@article{5757,
  author       = {{Jovanovikj, Ivan and Yigitbas, Enes and Anjorin, Anthony and Sauer, Stefan}},
  journal      = {{Softwaretechnik-Trends, Proceedings of the 20th Workshop Software-Reengineering & Evolution (WSRE) & 9th Workshop Design for Future (DFF)}},
  location     = {{Bad Honnef}},
  title        = {{{Who Guards the Guards? On the Validation of Test Case Migration}}},
  year         = {{2018}},
}

@article{5758,
  author       = {{Jovanovikj, Ivan and Yigitbas, Enes and Sauer, Stefan}},
  journal      = {{Softwaretechnik-Trends, Proceedings of the 20th Workshop Software-Reengineering & Evolution (WSRE) & 9th Workshop Design for Future (DFF)}},
  location     = {{Bad Honnef}},
  title        = {{{Model-based UI Modernization: From Legacy UIs to Self-adaptive UIs}}},
  year         = {{2018}},
}

@inproceedings{5764,
  author       = {{Gmyr, Robert and Hinnenthal, Kristian and Kostitsyna, Irina and Kuhn, Fabian and Rudolph, Dorian and Scheideler, Christian and Strothmann, Thim Frederik}},
  booktitle    = {{Proceedings of the 24th International Conference on DNA Computing and Molecular Programming}},
  pages        = {{122--138}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Forming Tile Shapes with Simple Robots}}},
  doi          = {{10.1007/978-3-030-00030-1_8}},
  year         = {{2018}},
}

@article{5772,
  author       = {{Fanasch, Patrizia and Frick, Bernd}},
  issn         = {{1931-4361}},
  journal      = {{Journal of Wine Economics}},
  pages        = {{1--27}},
  publisher    = {{Cambridge University Press (CUP)}},
  title        = {{{What Makes Cooperatives Successful? Identifying the Determinants of Their Organizational Performance}}},
  doi          = {{10.1017/jwe.2018.28}},
  year         = {{2018}},
}

@inproceedings{5774,
  abstract     = {{Information flow analysis investigates the flow of data in applications, checking in particular for flows from private sources to public sinks. Flow- and path-sensitive analyses are, however, often too costly to be performed every time a security-critical application is run. In this paper, we propose a variant of proof carrying code for information flow security. To this end, we develop information flow (IF) certificates which get attached to programs as well as a method for IF certificate validation. We prove soundness of our technique, i.e., show it to be tamper-free. The technique is implemented within the program analysis tool CPAchecker. Our experiments confirm that the use of certificates pays off for costly analysis runs.}},
  author       = {{Töws, Manuel and Wehrheim, Heike}},
  booktitle    = {{Theoretical Aspects of Computing – ICTAC 2018}},
  isbn         = {{9783030025076}},
  issn         = {{0302-9743}},
  pages        = {{435--454}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Information Flow Certificates}}},
  doi          = {{10.1007/978-3-030-02508-3_23}},
  year         = {{2018}},
}

@inproceedings{5796,
  author       = {{Engels, Gregor and Strothmann, Thim Frederik and Teetz, Alexander}},
  booktitle    = {{2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW)}},
  isbn         = {{9781538641415}},
  publisher    = {{IEEE}},
  title        = {{{Adapt Cases 4 BPM - A Modeling Framework for Process Flexibility in IIoT}}},
  doi          = {{10.1109/edocw.2018.00020}},
  year         = {{2018}},
}

@article{5798,
  author       = {{Gockel, C. and Kremer, H.-Hugo}},
  journal      = {{Wirtschaft und Erziehung}},
  number       = {{1}},
  pages        = {{13--17}},
  title        = {{{Das Blended Mentoring Concept: Digital gestützte Begleitung von Jugendlichen im Betriebspraktikum (Teil 1)}}},
  volume       = {{70}},
  year         = {{2018}},
}

@article{5799,
  author       = {{Gockel, C. and Kremer, H.-Hugo}},
  journal      = {{Wirtschaft und Erziehung}},
  number       = {{2}},
  pages        = {{66--74}},
  title        = {{{Das Blended Mentoring Concept: Digital gestützte Begleitung von Jugendlichen im Betriebspraktikum (Teil 2)}}},
  volume       = {{70}},
  year         = {{2018}},
}

@inproceedings{5816,
  author       = {{Weidmann, Nils}},
  booktitle    = {{Proceedings of the 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion Proceedings - MODELS '18}},
  editor       = {{Babur, Önder and Strüber, Daniel and Abrahao, Silvia and Burgueno, Loli and Gogolla, Martin and Greenyer, Joel and Kokaly, Sahar and Kolovos, Dimitris and Mayerhofer, Tanja and Zahedi, Mansooreh}},
  isbn         = {{9781450359658}},
  location     = {{Copenhagen, Denmark}},
  publisher    = {{ACM Press}},
  title        = {{{Tolerant consistency management in model-driven engineering}}},
  doi          = {{10.1145/3270112.3275339}},
  year         = {{2018}},
}

@techreport{5820,
  abstract     = {{In this paper, we investigate the use of trusted execution environments (TEEs, such as Intel's SGX) for an anonymous communication infrastructure over untrusted networks.
For this, we present the general idea of exploiting trusted execution environments for the purpose of anonymous communication, including a continuous-time security framework that models strong anonymity guarantees in the presence of an adversary that observes all network traffic and can adaptively corrupt a constant fraction of participating nodes.
In our framework, a participating node can generate a number of unlinkable pseudonyms. Messages are sent from and to pseudonyms, allowing both senders and receivers of messages to remain anonymous. We introduce a concrete construction, which shows viability of our TEE-based approach to anonymous communication. The construction draws from techniques from cryptography and overlay networks. 
Our techniques are very general and can be used as a basis for future constructions with similar goals.}},
  author       = {{Blömer, Johannes and Bobolz, Jan and Scheideler, Christian and Setzer, Alexander}},
  title        = {{{Provably Anonymous Communication Based on Trusted Execution Environments}}},
  year         = {{2018}},
}

@inproceedings{5822,
  author       = {{Gaspers, Daniel and Knorr, Christoph and Nickchen, Tobias and Nickchen, Daniel and Mertsching, Barbel and Mohamed, Mahmoud A.}},
  booktitle    = {{2018 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR)}},
  isbn         = {{9781538655726}},
  publisher    = {{IEEE}},
  title        = {{{Real-time Graph-Based 3D Reconstruction of Sparse Feature Environments for Mobile Robot Applications}}},
  doi          = {{10.1109/ssrr.2018.8468658}},
  year         = {{2018}},
}

@inproceedings{5861,
  author       = {{Jager, Tibor and Kurek, Rafael}},
  booktitle    = {{Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II}},
  pages        = {{221--250}},
  title        = {{{Short Digital Signatures and ID-KEMs via Truncation Collision Resistance}}},
  doi          = {{10.1007/978-3-030-03329-3_8}},
  year         = {{2018}},
}

@inproceedings{5862,
  author       = {{Jager, Tibor and Kurek, Rafael and Pan, Jiaxin}},
  booktitle    = {{Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III}},
  pages        = {{490--518}},
  title        = {{{Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH}}},
  doi          = {{10.1007/978-3-030-03332-3_18}},
  year         = {{2018}},
}

@article{5910,
  author       = {{Heinemann, Birte and Opel, Simone and Budde, Lea and Schulte, Carsten and Frischemeier, Daniel and Biehler, Rolf and Podworny, Susanne and Wassong, Thomas}},
  isbn         = {{9781450365352}},
  journal      = {{Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling '18}},
  keywords     = {{Curriculum Development, Data Science, Secondary Sc, acm reference format, big data, curriculum development, data literacy, data science, educa-, interdisciplinary, secondary schools, tion}},
  number       = {{17}},
  pages        = {{1--5}},
  title        = {{{Drafting a Data Science Curriculum for Secondary Schools}}},
  doi          = {{10.1145/3279720.3279737}},
  year         = {{2018}},
}

@article{5916,
  author       = {{Zhao, Ruizhe and Sain, Basudeb and Wei, Qunshuo and Tang, Chengchun and Li, Xiaowei and Weiss, Thomas and Huang, Lingling and Wang, Yongtian and Zentgraf, Thomas}},
  issn         = {{2047-7538}},
  journal      = {{Light: Science & Applications}},
  number       = {{1}},
  publisher    = {{Springer Nature America, Inc}},
  title        = {{{Multichannel vectorial holographic display and encryption}}},
  doi          = {{10.1038/s41377-018-0091-0}},
  volume       = {{7}},
  year         = {{2018}},
}

@misc{5936,
  author       = {{Scheibl, Manuel}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Learning about learning curves from dataset properties}}},
  year         = {{2018}},
}

@misc{5967,
  author       = {{Koch, Alexander}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Reduzierung des Energieverlustes im Smart Grid mittels Koalitionsbildung}}},
  year         = {{2018}},
}

@article{5971,
  author       = {{Kuczera, Stefan and Gentile, Luigi and Brox, Timothy I. and Olsson, Ulf and Schmidt, Claudia and Galvosas, Petrik}},
  issn         = {{0743-7463}},
  journal      = {{Langmuir}},
  number       = {{28}},
  pages        = {{8314--8325}},
  publisher    = {{American Chemical Society (ACS)}},
  title        = {{{Multilamellar Vesicle Formation Probed by Rheo-NMR and Rheo-SALS under Large Amplitude Oscillatory Shear}}},
  doi          = {{10.1021/acs.langmuir.8b01510}},
  volume       = {{34}},
  year         = {{2018}},
}

@inbook{5977,
  author       = {{Kückmann, Marie-Ann and Kremer, H.-Hugo}},
  booktitle    = {{Vielfalt des Lernens im Rahmen berufsbezogener Standards}},
  editor       = {{Buschfeld, D. and Cleef, M.}},
  isbn         = {{9783830937739}},
  pages        = {{177--188}},
  publisher    = {{Waxmann}},
  title        = {{{Multiprofessionelle Teams zur inklusiven Bildungsarbeit. Empirische Explorationen, theoretisch-konzeptionelle Annäherungen und praktische Gestaltung}}},
  year         = {{2018}},
}

@article{5984,
  author       = {{Scheideler, Christian}},
  journal      = {{Theor. Comput. Sci.}},
  pages        = {{1}},
  title        = {{{Preface}}},
  doi          = {{10.1016/j.tcs.2018.11.004}},
  volume       = {{751}},
  year         = {{2018}},
}

