[{"user_id":"44006","department":[{"_id":"54"}],"_id":"12901","language":[{"iso":"eng"}],"type":"conference","publication":"ICASSP 2018, Calgary, Canada","status":"public","abstract":[{"lang":"eng","text":"This work examines acoustic beamformers employing neural networks (NNs) for mask prediction as front-end for automatic speech recognition (ASR) systems for practical scenarios like voice-enabled home devices. To test the versatility of the mask predicting network, the system is evaluated with different recording hardware, different microphone array designs, and different acoustic models of the downstream ASR system. Significant gains in recognition accuracy are obtained in all configurations despite the fact that the NN had been trained on mismatched data. Unlike previous work, the NN is trained on a feature level objective, which gives some performance advantage over a mask related criterion. Furthermore, different approaches for realizing online, or adaptive, NN-based beamforming are explored, where the online algorithms still show significant gains compared to the baseline performance."}],"date_created":"2019-07-30T14:53:58Z","author":[{"full_name":"Boeddeker, Christoph","id":"40767","last_name":"Boeddeker","first_name":"Christoph"},{"first_name":"Hakan","full_name":"Erdogan, Hakan","last_name":"Erdogan"},{"last_name":"Yoshioka","full_name":"Yoshioka, Takuya","first_name":"Takuya"},{"first_name":"Reinhold","last_name":"Haeb-Umbach","id":"242","full_name":"Haeb-Umbach, Reinhold"}],"date_updated":"2022-01-06T06:51:24Z","oa":"1","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2018/ICASSP_2018_Boeddeker_Paper.pdf","open_access":"1"}],"title":"Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition","related_material":{"link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2018/ICASSP_2018_Boeddeker_Slides.pdf","relation":"supplementary_material","description":"Poster"}]},"citation":{"bibtex":"@inproceedings{Boeddeker_Erdogan_Yoshioka_Haeb-Umbach_2018, title={Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition}, booktitle={ICASSP 2018, Calgary, Canada}, author={Boeddeker, Christoph and Erdogan, Hakan and Yoshioka, Takuya and Haeb-Umbach, Reinhold}, year={2018} }","short":"C. Boeddeker, H. Erdogan, T. Yoshioka, R. Haeb-Umbach, in: ICASSP 2018, Calgary, Canada, 2018.","mla":"Boeddeker, Christoph, et al. “Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition.” <i>ICASSP 2018, Calgary, Canada</i>, 2018.","apa":"Boeddeker, C., Erdogan, H., Yoshioka, T., &#38; Haeb-Umbach, R. (2018). Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition. In <i>ICASSP 2018, Calgary, Canada</i>.","chicago":"Boeddeker, Christoph, Hakan Erdogan, Takuya Yoshioka, and Reinhold Haeb-Umbach. “Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition.” In <i>ICASSP 2018, Calgary, Canada</i>, 2018.","ieee":"C. Boeddeker, H. Erdogan, T. Yoshioka, and R. Haeb-Umbach, “Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition,” in <i>ICASSP 2018, Calgary, Canada</i>, 2018.","ama":"Boeddeker C, Erdogan H, Yoshioka T, Haeb-Umbach R. Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition. In: <i>ICASSP 2018, Calgary, Canada</i>. ; 2018."},"year":"2018"},{"issue":"2","publication_status":"published","page":"302–308","intvolume":"        42","citation":{"ama":"Röwenstrunk D. Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich historisch-kritischer Musikedition. <i>Bibliothek Forschung und Praxis</i>. 2018;42(2):302–308. doi:<a href=\"https://doi.org/10.18452/18949\">10.18452/18949</a>","chicago":"Röwenstrunk, Daniel. “Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich historisch-kritischer Musikedition.” <i>Bibliothek Forschung und Praxis</i> 42, no. 2 (2018): 302–308. <a href=\"https://doi.org/10.18452/18949\">https://doi.org/10.18452/18949</a>.","ieee":"D. Röwenstrunk, “Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich historisch-kritischer Musikedition,” <i>Bibliothek Forschung und Praxis</i>, vol. 42, no. 2, pp. 302–308, 2018.","short":"D. Röwenstrunk, Bibliothek Forschung und Praxis 42 (2018) 302–308.","bibtex":"@article{Röwenstrunk_2018, title={Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich historisch-kritischer Musikedition}, volume={42}, DOI={<a href=\"https://doi.org/10.18452/18949\">10.18452/18949</a>}, number={2}, journal={Bibliothek Forschung und Praxis}, publisher={Walter de Gruyter GmbH, Berlin/Boston}, author={Röwenstrunk, Daniel}, year={2018}, pages={302–308} }","mla":"Röwenstrunk, Daniel. “Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich historisch-kritischer Musikedition.” <i>Bibliothek Forschung und Praxis</i>, vol. 42, no. 2, Walter de Gruyter GmbH, Berlin/Boston, 2018, pp. 302–308, doi:<a href=\"https://doi.org/10.18452/18949\">10.18452/18949</a>.","apa":"Röwenstrunk, D. (2018). Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich historisch-kritischer Musikedition. <i>Bibliothek Forschung und Praxis</i>, <i>42</i>(2), 302–308. <a href=\"https://doi.org/10.18452/18949\">https://doi.org/10.18452/18949</a>"},"year":"2018","volume":42,"date_created":"2019-08-16T13:14:44Z","author":[{"id":"439","full_name":"Röwenstrunk, Daniel","last_name":"Röwenstrunk","orcid":"https://orcid.org/0000-0001-6271-2095","first_name":"Daniel"}],"publisher":"Walter de Gruyter GmbH, Berlin/Boston","date_updated":"2022-01-06T06:51:27Z","doi":"10.18452/18949","title":"Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich historisch-kritischer Musikedition","publication":"Bibliothek Forschung und Praxis","type":"journal_article","status":"public","abstract":[{"lang":"ger","text":"Die Langzeitverfügbarkeit von Forschungsergebnissen und der dafür häufig notwendige langfristige Erhalt der Lauffähigkeit von Software ist eine gemeinschaftliche Herausforderung für Forschung, Softwareentwicklung und Gedächtnisinstitutionen. Es stehen verschiedene Maßnahmen wie Standardisierung, Emulation oder auch die Weiterentwicklung durch Open-Source-Communities zur Verfügung, die in unterschiedlichen Kontexten für unterschiedliche Arten von Software zum Einsatz kommen können."},{"lang":"eng","text":"Long-term availability of research findings is a challenge for research, software development, and memory institutions altogether. This often includes the necessity to keep research software running over a long time. There are various methods and actions like standardization, emulation, or the development of research software by an open source community which can be taken to achieve this goal."}],"department":[{"_id":"233"},{"_id":"43"}],"user_id":"439","_id":"12937","language":[{"iso":"ger"}]},{"status":"public","publication":"IEEE Access","type":"journal_article","language":[{"iso":"eng"}],"_id":"12965","department":[{"_id":"78"}],"user_id":"398","year":"2018","page":"14078-14092","citation":{"short":"I. Ghribi, R.B. Abdallah, M. Khalgui, Z. Li, K. Alnowibet, M. Platzner, IEEE Access (2018) 14078–14092.","mla":"Ghribi, Ines, et al. “R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy Constraints.” <i>IEEE Access</i>, 2018, pp. 14078–92, doi:<a href=\"https://doi.org/10.1109/access.2018.2799852\">10.1109/access.2018.2799852</a>.","bibtex":"@article{Ghribi_Abdallah_Khalgui_Li_Alnowibet_Platzner_2018, title={R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy Constraints}, DOI={<a href=\"https://doi.org/10.1109/access.2018.2799852\">10.1109/access.2018.2799852</a>}, journal={IEEE Access}, author={Ghribi, Ines and Abdallah, Riadh Ben and Khalgui, Mohamed and Li, Zhiwu and Alnowibet, Khalid and Platzner, Marco}, year={2018}, pages={14078–14092} }","apa":"Ghribi, I., Abdallah, R. B., Khalgui, M., Li, Z., Alnowibet, K., &#38; Platzner, M. (2018). R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy Constraints. <i>IEEE Access</i>, 14078–14092. <a href=\"https://doi.org/10.1109/access.2018.2799852\">https://doi.org/10.1109/access.2018.2799852</a>","ieee":"I. Ghribi, R. B. Abdallah, M. Khalgui, Z. Li, K. Alnowibet, and M. Platzner, “R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy Constraints,” <i>IEEE Access</i>, pp. 14078–14092, 2018.","chicago":"Ghribi, Ines, Riadh Ben Abdallah, Mohamed Khalgui, Zhiwu Li, Khalid Alnowibet, and Marco Platzner. “R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy Constraints.” <i>IEEE Access</i>, 2018, 14078–92. <a href=\"https://doi.org/10.1109/access.2018.2799852\">https://doi.org/10.1109/access.2018.2799852</a>.","ama":"Ghribi I, Abdallah RB, Khalgui M, Li Z, Alnowibet K, Platzner M. R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy Constraints. <i>IEEE Access</i>. 2018:14078-14092. doi:<a href=\"https://doi.org/10.1109/access.2018.2799852\">10.1109/access.2018.2799852</a>"},"publication_identifier":{"issn":["2169-3536"]},"publication_status":"published","title":"R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy Constraints","doi":"10.1109/access.2018.2799852","date_updated":"2022-01-06T06:51:27Z","author":[{"full_name":"Ghribi, Ines","last_name":"Ghribi","first_name":"Ines"},{"first_name":"Riadh Ben","last_name":"Abdallah","full_name":"Abdallah, Riadh Ben"},{"first_name":"Mohamed","full_name":"Khalgui, Mohamed","last_name":"Khalgui"},{"first_name":"Zhiwu","last_name":"Li","full_name":"Li, Zhiwu"},{"full_name":"Alnowibet, Khalid","last_name":"Alnowibet","first_name":"Khalid"},{"id":"398","full_name":"Platzner, Marco","last_name":"Platzner","first_name":"Marco"}],"date_created":"2019-08-26T13:33:00Z"},{"_id":"12974","department":[{"_id":"48"}],"user_id":"209","language":[{"iso":"eng"}],"publication":"IEEE Embedded Systems Letters","type":"journal_article","status":"public","publisher":"IEEE","date_updated":"2022-01-06T06:51:27Z","volume":10,"date_created":"2019-08-28T08:40:58Z","author":[{"full_name":"Hellebrand, Sybille","id":"209","orcid":"0000-0002-3717-3939","last_name":"Hellebrand","first_name":"Sybille"},{"last_name":"Henkel","full_name":"Henkel, Joerg","first_name":"Joerg"},{"last_name":"Raghunathan","full_name":"Raghunathan, Anand","first_name":"Anand"},{"full_name":"Wunderlich, Hans-Joachim","last_name":"Wunderlich","first_name":"Hans-Joachim"}],"title":"Guest Editors' Introduction - Special Issue on Approximate Computing","doi":"10.1109/les.2018.2789942","issue":"1","year":"2018","page":"1-1","intvolume":"        10","citation":{"chicago":"Hellebrand, Sybille, Joerg Henkel, Anand Raghunathan, and Hans-Joachim Wunderlich. “Guest Editors’ Introduction - Special Issue on Approximate Computing.” <i>IEEE Embedded Systems Letters</i> 10, no. 1 (2018): 1–1. <a href=\"https://doi.org/10.1109/les.2018.2789942\">https://doi.org/10.1109/les.2018.2789942</a>.","ieee":"S. Hellebrand, J. Henkel, A. Raghunathan, and H.-J. Wunderlich, “Guest Editors’ Introduction - Special Issue on Approximate Computing,” <i>IEEE Embedded Systems Letters</i>, vol. 10, no. 1, pp. 1–1, 2018.","ama":"Hellebrand S, Henkel J, Raghunathan A, Wunderlich H-J. Guest Editors’ Introduction - Special Issue on Approximate Computing. <i>IEEE Embedded Systems Letters</i>. 2018;10(1):1-1. doi:<a href=\"https://doi.org/10.1109/les.2018.2789942\">10.1109/les.2018.2789942</a>","apa":"Hellebrand, S., Henkel, J., Raghunathan, A., &#38; Wunderlich, H.-J. (2018). Guest Editors’ Introduction - Special Issue on Approximate Computing. <i>IEEE Embedded Systems Letters</i>, <i>10</i>(1), 1–1. <a href=\"https://doi.org/10.1109/les.2018.2789942\">https://doi.org/10.1109/les.2018.2789942</a>","mla":"Hellebrand, Sybille, et al. “Guest Editors’ Introduction - Special Issue on Approximate Computing.” <i>IEEE Embedded Systems Letters</i>, vol. 10, no. 1, IEEE, 2018, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/les.2018.2789942\">10.1109/les.2018.2789942</a>.","bibtex":"@article{Hellebrand_Henkel_Raghunathan_Wunderlich_2018, title={Guest Editors’ Introduction - Special Issue on Approximate Computing}, volume={10}, DOI={<a href=\"https://doi.org/10.1109/les.2018.2789942\">10.1109/les.2018.2789942</a>}, number={1}, journal={IEEE Embedded Systems Letters}, publisher={IEEE}, author={Hellebrand, Sybille and Henkel, Joerg and Raghunathan, Anand and Wunderlich, Hans-Joachim}, year={2018}, pages={1–1} }","short":"S. Hellebrand, J. Henkel, A. Raghunathan, H.-J. Wunderlich, IEEE Embedded Systems Letters 10 (2018) 1–1."}},{"publication_identifier":{"issn":["1662-5153"]},"publication_status":"published","year":"2018","citation":{"apa":"Anders, P., Lehmann, T., Müller, H., Grønvik, K. B., Skjæret-Maroni, N., Baumeister, J., &#38; Vereijken, B. (2018). Exergames Inherently Contain Cognitive Elements as Indicated by Cortical Processing. <i>Frontiers in Behavioral Neuroscience</i>. <a href=\"https://doi.org/10.3389/fnbeh.2018.00102\">https://doi.org/10.3389/fnbeh.2018.00102</a>","short":"P. Anders, T. Lehmann, H. Müller, K.B. Grønvik, N. Skjæret-Maroni, J. Baumeister, B. Vereijken, Frontiers in Behavioral Neuroscience (2018).","mla":"Anders, Phillipp, et al. “Exergames Inherently Contain Cognitive Elements as Indicated by Cortical Processing.” <i>Frontiers in Behavioral Neuroscience</i>, 2018, doi:<a href=\"https://doi.org/10.3389/fnbeh.2018.00102\">10.3389/fnbeh.2018.00102</a>.","bibtex":"@article{Anders_Lehmann_Müller_Grønvik_Skjæret-Maroni_Baumeister_Vereijken_2018, title={Exergames Inherently Contain Cognitive Elements as Indicated by Cortical Processing}, DOI={<a href=\"https://doi.org/10.3389/fnbeh.2018.00102\">10.3389/fnbeh.2018.00102</a>}, journal={Frontiers in Behavioral Neuroscience}, author={Anders, Phillipp and Lehmann, Tim and Müller, Helen and Grønvik, Karoline B. and Skjæret-Maroni, Nina and Baumeister, Jochen and Vereijken, Beatrix}, year={2018} }","ama":"Anders P, Lehmann T, Müller H, et al. Exergames Inherently Contain Cognitive Elements as Indicated by Cortical Processing. <i>Frontiers in Behavioral Neuroscience</i>. 2018. doi:<a href=\"https://doi.org/10.3389/fnbeh.2018.00102\">10.3389/fnbeh.2018.00102</a>","chicago":"Anders, Phillipp, Tim Lehmann, Helen Müller, Karoline B. Grønvik, Nina Skjæret-Maroni, Jochen Baumeister, and Beatrix Vereijken. “Exergames Inherently Contain Cognitive Elements as Indicated by Cortical Processing.” <i>Frontiers in Behavioral Neuroscience</i>, 2018. <a href=\"https://doi.org/10.3389/fnbeh.2018.00102\">https://doi.org/10.3389/fnbeh.2018.00102</a>.","ieee":"P. Anders <i>et al.</i>, “Exergames Inherently Contain Cognitive Elements as Indicated by Cortical Processing,” <i>Frontiers in Behavioral Neuroscience</i>, 2018."},"date_updated":"2022-01-06T06:52:25Z","author":[{"last_name":"Anders","full_name":"Anders, Phillipp","first_name":"Phillipp"},{"last_name":"Lehmann","full_name":"Lehmann, Tim","first_name":"Tim"},{"first_name":"Helen","last_name":"Müller","full_name":"Müller, Helen"},{"first_name":"Karoline B.","full_name":"Grønvik, Karoline B.","last_name":"Grønvik"},{"full_name":"Skjæret-Maroni, Nina","last_name":"Skjæret-Maroni","first_name":"Nina"},{"first_name":"Jochen","orcid":"0000-0003-2683-5826","last_name":"Baumeister","full_name":"Baumeister, Jochen","id":"46"},{"first_name":"Beatrix","full_name":"Vereijken, Beatrix","last_name":"Vereijken"}],"date_created":"2019-12-28T17:22:19Z","title":"Exergames Inherently Contain Cognitive Elements as Indicated by Cortical Processing","doi":"10.3389/fnbeh.2018.00102","publication":"Frontiers in Behavioral Neuroscience","type":"journal_article","status":"public","_id":"15418","department":[{"_id":"17"},{"_id":"172"}],"user_id":"62406","language":[{"iso":"eng"}]},{"citation":{"apa":"Magenheim, J., Müller, K., Schulte, C., Bergner, N., Haselmeier, K., Humbert, L., … Schroeder, U. (2018). Evaluation of Learning Informatics in Primary Education - Views of Teachers and Students. In <i>Informatics in Schools. Fundamentals of Computer Science and Software Engineering - 11th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings</i> (pp. 339–353). <a href=\"https://doi.org/10.1007/978-3-030-02750-6\\_26\">https://doi.org/10.1007/978-3-030-02750-6\\_26</a>","short":"J. Magenheim, K. Müller, C. Schulte, N. Bergner, K. Haselmeier, L. Humbert, D. Müller, U. Schroeder, in: Informatics in Schools. Fundamentals of Computer Science and Software Engineering - 11th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings, 2018, pp. 339–353.","bibtex":"@inproceedings{Magenheim_Müller_Schulte_Bergner_Haselmeier_Humbert_Müller_Schroeder_2018, title={Evaluation of Learning Informatics in Primary Education - Views of Teachers and Students}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-02750-6\\_26\">10.1007/978-3-030-02750-6\\_26</a>}, booktitle={Informatics in Schools. Fundamentals of Computer Science and Software Engineering - 11th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings}, author={Magenheim, Johannes and Müller, Kathrin and Schulte, Carsten and Bergner, Nadine and Haselmeier, Kathrin and Humbert, Ludger and Müller, Dorothee and Schroeder, Ulrik}, year={2018}, pages={339–353} }","mla":"Magenheim, Johannes, et al. “Evaluation of Learning Informatics in Primary Education - Views of Teachers and Students.” <i>Informatics in Schools. Fundamentals of Computer Science and Software Engineering - 11th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings</i>, 2018, pp. 339–53, doi:<a href=\"https://doi.org/10.1007/978-3-030-02750-6\\_26\">10.1007/978-3-030-02750-6\\_26</a>.","ieee":"J. Magenheim <i>et al.</i>, “Evaluation of Learning Informatics in Primary Education - Views of Teachers and Students,” in <i>Informatics in Schools. Fundamentals of Computer Science and Software Engineering - 11th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings</i>, 2018, pp. 339–353.","chicago":"Magenheim, Johannes, Kathrin Müller, Carsten Schulte, Nadine Bergner, Kathrin Haselmeier, Ludger Humbert, Dorothee Müller, and Ulrik Schroeder. “Evaluation of Learning Informatics in Primary Education - Views of Teachers and Students.” In <i>Informatics in Schools. Fundamentals of Computer Science and Software Engineering - 11th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings</i>, 339–53, 2018. <a href=\"https://doi.org/10.1007/978-3-030-02750-6\\_26\">https://doi.org/10.1007/978-3-030-02750-6\\_26</a>.","ama":"Magenheim J, Müller K, Schulte C, et al. Evaluation of Learning Informatics in Primary Education - Views of Teachers and Students. In: <i>Informatics in Schools. Fundamentals of Computer Science and Software Engineering - 11th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings</i>. ; 2018:339-353. doi:<a href=\"https://doi.org/10.1007/978-3-030-02750-6\\_26\">10.1007/978-3-030-02750-6\\_26</a>"},"page":"339-353","year":"2018","author":[{"first_name":"Johannes","last_name":"Magenheim","full_name":"Magenheim, Johannes"},{"first_name":"Kathrin","full_name":"Müller, Kathrin","last_name":"Müller"},{"last_name":"Schulte","full_name":"Schulte, Carsten","first_name":"Carsten"},{"full_name":"Bergner, Nadine","last_name":"Bergner","first_name":"Nadine"},{"full_name":"Haselmeier, Kathrin","last_name":"Haselmeier","first_name":"Kathrin"},{"full_name":"Humbert, Ludger","last_name":"Humbert","first_name":"Ludger"},{"full_name":"Müller, Dorothee","last_name":"Müller","first_name":"Dorothee"},{"first_name":"Ulrik","last_name":"Schroeder","full_name":"Schroeder, Ulrik"}],"date_created":"2020-01-15T08:57:23Z","date_updated":"2022-01-06T06:52:30Z","doi":"10.1007/978-3-030-02750-6\\_26","title":"Evaluation of Learning Informatics in Primary Education - Views of Teachers and Students","type":"conference","publication":"Informatics in Schools. Fundamentals of Computer Science and Software Engineering - 11th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings","status":"public","user_id":"21145","department":[{"_id":"67"}],"_id":"15584","language":[{"iso":"eng"}]},{"author":[{"first_name":"Roman","full_name":"Bednarik, Roman","last_name":"Bednarik"},{"last_name":"Schulte","full_name":"Schulte, Carsten","id":"60311","first_name":"Carsten"},{"full_name":"Budde, Lea","id":"32443","last_name":"Budde","first_name":"Lea"},{"first_name":"Birte","full_name":"Heinemann, Birte","last_name":"Heinemann"},{"first_name":"Hana","last_name":"Vrzakova","full_name":"Vrzakova, Hana"}],"date_created":"2020-01-15T09:00:46Z","date_updated":"2022-01-06T06:52:30Z","doi":"10.1145/3279720.3279722","title":"Eye-movement Modeling Examples in Source Code Comprehension: A Classroom Study","citation":{"mla":"Bednarik, Roman, et al. “Eye-Movement Modeling Examples in Source Code Comprehension: A Classroom Study.” <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 22-25, 2018</i>, 2018, pp. 2:1-2:8, doi:<a href=\"https://doi.org/10.1145/3279720.3279722\">10.1145/3279720.3279722</a>.","bibtex":"@inproceedings{Bednarik_Schulte_Budde_Heinemann_Vrzakova_2018, title={Eye-movement Modeling Examples in Source Code Comprehension: A Classroom Study}, DOI={<a href=\"https://doi.org/10.1145/3279720.3279722\">10.1145/3279720.3279722</a>}, booktitle={Proceedings of the 18th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 22-25, 2018}, author={Bednarik, Roman and Schulte, Carsten and Budde, Lea and Heinemann, Birte and Vrzakova, Hana}, year={2018}, pages={2:1-2:8} }","short":"R. Bednarik, C. Schulte, L. Budde, B. Heinemann, H. Vrzakova, in: Proceedings of the 18th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 22-25, 2018, 2018, pp. 2:1-2:8.","apa":"Bednarik, R., Schulte, C., Budde, L., Heinemann, B., &#38; Vrzakova, H. (2018). Eye-movement Modeling Examples in Source Code Comprehension: A Classroom Study. In <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 22-25, 2018</i> (pp. 2:1-2:8). <a href=\"https://doi.org/10.1145/3279720.3279722\">https://doi.org/10.1145/3279720.3279722</a>","ama":"Bednarik R, Schulte C, Budde L, Heinemann B, Vrzakova H. Eye-movement Modeling Examples in Source Code Comprehension: A Classroom Study. In: <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 22-25, 2018</i>. ; 2018:2:1-2:8. doi:<a href=\"https://doi.org/10.1145/3279720.3279722\">10.1145/3279720.3279722</a>","chicago":"Bednarik, Roman, Carsten Schulte, Lea Budde, Birte Heinemann, and Hana Vrzakova. “Eye-Movement Modeling Examples in Source Code Comprehension: A Classroom Study.” In <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 22-25, 2018</i>, 2:1-2:8, 2018. <a href=\"https://doi.org/10.1145/3279720.3279722\">https://doi.org/10.1145/3279720.3279722</a>.","ieee":"R. Bednarik, C. Schulte, L. Budde, B. Heinemann, and H. Vrzakova, “Eye-movement Modeling Examples in Source Code Comprehension: A Classroom Study,” in <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 22-25, 2018</i>, 2018, pp. 2:1-2:8."},"page":"2:1-2:8","year":"2018","user_id":"21145","department":[{"_id":"67"}],"_id":"15585","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 18th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 22-25, 2018","status":"public"},{"status":"public","type":"conference","publication":"Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018","language":[{"iso":"eng"}],"_id":"15586","user_id":"21145","department":[{"_id":"67"}],"year":"2018","citation":{"ama":"Müller K, Schulte C. Are children perceiving robots as supporting or replacing humans?: first empirical results and classification of preconceptions within a theoretical framework. In: <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>. ; 2018:10:1-10:4. doi:<a href=\"https://doi.org/10.1145/3265757.3265767\">10.1145/3265757.3265767</a>","ieee":"K. Müller and C. Schulte, “Are children perceiving robots as supporting or replacing humans?: first empirical results and classification of preconceptions within a theoretical framework,” in <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>, 2018, pp. 10:1-10:4.","chicago":"Müller, Kathrin, and Carsten Schulte. “Are Children Perceiving Robots as Supporting or Replacing Humans?: First Empirical Results and Classification of Preconceptions within a Theoretical Framework.” In <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>, 10:1-10:4, 2018. <a href=\"https://doi.org/10.1145/3265757.3265767\">https://doi.org/10.1145/3265757.3265767</a>.","apa":"Müller, K., &#38; Schulte, C. (2018). Are children perceiving robots as supporting or replacing humans?: first empirical results and classification of preconceptions within a theoretical framework. In <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i> (pp. 10:1-10:4). <a href=\"https://doi.org/10.1145/3265757.3265767\">https://doi.org/10.1145/3265757.3265767</a>","bibtex":"@inproceedings{Müller_Schulte_2018, title={Are children perceiving robots as supporting or replacing humans?: first empirical results and classification of preconceptions within a theoretical framework}, DOI={<a href=\"https://doi.org/10.1145/3265757.3265767\">10.1145/3265757.3265767</a>}, booktitle={Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018}, author={Müller, Kathrin and Schulte, Carsten}, year={2018}, pages={10:1-10:4} }","short":"K. Müller, C. Schulte, in: Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018, 2018, pp. 10:1-10:4.","mla":"Müller, Kathrin, and Carsten Schulte. “Are Children Perceiving Robots as Supporting or Replacing Humans?: First Empirical Results and Classification of Preconceptions within a Theoretical Framework.” <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>, 2018, pp. 10:1-10:4, doi:<a href=\"https://doi.org/10.1145/3265757.3265767\">10.1145/3265757.3265767</a>."},"page":"10:1-10:4","title":"Are children perceiving robots as supporting or replacing humans?: first empirical results and classification of preconceptions within a theoretical framework","doi":"10.1145/3265757.3265767","date_updated":"2022-01-06T06:52:30Z","author":[{"first_name":"Kathrin","full_name":"Müller, Kathrin","last_name":"Müller"},{"first_name":"Carsten","id":"60311","full_name":"Schulte, Carsten","last_name":"Schulte"}],"date_created":"2020-01-15T09:03:32Z"},{"date_updated":"2022-01-06T06:52:30Z","date_created":"2020-01-15T09:05:13Z","author":[{"first_name":"Carsten","last_name":"Schulte","full_name":"Schulte, Carsten","id":"60311"},{"first_name":"Jessica","full_name":"Krüger, Jessica","last_name":"Krüger"},{"last_name":"Gödecke","full_name":"Gödecke, Andreas","first_name":"Andreas"},{"full_name":"Schmidt, Ann-Katrin","last_name":"Schmidt","first_name":"Ann-Katrin"}],"title":"The computing repair cafe: a concept for repair cafes in computing edcuation","doi":"10.1145/3265757.3265781","year":"2018","page":"24:1-24:6","citation":{"apa":"Schulte, C., Krüger, J., Gödecke, A., &#38; Schmidt, A.-K. (2018). The computing repair cafe: a concept for repair cafes in computing edcuation. In <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i> (pp. 24:1-24:6). <a href=\"https://doi.org/10.1145/3265757.3265781\">https://doi.org/10.1145/3265757.3265781</a>","short":"C. Schulte, J. Krüger, A. Gödecke, A.-K. Schmidt, in: Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018, 2018, pp. 24:1-24:6.","bibtex":"@inproceedings{Schulte_Krüger_Gödecke_Schmidt_2018, title={The computing repair cafe: a concept for repair cafes in computing edcuation}, DOI={<a href=\"https://doi.org/10.1145/3265757.3265781\">10.1145/3265757.3265781</a>}, booktitle={Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018}, author={Schulte, Carsten and Krüger, Jessica and Gödecke, Andreas and Schmidt, Ann-Katrin}, year={2018}, pages={24:1-24:6} }","mla":"Schulte, Carsten, et al. “The Computing Repair Cafe: A Concept for Repair Cafes in Computing Edcuation.” <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>, 2018, pp. 24:1-24:6, doi:<a href=\"https://doi.org/10.1145/3265757.3265781\">10.1145/3265757.3265781</a>.","chicago":"Schulte, Carsten, Jessica Krüger, Andreas Gödecke, and Ann-Katrin Schmidt. “The Computing Repair Cafe: A Concept for Repair Cafes in Computing Edcuation.” In <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>, 24:1-24:6, 2018. <a href=\"https://doi.org/10.1145/3265757.3265781\">https://doi.org/10.1145/3265757.3265781</a>.","ieee":"C. Schulte, J. Krüger, A. Gödecke, and A.-K. Schmidt, “The computing repair cafe: a concept for repair cafes in computing edcuation,” in <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>, 2018, pp. 24:1-24:6.","ama":"Schulte C, Krüger J, Gödecke A, Schmidt A-K. The computing repair cafe: a concept for repair cafes in computing edcuation. In: <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>. ; 2018:24:1-24:6. doi:<a href=\"https://doi.org/10.1145/3265757.3265781\">10.1145/3265757.3265781</a>"},"_id":"15587","department":[{"_id":"67"}],"user_id":"21145","language":[{"iso":"eng"}],"publication":"Proceedings of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018","type":"conference","status":"public"},{"editor":[{"first_name":"Roman","full_name":"Bednarik, Roman","last_name":"Bednarik"},{"id":"60311","full_name":"Schulte, Carsten","last_name":"Schulte","first_name":"Carsten"}],"status":"public","type":"conference_editor","language":[{"iso":"eng"}],"_id":"15588","user_id":"21145","department":[{"_id":"67"}],"year":"2018","citation":{"bibtex":"@book{Bednarik_Schulte_2018, title={Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018}, publisher={(ACM)}, year={2018} }","short":"R. Bednarik, C. Schulte, eds., Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018, (ACM), 2018.","mla":"Bednarik, Roman, and Carsten Schulte, editors. <i>Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>. (ACM), 2018.","apa":"Bednarik, R., &#38; Schulte, C. (Eds.). (2018). <i>Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>. (ACM).","chicago":"Bednarik, Roman, and Carsten Schulte, eds. <i>Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>. (ACM), 2018.","ieee":"R. Bednarik and C. Schulte, Eds., <i>Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>. (ACM), 2018.","ama":"Bednarik R, Schulte C, eds. <i>Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>. (ACM); 2018."},"title":"Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018","date_updated":"2022-01-06T06:52:30Z","publisher":"(ACM)","date_created":"2020-01-15T09:07:01Z"},{"_id":"15595","department":[{"_id":"67"}],"user_id":"21145","language":[{"iso":"eng"}],"type":"book","status":"public","date_updated":"2022-01-06T06:52:30Z","publisher":"Bloomsbury Publishing","date_created":"2020-01-16T08:29:15Z","author":[{"full_name":"Sentance, Sue","last_name":"Sentance","first_name":"Sue"},{"first_name":"Erik","full_name":"Barendsen, Erik","last_name":"Barendsen"},{"last_name":"Schulte","id":"60311","full_name":"Schulte, Carsten","first_name":"Carsten"}],"title":"Computer Science Education: Perspectives on Teaching and learning in school","year":"2018","citation":{"apa":"Sentance, S., Barendsen, E., &#38; Schulte, C. (2018). <i>Computer Science Education: Perspectives on Teaching and learning in school</i>. Bloomsbury Publishing.","mla":"Sentance, Sue, et al. <i>Computer Science Education: Perspectives on Teaching and Learning in School</i>. Bloomsbury Publishing, 2018.","short":"S. Sentance, E. Barendsen, C. Schulte, Computer Science Education: Perspectives on Teaching and Learning in School, Bloomsbury Publishing, 2018.","bibtex":"@book{Sentance_Barendsen_Schulte_2018, title={Computer Science Education: Perspectives on Teaching and learning in school}, publisher={Bloomsbury Publishing}, author={Sentance, Sue and Barendsen, Erik and Schulte, Carsten}, year={2018} }","ama":"Sentance S, Barendsen E, Schulte C. <i>Computer Science Education: Perspectives on Teaching and Learning in School</i>. Bloomsbury Publishing; 2018.","ieee":"S. Sentance, E. Barendsen, and C. Schulte, <i>Computer Science Education: Perspectives on Teaching and learning in school</i>. Bloomsbury Publishing, 2018.","chicago":"Sentance, Sue, Erik Barendsen, and Carsten Schulte. <i>Computer Science Education: Perspectives on Teaching and Learning in School</i>. Bloomsbury Publishing, 2018."}},{"title":"A Framework for Computing Education: Hybrid Interaction System: The need for a bigger picture in computing education","publisher":"ACM","date_updated":"2022-01-06T06:52:31Z","author":[{"full_name":"Schulte, Carsten","id":"60311","last_name":"Schulte","first_name":"Carsten"},{"full_name":"Budde, Lea","id":"32443","last_name":"Budde","first_name":"Lea"}],"date_created":"2020-01-28T10:28:42Z","year":"2018","citation":{"ieee":"C. Schulte and L. Budde, “A Framework for Computing Education: Hybrid Interaction System: The need for a bigger picture in computing education,” in <i>Koli Calling</i>, 2018, pp. 12:1-12:10.","chicago":"Schulte, Carsten, and Lea Budde. “A Framework for Computing Education: Hybrid Interaction System: The Need for a Bigger Picture in Computing Education.” In <i>Koli Calling</i>, 12:1-12:10. ACM, 2018.","ama":"Schulte C, Budde L. A Framework for Computing Education: Hybrid Interaction System: The need for a bigger picture in computing education. In: <i>Koli Calling</i>. ACM; 2018:12:1-12:10.","apa":"Schulte, C., &#38; Budde, L. (2018). A Framework for Computing Education: Hybrid Interaction System: The need for a bigger picture in computing education. In <i>Koli Calling</i> (pp. 12:1-12:10). ACM.","bibtex":"@inproceedings{Schulte_Budde_2018, title={A Framework for Computing Education: Hybrid Interaction System: The need for a bigger picture in computing education}, booktitle={Koli Calling}, publisher={ACM}, author={Schulte, Carsten and Budde, Lea}, year={2018}, pages={12:1-12:10} }","short":"C. Schulte, L. Budde, in: Koli Calling, ACM, 2018, pp. 12:1-12:10.","mla":"Schulte, Carsten, and Lea Budde. “A Framework for Computing Education: Hybrid Interaction System: The Need for a Bigger Picture in Computing Education.” <i>Koli Calling</i>, ACM, 2018, pp. 12:1-12:10."},"page":"12:1-12:10","language":[{"iso":"eng"}],"_id":"15647","user_id":"21145","department":[{"_id":"67"}],"status":"public","type":"conference","publication":"Koli Calling"},{"citation":{"apa":"Ameli, A., Krauter, S., Ameli, M. T., &#38; Moslehpour, S. (2018). Smart charging management system of plugged-in EVs based on user driving patterns in micro-grids. <i>International Journal of Engineering Research &#38; Innovation</i>, <i>10</i>(1).","bibtex":"@article{Ameli_Krauter_Ameli_Moslehpour_2018, title={Smart charging management system of plugged-in EVs based on user driving patterns in micro-grids}, volume={10}, number={1}, journal={International Journal of Engineering Research &#38; Innovation}, author={Ameli, Ali and Krauter, Stefan and Ameli, Mohammad Taghi and Moslehpour, Saeid}, year={2018} }","short":"A. Ameli, S. Krauter, M.T. Ameli, S. Moslehpour, International Journal of Engineering Research &#38; Innovation 10 (2018).","mla":"Ameli, Ali, et al. “Smart Charging Management System of Plugged-in EVs Based on User Driving Patterns in Micro-Grids.” <i>International Journal of Engineering Research &#38; Innovation</i>, vol. 10, no. 1, 2018.","ieee":"A. Ameli, S. Krauter, M. T. Ameli, and S. Moslehpour, “Smart charging management system of plugged-in EVs based on user driving patterns in micro-grids,” <i>International Journal of Engineering Research &#38; Innovation</i>, vol. 10, no. 1, 2018.","chicago":"Ameli, Ali, Stefan Krauter, Mohammad Taghi Ameli, and Saeid Moslehpour. “Smart Charging Management System of Plugged-in EVs Based on User Driving Patterns in Micro-Grids.” <i>International Journal of Engineering Research &#38; Innovation</i> 10, no. 1 (2018).","ama":"Ameli A, Krauter S, Ameli MT, Moslehpour S. Smart charging management system of plugged-in EVs based on user driving patterns in micro-grids. <i>International Journal of Engineering Research &#38; Innovation</i>. 2018;10(1)."},"intvolume":"        10","year":"2018","issue":"1","publication_status":"published","publication_identifier":{"issn":["2152 4157"]},"title":"Smart charging management system of plugged-in EVs based on user driving patterns in micro-grids","date_created":"2020-02-10T09:45:43Z","author":[{"last_name":"Ameli","full_name":"Ameli, Ali","first_name":"Ali"},{"first_name":"Stefan","last_name":"Krauter","orcid":"0000-0002-3594-260X","full_name":"Krauter, Stefan","id":"28836"},{"last_name":"Ameli","full_name":"Ameli, Mohammad Taghi","first_name":"Mohammad Taghi"},{"last_name":"Moslehpour","full_name":"Moslehpour, Saeid","first_name":"Saeid"}],"volume":10,"date_updated":"2022-01-06T06:52:38Z","status":"public","type":"journal_article","publication":"International Journal of Engineering Research & Innovation","language":[{"iso":"eng"}],"article_type":"original","user_id":"16148","department":[{"_id":"53"}],"_id":"15845"},{"publication_identifier":{"issn":["2510-2877"]},"publication_status":"published","issue":"2","year":"2018","intvolume":"        11","page":"24-29","citation":{"chicago":"Camberg, Alan Adam, Katja Engelkemeier, Jan Dietrich, and Thomas Heggemann. “Top-down Design of Tailored Fiber-Metal Laminates.” <i>Lightweight Design Worldwide</i> 11, no. 2 (2018): 24–29. <a href=\"https://doi.org/10.1007/s41777-018-0004-1\">https://doi.org/10.1007/s41777-018-0004-1</a>.","ieee":"A. A. Camberg, K. Engelkemeier, J. Dietrich, and T. Heggemann, “Top-down design of tailored fiber-metal laminates,” <i>Lightweight Design worldwide</i>, vol. 11, no. 2, pp. 24–29, 2018.","ama":"Camberg AA, Engelkemeier K, Dietrich J, Heggemann T. Top-down design of tailored fiber-metal laminates. <i>Lightweight Design worldwide</i>. 2018;11(2):24-29. doi:<a href=\"https://doi.org/10.1007/s41777-018-0004-1\">10.1007/s41777-018-0004-1</a>","mla":"Camberg, Alan Adam, et al. “Top-down Design of Tailored Fiber-Metal Laminates.” <i>Lightweight Design Worldwide</i>, vol. 11, no. 2, Springer Vieweg, 2018, pp. 24–29, doi:<a href=\"https://doi.org/10.1007/s41777-018-0004-1\">10.1007/s41777-018-0004-1</a>.","short":"A.A. Camberg, K. Engelkemeier, J. Dietrich, T. Heggemann, Lightweight Design Worldwide 11 (2018) 24–29.","bibtex":"@article{Camberg_Engelkemeier_Dietrich_Heggemann_2018, title={Top-down design of tailored fiber-metal laminates}, volume={11}, DOI={<a href=\"https://doi.org/10.1007/s41777-018-0004-1\">10.1007/s41777-018-0004-1</a>}, number={2}, journal={Lightweight Design worldwide}, publisher={Springer Vieweg}, author={Camberg, Alan Adam and Engelkemeier, Katja and Dietrich, Jan and Heggemann, Thomas}, year={2018}, pages={24–29} }","apa":"Camberg, A. A., Engelkemeier, K., Dietrich, J., &#38; Heggemann, T. (2018). Top-down design of tailored fiber-metal laminates. <i>Lightweight Design Worldwide</i>, <i>11</i>(2), 24–29. <a href=\"https://doi.org/10.1007/s41777-018-0004-1\">https://doi.org/10.1007/s41777-018-0004-1</a>"},"date_updated":"2022-01-06T06:52:39Z","publisher":"Springer Vieweg","volume":11,"author":[{"full_name":"Camberg, Alan Adam","id":"60544","last_name":"Camberg","first_name":"Alan Adam"},{"first_name":"Katja","full_name":"Engelkemeier, Katja","last_name":"Engelkemeier"},{"full_name":"Dietrich, Jan","last_name":"Dietrich","first_name":"Jan"},{"full_name":"Heggemann, Thomas","last_name":"Heggemann","first_name":"Thomas"}],"date_created":"2020-02-11T10:25:31Z","title":"Top-down design of tailored fiber-metal laminates","doi":"10.1007/s41777-018-0004-1","publication":"Lightweight Design worldwide","type":"journal_article","status":"public","_id":"15876","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"department":[{"_id":"9"},{"_id":"321"},{"_id":"149"}],"user_id":"60544","language":[{"iso":"eng"}]},{"publication_identifier":{"isbn":["9781450356930"]},"publication_status":"published","citation":{"chicago":"Albrecht, Martin R., Jake Massimo, Kenneth G. Paterson, and Juraj Somorovsky. “Prime and Prejudice: Primality Testing Under Adversarial Conditions.” In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>, 2018. <a href=\"https://doi.org/10.1145/3243734.3243787\">https://doi.org/10.1145/3243734.3243787</a>.","ieee":"M. R. Albrecht, J. Massimo, K. G. Paterson, and J. Somorovsky, “Prime and Prejudice: Primality Testing Under Adversarial Conditions,” in <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>, 2018.","ama":"Albrecht MR, Massimo J, Paterson KG, Somorovsky J. Prime and Prejudice: Primality Testing Under Adversarial Conditions. In: <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>. ; 2018. doi:<a href=\"https://doi.org/10.1145/3243734.3243787\">10.1145/3243734.3243787</a>","short":"M.R. Albrecht, J. Massimo, K.G. Paterson, J. Somorovsky, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.","bibtex":"@inproceedings{Albrecht_Massimo_Paterson_Somorovsky_2018, title={Prime and Prejudice: Primality Testing Under Adversarial Conditions}, DOI={<a href=\"https://doi.org/10.1145/3243734.3243787\">10.1145/3243734.3243787</a>}, booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security}, author={Albrecht, Martin R. and Massimo, Jake and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2018} }","mla":"Albrecht, Martin R., et al. “Prime and Prejudice: Primality Testing Under Adversarial Conditions.” <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>, 2018, doi:<a href=\"https://doi.org/10.1145/3243734.3243787\">10.1145/3243734.3243787</a>.","apa":"Albrecht, M. R., Massimo, J., Paterson, K. G., &#38; Somorovsky, J. (2018). Prime and Prejudice: Primality Testing Under Adversarial Conditions. In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3243734.3243787\">https://doi.org/10.1145/3243734.3243787</a>"},"year":"2018","date_created":"2020-02-15T09:34:47Z","author":[{"full_name":"Albrecht, Martin R.","last_name":"Albrecht","first_name":"Martin R."},{"full_name":"Massimo, Jake","last_name":"Massimo","first_name":"Jake"},{"last_name":"Paterson","full_name":"Paterson, Kenneth G.","first_name":"Kenneth G."},{"first_name":"Juraj","id":"83504","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"}],"date_updated":"2022-01-06T06:52:39Z","doi":"10.1145/3243734.3243787","main_file_link":[{"url":"https://eprint.iacr.org/2018/749"}],"title":"Prime and Prejudice: Primality Testing Under Adversarial Conditions","publication":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","status":"public","user_id":"83504","_id":"15892","extern":"1","language":[{"iso":"eng"}]},{"status":"public","publication":"2018 IEEE European Symposium on Security and Privacy (EuroS&P)","type":"conference","language":[{"iso":"eng"}],"_id":"15893","user_id":"83504","year":"2018","citation":{"apa":"Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., &#38; Rosler, P. (2018). Attacking Deterministic Signature Schemes Using Fault Attacks. In <i>2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)</i>. <a href=\"https://doi.org/10.1109/eurosp.2018.00031\">https://doi.org/10.1109/eurosp.2018.00031</a>","short":"D. Poddebniak, J. Somorovsky, S. Schinzel, M. Lochter, P. Rosler, in: 2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P), 2018.","bibtex":"@inproceedings{Poddebniak_Somorovsky_Schinzel_Lochter_Rosler_2018, title={Attacking Deterministic Signature Schemes Using Fault Attacks}, DOI={<a href=\"https://doi.org/10.1109/eurosp.2018.00031\">10.1109/eurosp.2018.00031</a>}, booktitle={2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)}, author={Poddebniak, Damian and Somorovsky, Juraj and Schinzel, Sebastian and Lochter, Manfred and Rosler, Paul}, year={2018} }","mla":"Poddebniak, Damian, et al. “Attacking Deterministic Signature Schemes Using Fault Attacks.” <i>2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)</i>, 2018, doi:<a href=\"https://doi.org/10.1109/eurosp.2018.00031\">10.1109/eurosp.2018.00031</a>.","ieee":"D. Poddebniak, J. Somorovsky, S. Schinzel, M. Lochter, and P. Rosler, “Attacking Deterministic Signature Schemes Using Fault Attacks,” in <i>2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)</i>, 2018.","chicago":"Poddebniak, Damian, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, and Paul Rosler. “Attacking Deterministic Signature Schemes Using Fault Attacks.” In <i>2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)</i>, 2018. <a href=\"https://doi.org/10.1109/eurosp.2018.00031\">https://doi.org/10.1109/eurosp.2018.00031</a>.","ama":"Poddebniak D, Somorovsky J, Schinzel S, Lochter M, Rosler P. Attacking Deterministic Signature Schemes Using Fault Attacks. In: <i>2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)</i>. ; 2018. doi:<a href=\"https://doi.org/10.1109/eurosp.2018.00031\">10.1109/eurosp.2018.00031</a>"},"publication_identifier":{"isbn":["9781538642283"]},"publication_status":"published","title":"Attacking Deterministic Signature Schemes Using Fault Attacks","doi":"10.1109/eurosp.2018.00031","date_updated":"2022-01-06T06:52:39Z","author":[{"full_name":"Poddebniak, Damian","last_name":"Poddebniak","first_name":"Damian"},{"first_name":"Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","id":"83504","full_name":"Somorovsky, Juraj"},{"first_name":"Sebastian","last_name":"Schinzel","full_name":"Schinzel, Sebastian"},{"last_name":"Lochter","full_name":"Lochter, Manfred","first_name":"Manfred"},{"last_name":"Rosler","full_name":"Rosler, Paul","first_name":"Paul"}],"date_created":"2020-02-15T09:35:53Z"},{"doi":"10.1145/3150376.3150379","title":"On The (In-)Security Of JavaScript Object Signing And Encryption","author":[{"last_name":"Detering","full_name":"Detering, Dennis","first_name":"Dennis"},{"orcid":"0000-0002-3593-7720","last_name":"Somorovsky","full_name":"Somorovsky, Juraj","id":"83504","first_name":"Juraj"},{"last_name":"Mainka","full_name":"Mainka, Christian","first_name":"Christian"},{"first_name":"Vladislav","last_name":"Mladenov","full_name":"Mladenov, Vladislav"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_created":"2020-02-15T09:36:33Z","date_updated":"2022-01-06T06:52:39Z","citation":{"apa":"Detering, D., Somorovsky, J., Mainka, C., Mladenov, V., &#38; Schwenk, J. (2018). On The (In-)Security Of JavaScript Object Signing And Encryption. In <i>Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS</i>. <a href=\"https://doi.org/10.1145/3150376.3150379\">https://doi.org/10.1145/3150376.3150379</a>","mla":"Detering, Dennis, et al. “On The (In-)Security Of JavaScript Object Signing And Encryption.” <i>Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium on - ROOTS</i>, 2018, doi:<a href=\"https://doi.org/10.1145/3150376.3150379\">10.1145/3150376.3150379</a>.","short":"D. Detering, J. Somorovsky, C. Mainka, V. Mladenov, J. Schwenk, in: Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium on - ROOTS, 2018.","bibtex":"@inproceedings{Detering_Somorovsky_Mainka_Mladenov_Schwenk_2018, title={On The (In-)Security Of JavaScript Object Signing And Encryption}, DOI={<a href=\"https://doi.org/10.1145/3150376.3150379\">10.1145/3150376.3150379</a>}, booktitle={Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS}, author={Detering, Dennis and Somorovsky, Juraj and Mainka, Christian and Mladenov, Vladislav and Schwenk, Jörg}, year={2018} }","ama":"Detering D, Somorovsky J, Mainka C, Mladenov V, Schwenk J. On The (In-)Security Of JavaScript Object Signing And Encryption. In: <i>Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium on - ROOTS</i>. ; 2018. doi:<a href=\"https://doi.org/10.1145/3150376.3150379\">10.1145/3150376.3150379</a>","chicago":"Detering, Dennis, Juraj Somorovsky, Christian Mainka, Vladislav Mladenov, and Jörg Schwenk. “On The (In-)Security Of JavaScript Object Signing And Encryption.” In <i>Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium on - ROOTS</i>, 2018. <a href=\"https://doi.org/10.1145/3150376.3150379\">https://doi.org/10.1145/3150376.3150379</a>.","ieee":"D. Detering, J. Somorovsky, C. Mainka, V. Mladenov, and J. Schwenk, “On The (In-)Security Of JavaScript Object Signing And Encryption,” in <i>Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS</i>, 2018."},"year":"2018","publication_identifier":{"isbn":["9781450353212"]},"publication_status":"published","language":[{"iso":"eng"}],"user_id":"83504","_id":"15894","status":"public","publication":"Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS","type":"conference"},{"date_created":"2020-02-15T09:49:36Z","author":[{"first_name":"Damian","full_name":"Poddebniak, Damian","last_name":"Poddebniak"},{"first_name":"Christian","last_name":"Dresen","full_name":"Dresen, Christian"},{"last_name":"Müller","full_name":"Müller, Jens","first_name":"Jens"},{"last_name":"Ising","full_name":"Ising, Fabian","first_name":"Fabian"},{"first_name":"Sebastian","full_name":"Schinzel, Sebastian","last_name":"Schinzel"},{"first_name":"Simon","last_name":"Friedberger","full_name":"Friedberger, Simon"},{"full_name":"Somorovsky, Juraj","id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"},{"full_name":"Schwenk, Jörg","last_name":"Schwenk","first_name":"Jörg"}],"publisher":"{USENIX} Association","date_updated":"2022-01-06T06:52:40Z","oa":"1","main_file_link":[{"open_access":"1","url":"https://www.usenix.org/node/217635"}],"title":"Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels","publication_identifier":{"isbn":["978-1-939133-04-5"]},"citation":{"chicago":"Poddebniak, Damian, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, and Jörg Schwenk. “Efail: Breaking S/MIME and OpenPGP Email Encryption Using Exfiltration Channels.” In <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>, 549–66. Baltimore, MD: {USENIX} Association, 2018.","ieee":"D. Poddebniak <i>et al.</i>, “Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels,” in <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>, 2018, pp. 549–566.","ama":"Poddebniak D, Dresen C, Müller J, et al. Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. In: <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>. Baltimore, MD: {USENIX} Association; 2018:549-566.","apa":"Poddebniak, D., Dresen, C., Müller, J., Ising, F., Schinzel, S., Friedberger, S., … Schwenk, J. (2018). Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. In <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i> (pp. 549–566). Baltimore, MD: {USENIX} Association.","mla":"Poddebniak, Damian, et al. “Efail: Breaking S/MIME and OpenPGP Email Encryption Using Exfiltration Channels.” <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>, {USENIX} Association, 2018, pp. 549–66.","short":"D. Poddebniak, C. Dresen, J. Müller, F. Ising, S. Schinzel, S. Friedberger, J. Somorovsky, J. Schwenk, in: 27th {USENIX} Security Symposium ({USENIX} Security 18), {USENIX} Association, Baltimore, MD, 2018, pp. 549–566.","bibtex":"@inproceedings{Poddebniak_Dresen_Müller_Ising_Schinzel_Friedberger_Somorovsky_Schwenk_2018, place={Baltimore, MD}, title={Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels}, booktitle={27th {USENIX} Security Symposium ({USENIX} Security 18)}, publisher={{USENIX} Association}, author={Poddebniak, Damian and Dresen, Christian and Müller, Jens and Ising, Fabian and Schinzel, Sebastian and Friedberger, Simon and Somorovsky, Juraj and Schwenk, Jörg}, year={2018}, pages={549–566} }"},"page":"549-566","place":"Baltimore, MD","year":"2018","user_id":"83504","_id":"15905","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"27th {USENIX} Security Symposium ({USENIX} Security 18)","status":"public"},{"user_id":"83504","_id":"15906","language":[{"iso":"eng"}],"type":"conference","publication":"27th {USENIX} Security Symposium ({USENIX} Security 18)","status":"public","date_created":"2020-02-15T09:49:57Z","author":[{"first_name":"Hanno","full_name":"Böck, Hanno","last_name":"Böck"},{"first_name":"Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","id":"83504"},{"first_name":"Craig","full_name":"Young, Craig","last_name":"Young"}],"oa":"1","publisher":"{USENIX} Association","date_updated":"2022-01-06T06:52:40Z","main_file_link":[{"open_access":"1","url":"https://www.usenix.org/node/217495"}],"title":"Return Of Bleichenbacher\\textquoterights Oracle Threat (ROBOT)","publication_identifier":{"isbn":["978-1-939133-04-5"]},"citation":{"ama":"Böck H, Somorovsky J, Young C. Return Of Bleichenbacher\\textquoterights Oracle Threat (ROBOT). In: <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>. Baltimore, MD: {USENIX} Association; 2018:817-849.","chicago":"Böck, Hanno, Juraj Somorovsky, and Craig Young. “Return Of Bleichenbacher\\textquoterights Oracle Threat (ROBOT).” In <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>, 817–49. Baltimore, MD: {USENIX} Association, 2018.","ieee":"H. Böck, J. Somorovsky, and C. Young, “Return Of Bleichenbacher\\textquoterights Oracle Threat (ROBOT),” in <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>, 2018, pp. 817–849.","apa":"Böck, H., Somorovsky, J., &#38; Young, C. (2018). Return Of Bleichenbacher\\textquoterights Oracle Threat (ROBOT). In <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i> (pp. 817–849). Baltimore, MD: {USENIX} Association.","mla":"Böck, Hanno, et al. “Return Of Bleichenbacher\\textquoterights Oracle Threat (ROBOT).” <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>, {USENIX} Association, 2018, pp. 817–49.","bibtex":"@inproceedings{Böck_Somorovsky_Young_2018, place={Baltimore, MD}, title={Return Of Bleichenbacher\\textquoterights Oracle Threat (ROBOT)}, booktitle={27th {USENIX} Security Symposium ({USENIX} Security 18)}, publisher={{USENIX} Association}, author={Böck, Hanno and Somorovsky, Juraj and Young, Craig}, year={2018}, pages={817–849} }","short":"H. Böck, J. Somorovsky, C. Young, in: 27th {USENIX} Security Symposium ({USENIX} Security 18), {USENIX} Association, Baltimore, MD, 2018, pp. 817–849."},"page":"817-849","place":"Baltimore, MD","year":"2018"},{"oa":"1","publisher":"{USENIX} Association","date_updated":"2022-01-06T06:52:40Z","author":[{"last_name":"Engelbertz","full_name":"Engelbertz, Nils","first_name":"Nils"},{"first_name":"Nurullah","full_name":"Erinola, Nurullah","last_name":"Erinola"},{"first_name":"David","full_name":"Herring, David","last_name":"Herring"},{"full_name":"Somorovsky, Juraj","id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"},{"full_name":"Mladenov, Vladislav","last_name":"Mladenov","first_name":"Vladislav"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_created":"2020-02-15T10:07:49Z","title":"Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe","main_file_link":[{"open_access":"1","url":"https://www.usenix.org/node/220571"}],"place":"Baltimore, MD","year":"2018","citation":{"bibtex":"@inproceedings{Engelbertz_Erinola_Herring_Somorovsky_Mladenov_Schwenk_2018, place={Baltimore, MD}, title={Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe}, booktitle={12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)}, publisher={{USENIX} Association}, author={Engelbertz, Nils and Erinola, Nurullah and Herring, David and Somorovsky, Juraj and Mladenov, Vladislav and Schwenk, Jörg}, year={2018} }","short":"N. Engelbertz, N. Erinola, D. Herring, J. Somorovsky, V. Mladenov, J. Schwenk, in: 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), {USENIX} Association, Baltimore, MD, 2018.","mla":"Engelbertz, Nils, et al. “Security Analysis of EIDAS -- The Cross-Country Authentication Scheme in Europe.” <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)</i>, {USENIX} Association, 2018.","apa":"Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., &#38; Schwenk, J. (2018). Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe. In <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)</i>. Baltimore, MD: {USENIX} Association.","ama":"Engelbertz N, Erinola N, Herring D, Somorovsky J, Mladenov V, Schwenk J. Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe. In: <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)</i>. Baltimore, MD: {USENIX} Association; 2018.","chicago":"Engelbertz, Nils, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, and Jörg Schwenk. “Security Analysis of EIDAS -- The Cross-Country Authentication Scheme in Europe.” In <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)</i>. Baltimore, MD: {USENIX} Association, 2018.","ieee":"N. Engelbertz, N. Erinola, D. Herring, J. Somorovsky, V. Mladenov, and J. Schwenk, “Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe,” in <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)</i>, 2018."},"_id":"15914","user_id":"83504","language":[{"iso":"eng"}],"extern":"1","publication":"12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)","type":"conference","status":"public"}]
