{{‚Reden‘ über Dichtung. Poetik-Vorlesungen und Poetik-Dozenturen im literarischen Feld}}},
  year         = {{2016}},
}

@article{19205,
  author       = {{Eke, Norbert Otto}},
  journal      = {{Text + Kritik IX/16}},
  number       = {{H. 212}},
  pages        = {{5--17}},
  title        = {{{„Um so etwas bekümmre ich mich nicht“. Grabbe und die Moral}}},
  year         = {{2016}},
}

@article{19210,
  author       = {{Breddermann, D. and Heinze, Dirk Florian and Binder, R. and Zrenner, Artur and Schumacher, Stefan}},
  issn         = {{2469-9950}},
  journal      = {{Physical Review B}},
  title        = {{{All-optical tailoring of single-photon spectra in a quantum-dot microcavity system}}},
  doi          = {{10.1103/physrevb.94.165310}},
  year         = {{2016}},
}

@article{1922,
  abstract     = {{We construct two-player two-strategy game-theoretic models of by-product mutualism, where our focus lies on the way in which the probability of cooperation among players is affected by the degree of adversity facing the players. In our first model, cooperation consists of the production of a public good, and adversity is linked to the degree of complementarity of the players׳ efforts in producing the public good. In our second model, cooperation consists of the defense of a public, and/or a private good with by-product benefits, and adversity is measured by the number of random attacks (e.g., by a predator) facing the players. In both of these models, our analysis confirms the existence of the so-called boomerang effect, which states that in a harsh environment, the individual player has few incentives to unilaterally defect in a situation of joint cooperation. Focusing on such an effect in isolation leads to the "common-enemy" hypothesis that a larger degree of adversity increases the probability of cooperation. Yet, we also find that a sucker effect may simultaneously exist, which says that in a harsh environment, the individual player has few incentives to unilaterally cooperate in a situation of joint defection. Looked at in isolation, the sucker effect leads to the competing hypothesis that a larger degree of adversity decreases the probability of cooperation. Our analysis predicts circumstances in which the "common enemy" hypothesis prevails, and circumstances in which the competing hypothesis prevails.}},
  author       = {{De Jaegher, Kris and Hoyer, Britta}},
  issn         = {{0022-5193}},
  journal      = {{Journal of Theoretical Biology}},
  pages        = {{82--97}},
  publisher    = {{Elsevier BV}},
  title        = {{{By-product mutualism and the ambiguous effects of harsher environments – A game-theoretic model}}},
  doi          = {{10.1016/j.jtbi.2015.12.034}},
  volume       = {{393}},
  year         = {{2016}},
}

