[{"status":"public","type":"journal_article","publication":"ICAME Journal 40","language":[{"iso":"eng"}],"user_id":"14932","department":[{"_id":"384"}],"_id":"17727","citation":{"ama":"Kytö M, Stenström A-B, Mindt I. An interview with Joybrato Mukherjee, the Chair oft he ICAME Board. <i>ICAME Journal 40</i>. 2016:5-8.","chicago":"Kytö, Merja, Anna-Brita Stenström, and Ilka Mindt. “An Interview with Joybrato Mukherjee, the Chair Oft He ICAME Board.” <i>ICAME Journal 40</i>, 2016, 5–8.","ieee":"M. Kytö, A.-B. Stenström, and I. Mindt, “An interview with Joybrato Mukherjee, the Chair oft he ICAME Board,” <i>ICAME Journal 40</i>, pp. 5–8, 2016.","apa":"Kytö, M., Stenström, A.-B., &#38; Mindt, I. (2016). An interview with Joybrato Mukherjee, the Chair oft he ICAME Board. <i>ICAME Journal 40</i>, 5–8.","mla":"Kytö, Merja, et al. “An Interview with Joybrato Mukherjee, the Chair Oft He ICAME Board.” <i>ICAME Journal 40</i>, 2016, pp. 5–8.","bibtex":"@article{Kytö_Stenström_Mindt_2016, title={An interview with Joybrato Mukherjee, the Chair oft he ICAME Board}, journal={ICAME Journal 40}, author={Kytö, Merja and Stenström, Anna-Brita and Mindt, Ilka}, year={2016}, pages={5–8} }","short":"M. Kytö, A.-B. Stenström, I. Mindt, ICAME Journal 40 (2016) 5–8."},"page":"5 - 8","year":"2016","title":"An interview with Joybrato Mukherjee, the Chair oft he ICAME Board","author":[{"first_name":"Merja","last_name":"Kytö","full_name":"Kytö, Merja"},{"first_name":"Anna-Brita","last_name":"Stenström","full_name":"Stenström, Anna-Brita"},{"first_name":"Ilka","id":"32079","full_name":"Mindt, Ilka","last_name":"Mindt"}],"date_created":"2020-08-07T12:46:47Z","date_updated":"2022-01-06T06:53:19Z"},{"status":"public","publication":"Silesian Studies in English 2015","type":"journal_article","language":[{"iso":"eng"}],"_id":"17764","department":[{"_id":"384"}],"user_id":"21240","year":"2016","page":"38 - 59","citation":{"bibtex":"@article{Mindt_2016, title={The diachronic development of “COME TO V”}, journal={Silesian Studies in English 2015}, publisher={Silesian University in Opava}, author={Mindt, Ilka}, year={2016}, pages={38–59} }","short":"I. Mindt, Silesian Studies in English 2015 (2016) 38–59.","mla":"Mindt, Ilka. “The Diachronic Development of ‘COME TO V.’” <i>Silesian Studies in English 2015</i>, Silesian University in Opava, 2016, pp. 38–59.","apa":"Mindt, I. (2016). The diachronic development of “COME TO V.” <i>Silesian Studies in English 2015</i>, 38–59.","chicago":"Mindt, Ilka. “The Diachronic Development of ‘COME TO V.’” <i>Silesian Studies in English 2015</i>, 2016, 38–59.","ieee":"I. Mindt, “The diachronic development of ‘COME TO V,’” <i>Silesian Studies in English 2015</i>, pp. 38–59, 2016.","ama":"Mindt I. The diachronic development of “COME TO V.” <i>Silesian Studies in English 2015</i>. 2016:38-59."},"title":"The diachronic development of 'COME TO V'","conference":{"location":"Opava"},"date_updated":"2022-01-06T06:53:19Z","publisher":"Silesian University in Opava","author":[{"full_name":"Mindt, Ilka","id":"32079","last_name":"Mindt","first_name":"Ilka"}],"date_created":"2020-08-10T11:04:17Z"},{"citation":{"mla":"Endres, Angelika Elfriede. <i>On the Design and Defense of Networks - An Experimental Investigation</i>. Universität Paderborn, 2016.","short":"A.E. Endres, On the Design and Defense of Networks - An Experimental Investigation, Universität Paderborn, 2016.","bibtex":"@book{Endres_2016, title={On the Design and Defense of Networks - An Experimental Investigation}, publisher={Universität Paderborn}, author={Endres, Angelika Elfriede}, year={2016} }","apa":"Endres, A. E. (2016). <i>On the Design and Defense of Networks - An Experimental Investigation</i>. Universität Paderborn.","ama":"Endres AE. <i>On the Design and Defense of Networks - An Experimental Investigation</i>. Universität Paderborn; 2016.","ieee":"A. E. Endres, <i>On the Design and Defense of Networks - An Experimental Investigation</i>. Universität Paderborn, 2016.","chicago":"Endres, Angelika Elfriede. <i>On the Design and Defense of Networks - An Experimental Investigation</i>. Universität Paderborn, 2016."},"year":"2016","title":"On the Design and Defense of Networks - An Experimental Investigation","date_created":"2017-10-17T12:41:26Z","author":[{"first_name":"Angelika Elfriede","id":"48794","full_name":"Endres, Angelika Elfriede","last_name":"Endres"}],"supervisor":[{"first_name":"Burkhard","last_name":"Hehenkamp","full_name":"Hehenkamp, Burkhard","id":"37339"}],"date_updated":"2022-01-06T06:53:19Z","publisher":"Universität Paderborn","status":"public","type":"mastersthesis","department":[{"_id":"280"}],"user_id":"42447","_id":"178","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}]},{"user_id":"42447","department":[{"_id":"280"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"179","type":"mastersthesis","status":"public","supervisor":[{"first_name":"Burkhard","last_name":"Hehenkamp","id":"37339","full_name":"Hehenkamp, Burkhard"}],"author":[{"full_name":"Pehlivan, Muhammet","last_name":"Pehlivan","first_name":"Muhammet"}],"date_created":"2017-10-17T12:41:26Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:53:22Z","title":"On the abuse of market power - an economic perspective of Microsoft antitrust cases","citation":{"apa":"Pehlivan, M. (2016). <i>On the abuse of market power - an economic perspective of Microsoft antitrust cases</i>. Universität Paderborn.","short":"M. Pehlivan, On the Abuse of Market Power - an Economic Perspective of Microsoft Antitrust Cases, Universität Paderborn, 2016.","bibtex":"@book{Pehlivan_2016, title={On the abuse of market power - an economic perspective of Microsoft antitrust cases}, publisher={Universität Paderborn}, author={Pehlivan, Muhammet}, year={2016} }","mla":"Pehlivan, Muhammet. <i>On the Abuse of Market Power - an Economic Perspective of Microsoft Antitrust Cases</i>. Universität Paderborn, 2016.","ieee":"M. Pehlivan, <i>On the abuse of market power - an economic perspective of Microsoft antitrust cases</i>. Universität Paderborn, 2016.","chicago":"Pehlivan, Muhammet. <i>On the Abuse of Market Power - an Economic Perspective of Microsoft Antitrust Cases</i>. Universität Paderborn, 2016.","ama":"Pehlivan M. <i>On the Abuse of Market Power - an Economic Perspective of Microsoft Antitrust Cases</i>. Universität Paderborn; 2016."},"year":"2016"},{"ddc":["040"],"file_date_updated":"2018-03-21T12:31:42Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"187","user_id":"15504","department":[{"_id":"63"}],"editor":[{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-21T12:31:42Z","creator":"florida","date_updated":"2018-03-21T12:31:42Z","file_id":"1531","file_name":"187-a1-heide.pdf","access_level":"closed","file_size":34053}],"status":"public","type":"journal_editor","publication":"Transactions on Parallel Computing (TOPC)","title":"Introduction to the Special Issue on SPAA 2014","doi":"10.1145/2936716","date_updated":"2022-01-06T06:53:51Z","date_created":"2017-10-17T12:41:28Z","year":"2016","citation":{"ama":"Meyer auf der Heide F, ed. <i>Introduction to the Special Issue on SPAA 2014</i>.; 2016. doi:<a href=\"https://doi.org/10.1145/2936716\">10.1145/2936716</a>","ieee":"F. Meyer auf der Heide, Ed., <i>Introduction to the Special Issue on SPAA 2014</i>, no. 1. 2016.","chicago":"Meyer auf der Heide, Friedhelm, ed. <i>Introduction to the Special Issue on SPAA 2014</i>. <i>Transactions on Parallel Computing (TOPC)</i>, 2016. <a href=\"https://doi.org/10.1145/2936716\">https://doi.org/10.1145/2936716</a>.","apa":"Meyer auf der Heide, F. (Ed.). (2016). <i>Introduction to the Special Issue on SPAA 2014</i>. <i>Transactions on Parallel Computing (TOPC)</i>. <a href=\"https://doi.org/10.1145/2936716\">https://doi.org/10.1145/2936716</a>","short":"F. Meyer auf der Heide, ed., Introduction to the Special Issue on SPAA 2014, 2016.","mla":"Meyer auf der Heide, Friedhelm, editor. “Introduction to the Special Issue on SPAA 2014.” <i>Transactions on Parallel Computing (TOPC)</i>, no. 1, 2016, doi:<a href=\"https://doi.org/10.1145/2936716\">10.1145/2936716</a>.","bibtex":"@book{Meyer auf der Heide_2016, title={Introduction to the Special Issue on SPAA 2014}, DOI={<a href=\"https://doi.org/10.1145/2936716\">10.1145/2936716</a>}, number={1}, journal={Transactions on Parallel Computing (TOPC)}, year={2016} }"},"page":"1","has_accepted_license":"1","issue":"1"},{"date_updated":"2022-01-06T06:53:52Z","author":[{"first_name":"Eva- Maria","last_name":"Seng","full_name":"Seng, Eva- Maria","id":"499"}],"date_created":"2020-09-02T11:42:36Z","title":"Das Eisenacher Regulativ und das Wiesbadener Programm. Die Diskussion um den evangelischen Kirchenbau und die Wiesbadener Kirchenbauten des 19. Jahrhunderts","place":"Wiesbaden","year":"2016","citation":{"apa":"Seng, E.-M. (2016). Das Eisenacher Regulativ und das Wiesbadener Programm. Die Diskussion um den evangelischen Kirchenbau und die Wiesbadener Kirchenbauten des 19. Jahrhunderts. In T. Weichel (Ed.), <i>Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow</i> (pp. 71–81). Wiesbaden.","bibtex":"@inbook{Seng_2016, place={Wiesbaden}, title={Das Eisenacher Regulativ und das Wiesbadener Programm. Die Diskussion um den evangelischen Kirchenbau und die Wiesbadener Kirchenbauten des 19. Jahrhunderts}, booktitle={Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow}, author={Seng, Eva- Maria}, editor={Weichel, ThomasEditor}, year={2016}, pages={71–81} }","mla":"Seng, Eva-Maria. “Das Eisenacher Regulativ und das Wiesbadener Programm. Die Diskussion um den evangelischen Kirchenbau und die Wiesbadener Kirchenbauten des 19. Jahrhunderts.” <i>Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow</i>, edited by Thomas Weichel, 2016, pp. 71–81.","short":"E.-M. Seng, in: T. Weichel (Ed.), Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow, Wiesbaden, 2016, pp. 71–81.","ama":"Seng E-M. Das Eisenacher Regulativ und das Wiesbadener Programm. Die Diskussion um den evangelischen Kirchenbau und die Wiesbadener Kirchenbauten des 19. Jahrhunderts. In: Weichel T, ed. <i>Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow</i>. Wiesbaden; 2016:71-81.","chicago":"Seng, Eva- Maria. “Das Eisenacher Regulativ und das Wiesbadener Programm. Die Diskussion um den evangelischen Kirchenbau und die Wiesbadener Kirchenbauten des 19. Jahrhunderts.” In <i>Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow</i>, edited by Thomas Weichel, 71–81. Wiesbaden, 2016.","ieee":"E.-M. Seng, “Das Eisenacher Regulativ und das Wiesbadener Programm. Die Diskussion um den evangelischen Kirchenbau und die Wiesbadener Kirchenbauten des 19. Jahrhunderts,” in <i>Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow</i>, T. Weichel, Ed. Wiesbaden, 2016, pp. 71–81."},"page":"71-81","_id":"18845","user_id":"21240","department":[{"_id":"443"}],"language":[{"iso":"ger"}],"type":"book_chapter","publication":"Das Wiesbadener Programm und seine Bedeutung für den Kirchenbau. Zum Gedächtnis an Prof. Dr. Gottfried Kiesow","editor":[{"last_name":"Weichel","full_name":"Weichel, Thomas","first_name":"Thomas"}],"status":"public"},{"language":[{"iso":"ger"}],"user_id":"21240","department":[{"_id":"443"}],"_id":"18847","status":"public","editor":[{"full_name":"Bremer, Thomas","last_name":"Bremer","first_name":"Thomas"}],"type":"book_chapter","publication":"ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015","title":"Palmanova, eine Idealstadt im Friaul","author":[{"first_name":"Eva- Maria","last_name":"Seng","full_name":"Seng, Eva- Maria","id":"499"}],"date_created":"2020-09-02T11:45:36Z","volume":"No.60, Herbst 2015","date_updated":"2022-01-06T06:53:52Z","citation":{"ama":"Seng E-M. Palmanova, eine Idealstadt im Friaul. In: Bremer T, ed. <i>ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015</i>. Vol No.60, Herbst 2015. Tübingen; 2016:69-79.","chicago":"Seng, Eva- Maria. “Palmanova, eine Idealstadt im Friaul.” In <i>ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015</i>, edited by Thomas Bremer, No.60, Herbst 2015:69–79. Tübingen, 2016.","ieee":"E.-M. Seng, “Palmanova, eine Idealstadt im Friaul,” in <i>ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015</i>, vol. No.60, Herbst 2015, T. Bremer, Ed. Tübingen, 2016, pp. 69–79.","apa":"Seng, E.-M. (2016). Palmanova, eine Idealstadt im Friaul. In T. Bremer (Ed.), <i>ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015</i> (Vol. No.60, Herbst 2015, pp. 69–79). Tübingen.","short":"E.-M. Seng, in: T. Bremer (Ed.), ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015, Tübingen, 2016, pp. 69–79.","bibtex":"@inbook{Seng_2016, place={Tübingen}, title={Palmanova, eine Idealstadt im Friaul}, volume={No.60, Herbst 2015}, booktitle={ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015}, author={Seng, Eva- Maria}, editor={Bremer, ThomasEditor}, year={2016}, pages={69–79} }","mla":"Seng, Eva-Maria. “Palmanova, eine Idealstadt im Friaul.” <i>ZIBALDONE. Zeitschrift für italienische Kultur der Gegenwart, No. 60, Herbst 2015</i>, edited by Thomas Bremer, vol. No.60, Herbst 2015, 2016, pp. 69–79."},"page":"69-79","year":"2016","place":"Tübingen"},{"date_updated":"2022-01-06T06:53:53Z","date_created":"2020-09-02T13:26:15Z","author":[{"first_name":"Eva- Maria","last_name":"Seng","full_name":"Seng, Eva- Maria","id":"499"}],"title":"Patrimoine culturel immatériel: plaidoyer pour une vision globale du patrimione culturel","year":"2016","place":"Rennes","citation":{"ama":"Seng E-M. Patrimoine culturel immatériel: plaidoyer pour une vision globale du patrimione culturel. In: Morice J-R, Sapin G, Vivier N, eds. <i>Mutations de la culture patrimoniale</i>. Rennes; 2016:61-72.","ieee":"E.-M. Seng, “Patrimoine culturel immatériel: plaidoyer pour une vision globale du patrimione culturel,” in <i>Mutations de la culture patrimoniale</i>, J.-R. Morice, G. Sapin, and N. Vivier, Eds. Rennes, 2016, pp. 61–72.","chicago":"Seng, Eva- Maria. “Patrimoine culturel immatériel: plaidoyer pour une vision globale du patrimione culturel.” In <i>Mutations de la culture patrimoniale</i>, edited by Jean-René Morice, Guy Sapin, and Nadine Vivier, 61–72. Rennes, 2016.","mla":"Seng, Eva-Maria. “Patrimoine culturel immatériel: plaidoyer pour une vision globale du patrimione culturel.” <i>Mutations de la culture patrimoniale</i>, edited by Jean-René Morice et al., 2016, pp. 61–72.","short":"E.-M. Seng, in: J.-R. Morice, G. Sapin, N. Vivier (Eds.), Mutations de la culture patrimoniale, Rennes, 2016, pp. 61–72.","bibtex":"@inbook{Seng_2016, place={Rennes}, title={Patrimoine culturel immatériel: plaidoyer pour une vision globale du patrimione culturel}, booktitle={Mutations de la culture patrimoniale}, author={Seng, Eva- Maria}, editor={Morice, Jean-René and Sapin, Guy and Vivier, NadineEditors}, year={2016}, pages={61–72} }","apa":"Seng, E.-M. (2016). Patrimoine culturel immatériel: plaidoyer pour une vision globale du patrimione culturel. In J.-R. Morice, G. Sapin, &#38; N. Vivier (Eds.), <i>Mutations de la culture patrimoniale</i> (pp. 61–72). Rennes."},"page":"61-72","_id":"18866","user_id":"21240","department":[{"_id":"443"}],"language":[{"iso":"fre"}],"type":"book_chapter","publication":"Mutations de la culture patrimoniale","editor":[{"first_name":"Jean-René","full_name":"Morice, Jean-René","last_name":"Morice"},{"first_name":"Guy","last_name":"Sapin","full_name":"Sapin, Guy"},{"last_name":"Vivier","full_name":"Vivier, Nadine","first_name":"Nadine"}],"status":"public"},{"date_updated":"2022-01-06T06:53:55Z","date_created":"2020-09-03T11:50:43Z","author":[{"full_name":"Seng, Eva- Maria","id":"499","last_name":"Seng","first_name":"Eva- Maria"}],"title":"Aus Fehlern lernen? Was kann man bei der Vergabe des Titels immaterielles Kulturerbe aus den Erfahrungen mit dem materiellen Kulturerbe ableiten und verbessern?","place":"Berlin","year":"2016","page":"246-250","citation":{"apa":"Seng, E.-M. (2016). Aus Fehlern lernen? Was kann man bei der Vergabe des Titels immaterielles Kulturerbe aus den Erfahrungen mit dem materiellen Kulturerbe ableiten und verbessern? In O. Zimmermann &#38; T. Geißler (Eds.), <i>Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz</i> (pp. 246–250). Berlin.","bibtex":"@inbook{Seng_2016, place={Berlin}, title={Aus Fehlern lernen? Was kann man bei der Vergabe des Titels immaterielles Kulturerbe aus den Erfahrungen mit dem materiellen Kulturerbe ableiten und verbessern?}, booktitle={Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz}, author={Seng, Eva- Maria}, editor={Zimmermann, Olaf and Geißler, TheoEditors}, year={2016}, pages={246–250} }","mla":"Seng, Eva-Maria. “Aus Fehlern lernen? Was kann man bei der Vergabe des Titels immaterielles Kulturerbe aus den Erfahrungen mit dem materiellen Kulturerbe ableiten und verbessern?” <i>Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz</i>, edited by Olaf Zimmermann and Theo Geißler, 2016, pp. 246–50.","short":"E.-M. Seng, in: O. Zimmermann, T. Geißler (Eds.), Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz, Berlin, 2016, pp. 246–250.","chicago":"Seng, Eva- Maria. “Aus Fehlern lernen? Was kann man bei der Vergabe des Titels immaterielles Kulturerbe aus den Erfahrungen mit dem materiellen Kulturerbe ableiten und verbessern?” In <i>Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz</i>, edited by Olaf Zimmermann and Theo Geißler, 246–50. Berlin, 2016.","ieee":"E.-M. Seng, “Aus Fehlern lernen? Was kann man bei der Vergabe des Titels immaterielles Kulturerbe aus den Erfahrungen mit dem materiellen Kulturerbe ableiten und verbessern?,” in <i>Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz</i>, O. Zimmermann and T. Geißler, Eds. Berlin, 2016, pp. 246–250.","ama":"Seng E-M. Aus Fehlern lernen? Was kann man bei der Vergabe des Titels immaterielles Kulturerbe aus den Erfahrungen mit dem materiellen Kulturerbe ableiten und verbessern? In: Zimmermann O, Geißler T, eds. <i>Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz</i>. Berlin; 2016:246-250."},"_id":"18948","department":[{"_id":"443"}],"user_id":"21240","language":[{"iso":"ger"}],"publication":"Altes Zeug: Beiträge zur Diskussion zum nachhaltigen Kulturgutschutz","type":"book_chapter","editor":[{"last_name":"Zimmermann","full_name":"Zimmermann, Olaf","first_name":"Olaf"},{"full_name":"Geißler, Theo","last_name":"Geißler","first_name":"Theo"}],"status":"public"},{"title":"Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension","doi":"10.1109/lcn.2016.11","date_updated":"2022-01-06T06:53:56Z","publisher":"IEEE","author":[{"last_name":"Lass","orcid":"0000-0002-5708-7632","id":"24135","full_name":"Lass, Michael","first_name":"Michael"},{"first_name":"Dominik","full_name":"Leibenger, Dominik","last_name":"Leibenger"},{"first_name":"Christoph","last_name":"Sorge","full_name":"Sorge, Christoph"}],"date_created":"2017-07-25T14:36:16Z","year":"2016","citation":{"apa":"Lass, M., Leibenger, D., &#38; Sorge, C. (2016). Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE. <a href=\"https://doi.org/10.1109/lcn.2016.11\">https://doi.org/10.1109/lcn.2016.11</a>","bibtex":"@inproceedings{Lass_Leibenger_Sorge_2016, title={Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension}, DOI={<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>}, booktitle={Proc. 41st Conference on Local Computer Networks (LCN)}, publisher={IEEE}, author={Lass, Michael and Leibenger, Dominik and Sorge, Christoph}, year={2016} }","mla":"Lass, Michael, et al. “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension.” <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>.","short":"M. Lass, D. Leibenger, C. Sorge, in: Proc. 41st Conference on Local Computer Networks (LCN), IEEE, 2016.","chicago":"Lass, Michael, Dominik Leibenger, and Christoph Sorge. “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension.” In <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/lcn.2016.11\">https://doi.org/10.1109/lcn.2016.11</a>.","ieee":"M. Lass, D. Leibenger, and C. Sorge, “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension,” in <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>, 2016.","ama":"Lass M, Leibenger D, Sorge C. Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In: <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>"},"publication_identifier":{"isbn":["978-1-5090-2054-6"]},"publication_status":"published","keyword":["access control","distributed version control systems","mercurial","peer-to-peer","convergent encryption","confidentiality","authenticity"],"language":[{"iso":"eng"}],"_id":"19","department":[{"_id":"27"},{"_id":"518"}],"user_id":"24135","abstract":[{"text":"Version Control Systems (VCS) are a valuable tool for software development\r\nand document management. Both client/server and distributed (Peer-to-Peer)\r\nmodels exist, with the latter (e.g., Git and Mercurial) becoming\r\nincreasingly popular. Their distributed nature introduces complications,\r\nespecially concerning security: it is hard to control the dissemination of\r\ncontents stored in distributed VCS as they rely on replication of complete\r\nrepositories to any involved user.\r\n\r\nWe overcome this issue by designing and implementing a concept for\r\ncryptography-enforced access control which is transparent to the user. Use\r\nof field-tested schemes (end-to-end encryption, digital signatures) allows\r\nfor strong security, while adoption of convergent encryption and\r\ncontent-defined chunking retains storage efficiency. The concept is\r\nseamlessly integrated into Mercurial---respecting its distributed storage\r\nconcept---to ensure practical usability and compatibility to existing\r\ndeployments.","lang":"eng"}],"status":"public","publication":"Proc. 41st Conference on Local Computer Networks (LCN)","type":"conference"},{"publication":"IEEE Transactions on Software Engineering (TSE), presented at ICSE 2017","type":"journal_article","status":"public","file":[{"access_level":"closed","file_id":"1529","file_name":"190-07755807.pdf","file_size":5225413,"creator":"florida","date_created":"2018-03-21T12:30:31Z","date_updated":"2018-03-21T12:30:31Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"abstract":[{"text":"Today, software components are provided by global markets in the form of services. In order to optimally satisfy service requesters and service providers, adequate techniques for automatic service matching are needed. However, a requester’s requirements may be vague and the information available about a provided service may be incomplete. As a consequence, fuzziness is induced into the matching procedure. The contribution of this paper is the development of a systematic matching procedure that leverages concepts and techniques from fuzzy logic and possibility theory based on our formal distinction between different sources and types of fuzziness in the context of service matching. In contrast to existing methods, our approach is able to deal with imprecision and incompleteness in service specifications and to inform users about the extent of induced fuzziness in order to improve the user’s decision-making. We demonstrate our approach on the example of specifications for service reputation based on ratings given by previous users. Our evaluation based on real service ratings shows the utility and applicability of our approach.","lang":"eng"}],"department":[{"_id":"355"}],"user_id":"15504","_id":"190","project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"name":"SFB 901 - Subprojekt B2","_id":"10"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-21T12:30:31Z","ddc":["040"],"issue":"8","has_accepted_license":"1","page":"739-759","citation":{"apa":"Platenius, M. C., Shaker, A., Becker, M., Hüllermeier, E., &#38; Schäfer, W. (2016). Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic. <i>IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017</i>, (8), 739–759. <a href=\"https://doi.org/10.1109/TSE.2016.2632115\">https://doi.org/10.1109/TSE.2016.2632115</a>","mla":"Platenius, Marie Christin, et al. “Imprecise Matching of Requirements Specifications for Software Services Using Fuzzy Logic.” <i>IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017</i>, no. 8, IEEE, 2016, pp. 739–59, doi:<a href=\"https://doi.org/10.1109/TSE.2016.2632115\">10.1109/TSE.2016.2632115</a>.","short":"M.C. Platenius, A. Shaker, M. Becker, E. Hüllermeier, W. Schäfer, IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017 (2016) 739–759.","bibtex":"@article{Platenius_Shaker_Becker_Hüllermeier_Schäfer_2016, title={Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic}, DOI={<a href=\"https://doi.org/10.1109/TSE.2016.2632115\">10.1109/TSE.2016.2632115</a>}, number={8}, journal={IEEE Transactions on Software Engineering (TSE), presented at ICSE 2017}, publisher={IEEE}, author={Platenius, Marie Christin and Shaker, Ammar and Becker, Matthias and Hüllermeier, Eyke and Schäfer, Wilhelm}, year={2016}, pages={739–759} }","ama":"Platenius MC, Shaker A, Becker M, Hüllermeier E, Schäfer W. Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic. <i>IEEE Transactions on Software Engineering (TSE), presented at ICSE 2017</i>. 2016;(8):739-759. doi:<a href=\"https://doi.org/10.1109/TSE.2016.2632115\">10.1109/TSE.2016.2632115</a>","chicago":"Platenius, Marie Christin, Ammar Shaker, Matthias Becker, Eyke Hüllermeier, and Wilhelm Schäfer. “Imprecise Matching of Requirements Specifications for Software Services Using Fuzzy Logic.” <i>IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017</i>, no. 8 (2016): 739–59. <a href=\"https://doi.org/10.1109/TSE.2016.2632115\">https://doi.org/10.1109/TSE.2016.2632115</a>.","ieee":"M. C. Platenius, A. Shaker, M. Becker, E. Hüllermeier, and W. Schäfer, “Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic,” <i>IEEE Transactions on Software Engineering (TSE), presented at ICSE 2017</i>, no. 8, pp. 739–759, 2016."},"year":"2016","date_created":"2017-10-17T12:41:29Z","author":[{"first_name":"Marie Christin","last_name":"Platenius","full_name":"Platenius, Marie Christin"},{"first_name":"Ammar","full_name":"Shaker, Ammar","last_name":"Shaker"},{"full_name":"Becker, Matthias","last_name":"Becker","first_name":"Matthias"},{"id":"48129","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","first_name":"Eyke"},{"first_name":"Wilhelm","last_name":"Schäfer","full_name":"Schäfer, Wilhelm"}],"date_updated":"2022-01-06T06:53:57Z","publisher":"IEEE","doi":"10.1109/TSE.2016.2632115","title":"Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic"},{"title":"Literaturwissenschaft","publisher":"Fink","date_updated":"2022-01-06T06:53:57Z","author":[{"last_name":"Eke","id":"104","full_name":"Eke, Norbert Otto","first_name":"Norbert Otto"},{"last_name":"Allkemper","full_name":"Allkemper, Alo","first_name":"Alo"}],"date_created":"2020-09-04T10:41:28Z","year":"2016","place":"München","citation":{"chicago":"Eke, Norbert Otto, and Alo Allkemper. <i>Literaturwissenschaft</i>. 5. aktualisierte Auflage. UTB Basics. München: Fink, 2016.","ieee":"N. O. Eke and A. Allkemper, <i>Literaturwissenschaft</i>, 5. aktualisierte Auflage. München: Fink, 2016.","ama":"Eke NO, Allkemper A. <i>Literaturwissenschaft</i>. 5. aktualisierte Auflage. München: Fink; 2016.","apa":"Eke, N. O., &#38; Allkemper, A. (2016). <i>Literaturwissenschaft</i> (5. aktualisierte Auflage). München: Fink.","bibtex":"@book{Eke_Allkemper_2016, place={München}, edition={5. aktualisierte Auflage}, series={UTB Basics}, title={Literaturwissenschaft}, publisher={Fink}, author={Eke, Norbert Otto and Allkemper, Alo}, year={2016}, collection={UTB Basics} }","short":"N.O. Eke, A. Allkemper, Literaturwissenschaft, 5. aktualisierte Auflage, Fink, München, 2016.","mla":"Eke, Norbert Otto, and Alo Allkemper. <i>Literaturwissenschaft</i>. 5. aktualisierte Auflage, Fink, 2016."},"edition":"5. aktualisierte Auflage","language":[{"iso":"ger"}],"_id":"19014","series_title":"UTB Basics","user_id":"14932","department":[{"_id":"465"}],"status":"public","type":"book"},{"language":[{"iso":"ger"}],"_id":"19058","department":[{"_id":"465"}],"user_id":"14932","series_title":"FVF Jahrbuch","editor":[{"full_name":"Eke, Norbert Otto","id":"104","last_name":"Eke","first_name":"Norbert Otto"},{"full_name":"Füllner, Bernd","last_name":"Füllner","first_name":"Bernd"}],"status":"public","type":"book_editor","title":"Das Politische und die Politik im Vormärz","publisher":"Aisthesis","date_updated":"2022-01-06T06:53:57Z","volume":2015,"date_created":"2020-09-07T10:51:39Z","place":"Bielefeld","year":"2016","intvolume":"      2015","page":"308","citation":{"apa":"Eke, N. O., &#38; Füllner, B. (Eds.). (2016). <i>Das Politische und die Politik im Vormärz</i> (Vol. 2015). Bielefeld: Aisthesis.","short":"N.O. Eke, B. Füllner, eds., Das Politische und die Politik im Vormärz, Aisthesis, Bielefeld, 2016.","bibtex":"@book{Eke_Füllner_2016, place={Bielefeld}, series={FVF Jahrbuch}, title={Das Politische und die Politik im Vormärz}, volume={2015}, publisher={Aisthesis}, year={2016}, collection={FVF Jahrbuch} }","mla":"Eke, Norbert Otto, and Bernd Füllner, editors. <i>Das Politische und die Politik im Vormärz</i>. Vol. 2015, Aisthesis, 2016.","ama":"Eke NO, Füllner B, eds. <i>Das Politische und die Politik im Vormärz</i>. Vol 2015. Bielefeld: Aisthesis; 2016.","ieee":"N. O. Eke and B. Füllner, Eds., <i>Das Politische und die Politik im Vormärz</i>, vol. 2015. Bielefeld: Aisthesis, 2016.","chicago":"Eke, Norbert Otto, and Bernd Füllner, eds. <i>Das Politische und die Politik im Vormärz</i>. Vol. 2015. FVF Jahrbuch. Bielefeld: Aisthesis, 2016."}},{"citation":{"bibtex":"@inproceedings{Geierhos_Bäumer_2016, place={Cham, Switzerland}, series={Lecture Notes in Computer Science}, title={How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement}, volume={9612}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-41754-7_4\">10.1007/978-3-319-41754-7_4</a>}, booktitle={Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB)}, publisher={Springer}, author={Geierhos, Michaela and Bäumer, Frederik Simon}, editor={Métais, Elisabeth  and Meziane, Farid  and Saraee, Mohamad  and Sugumaran, Vijayan  and Vadera, Sunil Editors}, year={2016}, pages={37–47}, collection={Lecture Notes in Computer Science} }","short":"M. Geierhos, F.S. Bäumer, in: E. Métais, F. Meziane, M. Saraee, V. Sugumaran, S. Vadera (Eds.), Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB), Springer, Cham, Switzerland, 2016, pp. 37–47.","mla":"Geierhos, Michaela, and Frederik Simon Bäumer. “How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement.” <i>Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB)</i>, edited by Elisabeth  Métais et al., vol. 9612, Springer, 2016, pp. 37–47, doi:<a href=\"https://doi.org/10.1007/978-3-319-41754-7_4\">10.1007/978-3-319-41754-7_4</a>.","apa":"Geierhos, M., &#38; Bäumer, F. S. (2016). How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement. In E. Métais, F. Meziane, M. Saraee, V. Sugumaran, &#38; S. Vadera (Eds.), <i>Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB)</i> (Vol. 9612, pp. 37–47). Cham, Switzerland: Springer. <a href=\"https://doi.org/10.1007/978-3-319-41754-7_4\">https://doi.org/10.1007/978-3-319-41754-7_4</a>","ieee":"M. Geierhos and F. S. Bäumer, “How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement,” in <i>Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB)</i>, Salford, UK, 2016, vol. 9612, pp. 37–47.","chicago":"Geierhos, Michaela, and Frederik Simon Bäumer. “How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement.” In <i>Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB)</i>, edited by Elisabeth  Métais, Farid  Meziane, Mohamad  Saraee, Vijayan  Sugumaran, and Sunil  Vadera, 9612:37–47. Lecture Notes in Computer Science. Cham, Switzerland: Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-41754-7_4\">https://doi.org/10.1007/978-3-319-41754-7_4</a>.","ama":"Geierhos M, Bäumer FS. How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement. In: Métais E, Meziane F, Saraee M, Sugumaran V, Vadera S, eds. <i>Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB)</i>. Vol 9612. Lecture Notes in Computer Science. Cham, Switzerland: Springer; 2016:37-47. doi:<a href=\"https://doi.org/10.1007/978-3-319-41754-7_4\">10.1007/978-3-319-41754-7_4</a>"},"intvolume":"      9612","page":"37-47","place":"Cham, Switzerland","publication_status":"published","has_accepted_license":"1","publication_identifier":{"isbn":["978-3-319-41753-0"],"eisbn":["978-3-319-41754-7"]},"doi":"10.1007/978-3-319-41754-7_4","conference":{"location":"Salford, UK","end_date":"2016-06-24","start_date":"2016-06-22","name":"21st International Conference on Applications of Natural Language to Information Systems (NLDB 2016)"},"author":[{"full_name":"Geierhos, Michaela","id":"42496","orcid":"0000-0002-8180-5606","last_name":"Geierhos","first_name":"Michaela"},{"full_name":"Bäumer, Frederik Simon","id":"38837","last_name":"Bäumer","first_name":"Frederik Simon"}],"volume":9612,"date_updated":"2022-01-06T06:53:58Z","status":"public","editor":[{"full_name":"Métais, Elisabeth ","last_name":"Métais","first_name":"Elisabeth "},{"first_name":"Farid ","full_name":"Meziane, Farid ","last_name":"Meziane"},{"last_name":"Saraee","full_name":"Saraee, Mohamad ","first_name":"Mohamad "},{"first_name":"Vijayan ","last_name":"Sugumaran","full_name":"Sugumaran, Vijayan "},{"first_name":"Sunil ","full_name":"Vadera, Sunil ","last_name":"Vadera"}],"type":"conference","file_date_updated":"2018-03-21T12:29:37Z","series_title":"Lecture Notes in Computer Science","user_id":"477","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"9","name":"SFB 901 - Subproject B1"}],"_id":"191","year":"2016","quality_controlled":"1","title":"How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement","date_created":"2017-10-17T12:41:29Z","publisher":"Springer","file":[{"access_level":"closed","file_id":"1528","file_name":"191-chp_3A10.1007_2F978-3-319-41754-7_4.pdf","file_size":1499075,"date_created":"2018-03-21T12:29:37Z","creator":"florida","date_updated":"2018-03-21T12:29:37Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"One purpose of requirement refinement is that higher-level requirements have to be translated to something usable by developers. Since customer requirements are often written in natural language by end users, they lack precision, completeness and consistency. Although user stories are often used in the requirement elicitation process in order to describe the possibilities how to interact with the software, there is always something unspoken. Here, we present techniques how to automatically refine vague software descriptions. Thus, we can bridge the gap by first revising natural language utterances from higher-level to more detailed customer requirements, before functionality matters. We therefore focus on the resolution of semantically incomplete user-generated sentences (i.e. non-instantiated arguments of predicates) and provide ontology-based gap-filling suggestions how to complete unverbalized information in the user’s demand."}],"publication":"Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB)","language":[{"iso":"eng"}],"ddc":["040"],"keyword":["Requirement refinement","Concept expansion","Ontology-based instantiation of predicate-argument structure"]},{"department":[{"_id":"280"},{"_id":"475"}],"user_id":"42447","_id":"1919","publication":"Journal of Public Economic Theory","type":"journal_article","status":"public","abstract":[{"lang":"eng","text":"We study a game between a network designer, who uses costly links to connect nodes in a network, and a network disruptor who tries to disrupt the resulting network as much as possible by deleting either nodes or links. For low linking costs networks with all nodes in symmetric positions are a best response of the designer under both link deletion and node deletion. For high linking costs the designer builds a star network under link deletion, but for node deletion excludes some nodes from the network to build a smaller but stronger network. For intermediate linking costs the designer again builds a symmetric network under node deletion but a star‐like network with weak spots under link deletion."}],"volume":18,"date_created":"2018-03-28T11:30:44Z","author":[{"id":"42447","full_name":"Hoyer, Britta","last_name":"Hoyer","first_name":"Britta"},{"last_name":"De Jaegher","full_name":"De Jaegher, Kris","first_name":"Kris"}],"publisher":"Wiley-Blackwell","date_updated":"2022-01-06T06:53:59Z","doi":"10.1111/jpet.12168","title":"Strategic Network Disruption and Defense","issue":"5","publication_identifier":{"issn":["1097-3923"]},"publication_status":"published","page":"802-830","intvolume":"        18","citation":{"chicago":"Hoyer, Britta, and Kris De Jaegher. “Strategic Network Disruption and Defense.” <i>Journal of Public Economic Theory</i> 18, no. 5 (2016): 802–30. <a href=\"https://doi.org/10.1111/jpet.12168\">https://doi.org/10.1111/jpet.12168</a>.","ieee":"B. Hoyer and K. De Jaegher, “Strategic Network Disruption and Defense,” <i>Journal of Public Economic Theory</i>, vol. 18, no. 5, pp. 802–830, 2016.","ama":"Hoyer B, De Jaegher K. Strategic Network Disruption and Defense. <i>Journal of Public Economic Theory</i>. 2016;18(5):802-830. doi:<a href=\"https://doi.org/10.1111/jpet.12168\">10.1111/jpet.12168</a>","mla":"Hoyer, Britta, and Kris De Jaegher. “Strategic Network Disruption and Defense.” <i>Journal of Public Economic Theory</i>, vol. 18, no. 5, Wiley-Blackwell, 2016, pp. 802–30, doi:<a href=\"https://doi.org/10.1111/jpet.12168\">10.1111/jpet.12168</a>.","short":"B. Hoyer, K. De Jaegher, Journal of Public Economic Theory 18 (2016) 802–830.","bibtex":"@article{Hoyer_De Jaegher_2016, title={Strategic Network Disruption and Defense}, volume={18}, DOI={<a href=\"https://doi.org/10.1111/jpet.12168\">10.1111/jpet.12168</a>}, number={5}, journal={Journal of Public Economic Theory}, publisher={Wiley-Blackwell}, author={Hoyer, Britta and De Jaegher, Kris}, year={2016}, pages={802–830} }","apa":"Hoyer, B., &#38; De Jaegher, K. (2016). Strategic Network Disruption and Defense. <i>Journal of Public Economic Theory</i>, <i>18</i>(5), 802–830. <a href=\"https://doi.org/10.1111/jpet.12168\">https://doi.org/10.1111/jpet.12168</a>"},"year":"2016"},{"title":"Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling","author":[{"last_name":"Reckhorn","full_name":"Reckhorn, Lena","first_name":"Lena"}],"date_created":"2017-10-17T12:41:29Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:54:00Z","citation":{"bibtex":"@book{Reckhorn_2016, title={Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling}, publisher={Universität Paderborn}, author={Reckhorn, Lena}, year={2016} }","mla":"Reckhorn, Lena. <i>Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling</i>. Universität Paderborn, 2016.","short":"L. Reckhorn, Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling, Universität Paderborn, 2016.","apa":"Reckhorn, L. (2016). <i>Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling</i>. Universität Paderborn.","ieee":"L. Reckhorn, <i>Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling</i>. Universität Paderborn, 2016.","chicago":"Reckhorn, Lena. <i>Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling</i>. Universität Paderborn, 2016.","ama":"Reckhorn L. <i>Herausforderungen im Umgang mit unvollständigen Softwareanforderungen durch Semantic Role Labeling</i>. Universität Paderborn; 2016."},"year":"2016","language":[{"iso":"ger"}],"user_id":"477","_id":"192","project":[{"name":"SFB 901","_id":"1"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"name":"SFB 901 - Project Area B","_id":"3"}],"status":"public","type":"bachelorsthesis"},{"type":"journal_article","publication":"Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans. Hg. von Nadine J. Schmidt und Kalina Kupczyńska","status":"public","_id":"19202","user_id":"14932","department":[{"_id":"465"}],"language":[{"iso":"ger"}],"year":"2016","citation":{"apa":"Eke, N. O. (2016). ‚Reden‘ über Dichtung. Poetik-Vorlesungen und Poetik-Dozenturen im literarischen Feld. <i>Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans. Hg. von Nadine J. Schmidt und Kalina Kupczyńska</i>, 18–29.","short":"N.O. Eke, Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans. Hg. von Nadine J. Schmidt und Kalina Kupczyńska (2016) 18–29.","bibtex":"@article{Eke_2016, title={‚Reden‘ über Dichtung. Poetik-Vorlesungen und Poetik-Dozenturen im literarischen Feld}, journal={Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans. Hg. von Nadine J. Schmidt und Kalina Kupczyńska}, publisher={edition text &#38; kritik, München}, author={Eke, Norbert Otto}, year={2016}, pages={18–29} }","mla":"Eke, Norbert Otto. “‚Reden‘ über Dichtung. Poetik-Vorlesungen und Poetik-Dozenturen im literarischen Feld.” <i>Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans. Hg. von Nadine J. Schmidt und Kalina Kupczyńska</i>, edition text &#38; kritik, München, 2016, pp. 18–29.","chicago":"Eke, Norbert Otto. “‚Reden‘ über Dichtung. Poetik-Vorlesungen und Poetik-Dozenturen im literarischen Feld.” <i>Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans. Hg. von Nadine J. Schmidt und Kalina Kupczyńska</i>, 2016, 18–29.","ieee":"N. O. Eke, “‚Reden‘ über Dichtung. Poetik-Vorlesungen und Poetik-Dozenturen im literarischen Feld,” <i>Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans. Hg. von Nadine J. Schmidt und Kalina Kupczyńska</i>, pp. 18–29, 2016.","ama":"Eke NO. ‚Reden‘ über Dichtung. Poetik-Vorlesungen und Poetik-Dozenturen im literarischen Feld. <i>Text + Kritik X/16, Sonderband: Poetik des Gegenwartsromans Hg von Nadine J Schmidt und Kalina Kupczyńska</i>. 2016:18-29."},"page":"18-29","date_updated":"2022-01-06T06:54:00Z","publisher":"edition text & kritik, München","author":[{"full_name":"Eke, Norbert Otto","id":"104","last_name":"Eke","first_name":"Norbert Otto"}],"date_created":"2020-09-09T10:52:36Z","title":"‚Reden‘ über Dichtung. Poetik-Vorlesungen und Poetik-Dozenturen im literarischen Feld"},{"title":"„Um so etwas bekümmre ich mich nicht“. Grabbe und die Moral","date_updated":"2022-01-06T06:54:00Z","author":[{"first_name":"Norbert Otto","last_name":"Eke","id":"104","full_name":"Eke, Norbert Otto"}],"date_created":"2020-09-09T11:48:45Z","year":"2016","citation":{"chicago":"Eke, Norbert Otto. “„Um so etwas bekümmre ich mich nicht“. Grabbe und die Moral.” <i>Text + Kritik IX/16</i>, no. H. 212 (2016): 5–17.","ieee":"N. O. Eke, “„Um so etwas bekümmre ich mich nicht“. Grabbe und die Moral,” <i>Text + Kritik IX/16</i>, no. H. 212, pp. 5–17, 2016.","ama":"Eke NO. „Um so etwas bekümmre ich mich nicht“. Grabbe und die Moral. <i>Text + Kritik IX/16</i>. 2016;(H. 212):5-17.","apa":"Eke, N. O. (2016). „Um so etwas bekümmre ich mich nicht“. Grabbe und die Moral. <i>Text + Kritik IX/16</i>, (H. 212), 5–17.","short":"N.O. Eke, Text + Kritik IX/16 (2016) 5–17.","bibtex":"@article{Eke_2016, title={„Um so etwas bekümmre ich mich nicht“. Grabbe und die Moral}, number={H. 212}, journal={Text + Kritik IX/16}, author={Eke, Norbert Otto}, year={2016}, pages={5–17} }","mla":"Eke, Norbert Otto. “„Um so etwas bekümmre ich mich nicht“. Grabbe und die Moral.” <i>Text + Kritik IX/16</i>, no. H. 212, 2016, pp. 5–17."},"page":"5-17","issue":"H. 212","language":[{"iso":"ger"}],"_id":"19205","user_id":"14932","department":[{"_id":"465"}],"status":"public","type":"journal_article","publication":"Text + Kritik IX/16"},{"doi":"10.1103/physrevb.94.165310","title":"All-optical tailoring of single-photon spectra in a quantum-dot microcavity system","date_created":"2020-09-09T13:56:53Z","author":[{"first_name":"D.","full_name":"Breddermann, D.","last_name":"Breddermann"},{"last_name":"Heinze","id":"10904","full_name":"Heinze, Dirk Florian","first_name":"Dirk Florian"},{"full_name":"Binder, R.","last_name":"Binder","first_name":"R."},{"first_name":"Artur","orcid":"0000-0002-5190-0944","last_name":"Zrenner","full_name":"Zrenner, Artur","id":"606"},{"first_name":"Stefan","orcid":"0000-0003-4042-4951","last_name":"Schumacher","full_name":"Schumacher, Stefan","id":"27271"}],"date_updated":"2022-01-06T06:54:00Z","citation":{"ama":"Breddermann D, Heinze DF, Binder R, Zrenner A, Schumacher S. All-optical tailoring of single-photon spectra in a quantum-dot microcavity system. <i>Physical Review B</i>. 2016. doi:<a href=\"https://doi.org/10.1103/physrevb.94.165310\">10.1103/physrevb.94.165310</a>","ieee":"D. Breddermann, D. F. Heinze, R. Binder, A. Zrenner, and S. Schumacher, “All-optical tailoring of single-photon spectra in a quantum-dot microcavity system,” <i>Physical Review B</i>, 2016.","chicago":"Breddermann, D., Dirk Florian Heinze, R. Binder, Artur Zrenner, and Stefan Schumacher. “All-Optical Tailoring of Single-Photon Spectra in a Quantum-Dot Microcavity System.” <i>Physical Review B</i>, 2016. <a href=\"https://doi.org/10.1103/physrevb.94.165310\">https://doi.org/10.1103/physrevb.94.165310</a>.","bibtex":"@article{Breddermann_Heinze_Binder_Zrenner_Schumacher_2016, title={All-optical tailoring of single-photon spectra in a quantum-dot microcavity system}, DOI={<a href=\"https://doi.org/10.1103/physrevb.94.165310\">10.1103/physrevb.94.165310</a>}, journal={Physical Review B}, author={Breddermann, D. and Heinze, Dirk Florian and Binder, R. and Zrenner, Artur and Schumacher, Stefan}, year={2016} }","mla":"Breddermann, D., et al. “All-Optical Tailoring of Single-Photon Spectra in a Quantum-Dot Microcavity System.” <i>Physical Review B</i>, 2016, doi:<a href=\"https://doi.org/10.1103/physrevb.94.165310\">10.1103/physrevb.94.165310</a>.","short":"D. Breddermann, D.F. Heinze, R. Binder, A. Zrenner, S. Schumacher, Physical Review B (2016).","apa":"Breddermann, D., Heinze, D. F., Binder, R., Zrenner, A., &#38; Schumacher, S. (2016). All-optical tailoring of single-photon spectra in a quantum-dot microcavity system. <i>Physical Review B</i>. <a href=\"https://doi.org/10.1103/physrevb.94.165310\">https://doi.org/10.1103/physrevb.94.165310</a>"},"year":"2016","publication_identifier":{"issn":["2469-9950","2469-9969"]},"publication_status":"published","language":[{"iso":"eng"}],"user_id":"10904","_id":"19210","status":"public","publication":"Physical Review B","type":"journal_article"},{"type":"journal_article","publication":"Journal of Theoretical Biology","abstract":[{"lang":"eng","text":"We construct two-player two-strategy game-theoretic models of by-product mutualism, where our focus lies on the way in which the probability of cooperation among players is affected by the degree of adversity facing the players. In our first model, cooperation consists of the production of a public good, and adversity is linked to the degree of complementarity of the players׳ efforts in producing the public good. In our second model, cooperation consists of the defense of a public, and/or a private good with by-product benefits, and adversity is measured by the number of random attacks (e.g., by a predator) facing the players. In both of these models, our analysis confirms the existence of the so-called boomerang effect, which states that in a harsh environment, the individual player has few incentives to unilaterally defect in a situation of joint cooperation. Focusing on such an effect in isolation leads to the \"common-enemy\" hypothesis that a larger degree of adversity increases the probability of cooperation. Yet, we also find that a sucker effect may simultaneously exist, which says that in a harsh environment, the individual player has few incentives to unilaterally cooperate in a situation of joint defection. Looked at in isolation, the sucker effect leads to the competing hypothesis that a larger degree of adversity decreases the probability of cooperation. Our analysis predicts circumstances in which the \"common enemy\" hypothesis prevails, and circumstances in which the competing hypothesis prevails."}],"status":"public","_id":"1922","user_id":"42447","department":[{"_id":"280"},{"_id":"475"}],"publication_status":"published","publication_identifier":{"issn":["0022-5193"]},"year":"2016","citation":{"mla":"De Jaegher, Kris, and Britta Hoyer. “By-Product Mutualism and the Ambiguous Effects of Harsher Environments – A Game-Theoretic Model.” <i>Journal of Theoretical Biology</i>, vol. 393, Elsevier BV, 2016, pp. 82–97, doi:<a href=\"https://doi.org/10.1016/j.jtbi.2015.12.034\">10.1016/j.jtbi.2015.12.034</a>.","bibtex":"@article{De Jaegher_Hoyer_2016, title={By-product mutualism and the ambiguous effects of harsher environments – A game-theoretic model}, volume={393}, DOI={<a href=\"https://doi.org/10.1016/j.jtbi.2015.12.034\">10.1016/j.jtbi.2015.12.034</a>}, journal={Journal of Theoretical Biology}, publisher={Elsevier BV}, author={De Jaegher, Kris and Hoyer, Britta}, year={2016}, pages={82–97} }","short":"K. De Jaegher, B. Hoyer, Journal of Theoretical Biology 393 (2016) 82–97.","apa":"De Jaegher, K., &#38; Hoyer, B. (2016). By-product mutualism and the ambiguous effects of harsher environments – A game-theoretic model. <i>Journal of Theoretical Biology</i>, <i>393</i>, 82–97. <a href=\"https://doi.org/10.1016/j.jtbi.2015.12.034\">https://doi.org/10.1016/j.jtbi.2015.12.034</a>","chicago":"De Jaegher, Kris, and Britta Hoyer. “By-Product Mutualism and the Ambiguous Effects of Harsher Environments – A Game-Theoretic Model.” <i>Journal of Theoretical Biology</i> 393 (2016): 82–97. <a href=\"https://doi.org/10.1016/j.jtbi.2015.12.034\">https://doi.org/10.1016/j.jtbi.2015.12.034</a>.","ieee":"K. De Jaegher and B. Hoyer, “By-product mutualism and the ambiguous effects of harsher environments – A game-theoretic model,” <i>Journal of Theoretical Biology</i>, vol. 393, pp. 82–97, 2016.","ama":"De Jaegher K, Hoyer B. By-product mutualism and the ambiguous effects of harsher environments – A game-theoretic model. <i>Journal of Theoretical Biology</i>. 2016;393:82-97. doi:<a href=\"https://doi.org/10.1016/j.jtbi.2015.12.034\">10.1016/j.jtbi.2015.12.034</a>"},"page":"82-97","intvolume":"       393","publisher":"Elsevier BV","date_updated":"2022-01-06T06:54:00Z","date_created":"2018-03-28T11:39:28Z","author":[{"full_name":"De Jaegher, Kris","last_name":"De Jaegher","first_name":"Kris"},{"id":"42447","full_name":"Hoyer, Britta","last_name":"Hoyer","first_name":"Britta"}],"volume":393,"title":"By-product mutualism and the ambiguous effects of harsher environments – A game-theoretic model","doi":"10.1016/j.jtbi.2015.12.034"}]
