[{"status":"public","file":[{"date_updated":"2018-03-21T12:50:29Z","date_created":"2018-03-21T12:50:29Z","creator":"florida","file_size":753147,"file_name":"157-chp_3A10.1007_2F978-3-319-48749-6_41.pdf","file_id":"1549","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"lang":"eng","text":"Consider a scheduling problem in which a set of jobs with interjob communication, canonically represented by a weighted tree, needs to be scheduled on m parallel processors interconnected by a shared communication channel. In each time step, we may allow any processed job to use a certain capacity of the channel in order to satisfy (parts of) its communication demands to adjacent jobs processed in parallel. The goal is to find a schedule that minimizes the makespan and in which communication demands of all jobs are satisfied.We show that this problem is NP-hard in the strong sense even if the number of processors and the maximum degree of the underlying tree is constant.Consequently, we design and analyze simple approximation algorithms with asymptotic approximation ratio 2-2/m in case of paths and a ratio of 5/2 in case of arbitrary trees."}],"publication":"Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)","type":"conference","file_date_updated":"2018-03-21T12:50:29Z","ddc":["040"],"department":[{"_id":"63"}],"user_id":"15504","series_title":"LNCS","_id":"157","project":[{"name":"SFB 901","_id":"1"},{"_id":"16","name":"SFB 901 - Subprojekt C4"},{"_id":"4","name":"SFB 901 - Project Area C"}],"page":"563--577","citation":{"bibtex":"@inproceedings{König_Mäcker_Meyer auf der Heide_Riechers_2016, series={LNCS}, title={Scheduling with Interjob Communication on Parallel Processors}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-48749-6_41\">10.1007/978-3-319-48749-6_41</a>}, booktitle={Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)}, author={König, Jürgen and Mäcker, Alexander and Meyer auf der Heide, Friedhelm and Riechers, Sören}, year={2016}, pages={563--577}, collection={LNCS} }","mla":"König, Jürgen, et al. “Scheduling with Interjob Communication on Parallel Processors.” <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 2016, pp. 563--577, doi:<a href=\"https://doi.org/10.1007/978-3-319-48749-6_41\">10.1007/978-3-319-48749-6_41</a>.","short":"J. König, A. Mäcker, F. Meyer auf der Heide, S. Riechers, in: Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 563--577.","apa":"König, J., Mäcker, A., Meyer auf der Heide, F., &#38; Riechers, S. (2016). Scheduling with Interjob Communication on Parallel Processors. In <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i> (pp. 563--577). <a href=\"https://doi.org/10.1007/978-3-319-48749-6_41\">https://doi.org/10.1007/978-3-319-48749-6_41</a>","chicago":"König, Jürgen, Alexander Mäcker, Friedhelm Meyer auf der Heide, and Sören Riechers. “Scheduling with Interjob Communication on Parallel Processors.” In <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 563--577. LNCS, 2016. <a href=\"https://doi.org/10.1007/978-3-319-48749-6_41\">https://doi.org/10.1007/978-3-319-48749-6_41</a>.","ieee":"J. König, A. Mäcker, F. Meyer auf der Heide, and S. Riechers, “Scheduling with Interjob Communication on Parallel Processors,” in <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 2016, pp. 563--577.","ama":"König J, Mäcker A, Meyer auf der Heide F, Riechers S. Scheduling with Interjob Communication on Parallel Processors. In: <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>. LNCS. ; 2016:563--577. doi:<a href=\"https://doi.org/10.1007/978-3-319-48749-6_41\">10.1007/978-3-319-48749-6_41</a>"},"year":"2016","has_accepted_license":"1","doi":"10.1007/978-3-319-48749-6_41","title":"Scheduling with Interjob Communication on Parallel Processors","date_created":"2017-10-17T12:41:22Z","author":[{"first_name":"Jürgen","full_name":"König, Jürgen","last_name":"König"},{"last_name":"Mäcker","full_name":"Mäcker, Alexander","id":"13536","first_name":"Alexander"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523"},{"first_name":"Sören","last_name":"Riechers","full_name":"Riechers, Sören"}],"date_updated":"2022-01-06T06:52:32Z"},{"status":"public","type":"journal_article","publication":"Physical Review B","language":[{"iso":"eng"}],"user_id":"71051","_id":"15731","citation":{"ama":"Thonig D, Rauch T, Mirhosseini H, et al. Existence of topological nontrivial surface states in strained transition metals: W, Ta, Mo, and Nb. <i>Physical Review B</i>. 2016. doi:<a href=\"https://doi.org/10.1103/physrevb.94.155132\">10.1103/physrevb.94.155132</a>","chicago":"Thonig, Danny, Tomáš Rauch, Hossein Mirhosseini, Jürgen Henk, Ingrid Mertig, Henry Wortelen, Bernd Engelkamp, Anke B. Schmidt, and Markus Donath. “Existence of Topological Nontrivial Surface States in Strained Transition Metals: W, Ta, Mo, and Nb.” <i>Physical Review B</i>, 2016. <a href=\"https://doi.org/10.1103/physrevb.94.155132\">https://doi.org/10.1103/physrevb.94.155132</a>.","ieee":"D. Thonig <i>et al.</i>, “Existence of topological nontrivial surface states in strained transition metals: W, Ta, Mo, and Nb,” <i>Physical Review B</i>, 2016.","bibtex":"@article{Thonig_Rauch_Mirhosseini_Henk_Mertig_Wortelen_Engelkamp_Schmidt_Donath_2016, title={Existence of topological nontrivial surface states in strained transition metals: W, Ta, Mo, and Nb}, DOI={<a href=\"https://doi.org/10.1103/physrevb.94.155132\">10.1103/physrevb.94.155132</a>}, journal={Physical Review B}, author={Thonig, Danny and Rauch, Tomáš and Mirhosseini, Hossein and Henk, Jürgen and Mertig, Ingrid and Wortelen, Henry and Engelkamp, Bernd and Schmidt, Anke B. and Donath, Markus}, year={2016} }","short":"D. Thonig, T. Rauch, H. Mirhosseini, J. Henk, I. Mertig, H. Wortelen, B. Engelkamp, A.B. Schmidt, M. Donath, Physical Review B (2016).","mla":"Thonig, Danny, et al. “Existence of Topological Nontrivial Surface States in Strained Transition Metals: W, Ta, Mo, and Nb.” <i>Physical Review B</i>, 2016, doi:<a href=\"https://doi.org/10.1103/physrevb.94.155132\">10.1103/physrevb.94.155132</a>.","apa":"Thonig, D., Rauch, T., Mirhosseini, H., Henk, J., Mertig, I., Wortelen, H., … Donath, M. (2016). Existence of topological nontrivial surface states in strained transition metals: W, Ta, Mo, and Nb. <i>Physical Review B</i>. <a href=\"https://doi.org/10.1103/physrevb.94.155132\">https://doi.org/10.1103/physrevb.94.155132</a>"},"year":"2016","publication_status":"published","publication_identifier":{"issn":["2469-9950","2469-9969"]},"doi":"10.1103/physrevb.94.155132","title":"Existence of topological nontrivial surface states in strained transition metals: W, Ta, Mo, and Nb","date_created":"2020-01-30T13:09:05Z","author":[{"full_name":"Thonig, Danny","last_name":"Thonig","first_name":"Danny"},{"last_name":"Rauch","full_name":"Rauch, Tomáš","first_name":"Tomáš"},{"id":"71051","full_name":"Mirhosseini, Hossein","last_name":"Mirhosseini","orcid":"https://orcid.org/0000-0001-6179-1545","first_name":"Hossein"},{"first_name":"Jürgen","full_name":"Henk, Jürgen","last_name":"Henk"},{"first_name":"Ingrid","last_name":"Mertig","full_name":"Mertig, Ingrid"},{"first_name":"Henry","last_name":"Wortelen","full_name":"Wortelen, Henry"},{"first_name":"Bernd","last_name":"Engelkamp","full_name":"Engelkamp, Bernd"},{"first_name":"Anke B.","full_name":"Schmidt, Anke B.","last_name":"Schmidt"},{"first_name":"Markus","full_name":"Donath, Markus","last_name":"Donath"}],"date_updated":"2022-01-06T06:52:32Z"},{"author":[{"orcid":"https://orcid.org/0000-0001-6179-1545","last_name":"Mirhosseini","full_name":"Mirhosseini, Hossein","id":"71051","first_name":"Hossein"},{"full_name":"Kiss, Janos","last_name":"Kiss","first_name":"Janos"},{"last_name":"Roma","full_name":"Roma, Guido","first_name":"Guido"},{"first_name":"Claudia","full_name":"Felser, Claudia","last_name":"Felser"}],"date_created":"2020-01-30T13:09:43Z","date_updated":"2022-01-06T06:52:32Z","doi":"10.1016/j.tsf.2016.03.053","title":"Reducing the Schottky barrier height at the MoSe2/Mo(110) interface in thin-film solar cells: Insights from first-principles calculations","publication_identifier":{"issn":["0040-6090"]},"publication_status":"published","page":"143-147","citation":{"short":"H. Mirhosseini, J. Kiss, G. Roma, C. Felser, Thin Solid Films (2016) 143–147.","bibtex":"@article{Mirhosseini_Kiss_Roma_Felser_2016, title={Reducing the Schottky barrier height at the MoSe2/Mo(110) interface in thin-film solar cells: Insights from first-principles calculations}, DOI={<a href=\"https://doi.org/10.1016/j.tsf.2016.03.053\">10.1016/j.tsf.2016.03.053</a>}, journal={Thin Solid Films}, author={Mirhosseini, Hossein and Kiss, Janos and Roma, Guido and Felser, Claudia}, year={2016}, pages={143–147} }","mla":"Mirhosseini, Hossein, et al. “Reducing the Schottky Barrier Height at the MoSe2/Mo(110) Interface in Thin-Film Solar Cells: Insights from First-Principles Calculations.” <i>Thin Solid Films</i>, 2016, pp. 143–47, doi:<a href=\"https://doi.org/10.1016/j.tsf.2016.03.053\">10.1016/j.tsf.2016.03.053</a>.","apa":"Mirhosseini, H., Kiss, J., Roma, G., &#38; Felser, C. (2016). Reducing the Schottky barrier height at the MoSe2/Mo(110) interface in thin-film solar cells: Insights from first-principles calculations. <i>Thin Solid Films</i>, 143–147. <a href=\"https://doi.org/10.1016/j.tsf.2016.03.053\">https://doi.org/10.1016/j.tsf.2016.03.053</a>","chicago":"Mirhosseini, Hossein, Janos Kiss, Guido Roma, and Claudia Felser. “Reducing the Schottky Barrier Height at the MoSe2/Mo(110) Interface in Thin-Film Solar Cells: Insights from First-Principles Calculations.” <i>Thin Solid Films</i>, 2016, 143–47. <a href=\"https://doi.org/10.1016/j.tsf.2016.03.053\">https://doi.org/10.1016/j.tsf.2016.03.053</a>.","ieee":"H. Mirhosseini, J. Kiss, G. Roma, and C. Felser, “Reducing the Schottky barrier height at the MoSe2/Mo(110) interface in thin-film solar cells: Insights from first-principles calculations,” <i>Thin Solid Films</i>, pp. 143–147, 2016.","ama":"Mirhosseini H, Kiss J, Roma G, Felser C. Reducing the Schottky barrier height at the MoSe2/Mo(110) interface in thin-film solar cells: Insights from first-principles calculations. <i>Thin Solid Films</i>. 2016:143-147. doi:<a href=\"https://doi.org/10.1016/j.tsf.2016.03.053\">10.1016/j.tsf.2016.03.053</a>"},"year":"2016","user_id":"71051","_id":"15732","language":[{"iso":"eng"}],"publication":"Thin Solid Films","type":"journal_article","status":"public"},{"user_id":"71051","_id":"15733","language":[{"iso":"eng"}],"extern":"1","article_type":"original","publication":"Physical Review B","type":"journal_article","status":"public","date_created":"2020-01-30T13:09:58Z","author":[{"first_name":"K.","full_name":"Miyamoto, K.","last_name":"Miyamoto"},{"first_name":"H.","full_name":"Wortelen, H.","last_name":"Wortelen"},{"first_name":"Hossein","last_name":"Mirhosseini","orcid":"https://orcid.org/0000-0001-6179-1545","id":"71051","full_name":"Mirhosseini, Hossein"},{"first_name":"T.","full_name":"Okuda, T.","last_name":"Okuda"},{"last_name":"Kimura","full_name":"Kimura, A.","first_name":"A."},{"last_name":"Iwasawa","full_name":"Iwasawa, H.","first_name":"H."},{"first_name":"K.","full_name":"Shimada, K.","last_name":"Shimada"},{"first_name":"J.","last_name":"Henk","full_name":"Henk, J."},{"last_name":"Donath","full_name":"Donath, M.","first_name":"M."}],"date_updated":"2022-01-06T06:52:32Z","doi":"10.1103/physrevb.93.161403","title":"Orbital-symmetry-selective spin characterization of Dirac-cone-like state on W(110)","publication_identifier":{"issn":["2469-9950","2469-9969"]},"publication_status":"published","citation":{"apa":"Miyamoto, K., Wortelen, H., Mirhosseini, H., Okuda, T., Kimura, A., Iwasawa, H., … Donath, M. (2016). Orbital-symmetry-selective spin characterization of Dirac-cone-like state on W(110). <i>Physical Review B</i>. <a href=\"https://doi.org/10.1103/physrevb.93.161403\">https://doi.org/10.1103/physrevb.93.161403</a>","bibtex":"@article{Miyamoto_Wortelen_Mirhosseini_Okuda_Kimura_Iwasawa_Shimada_Henk_Donath_2016, title={Orbital-symmetry-selective spin characterization of Dirac-cone-like state on W(110)}, DOI={<a href=\"https://doi.org/10.1103/physrevb.93.161403\">10.1103/physrevb.93.161403</a>}, journal={Physical Review B}, author={Miyamoto, K. and Wortelen, H. and Mirhosseini, Hossein and Okuda, T. and Kimura, A. and Iwasawa, H. and Shimada, K. and Henk, J. and Donath, M.}, year={2016} }","short":"K. Miyamoto, H. Wortelen, H. Mirhosseini, T. Okuda, A. Kimura, H. Iwasawa, K. Shimada, J. Henk, M. Donath, Physical Review B (2016).","mla":"Miyamoto, K., et al. “Orbital-Symmetry-Selective Spin Characterization of Dirac-Cone-like State on W(110).” <i>Physical Review B</i>, 2016, doi:<a href=\"https://doi.org/10.1103/physrevb.93.161403\">10.1103/physrevb.93.161403</a>.","ama":"Miyamoto K, Wortelen H, Mirhosseini H, et al. Orbital-symmetry-selective spin characterization of Dirac-cone-like state on W(110). <i>Physical Review B</i>. 2016. doi:<a href=\"https://doi.org/10.1103/physrevb.93.161403\">10.1103/physrevb.93.161403</a>","ieee":"K. Miyamoto <i>et al.</i>, “Orbital-symmetry-selective spin characterization of Dirac-cone-like state on W(110),” <i>Physical Review B</i>, 2016.","chicago":"Miyamoto, K., H. Wortelen, Hossein Mirhosseini, T. Okuda, A. Kimura, H. Iwasawa, K. Shimada, J. Henk, and M. Donath. “Orbital-Symmetry-Selective Spin Characterization of Dirac-Cone-like State on W(110).” <i>Physical Review B</i>, 2016. <a href=\"https://doi.org/10.1103/physrevb.93.161403\">https://doi.org/10.1103/physrevb.93.161403</a>."},"year":"2016"},{"title":"Insights into Intrinsic Defects and the Incorporation of Na and K in the Cu2ZnSnSe4 Thin-Film Solar Cell Material from Hybrid-Functional Calculations","doi":"10.1021/acs.jpcc.5b11022","date_updated":"2022-01-06T06:52:32Z","date_created":"2020-01-30T13:10:14Z","author":[{"full_name":"Ghorbani, Elaheh","last_name":"Ghorbani","first_name":"Elaheh"},{"full_name":"Kiss, Janos","last_name":"Kiss","first_name":"Janos"},{"last_name":"Mirhosseini","orcid":"https://orcid.org/0000-0001-6179-1545","full_name":"Mirhosseini, Hossein","id":"71051","first_name":"Hossein"},{"last_name":"Schmidt","full_name":"Schmidt, Markus","first_name":"Markus"},{"first_name":"Johannes","full_name":"Windeln, Johannes","last_name":"Windeln"},{"last_name":"Kühne","id":"49079","full_name":"Kühne, Thomas","first_name":"Thomas"},{"first_name":"Claudia","last_name":"Felser","full_name":"Felser, Claudia"}],"year":"2016","page":"2064-2069","citation":{"chicago":"Ghorbani, Elaheh, Janos Kiss, Hossein Mirhosseini, Markus Schmidt, Johannes Windeln, Thomas Kühne, and Claudia Felser. “Insights into Intrinsic Defects and the Incorporation of Na and K in the Cu2ZnSnSe4 Thin-Film Solar Cell Material from Hybrid-Functional Calculations.” <i>The Journal of Physical Chemistry C</i>, 2016, 2064–69. <a href=\"https://doi.org/10.1021/acs.jpcc.5b11022\">https://doi.org/10.1021/acs.jpcc.5b11022</a>.","ieee":"E. Ghorbani <i>et al.</i>, “Insights into Intrinsic Defects and the Incorporation of Na and K in the Cu2ZnSnSe4 Thin-Film Solar Cell Material from Hybrid-Functional Calculations,” <i>The Journal of Physical Chemistry C</i>, pp. 2064–2069, 2016.","ama":"Ghorbani E, Kiss J, Mirhosseini H, et al. Insights into Intrinsic Defects and the Incorporation of Na and K in the Cu2ZnSnSe4 Thin-Film Solar Cell Material from Hybrid-Functional Calculations. <i>The Journal of Physical Chemistry C</i>. 2016:2064-2069. doi:<a href=\"https://doi.org/10.1021/acs.jpcc.5b11022\">10.1021/acs.jpcc.5b11022</a>","short":"E. Ghorbani, J. Kiss, H. Mirhosseini, M. Schmidt, J. Windeln, T. Kühne, C. Felser, The Journal of Physical Chemistry C (2016) 2064–2069.","mla":"Ghorbani, Elaheh, et al. “Insights into Intrinsic Defects and the Incorporation of Na and K in the Cu2ZnSnSe4 Thin-Film Solar Cell Material from Hybrid-Functional Calculations.” <i>The Journal of Physical Chemistry C</i>, 2016, pp. 2064–69, doi:<a href=\"https://doi.org/10.1021/acs.jpcc.5b11022\">10.1021/acs.jpcc.5b11022</a>.","bibtex":"@article{Ghorbani_Kiss_Mirhosseini_Schmidt_Windeln_Kühne_Felser_2016, title={Insights into Intrinsic Defects and the Incorporation of Na and K in the Cu2ZnSnSe4 Thin-Film Solar Cell Material from Hybrid-Functional Calculations}, DOI={<a href=\"https://doi.org/10.1021/acs.jpcc.5b11022\">10.1021/acs.jpcc.5b11022</a>}, journal={The Journal of Physical Chemistry C}, author={Ghorbani, Elaheh and Kiss, Janos and Mirhosseini, Hossein and Schmidt, Markus and Windeln, Johannes and Kühne, Thomas and Felser, Claudia}, year={2016}, pages={2064–2069} }","apa":"Ghorbani, E., Kiss, J., Mirhosseini, H., Schmidt, M., Windeln, J., Kühne, T., &#38; Felser, C. (2016). Insights into Intrinsic Defects and the Incorporation of Na and K in the Cu2ZnSnSe4 Thin-Film Solar Cell Material from Hybrid-Functional Calculations. <i>The Journal of Physical Chemistry C</i>, 2064–2069. <a href=\"https://doi.org/10.1021/acs.jpcc.5b11022\">https://doi.org/10.1021/acs.jpcc.5b11022</a>"},"publication_identifier":{"issn":["1932-7447","1932-7455"]},"publication_status":"published","article_type":"original","language":[{"iso":"eng"}],"extern":"1","_id":"15734","user_id":"71692","status":"public","publication":"The Journal of Physical Chemistry C","type":"journal_article"},{"volume":639,"author":[{"first_name":"Frederik Simon","full_name":"Bäumer, Frederik Simon","id":"38837","last_name":"Bäumer"},{"orcid":"0000-0002-8180-5606","last_name":"Geierhos","id":"42496","full_name":"Geierhos, Michaela","first_name":"Michaela"}],"date_updated":"2022-01-06T06:52:34Z","conference":{"end_date":"2016-10-15","location":"Druskininkai, Lithuania","name":"22nd International Conference on Information and Software Technologies (ICIST 2016)","start_date":"2016-10-13"},"doi":"10.1007/978-3-319-46254-7_44","has_accepted_license":"1","publication_identifier":{"eisbn":["978-3-319-46254-7"],"isbn":["978-3-319-46253-0"]},"publication_status":"published","intvolume":"       639","page":"549-558","citation":{"chicago":"Bäumer, Frederik Simon, and Michaela Geierhos. “Running out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions.” In <i>Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST)</i>, edited by Giedre  Dregvaite and Robertas  Damasevicius, 639:549–58. Communications in Computer and Information Science. Cham, Switzerland: Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-46254-7_44\">https://doi.org/10.1007/978-3-319-46254-7_44</a>.","ieee":"F. S. Bäumer and M. Geierhos, “Running out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions,” in <i>Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST)</i>, Druskininkai, Lithuania, 2016, vol. 639, pp. 549–558.","ama":"Bäumer FS, Geierhos M. Running out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions. In: Dregvaite G, Damasevicius R, eds. <i>Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST)</i>. Vol 639. Communications in Computer and Information Science. Cham, Switzerland: Springer; 2016:549-558. doi:<a href=\"https://doi.org/10.1007/978-3-319-46254-7_44\">10.1007/978-3-319-46254-7_44</a>","short":"F.S. Bäumer, M. Geierhos, in: G. Dregvaite, R. Damasevicius (Eds.), Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST), Springer, Cham, Switzerland, 2016, pp. 549–558.","bibtex":"@inproceedings{Bäumer_Geierhos_2016, place={Cham, Switzerland}, series={Communications in Computer and Information Science}, title={Running out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions}, volume={639}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-46254-7_44\">10.1007/978-3-319-46254-7_44</a>}, booktitle={Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST)}, publisher={Springer}, author={Bäumer, Frederik Simon and Geierhos, Michaela}, editor={Dregvaite, Giedre  and Damasevicius, Robertas Editors}, year={2016}, pages={549–558}, collection={Communications in Computer and Information Science} }","mla":"Bäumer, Frederik Simon, and Michaela Geierhos. “Running out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions.” <i>Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST)</i>, edited by Giedre  Dregvaite and Robertas  Damasevicius, vol. 639, Springer, 2016, pp. 549–58, doi:<a href=\"https://doi.org/10.1007/978-3-319-46254-7_44\">10.1007/978-3-319-46254-7_44</a>.","apa":"Bäumer, F. S., &#38; Geierhos, M. (2016). Running out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions. In G. Dregvaite &#38; R. Damasevicius (Eds.), <i>Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST)</i> (Vol. 639, pp. 549–558). Cham, Switzerland: Springer. <a href=\"https://doi.org/10.1007/978-3-319-46254-7_44\">https://doi.org/10.1007/978-3-319-46254-7_44</a>"},"place":"Cham, Switzerland","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"user_id":"477","series_title":"Communications in Computer and Information Science","_id":"158","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"file_date_updated":"2018-03-21T12:49:38Z","type":"conference","status":"public","editor":[{"last_name":"Dregvaite","full_name":"Dregvaite, Giedre ","first_name":"Giedre "},{"full_name":"Damasevicius, Robertas ","last_name":"Damasevicius","first_name":"Robertas "}],"date_created":"2017-10-17T12:41:22Z","publisher":"Springer","title":"Running out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions","quality_controlled":"1","year":"2016","language":[{"iso":"eng"}],"keyword":["Natural language requirements clarification","Syntactically incomplete requirements","Compensatory user stories"],"ddc":["040"],"publication":"Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST)","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"florida","date_created":"2018-03-21T12:49:38Z","date_updated":"2018-03-21T12:49:38Z","file_id":"1548","access_level":"closed","file_name":"158-06390044.pdf","file_size":860232}],"abstract":[{"lang":"eng","text":"While requirements focus on how the user interacts with the system, user stories concentrate on the purpose of software features. But in practice, functional requirements are also described in user stories. For this reason, requirements clarification is needed, especially when they are written in natural language and do not stick to any templates (e.g., \"as an X, I want Y so that Z ...\"). However, there is a lot of implicit knowledge that is not expressed in words. As a result, natural language requirements descriptions may suffer from incompleteness. Existing approaches try to formalize natural language or focus only on entirely missing and not on deficient requirements. In this paper, we therefore present an approach to detect knowledge gaps in user-generated software requirements for interactive requirement clarification: We provide tailored suggestions to the users in order to get more precise descriptions. For this purpose, we identify not fully instantiated predicate argument structures in requirements written in natural language and use context information to realize what was meant by the user."}]},{"publication":"2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","type":"conference","status":"public","_id":"15873","department":[{"_id":"78"}],"user_id":"49051","keyword":["Electromyography","Feature extraction","Delays","Hardware  Pattern recognition","Prosthetics","High definition video"],"language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9781467394062"]},"publication_status":"published","year":"2016","citation":{"bibtex":"@inproceedings{Boschmann_Agne_Witschen_Thombansen_Kraus_Platzner_2016, title={FPGA-based acceleration of high density myoelectric signal processing}, DOI={<a href=\"https://doi.org/10.1109/reconfig.2015.7393312\">10.1109/reconfig.2015.7393312</a>}, booktitle={2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)}, publisher={IEEE}, author={Boschmann, Alexander and Agne, Andreas and Witschen, Linus Matthias and Thombansen, Georg and Kraus, Florian and Platzner, Marco}, year={2016} }","short":"A. Boschmann, A. Agne, L.M. Witschen, G. Thombansen, F. Kraus, M. Platzner, in: 2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig), IEEE, 2016.","mla":"Boschmann, Alexander, et al. “FPGA-Based Acceleration of High Density Myoelectric Signal Processing.” <i>2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/reconfig.2015.7393312\">10.1109/reconfig.2015.7393312</a>.","apa":"Boschmann, A., Agne, A., Witschen, L. M., Thombansen, G., Kraus, F., &#38; Platzner, M. (2016). FPGA-based acceleration of high density myoelectric signal processing. In <i>2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)</i>. Mexiko City, Mexiko: IEEE. <a href=\"https://doi.org/10.1109/reconfig.2015.7393312\">https://doi.org/10.1109/reconfig.2015.7393312</a>","ama":"Boschmann A, Agne A, Witschen LM, Thombansen G, Kraus F, Platzner M. FPGA-based acceleration of high density myoelectric signal processing. In: <i>2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/reconfig.2015.7393312\">10.1109/reconfig.2015.7393312</a>","chicago":"Boschmann, Alexander, Andreas Agne, Linus Matthias Witschen, Georg Thombansen, Florian Kraus, and Marco Platzner. “FPGA-Based Acceleration of High Density Myoelectric Signal Processing.” In <i>2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/reconfig.2015.7393312\">https://doi.org/10.1109/reconfig.2015.7393312</a>.","ieee":"A. Boschmann, A. Agne, L. M. Witschen, G. Thombansen, F. Kraus, and M. Platzner, “FPGA-based acceleration of high density myoelectric signal processing,” in <i>2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)</i>, Mexiko City, Mexiko, 2016."},"date_updated":"2022-01-06T06:52:38Z","publisher":"IEEE","author":[{"first_name":"Alexander","last_name":"Boschmann","full_name":"Boschmann, Alexander"},{"first_name":"Andreas","last_name":"Agne","full_name":"Agne, Andreas"},{"last_name":"Witschen","full_name":"Witschen, Linus Matthias","id":"49051","first_name":"Linus Matthias"},{"last_name":"Thombansen","full_name":"Thombansen, Georg","first_name":"Georg"},{"last_name":"Kraus","full_name":"Kraus, Florian","first_name":"Florian"},{"first_name":"Marco","last_name":"Platzner","full_name":"Platzner, Marco","id":"398"}],"date_created":"2020-02-11T07:48:56Z","title":"FPGA-based acceleration of high density myoelectric signal processing","conference":{"name":"2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","location":"Mexiko City, Mexiko"},"doi":"10.1109/reconfig.2015.7393312"},{"status":"public","publication":"ACM Journal on Emerging Technologies in Computing Systems","type":"journal_article","language":[{"iso":"eng"}],"_id":"15879","user_id":"61186","year":"2016","page":"1-13","citation":{"ama":"Ghasemzadeh Mohammadi H, Gaillardon P-E, Zhang J, Micheli GD, Sanchez E, Reorda MS. A Fault-Tolerant Ripple-Carry Adder with Controllable-Polarity Transistors. <i>ACM Journal on Emerging Technologies in Computing Systems</i>. 2016:1-13. doi:<a href=\"https://doi.org/10.1145/2988234\">10.1145/2988234</a>","chicago":"Ghasemzadeh Mohammadi, Hassan, Pierre-Emmanuel Gaillardon, Jian Zhang, Giovanni De Micheli, Ernesto Sanchez, and Matteo Sonza Reorda. “A Fault-Tolerant Ripple-Carry Adder with Controllable-Polarity Transistors.” <i>ACM Journal on Emerging Technologies in Computing Systems</i>, 2016, 1–13. <a href=\"https://doi.org/10.1145/2988234\">https://doi.org/10.1145/2988234</a>.","ieee":"H. Ghasemzadeh Mohammadi, P.-E. Gaillardon, J. Zhang, G. D. Micheli, E. Sanchez, and M. S. Reorda, “A Fault-Tolerant Ripple-Carry Adder with Controllable-Polarity Transistors,” <i>ACM Journal on Emerging Technologies in Computing Systems</i>, pp. 1–13, 2016.","short":"H. Ghasemzadeh Mohammadi, P.-E. Gaillardon, J. Zhang, G.D. Micheli, E. Sanchez, M.S. Reorda, ACM Journal on Emerging Technologies in Computing Systems (2016) 1–13.","bibtex":"@article{Ghasemzadeh Mohammadi_Gaillardon_Zhang_Micheli_Sanchez_Reorda_2016, title={A Fault-Tolerant Ripple-Carry Adder with Controllable-Polarity Transistors}, DOI={<a href=\"https://doi.org/10.1145/2988234\">10.1145/2988234</a>}, journal={ACM Journal on Emerging Technologies in Computing Systems}, author={Ghasemzadeh Mohammadi, Hassan and Gaillardon, Pierre-Emmanuel and Zhang, Jian and Micheli, Giovanni De and Sanchez, Ernesto and Reorda, Matteo Sonza}, year={2016}, pages={1–13} }","mla":"Ghasemzadeh Mohammadi, Hassan, et al. “A Fault-Tolerant Ripple-Carry Adder with Controllable-Polarity Transistors.” <i>ACM Journal on Emerging Technologies in Computing Systems</i>, 2016, pp. 1–13, doi:<a href=\"https://doi.org/10.1145/2988234\">10.1145/2988234</a>.","apa":"Ghasemzadeh Mohammadi, H., Gaillardon, P.-E., Zhang, J., Micheli, G. D., Sanchez, E., &#38; Reorda, M. S. (2016). A Fault-Tolerant Ripple-Carry Adder with Controllable-Polarity Transistors. <i>ACM Journal on Emerging Technologies in Computing Systems</i>, 1–13. <a href=\"https://doi.org/10.1145/2988234\">https://doi.org/10.1145/2988234</a>"},"publication_identifier":{"issn":["1550-4832"]},"publication_status":"published","title":"A Fault-Tolerant Ripple-Carry Adder with Controllable-Polarity Transistors","doi":"10.1145/2988234","date_updated":"2022-01-06T06:52:39Z","date_created":"2020-02-11T16:03:47Z","author":[{"first_name":"Hassan","last_name":"Ghasemzadeh Mohammadi","id":"61186","full_name":"Ghasemzadeh Mohammadi, Hassan"},{"full_name":"Gaillardon, Pierre-Emmanuel","last_name":"Gaillardon","first_name":"Pierre-Emmanuel"},{"full_name":"Zhang, Jian","last_name":"Zhang","first_name":"Jian"},{"first_name":"Giovanni De","last_name":"Micheli","full_name":"Micheli, Giovanni De"},{"first_name":"Ernesto","last_name":"Sanchez","full_name":"Sanchez, Ernesto"},{"last_name":"Reorda","full_name":"Reorda, Matteo Sonza","first_name":"Matteo Sonza"}]},{"citation":{"bibtex":"@inproceedings{Somorovsky_2016, title={Systematic Fuzzing and Testing of TLS Libraries}, DOI={<a href=\"https://doi.org/10.1145/2976749.2978411\">10.1145/2976749.2978411</a>}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16}, author={Somorovsky, Juraj}, year={2016} }","short":"J. Somorovsky, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16, 2016.","mla":"Somorovsky, Juraj. “Systematic Fuzzing and Testing of TLS Libraries.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16</i>, 2016, doi:<a href=\"https://doi.org/10.1145/2976749.2978411\">10.1145/2976749.2978411</a>.","apa":"Somorovsky, J. (2016). Systematic Fuzzing and Testing of TLS Libraries. In <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16</i>. <a href=\"https://doi.org/10.1145/2976749.2978411\">https://doi.org/10.1145/2976749.2978411</a>","ama":"Somorovsky J. Systematic Fuzzing and Testing of TLS Libraries. In: <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16</i>. ; 2016. doi:<a href=\"https://doi.org/10.1145/2976749.2978411\">10.1145/2976749.2978411</a>","chicago":"Somorovsky, Juraj. “Systematic Fuzzing and Testing of TLS Libraries.” In <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16</i>, 2016. <a href=\"https://doi.org/10.1145/2976749.2978411\">https://doi.org/10.1145/2976749.2978411</a>.","ieee":"J. Somorovsky, “Systematic Fuzzing and Testing of TLS Libraries,” in <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16</i>, 2016."},"year":"2016","publication_status":"published","publication_identifier":{"isbn":["9781450341394"]},"main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2016/10/19/tls-attacker-ccs16.pdf"}],"doi":"10.1145/2976749.2978411","title":"Systematic Fuzzing and Testing of TLS Libraries","date_created":"2020-02-15T09:37:47Z","author":[{"first_name":"Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","full_name":"Somorovsky, Juraj","id":"83504"}],"date_updated":"2022-01-06T06:52:39Z","status":"public","type":"conference","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16","extern":"1","language":[{"iso":"eng"}],"user_id":"83504","_id":"15896"},{"doi":"10.1109/TNET.2015.2468571","title":"Routing Games With Progressive Filling","date_created":"2017-10-17T12:41:23Z","author":[{"first_name":"Tobias","full_name":"Harks, Tobias","last_name":"Harks"},{"first_name":"Martin","full_name":"Höfer, Martin","last_name":"Höfer"},{"last_name":"Schewior","full_name":"Schewior, Kevin","first_name":"Kevin"},{"first_name":"Alexander","last_name":"Skopalik","id":"40384","full_name":"Skopalik, Alexander"}],"date_updated":"2022-01-06T06:52:40Z","publisher":"IEEE","citation":{"bibtex":"@article{Harks_Höfer_Schewior_Skopalik_2016, title={Routing Games With Progressive Filling}, DOI={<a href=\"https://doi.org/10.1109/TNET.2015.2468571\">10.1109/TNET.2015.2468571</a>}, number={4}, journal={IEEE/ACM Transactions on Networking}, publisher={IEEE}, author={Harks, Tobias and Höfer, Martin and Schewior, Kevin and Skopalik, Alexander}, year={2016}, pages={2553–2562} }","short":"T. Harks, M. Höfer, K. Schewior, A. Skopalik, IEEE/ACM Transactions on Networking (2016) 2553–2562.","mla":"Harks, Tobias, et al. “Routing Games With Progressive Filling.” <i>IEEE/ACM Transactions on Networking</i>, no. 4, IEEE, 2016, pp. 2553–62, doi:<a href=\"https://doi.org/10.1109/TNET.2015.2468571\">10.1109/TNET.2015.2468571</a>.","apa":"Harks, T., Höfer, M., Schewior, K., &#38; Skopalik, A. (2016). Routing Games With Progressive Filling. <i>IEEE/ACM Transactions on Networking</i>, (4), 2553–2562. <a href=\"https://doi.org/10.1109/TNET.2015.2468571\">https://doi.org/10.1109/TNET.2015.2468571</a>","ama":"Harks T, Höfer M, Schewior K, Skopalik A. Routing Games With Progressive Filling. <i>IEEE/ACM Transactions on Networking</i>. 2016;(4):2553-2562. doi:<a href=\"https://doi.org/10.1109/TNET.2015.2468571\">10.1109/TNET.2015.2468571</a>","ieee":"T. Harks, M. Höfer, K. Schewior, and A. Skopalik, “Routing Games With Progressive Filling,” <i>IEEE/ACM Transactions on Networking</i>, no. 4, pp. 2553–2562, 2016.","chicago":"Harks, Tobias, Martin Höfer, Kevin Schewior, and Alexander Skopalik. “Routing Games With Progressive Filling.” <i>IEEE/ACM Transactions on Networking</i>, no. 4 (2016): 2553–62. <a href=\"https://doi.org/10.1109/TNET.2015.2468571\">https://doi.org/10.1109/TNET.2015.2468571</a>."},"page":"2553 - 2562","year":"2016","issue":"4","has_accepted_license":"1","file_date_updated":"2018-03-21T12:48:02Z","language":[{"iso":"eng"}],"ddc":["040"],"user_id":"477","department":[{"_id":"63"},{"_id":"541"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"159","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"florida","date_created":"2018-03-21T12:48:02Z","date_updated":"2018-03-21T12:48:02Z","file_name":"159-Harks-Hoefer-Schewior-Skopalik2016.pdf","file_id":"1547","access_level":"closed","file_size":1655309}],"status":"public","abstract":[{"text":"Abstract—Max-min fairness (MMF) is a widely known approachto a fair allocation of bandwidth to each of the usersin a network. This allocation can be computed by uniformlyraising the bandwidths of all users without violating capacityconstraints. We consider an extension of these allocations byraising the bandwidth with arbitrary and not necessarily uniformtime-depending velocities (allocation rates). These allocationsare used in a game-theoretic context for routing choices, whichwe formalize in progressive filling games (PFGs). We present avariety of results for equilibria in PFGs. We show that these gamespossess pure Nash and strong equilibria. While computation ingeneral is NP-hard, there are polynomial-time algorithms forprominent classes of Max-Min-Fair Games (MMFG), includingthe case when all users have the same source-destination pair.We characterize prices of anarchy and stability for pure Nashand strong equilibria in PFGs and MMFGs when players havedifferent or the same source-destination pairs. In addition, weshow that when a designer can adjust allocation rates, it is possibleto design games with optimal strong equilibria. Some initial resultson polynomial-time algorithms in this direction are also derived.","lang":"eng"}],"type":"journal_article","publication":"IEEE/ACM Transactions on Networking"},{"type":"conference","publication":"25th {USENIX} Security Symposium ({USENIX} Security 16)","status":"public","_id":"15907","user_id":"83504","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["978-1-931971-32-4"]},"year":"2016","place":"Austin, TX","citation":{"chicago":"Aviram, Nimrod, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, et al. “DROWN: Breaking TLS Using SSLv2.” In <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i>, 689–706. Austin, TX: {USENIX} Association, 2016.","ieee":"N. Aviram <i>et al.</i>, “DROWN: Breaking TLS Using SSLv2,” in <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i>, 2016, pp. 689–706.","ama":"Aviram N, Schinzel S, Somorovsky J, et al. DROWN: Breaking TLS Using SSLv2. In: <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i>. Austin, TX: {USENIX} Association; 2016:689-706.","mla":"Aviram, Nimrod, et al. “DROWN: Breaking TLS Using SSLv2.” <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i>, {USENIX} Association, 2016, pp. 689–706.","short":"N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni, E. Käsper, S. Cohney, S. Engels, C. Paar, Y. Shavitt, in: 25th {USENIX} Security Symposium ({USENIX} Security 16), {USENIX} Association, Austin, TX, 2016, pp. 689–706.","bibtex":"@inproceedings{Aviram_Schinzel_Somorovsky_Heninger_Dankel_Steube_Valenta_Adrian_Halderman_Dukhovni_et al._2016, place={Austin, TX}, title={DROWN: Breaking TLS Using SSLv2}, booktitle={25th {USENIX} Security Symposium ({USENIX} Security 16)}, publisher={{USENIX} Association}, author={Aviram, Nimrod and Schinzel, Sebastian and Somorovsky, Juraj and Heninger, Nadia and Dankel, Maik and Steube, Jens and Valenta, Luke and Adrian, David and Halderman, J. Alex and Dukhovni, Viktor and et al.}, year={2016}, pages={689–706} }","apa":"Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., … Shavitt, Y. (2016). DROWN: Breaking TLS Using SSLv2. In <i>25th {USENIX} Security Symposium ({USENIX} Security 16)</i> (pp. 689–706). Austin, TX: {USENIX} Association."},"page":"689-706","oa":"1","date_updated":"2022-01-06T06:52:40Z","publisher":"{USENIX} Association","date_created":"2020-02-15T09:50:14Z","author":[{"first_name":"Nimrod","full_name":"Aviram, Nimrod","last_name":"Aviram"},{"last_name":"Schinzel","full_name":"Schinzel, Sebastian","first_name":"Sebastian"},{"first_name":"Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","id":"83504","full_name":"Somorovsky, Juraj"},{"first_name":"Nadia","full_name":"Heninger, Nadia","last_name":"Heninger"},{"last_name":"Dankel","full_name":"Dankel, Maik","first_name":"Maik"},{"first_name":"Jens","full_name":"Steube, Jens","last_name":"Steube"},{"full_name":"Valenta, Luke","last_name":"Valenta","first_name":"Luke"},{"last_name":"Adrian","full_name":"Adrian, David","first_name":"David"},{"full_name":"Halderman, J. Alex","last_name":"Halderman","first_name":"J. Alex"},{"full_name":"Dukhovni, Viktor","last_name":"Dukhovni","first_name":"Viktor"},{"first_name":"Emilia","last_name":"Käsper","full_name":"Käsper, Emilia"},{"first_name":"Shaanan","full_name":"Cohney, Shaanan","last_name":"Cohney"},{"last_name":"Engels","full_name":"Engels, Susanne","first_name":"Susanne"},{"full_name":"Paar, Christof","last_name":"Paar","first_name":"Christof"},{"first_name":"Yuval","full_name":"Shavitt, Yuval","last_name":"Shavitt"}],"title":"DROWN: Breaking TLS Using SSLv2","main_file_link":[{"url":"https://www.usenix.org/node/197246","open_access":"1"}]},{"type":"conference","publication":"10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)","status":"public","user_id":"83504","_id":"15913","language":[{"iso":"eng"}],"citation":{"chicago":"Böck, Hanno, Aaron Zauner, Sean Devlin, Juraj Somorovsky, and Philipp Jovanovic. “Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.” In <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>. Austin, TX: {USENIX} Association, 2016.","ieee":"H. Böck, A. Zauner, S. Devlin, J. Somorovsky, and P. Jovanovic, “Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS,” in <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>, 2016.","ama":"Böck H, Zauner A, Devlin S, Somorovsky J, Jovanovic P. Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In: <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>. Austin, TX: {USENIX} Association; 2016.","apa":"Böck, H., Zauner, A., Devlin, S., Somorovsky, J., &#38; Jovanovic, P. (2016). Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>. Austin, TX: {USENIX} Association.","bibtex":"@inproceedings{Böck_Zauner_Devlin_Somorovsky_Jovanovic_2016, place={Austin, TX}, title={Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS}, booktitle={10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)}, publisher={{USENIX} Association}, author={Böck, Hanno and Zauner, Aaron and Devlin, Sean and Somorovsky, Juraj and Jovanovic, Philipp}, year={2016} }","short":"H. Böck, A. Zauner, S. Devlin, J. Somorovsky, P. Jovanovic, in: 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), {USENIX} Association, Austin, TX, 2016.","mla":"Böck, Hanno, et al. “Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.” <i>10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16)</i>, {USENIX} Association, 2016."},"year":"2016","place":"Austin, TX","date_created":"2020-02-15T10:06:33Z","author":[{"first_name":"Hanno","last_name":"Böck","full_name":"Böck, Hanno"},{"last_name":"Zauner","full_name":"Zauner, Aaron","first_name":"Aaron"},{"first_name":"Sean","last_name":"Devlin","full_name":"Devlin, Sean"},{"first_name":"Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","id":"83504","full_name":"Somorovsky, Juraj"},{"first_name":"Philipp","last_name":"Jovanovic","full_name":"Jovanovic, Philipp"}],"date_updated":"2022-01-06T06:52:40Z","publisher":"{USENIX} Association","oa":"1","main_file_link":[{"url":"https://www.usenix.org/conference/woot16/workshop-program/presentation/bock","open_access":"1"}],"title":"Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS"},{"author":[{"first_name":"Julian","full_name":"Hamm, Julian","last_name":"Hamm"}],"date_created":"2017-10-17T12:41:20Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:52:03Z","title":"Symmetric Anonymous Credentials with Protocols for Relations on Attributes","citation":{"ama":"Hamm J. <i>Symmetric Anonymous Credentials with Protocols for Relations on Attributes</i>. Universität Paderborn; 2016.","chicago":"Hamm, Julian. <i>Symmetric Anonymous Credentials with Protocols for Relations on Attributes</i>. Universität Paderborn, 2016.","ieee":"J. Hamm, <i>Symmetric Anonymous Credentials with Protocols for Relations on Attributes</i>. Universität Paderborn, 2016.","mla":"Hamm, Julian. <i>Symmetric Anonymous Credentials with Protocols for Relations on Attributes</i>. Universität Paderborn, 2016.","short":"J. Hamm, Symmetric Anonymous Credentials with Protocols for Relations on Attributes, Universität Paderborn, 2016.","bibtex":"@book{Hamm_2016, title={Symmetric Anonymous Credentials with Protocols for Relations on Attributes}, publisher={Universität Paderborn}, author={Hamm, Julian}, year={2016} }","apa":"Hamm, J. (2016). <i>Symmetric Anonymous Credentials with Protocols for Relations on Attributes</i>. Universität Paderborn."},"year":"2016","user_id":"477","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"146","type":"mastersthesis","status":"public"},{"user_id":"30525","department":[{"_id":"15"},{"_id":"230"}],"_id":"1460","type":"journal_article","publication":"Advanced Optical Materials","status":"public","date_created":"2018-03-20T18:23:41Z","author":[{"full_name":"Xiao, Shiyi","last_name":"Xiao","first_name":"Shiyi"},{"full_name":"Mühlenbernd, Holger","last_name":"Mühlenbernd","first_name":"Holger"},{"first_name":"Guixin","full_name":"Li, Guixin","last_name":"Li"},{"full_name":"Kenney, Mitchell","last_name":"Kenney","first_name":"Mitchell"},{"first_name":"Fu","last_name":"Liu","full_name":"Liu, Fu"},{"last_name":"Zentgraf","orcid":"0000-0002-8662-1101","full_name":"Zentgraf, Thomas","id":"30525","first_name":"Thomas"},{"first_name":"Shuang","last_name":"Zhang","full_name":"Zhang, Shuang"},{"first_name":"Jensen","full_name":"Li, Jensen","last_name":"Li"}],"volume":4,"publisher":"Wiley-Blackwell","date_updated":"2022-01-06T06:52:03Z","doi":"10.1002/adom.201500705","title":"Helicity-Preserving Omnidirectional Plasmonic Mirror","issue":"5","publication_status":"published","publication_identifier":{"issn":["2195-1071"]},"citation":{"ieee":"S. Xiao <i>et al.</i>, “Helicity-Preserving Omnidirectional Plasmonic Mirror,” <i>Advanced Optical Materials</i>, vol. 4, no. 5, pp. 654–658, 2016.","chicago":"Xiao, Shiyi, Holger Mühlenbernd, Guixin Li, Mitchell Kenney, Fu Liu, Thomas Zentgraf, Shuang Zhang, and Jensen Li. “Helicity-Preserving Omnidirectional Plasmonic Mirror.” <i>Advanced Optical Materials</i> 4, no. 5 (2016): 654–58. <a href=\"https://doi.org/10.1002/adom.201500705\">https://doi.org/10.1002/adom.201500705</a>.","ama":"Xiao S, Mühlenbernd H, Li G, et al. Helicity-Preserving Omnidirectional Plasmonic Mirror. <i>Advanced Optical Materials</i>. 2016;4(5):654-658. doi:<a href=\"https://doi.org/10.1002/adom.201500705\">10.1002/adom.201500705</a>","mla":"Xiao, Shiyi, et al. “Helicity-Preserving Omnidirectional Plasmonic Mirror.” <i>Advanced Optical Materials</i>, vol. 4, no. 5, Wiley-Blackwell, 2016, pp. 654–58, doi:<a href=\"https://doi.org/10.1002/adom.201500705\">10.1002/adom.201500705</a>.","short":"S. Xiao, H. Mühlenbernd, G. Li, M. Kenney, F. Liu, T. Zentgraf, S. Zhang, J. Li, Advanced Optical Materials 4 (2016) 654–658.","bibtex":"@article{Xiao_Mühlenbernd_Li_Kenney_Liu_Zentgraf_Zhang_Li_2016, title={Helicity-Preserving Omnidirectional Plasmonic Mirror}, volume={4}, DOI={<a href=\"https://doi.org/10.1002/adom.201500705\">10.1002/adom.201500705</a>}, number={5}, journal={Advanced Optical Materials}, publisher={Wiley-Blackwell}, author={Xiao, Shiyi and Mühlenbernd, Holger and Li, Guixin and Kenney, Mitchell and Liu, Fu and Zentgraf, Thomas and Zhang, Shuang and Li, Jensen}, year={2016}, pages={654–658} }","apa":"Xiao, S., Mühlenbernd, H., Li, G., Kenney, M., Liu, F., Zentgraf, T., … Li, J. (2016). Helicity-Preserving Omnidirectional Plasmonic Mirror. <i>Advanced Optical Materials</i>, <i>4</i>(5), 654–658. <a href=\"https://doi.org/10.1002/adom.201500705\">https://doi.org/10.1002/adom.201500705</a>"},"page":"654-658","intvolume":"         4","year":"2016"},{"ddc":["040"],"language":[{"iso":"eng"}],"file_date_updated":"2018-12-03T15:29:08Z","_id":"148","project":[{"_id":"1","name":"SFB 901"},{"_id":"17","name":"SFB 901 - Subprojekt C5"},{"_id":"4","name":"SFB 901 - Project Area C"}],"department":[{"_id":"276"}],"user_id":"16205","abstract":[{"text":"Successful business model innovation is impossible without innovative business model ideas. When generating such ideas, humans make use of two properties of the human cognitive system: First, their ability to build up knowledge (i.e., raw material for new ideas), and second, their ability to flexibly recombine that knowledge. While these properties enable humans to generate innovative ideas, the amounts of knowledge and cognitive flexibility that humans can possess are limited, which in turn limits human idea generation capability. With business model idea generators, a new class of information systems is proposed that can contribute to alleviating the limits that constrain human idea generation. The ideas that such idea generators produce can complement human business model ideas, thereby increase the probability for high-quality ideas, and eventually raise the odds of successful business model innovation. The contribution is a design theory that describes the architecture of the proposed idea generators.","lang":"eng"}],"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_id":"5991","file_name":"Supporting Business Model Idea Generation Through Machine-generat.pdf","file_size":1626458,"creator":"abursig","date_created":"2018-12-03T15:29:08Z","date_updated":"2018-12-03T15:29:08Z"}],"publication":"Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland","type":"conference","title":"Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory","conference":{"location":"Dublin, Ireland","name":"37th International Conference on Information Systems (ICIS)"},"main_file_link":[{"url":"http://aisel.aisnet.org/icis2016/DigitalInnovation/Presentations/5/"}],"date_updated":"2022-01-06T06:52:06Z","author":[{"last_name":"John","full_name":"John, Thomas","id":"3952","first_name":"Thomas"}],"date_created":"2017-10-17T12:41:20Z","year":"2016","citation":{"short":"T. John, in: Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland, 2016.","bibtex":"@inproceedings{John_2016, title={Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory}, booktitle={Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland}, author={John, Thomas}, year={2016} }","mla":"John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas: A Design Theory.” <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>, 2016.","apa":"John, T. (2016). Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory. In <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>. Dublin, Ireland.","ama":"John T. Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory. In: <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>. ; 2016.","chicago":"John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas: A Design Theory.” In <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>, 2016.","ieee":"T. John, “Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory,” in <i>Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland</i>, Dublin, Ireland, 2016."},"has_accepted_license":"1"},{"publication":"Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics","type":"conference","status":"public","_id":"14881","department":[{"_id":"600"}],"user_id":"82920","extern":"1","language":[{"iso":"eng"}],"year":"2016","page":"1635-1645","citation":{"ama":"Chen W-F, Ku L-W. UTCNN: a Deep Learning Model of Stance Classification on Social Media Text. In: <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics</i>. ; 2016:1635-1645.","chicago":"Chen, Wei-Fan, and Lun-Wei Ku. “UTCNN: A Deep Learning Model of Stance Classification on Social Media Text.” In <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics</i>, 1635–45, 2016.","ieee":"W.-F. Chen and L.-W. Ku, “UTCNN: a Deep Learning Model of Stance Classification on Social Media Text,” in <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics</i>, 2016, pp. 1635–1645.","short":"W.-F. Chen, L.-W. Ku, in: Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics, 2016, pp. 1635–1645.","mla":"Chen, Wei-Fan, and Lun-Wei Ku. “UTCNN: A Deep Learning Model of Stance Classification on Social Media Text.” <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics</i>, 2016, pp. 1635–45.","bibtex":"@inproceedings{Chen_Ku_2016, title={UTCNN: a Deep Learning Model of Stance Classification on Social Media Text}, booktitle={Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics}, author={Chen, Wei-Fan and Ku, Lun-Wei}, year={2016}, pages={1635–1645} }","apa":"Chen, W.-F., &#38; Ku, L.-W. (2016). UTCNN: a Deep Learning Model of Stance Classification on Social Media Text. In <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics</i> (pp. 1635–1645)."},"date_updated":"2022-01-06T06:52:09Z","date_created":"2019-11-11T12:28:24Z","author":[{"first_name":"Wei-Fan","full_name":"Chen, Wei-Fan","id":"82920","last_name":"Chen"},{"first_name":"Lun-Wei","last_name":"Ku","full_name":"Ku, Lun-Wei"}],"title":"UTCNN: a Deep Learning Model of Stance Classification on Social Media Text","main_file_link":[{"url":"https://www.aclweb.org/anthology/C16-1154.pdf"}]},{"year":"2016","citation":{"apa":"Chen, W.-F., Lin, F.-Y., &#38; Ku, L.-W. (2016). WordForce: Visualizing Controversial Words in Debates. In <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: System Demonstrations</i> (pp. 273–277).","bibtex":"@inproceedings{Chen_Lin_Ku_2016, title={WordForce: Visualizing Controversial Words in Debates}, booktitle={Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: System Demonstrations}, author={Chen, Wei-Fan and Lin, Fang-Yu and Ku, Lun-Wei}, year={2016}, pages={273–277} }","short":"W.-F. Chen, F.-Y. Lin, L.-W. Ku, in: Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: System Demonstrations, 2016, pp. 273–277.","mla":"Chen, Wei-Fan, et al. “WordForce: Visualizing Controversial Words in Debates.” <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: System Demonstrations</i>, 2016, pp. 273–77.","chicago":"Chen, Wei-Fan, Fang-Yu Lin, and Lun-Wei Ku. “WordForce: Visualizing Controversial Words in Debates.” In <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: System Demonstrations</i>, 273–77, 2016.","ieee":"W.-F. Chen, F.-Y. Lin, and L.-W. Ku, “WordForce: Visualizing Controversial Words in Debates,” in <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: System Demonstrations</i>, 2016, pp. 273–277.","ama":"Chen W-F, Lin F-Y, Ku L-W. WordForce: Visualizing Controversial Words in Debates. In: <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: System Demonstrations</i>. ; 2016:273-277."},"page":"273-277","date_updated":"2022-01-06T06:52:09Z","author":[{"first_name":"Wei-Fan","last_name":"Chen","id":"82920","full_name":"Chen, Wei-Fan"},{"first_name":"Fang-Yu","full_name":"Lin, Fang-Yu","last_name":"Lin"},{"first_name":"Lun-Wei","full_name":"Ku, Lun-Wei","last_name":"Ku"}],"date_created":"2019-11-11T12:29:14Z","title":"WordForce: Visualizing Controversial Words in Debates","main_file_link":[{"url":"https://www.aclweb.org/anthology/C16-2057.pdf"}],"type":"conference","publication":"Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: System Demonstrations","status":"public","_id":"14882","user_id":"82920","department":[{"_id":"600"}],"language":[{"iso":"eng"}],"extern":"1"},{"status":"public","publication":"Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Tutorial Abstracts","type":"conference_abstract","language":[{"iso":"eng"}],"extern":"1","_id":"14883","department":[{"_id":"600"}],"user_id":"82920","year":"2016","page":"5-8","citation":{"ama":"Ku L-W, Chen W-F. Chinese Textual Sentiment Analysis: Datasets, Resources and Tools. In: <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Tutorial Abstracts</i>. ; 2016:5-8.","chicago":"Ku, Lun-Wei, and Wei-Fan Chen. “Chinese Textual Sentiment Analysis: Datasets, Resources and Tools.” In <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Tutorial Abstracts</i>, 5–8, 2016.","ieee":"L.-W. Ku and W.-F. Chen, “Chinese Textual Sentiment Analysis: Datasets, Resources and Tools,” in <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Tutorial Abstracts</i>, 2016, pp. 5–8.","short":"L.-W. Ku, W.-F. Chen, in: Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Tutorial Abstracts, 2016, pp. 5–8.","mla":"Ku, Lun-Wei, and Wei-Fan Chen. “Chinese Textual Sentiment Analysis: Datasets, Resources and Tools.” <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Tutorial Abstracts</i>, 2016, pp. 5–8.","bibtex":"@inproceedings{Ku_Chen_2016, title={Chinese Textual Sentiment Analysis: Datasets, Resources and Tools}, booktitle={Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Tutorial Abstracts}, author={Ku, Lun-Wei and Chen, Wei-Fan}, year={2016}, pages={5–8} }","apa":"Ku, L.-W., &#38; Chen, W.-F. (2016). Chinese Textual Sentiment Analysis: Datasets, Resources and Tools. In <i>Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Tutorial Abstracts</i> (pp. 5–8)."},"title":"Chinese Textual Sentiment Analysis: Datasets, Resources and Tools","main_file_link":[{"url":"https://www.aclweb.org/anthology/C16-3002.pdf"}],"date_updated":"2022-01-06T06:52:09Z","date_created":"2019-11-11T12:30:04Z","author":[{"last_name":"Ku","full_name":"Ku, Lun-Wei","first_name":"Lun-Wei"},{"first_name":"Wei-Fan","full_name":"Chen, Wei-Fan","id":"82920","last_name":"Chen"}]},{"has_accepted_license":"1","year":"2016","page":"593--607","citation":{"apa":"Drees, M., Feldkord, B., &#38; Skopalik, A. (2016). Strategic Online Facility Location. In <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i> (pp. 593--607). <a href=\"https://doi.org/10.1007/978-3-319-48749-6_43\">https://doi.org/10.1007/978-3-319-48749-6_43</a>","mla":"Drees, Maximilian, et al. “Strategic Online Facility Location.” <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 2016, pp. 593--607, doi:<a href=\"https://doi.org/10.1007/978-3-319-48749-6_43\">10.1007/978-3-319-48749-6_43</a>.","bibtex":"@inproceedings{Drees_Feldkord_Skopalik_2016, series={LNCS}, title={Strategic Online Facility Location}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-48749-6_43\">10.1007/978-3-319-48749-6_43</a>}, booktitle={Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)}, author={Drees, Maximilian and Feldkord, Björn and Skopalik, Alexander}, year={2016}, pages={593--607}, collection={LNCS} }","short":"M. Drees, B. Feldkord, A. Skopalik, in: Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 593--607.","ama":"Drees M, Feldkord B, Skopalik A. Strategic Online Facility Location. In: <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>. LNCS. ; 2016:593--607. doi:<a href=\"https://doi.org/10.1007/978-3-319-48749-6_43\">10.1007/978-3-319-48749-6_43</a>","chicago":"Drees, Maximilian, Björn Feldkord, and Alexander Skopalik. “Strategic Online Facility Location.” In <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 593--607. LNCS, 2016. <a href=\"https://doi.org/10.1007/978-3-319-48749-6_43\">https://doi.org/10.1007/978-3-319-48749-6_43</a>.","ieee":"M. Drees, B. Feldkord, and A. Skopalik, “Strategic Online Facility Location,” in <i>Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)</i>, 2016, pp. 593--607."},"date_updated":"2022-01-06T06:52:10Z","author":[{"full_name":"Drees, Maximilian","last_name":"Drees","first_name":"Maximilian"},{"first_name":"Björn","full_name":"Feldkord, Björn","id":"22704","last_name":"Feldkord"},{"first_name":"Alexander","id":"40384","full_name":"Skopalik, Alexander","last_name":"Skopalik"}],"date_created":"2017-10-17T12:41:21Z","title":"Strategic Online Facility Location","doi":"10.1007/978-3-319-48749-6_43","publication":"Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)","type":"conference","abstract":[{"lang":"eng","text":"In this paper we consider a strategic variant of the online facility location problem. Given is a graph in which each node serves two roles: it is a strategic client stating requests as well as a potential location for a facility. In each time step one client states a request which induces private costs equal to the distance to the closest facility. Before serving, the clients may collectively decide to open new facilities, sharing the corresponding price. Instead of optimizing the global costs, each client acts selfishly. The prices of new facilities vary between nodes and also change over time, but are always bounded by some fixed value α. Both the requests as well as the facility prices are given by an online sequence and are not known in advance.We characterize the optimal strategies of the clients and analyze their overall performance in comparison to a centralized offline solution. If all players optimize their own competitiveness, the global performance of the system is O(√α⋅α) times worse than the offline optimum. A restriction to a natural subclass of strategies improves this result to O(α). We also show that for fixed facility costs, we can find strategies such that this bound further improves to O(√α)."}],"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"1553","access_level":"closed","file_name":"149-chp_3A10.1007_2F978-3-319-48749-6_43.pdf","file_size":236253,"creator":"florida","date_created":"2018-03-21T12:55:43Z","date_updated":"2018-03-21T12:55:43Z"}],"_id":"149","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"7","name":"SFB 901 - Subproject A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"63"},{"_id":"541"}],"user_id":"477","series_title":"LNCS","ddc":["040"],"file_date_updated":"2018-03-21T12:55:43Z","language":[{"iso":"eng"}]},{"title":"Solving Heterogeneity for a Successful Service Market","doi":"10.17619/UNIPB/1-13","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:52:13Z","date_created":"2017-10-17T12:41:21Z","author":[{"first_name":"Svetlana","last_name":"Arifulina","full_name":"Arifulina, Svetlana"}],"supervisor":[{"first_name":"Gregor","id":"107","full_name":"Engels, Gregor","last_name":"Engels"}],"year":"2016","citation":{"apa":"Arifulina, S. (2016). <i>Solving Heterogeneity for a Successful Service Market</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-13\">https://doi.org/10.17619/UNIPB/1-13</a>","mla":"Arifulina, Svetlana. <i>Solving Heterogeneity for a Successful Service Market</i>. Universität Paderborn, 2016, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-13\">10.17619/UNIPB/1-13</a>.","short":"S. Arifulina, Solving Heterogeneity for a Successful Service Market, Universität Paderborn, 2016.","bibtex":"@book{Arifulina_2016, title={Solving Heterogeneity for a Successful Service Market}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-13\">10.17619/UNIPB/1-13</a>}, publisher={Universität Paderborn}, author={Arifulina, Svetlana}, year={2016} }","chicago":"Arifulina, Svetlana. <i>Solving Heterogeneity for a Successful Service Market</i>. Universität Paderborn, 2016. <a href=\"https://doi.org/10.17619/UNIPB/1-13\">https://doi.org/10.17619/UNIPB/1-13</a>.","ieee":"S. Arifulina, <i>Solving Heterogeneity for a Successful Service Market</i>. Universität Paderborn, 2016.","ama":"Arifulina S. <i>Solving Heterogeneity for a Successful Service Market</i>. Universität Paderborn; 2016. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-13\">10.17619/UNIPB/1-13</a>"},"has_accepted_license":"1","ddc":["040"],"file_date_updated":"2018-03-21T12:54:05Z","_id":"150","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"66"}],"user_id":"477","status":"public","file":[{"date_updated":"2018-03-21T12:54:05Z","date_created":"2018-03-21T12:54:05Z","creator":"florida","file_size":6340482,"file_id":"1552","access_level":"closed","file_name":"150-Dissertation_Svetlana_Arifulina.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"type":"dissertation"}]
