---
_id: '12901'
abstract:
- lang: eng
  text: This work examines acoustic beamformers employing neural networks (NNs) for
    mask prediction as front-end for automatic speech recognition (ASR) systems for
    practical scenarios like voice-enabled home devices. To test the versatility of
    the mask predicting network, the system is evaluated with different recording
    hardware, different microphone array designs, and different acoustic models of
    the downstream ASR system. Significant gains in recognition accuracy are obtained
    in all configurations despite the fact that the NN had been trained on mismatched
    data. Unlike previous work, the NN is trained on a feature level objective, which
    gives some performance advantage over a mask related criterion. Furthermore, different
    approaches for realizing online, or adaptive, NN-based beamforming are explored,
    where the online algorithms still show significant gains compared to the baseline
    performance.
author:
- first_name: Christoph
  full_name: Boeddeker, Christoph
  id: '40767'
  last_name: Boeddeker
- first_name: Hakan
  full_name: Erdogan, Hakan
  last_name: Erdogan
- first_name: Takuya
  full_name: Yoshioka, Takuya
  last_name: Yoshioka
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Boeddeker C, Erdogan H, Yoshioka T, Haeb-Umbach R. Exploring Practical Aspects
    of Neural Mask-Based Beamforming for Far-Field Speech Recognition. In: <i>ICASSP
    2018, Calgary, Canada</i>. ; 2018.'
  apa: Boeddeker, C., Erdogan, H., Yoshioka, T., &#38; Haeb-Umbach, R. (2018). Exploring
    Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition.
    In <i>ICASSP 2018, Calgary, Canada</i>.
  bibtex: '@inproceedings{Boeddeker_Erdogan_Yoshioka_Haeb-Umbach_2018, title={Exploring
    Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition},
    booktitle={ICASSP 2018, Calgary, Canada}, author={Boeddeker, Christoph and Erdogan,
    Hakan and Yoshioka, Takuya and Haeb-Umbach, Reinhold}, year={2018} }'
  chicago: Boeddeker, Christoph, Hakan Erdogan, Takuya Yoshioka, and Reinhold Haeb-Umbach.
    “Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field Speech
    Recognition.” In <i>ICASSP 2018, Calgary, Canada</i>, 2018.
  ieee: C. Boeddeker, H. Erdogan, T. Yoshioka, and R. Haeb-Umbach, “Exploring Practical
    Aspects of Neural Mask-Based Beamforming for Far-Field Speech Recognition,” in
    <i>ICASSP 2018, Calgary, Canada</i>, 2018.
  mla: Boeddeker, Christoph, et al. “Exploring Practical Aspects of Neural Mask-Based
    Beamforming for Far-Field Speech Recognition.” <i>ICASSP 2018, Calgary, Canada</i>,
    2018.
  short: 'C. Boeddeker, H. Erdogan, T. Yoshioka, R. Haeb-Umbach, in: ICASSP 2018,
    Calgary, Canada, 2018.'
date_created: 2019-07-30T14:53:58Z
date_updated: 2022-01-06T06:51:24Z
department:
- _id: '54'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2018/ICASSP_2018_Boeddeker_Paper.pdf
oa: '1'
publication: ICASSP 2018, Calgary, Canada
related_material:
  link:
  - description: Poster
    relation: supplementary_material
    url: https://groups.uni-paderborn.de/nt/pubs/2018/ICASSP_2018_Boeddeker_Slides.pdf
status: public
title: Exploring Practical Aspects of Neural Mask-Based Beamforming for Far-Field
  Speech Recognition
type: conference
user_id: '44006'
year: '2018'
...
---
_id: '12937'
abstract:
- lang: ger
  text: Die Langzeitverfügbarkeit von Forschungsergebnissen und der dafür häufig notwendige
    langfristige Erhalt der Lauffähigkeit von Software ist eine gemeinschaftliche
    Herausforderung für Forschung, Softwareentwicklung und Gedächtnisinstitutionen.
    Es stehen verschiedene Maßnahmen wie Standardisierung, Emulation oder auch die
    Weiterentwicklung durch Open-Source-Communities zur Verfügung, die in unterschiedlichen
    Kontexten für unterschiedliche Arten von Software zum Einsatz kommen können.
- lang: eng
  text: Long-term availability of research findings is a challenge for research, software
    development, and memory institutions altogether. This often includes the necessity
    to keep research software running over a long time. There are various methods
    and actions like standardization, emulation, or the development of research software
    by an open source community which can be taken to achieve this goal.
author:
- first_name: Daniel
  full_name: Röwenstrunk, Daniel
  id: '439'
  last_name: Röwenstrunk
  orcid: https://orcid.org/0000-0001-6271-2095
citation:
  ama: Röwenstrunk D. Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich
    historisch-kritischer Musikedition. <i>Bibliothek Forschung und Praxis</i>. 2018;42(2):302–308.
    doi:<a href="https://doi.org/10.18452/18949">10.18452/18949</a>
  apa: Röwenstrunk, D. (2018). Langzeitverfügbarkeit von wissenschaftlicher Software
    im Bereich historisch-kritischer Musikedition. <i>Bibliothek Forschung und Praxis</i>,
    <i>42</i>(2), 302–308. <a href="https://doi.org/10.18452/18949">https://doi.org/10.18452/18949</a>
  bibtex: '@article{Röwenstrunk_2018, title={Langzeitverfügbarkeit von wissenschaftlicher
    Software im Bereich historisch-kritischer Musikedition}, volume={42}, DOI={<a
    href="https://doi.org/10.18452/18949">10.18452/18949</a>}, number={2}, journal={Bibliothek
    Forschung und Praxis}, publisher={Walter de Gruyter GmbH, Berlin/Boston}, author={Röwenstrunk,
    Daniel}, year={2018}, pages={302–308} }'
  chicago: 'Röwenstrunk, Daniel. “Langzeitverfügbarkeit von wissenschaftlicher Software
    im Bereich historisch-kritischer Musikedition.” <i>Bibliothek Forschung und Praxis</i>
    42, no. 2 (2018): 302–308. <a href="https://doi.org/10.18452/18949">https://doi.org/10.18452/18949</a>.'
  ieee: D. Röwenstrunk, “Langzeitverfügbarkeit von wissenschaftlicher Software im
    Bereich historisch-kritischer Musikedition,” <i>Bibliothek Forschung und Praxis</i>,
    vol. 42, no. 2, pp. 302–308, 2018.
  mla: Röwenstrunk, Daniel. “Langzeitverfügbarkeit von wissenschaftlicher Software
    im Bereich historisch-kritischer Musikedition.” <i>Bibliothek Forschung und Praxis</i>,
    vol. 42, no. 2, Walter de Gruyter GmbH, Berlin/Boston, 2018, pp. 302–308, doi:<a
    href="https://doi.org/10.18452/18949">10.18452/18949</a>.
  short: D. Röwenstrunk, Bibliothek Forschung und Praxis 42 (2018) 302–308.
date_created: 2019-08-16T13:14:44Z
date_updated: 2022-01-06T06:51:27Z
department:
- _id: '233'
- _id: '43'
doi: 10.18452/18949
intvolume: '        42'
issue: '2'
language:
- iso: ger
page: 302–308
publication: Bibliothek Forschung und Praxis
publication_status: published
publisher: Walter de Gruyter GmbH, Berlin/Boston
status: public
title: Langzeitverfügbarkeit von wissenschaftlicher Software im Bereich historisch-kritischer
  Musikedition
type: journal_article
user_id: '439'
volume: 42
year: '2018'
...
---
_id: '12965'
author:
- first_name: Ines
  full_name: Ghribi, Ines
  last_name: Ghribi
- first_name: Riadh Ben
  full_name: Abdallah, Riadh Ben
  last_name: Abdallah
- first_name: Mohamed
  full_name: Khalgui, Mohamed
  last_name: Khalgui
- first_name: Zhiwu
  full_name: Li, Zhiwu
  last_name: Li
- first_name: Khalid
  full_name: Alnowibet, Khalid
  last_name: Alnowibet
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: 'Ghribi I, Abdallah RB, Khalgui M, Li Z, Alnowibet K, Platzner M. R-Codesign:
    Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy
    Constraints. <i>IEEE Access</i>. 2018:14078-14092. doi:<a href="https://doi.org/10.1109/access.2018.2799852">10.1109/access.2018.2799852</a>'
  apa: 'Ghribi, I., Abdallah, R. B., Khalgui, M., Li, Z., Alnowibet, K., &#38; Platzner,
    M. (2018). R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded
    Systems Under Energy Constraints. <i>IEEE Access</i>, 14078–14092. <a href="https://doi.org/10.1109/access.2018.2799852">https://doi.org/10.1109/access.2018.2799852</a>'
  bibtex: '@article{Ghribi_Abdallah_Khalgui_Li_Alnowibet_Platzner_2018, title={R-Codesign:
    Codesign Methodology for Real-Time Reconfigurable Embedded Systems Under Energy
    Constraints}, DOI={<a href="https://doi.org/10.1109/access.2018.2799852">10.1109/access.2018.2799852</a>},
    journal={IEEE Access}, author={Ghribi, Ines and Abdallah, Riadh Ben and Khalgui,
    Mohamed and Li, Zhiwu and Alnowibet, Khalid and Platzner, Marco}, year={2018},
    pages={14078–14092} }'
  chicago: 'Ghribi, Ines, Riadh Ben Abdallah, Mohamed Khalgui, Zhiwu Li, Khalid Alnowibet,
    and Marco Platzner. “R-Codesign: Codesign Methodology for Real-Time Reconfigurable
    Embedded Systems Under Energy Constraints.” <i>IEEE Access</i>, 2018, 14078–92.
    <a href="https://doi.org/10.1109/access.2018.2799852">https://doi.org/10.1109/access.2018.2799852</a>.'
  ieee: 'I. Ghribi, R. B. Abdallah, M. Khalgui, Z. Li, K. Alnowibet, and M. Platzner,
    “R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems
    Under Energy Constraints,” <i>IEEE Access</i>, pp. 14078–14092, 2018.'
  mla: 'Ghribi, Ines, et al. “R-Codesign: Codesign Methodology for Real-Time Reconfigurable
    Embedded Systems Under Energy Constraints.” <i>IEEE Access</i>, 2018, pp. 14078–92,
    doi:<a href="https://doi.org/10.1109/access.2018.2799852">10.1109/access.2018.2799852</a>.'
  short: I. Ghribi, R.B. Abdallah, M. Khalgui, Z. Li, K. Alnowibet, M. Platzner, IEEE
    Access (2018) 14078–14092.
date_created: 2019-08-26T13:33:00Z
date_updated: 2022-01-06T06:51:27Z
department:
- _id: '78'
doi: 10.1109/access.2018.2799852
language:
- iso: eng
page: 14078-14092
publication: IEEE Access
publication_identifier:
  issn:
  - 2169-3536
publication_status: published
status: public
title: 'R-Codesign: Codesign Methodology for Real-Time Reconfigurable Embedded Systems
  Under Energy Constraints'
type: journal_article
user_id: '398'
year: '2018'
...
---
_id: '12974'
author:
- first_name: Sybille
  full_name: Hellebrand, Sybille
  id: '209'
  last_name: Hellebrand
  orcid: 0000-0002-3717-3939
- first_name: Joerg
  full_name: Henkel, Joerg
  last_name: Henkel
- first_name: Anand
  full_name: Raghunathan, Anand
  last_name: Raghunathan
- first_name: Hans-Joachim
  full_name: Wunderlich, Hans-Joachim
  last_name: Wunderlich
citation:
  ama: Hellebrand S, Henkel J, Raghunathan A, Wunderlich H-J. Guest Editors’ Introduction
    - Special Issue on Approximate Computing. <i>IEEE Embedded Systems Letters</i>.
    2018;10(1):1-1. doi:<a href="https://doi.org/10.1109/les.2018.2789942">10.1109/les.2018.2789942</a>
  apa: Hellebrand, S., Henkel, J., Raghunathan, A., &#38; Wunderlich, H.-J. (2018).
    Guest Editors’ Introduction - Special Issue on Approximate Computing. <i>IEEE
    Embedded Systems Letters</i>, <i>10</i>(1), 1–1. <a href="https://doi.org/10.1109/les.2018.2789942">https://doi.org/10.1109/les.2018.2789942</a>
  bibtex: '@article{Hellebrand_Henkel_Raghunathan_Wunderlich_2018, title={Guest Editors’
    Introduction - Special Issue on Approximate Computing}, volume={10}, DOI={<a href="https://doi.org/10.1109/les.2018.2789942">10.1109/les.2018.2789942</a>},
    number={1}, journal={IEEE Embedded Systems Letters}, publisher={IEEE}, author={Hellebrand,
    Sybille and Henkel, Joerg and Raghunathan, Anand and Wunderlich, Hans-Joachim},
    year={2018}, pages={1–1} }'
  chicago: 'Hellebrand, Sybille, Joerg Henkel, Anand Raghunathan, and Hans-Joachim
    Wunderlich. “Guest Editors’ Introduction - Special Issue on Approximate Computing.”
    <i>IEEE Embedded Systems Letters</i> 10, no. 1 (2018): 1–1. <a href="https://doi.org/10.1109/les.2018.2789942">https://doi.org/10.1109/les.2018.2789942</a>.'
  ieee: S. Hellebrand, J. Henkel, A. Raghunathan, and H.-J. Wunderlich, “Guest Editors’
    Introduction - Special Issue on Approximate Computing,” <i>IEEE Embedded Systems
    Letters</i>, vol. 10, no. 1, pp. 1–1, 2018.
  mla: Hellebrand, Sybille, et al. “Guest Editors’ Introduction - Special Issue on
    Approximate Computing.” <i>IEEE Embedded Systems Letters</i>, vol. 10, no. 1,
    IEEE, 2018, pp. 1–1, doi:<a href="https://doi.org/10.1109/les.2018.2789942">10.1109/les.2018.2789942</a>.
  short: S. Hellebrand, J. Henkel, A. Raghunathan, H.-J. Wunderlich, IEEE Embedded
    Systems Letters 10 (2018) 1–1.
date_created: 2019-08-28T08:40:58Z
date_updated: 2022-01-06T06:51:27Z
department:
- _id: '48'
doi: 10.1109/les.2018.2789942
intvolume: '        10'
issue: '1'
language:
- iso: eng
page: 1-1
publication: IEEE Embedded Systems Letters
publisher: IEEE
status: public
title: Guest Editors' Introduction - Special Issue on Approximate Computing
type: journal_article
user_id: '209'
volume: 10
year: '2018'
...
---
_id: '15418'
author:
- first_name: Phillipp
  full_name: Anders, Phillipp
  last_name: Anders
- first_name: Tim
  full_name: Lehmann, Tim
  last_name: Lehmann
- first_name: Helen
  full_name: Müller, Helen
  last_name: Müller
- first_name: Karoline B.
  full_name: Grønvik, Karoline B.
  last_name: Grønvik
- first_name: Nina
  full_name: Skjæret-Maroni, Nina
  last_name: Skjæret-Maroni
- first_name: Jochen
  full_name: Baumeister, Jochen
  id: '46'
  last_name: Baumeister
  orcid: 0000-0003-2683-5826
- first_name: Beatrix
  full_name: Vereijken, Beatrix
  last_name: Vereijken
citation:
  ama: Anders P, Lehmann T, Müller H, et al. Exergames Inherently Contain Cognitive
    Elements as Indicated by Cortical Processing. <i>Frontiers in Behavioral Neuroscience</i>.
    2018. doi:<a href="https://doi.org/10.3389/fnbeh.2018.00102">10.3389/fnbeh.2018.00102</a>
  apa: Anders, P., Lehmann, T., Müller, H., Grønvik, K. B., Skjæret-Maroni, N., Baumeister,
    J., &#38; Vereijken, B. (2018). Exergames Inherently Contain Cognitive Elements
    as Indicated by Cortical Processing. <i>Frontiers in Behavioral Neuroscience</i>.
    <a href="https://doi.org/10.3389/fnbeh.2018.00102">https://doi.org/10.3389/fnbeh.2018.00102</a>
  bibtex: '@article{Anders_Lehmann_Müller_Grønvik_Skjæret-Maroni_Baumeister_Vereijken_2018,
    title={Exergames Inherently Contain Cognitive Elements as Indicated by Cortical
    Processing}, DOI={<a href="https://doi.org/10.3389/fnbeh.2018.00102">10.3389/fnbeh.2018.00102</a>},
    journal={Frontiers in Behavioral Neuroscience}, author={Anders, Phillipp and Lehmann,
    Tim and Müller, Helen and Grønvik, Karoline B. and Skjæret-Maroni, Nina and Baumeister,
    Jochen and Vereijken, Beatrix}, year={2018} }'
  chicago: Anders, Phillipp, Tim Lehmann, Helen Müller, Karoline B. Grønvik, Nina
    Skjæret-Maroni, Jochen Baumeister, and Beatrix Vereijken. “Exergames Inherently
    Contain Cognitive Elements as Indicated by Cortical Processing.” <i>Frontiers
    in Behavioral Neuroscience</i>, 2018. <a href="https://doi.org/10.3389/fnbeh.2018.00102">https://doi.org/10.3389/fnbeh.2018.00102</a>.
  ieee: P. Anders <i>et al.</i>, “Exergames Inherently Contain Cognitive Elements
    as Indicated by Cortical Processing,” <i>Frontiers in Behavioral Neuroscience</i>,
    2018.
  mla: Anders, Phillipp, et al. “Exergames Inherently Contain Cognitive Elements as
    Indicated by Cortical Processing.” <i>Frontiers in Behavioral Neuroscience</i>,
    2018, doi:<a href="https://doi.org/10.3389/fnbeh.2018.00102">10.3389/fnbeh.2018.00102</a>.
  short: P. Anders, T. Lehmann, H. Müller, K.B. Grønvik, N. Skjæret-Maroni, J. Baumeister,
    B. Vereijken, Frontiers in Behavioral Neuroscience (2018).
date_created: 2019-12-28T17:22:19Z
date_updated: 2022-01-06T06:52:25Z
department:
- _id: '17'
- _id: '172'
doi: 10.3389/fnbeh.2018.00102
language:
- iso: eng
publication: Frontiers in Behavioral Neuroscience
publication_identifier:
  issn:
  - 1662-5153
publication_status: published
status: public
title: Exergames Inherently Contain Cognitive Elements as Indicated by Cortical Processing
type: journal_article
user_id: '62406'
year: '2018'
...
---
_id: '15584'
author:
- first_name: Johannes
  full_name: Magenheim, Johannes
  last_name: Magenheim
- first_name: Kathrin
  full_name: Müller, Kathrin
  last_name: Müller
- first_name: Carsten
  full_name: Schulte, Carsten
  last_name: Schulte
- first_name: Nadine
  full_name: Bergner, Nadine
  last_name: Bergner
- first_name: Kathrin
  full_name: Haselmeier, Kathrin
  last_name: Haselmeier
- first_name: Ludger
  full_name: Humbert, Ludger
  last_name: Humbert
- first_name: Dorothee
  full_name: Müller, Dorothee
  last_name: Müller
- first_name: Ulrik
  full_name: Schroeder, Ulrik
  last_name: Schroeder
citation:
  ama: 'Magenheim J, Müller K, Schulte C, et al. Evaluation of Learning Informatics
    in Primary Education - Views of Teachers and Students. In: <i>Informatics in Schools.
    Fundamentals of Computer Science and Software Engineering - 11th International
    Conference on Informatics in Schools: Situation, Evolution, and Perspectives,
    (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings</i>. ;
    2018:339-353. doi:<a href="https://doi.org/10.1007/978-3-030-02750-6\_26">10.1007/978-3-030-02750-6\_26</a>'
  apa: 'Magenheim, J., Müller, K., Schulte, C., Bergner, N., Haselmeier, K., Humbert,
    L., … Schroeder, U. (2018). Evaluation of Learning Informatics in Primary Education
    - Views of Teachers and Students. In <i>Informatics in Schools. Fundamentals of
    Computer Science and Software Engineering - 11th International Conference on Informatics
    in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg,
    Russia, October 10-12, 2018, Proceedings</i> (pp. 339–353). <a href="https://doi.org/10.1007/978-3-030-02750-6\_26">https://doi.org/10.1007/978-3-030-02750-6\_26</a>'
  bibtex: '@inproceedings{Magenheim_Müller_Schulte_Bergner_Haselmeier_Humbert_Müller_Schroeder_2018,
    title={Evaluation of Learning Informatics in Primary Education - Views of Teachers
    and Students}, DOI={<a href="https://doi.org/10.1007/978-3-030-02750-6\_26">10.1007/978-3-030-02750-6\_26</a>},
    booktitle={Informatics in Schools. Fundamentals of Computer Science and Software
    Engineering - 11th International Conference on Informatics in Schools: Situation,
    Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12,
    2018, Proceedings}, author={Magenheim, Johannes and Müller, Kathrin and Schulte,
    Carsten and Bergner, Nadine and Haselmeier, Kathrin and Humbert, Ludger and Müller,
    Dorothee and Schroeder, Ulrik}, year={2018}, pages={339–353} }'
  chicago: 'Magenheim, Johannes, Kathrin Müller, Carsten Schulte, Nadine Bergner,
    Kathrin Haselmeier, Ludger Humbert, Dorothee Müller, and Ulrik Schroeder. “Evaluation
    of Learning Informatics in Primary Education - Views of Teachers and Students.”
    In <i>Informatics in Schools. Fundamentals of Computer Science and Software Engineering
    - 11th International Conference on Informatics in Schools: Situation, Evolution,
    and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12, 2018, Proceedings</i>,
    339–53, 2018. <a href="https://doi.org/10.1007/978-3-030-02750-6\_26">https://doi.org/10.1007/978-3-030-02750-6\_26</a>.'
  ieee: 'J. Magenheim <i>et al.</i>, “Evaluation of Learning Informatics in Primary
    Education - Views of Teachers and Students,” in <i>Informatics in Schools. Fundamentals
    of Computer Science and Software Engineering - 11th International Conference on
    Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018,
    St. Petersburg, Russia, October 10-12, 2018, Proceedings</i>, 2018, pp. 339–353.'
  mla: 'Magenheim, Johannes, et al. “Evaluation of Learning Informatics in Primary
    Education - Views of Teachers and Students.” <i>Informatics in Schools. Fundamentals
    of Computer Science and Software Engineering - 11th International Conference on
    Informatics in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018,
    St. Petersburg, Russia, October 10-12, 2018, Proceedings</i>, 2018, pp. 339–53,
    doi:<a href="https://doi.org/10.1007/978-3-030-02750-6\_26">10.1007/978-3-030-02750-6\_26</a>.'
  short: 'J. Magenheim, K. Müller, C. Schulte, N. Bergner, K. Haselmeier, L. Humbert,
    D. Müller, U. Schroeder, in: Informatics in Schools. Fundamentals of Computer
    Science and Software Engineering - 11th International Conference on Informatics
    in Schools: Situation, Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg,
    Russia, October 10-12, 2018, Proceedings, 2018, pp. 339–353.'
date_created: 2020-01-15T08:57:23Z
date_updated: 2022-01-06T06:52:30Z
department:
- _id: '67'
doi: 10.1007/978-3-030-02750-6\_26
language:
- iso: eng
page: 339-353
publication: 'Informatics in Schools. Fundamentals of Computer Science and Software
  Engineering - 11th International Conference on Informatics in Schools: Situation,
  Evolution, and Perspectives, (ISSEP) 2018, St. Petersburg, Russia, October 10-12,
  2018, Proceedings'
status: public
title: Evaluation of Learning Informatics in Primary Education - Views of Teachers
  and Students
type: conference
user_id: '21145'
year: '2018'
...
---
_id: '15585'
author:
- first_name: Roman
  full_name: Bednarik, Roman
  last_name: Bednarik
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
- first_name: Lea
  full_name: Budde, Lea
  id: '32443'
  last_name: Budde
- first_name: Birte
  full_name: Heinemann, Birte
  last_name: Heinemann
- first_name: Hana
  full_name: Vrzakova, Hana
  last_name: Vrzakova
citation:
  ama: 'Bednarik R, Schulte C, Budde L, Heinemann B, Vrzakova H. Eye-movement Modeling
    Examples in Source Code Comprehension: A Classroom Study. In: <i>Proceedings of
    the 18th Koli Calling International Conference on Computing Education Research,
    Koli, Finland, November 22-25, 2018</i>. ; 2018:2:1-2:8. doi:<a href="https://doi.org/10.1145/3279720.3279722">10.1145/3279720.3279722</a>'
  apa: 'Bednarik, R., Schulte, C., Budde, L., Heinemann, B., &#38; Vrzakova, H. (2018).
    Eye-movement Modeling Examples in Source Code Comprehension: A Classroom Study.
    In <i>Proceedings of the 18th Koli Calling International Conference on Computing
    Education Research, Koli, Finland, November 22-25, 2018</i> (pp. 2:1-2:8). <a
    href="https://doi.org/10.1145/3279720.3279722">https://doi.org/10.1145/3279720.3279722</a>'
  bibtex: '@inproceedings{Bednarik_Schulte_Budde_Heinemann_Vrzakova_2018, title={Eye-movement
    Modeling Examples in Source Code Comprehension: A Classroom Study}, DOI={<a href="https://doi.org/10.1145/3279720.3279722">10.1145/3279720.3279722</a>},
    booktitle={Proceedings of the 18th Koli Calling International Conference on Computing
    Education Research, Koli, Finland, November 22-25, 2018}, author={Bednarik, Roman
    and Schulte, Carsten and Budde, Lea and Heinemann, Birte and Vrzakova, Hana},
    year={2018}, pages={2:1-2:8} }'
  chicago: 'Bednarik, Roman, Carsten Schulte, Lea Budde, Birte Heinemann, and Hana
    Vrzakova. “Eye-Movement Modeling Examples in Source Code Comprehension: A Classroom
    Study.” In <i>Proceedings of the 18th Koli Calling International Conference on
    Computing Education Research, Koli, Finland, November 22-25, 2018</i>, 2:1-2:8,
    2018. <a href="https://doi.org/10.1145/3279720.3279722">https://doi.org/10.1145/3279720.3279722</a>.'
  ieee: 'R. Bednarik, C. Schulte, L. Budde, B. Heinemann, and H. Vrzakova, “Eye-movement
    Modeling Examples in Source Code Comprehension: A Classroom Study,” in <i>Proceedings
    of the 18th Koli Calling International Conference on Computing Education Research,
    Koli, Finland, November 22-25, 2018</i>, 2018, pp. 2:1-2:8.'
  mla: 'Bednarik, Roman, et al. “Eye-Movement Modeling Examples in Source Code Comprehension:
    A Classroom Study.” <i>Proceedings of the 18th Koli Calling International Conference
    on Computing Education Research, Koli, Finland, November 22-25, 2018</i>, 2018,
    pp. 2:1-2:8, doi:<a href="https://doi.org/10.1145/3279720.3279722">10.1145/3279720.3279722</a>.'
  short: 'R. Bednarik, C. Schulte, L. Budde, B. Heinemann, H. Vrzakova, in: Proceedings
    of the 18th Koli Calling International Conference on Computing Education Research,
    Koli, Finland, November 22-25, 2018, 2018, pp. 2:1-2:8.'
date_created: 2020-01-15T09:00:46Z
date_updated: 2022-01-06T06:52:30Z
department:
- _id: '67'
doi: 10.1145/3279720.3279722
language:
- iso: eng
page: 2:1-2:8
publication: Proceedings of the 18th Koli Calling International Conference on Computing
  Education Research, Koli, Finland, November 22-25, 2018
status: public
title: 'Eye-movement Modeling Examples in Source Code Comprehension: A Classroom Study'
type: conference
user_id: '21145'
year: '2018'
...
---
_id: '15586'
author:
- first_name: Kathrin
  full_name: Müller, Kathrin
  last_name: Müller
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
citation:
  ama: 'Müller K, Schulte C. Are children perceiving robots as supporting or replacing
    humans?: first empirical results and classification of preconceptions within a
    theoretical framework. In: <i>Proceedings of the 13th Workshop in Primary and
    Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>.
    ; 2018:10:1-10:4. doi:<a href="https://doi.org/10.1145/3265757.3265767">10.1145/3265757.3265767</a>'
  apa: 'Müller, K., &#38; Schulte, C. (2018). Are children perceiving robots as supporting
    or replacing humans?: first empirical results and classification of preconceptions
    within a theoretical framework. In <i>Proceedings of the 13th Workshop in Primary
    and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06,
    2018</i> (pp. 10:1-10:4). <a href="https://doi.org/10.1145/3265757.3265767">https://doi.org/10.1145/3265757.3265767</a>'
  bibtex: '@inproceedings{Müller_Schulte_2018, title={Are children perceiving robots
    as supporting or replacing humans?: first empirical results and classification
    of preconceptions within a theoretical framework}, DOI={<a href="https://doi.org/10.1145/3265757.3265767">10.1145/3265757.3265767</a>},
    booktitle={Proceedings of the 13th Workshop in Primary and Secondary Computing
    Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018}, author={Müller,
    Kathrin and Schulte, Carsten}, year={2018}, pages={10:1-10:4} }'
  chicago: 'Müller, Kathrin, and Carsten Schulte. “Are Children Perceiving Robots
    as Supporting or Replacing Humans?: First Empirical Results and Classification
    of Preconceptions within a Theoretical Framework.” In <i>Proceedings of the 13th
    Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany,
    October 04-06, 2018</i>, 10:1-10:4, 2018. <a href="https://doi.org/10.1145/3265757.3265767">https://doi.org/10.1145/3265757.3265767</a>.'
  ieee: 'K. Müller and C. Schulte, “Are children perceiving robots as supporting or
    replacing humans?: first empirical results and classification of preconceptions
    within a theoretical framework,” in <i>Proceedings of the 13th Workshop in Primary
    and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06,
    2018</i>, 2018, pp. 10:1-10:4.'
  mla: 'Müller, Kathrin, and Carsten Schulte. “Are Children Perceiving Robots as Supporting
    or Replacing Humans?: First Empirical Results and Classification of Preconceptions
    within a Theoretical Framework.” <i>Proceedings of the 13th Workshop in Primary
    and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06,
    2018</i>, 2018, pp. 10:1-10:4, doi:<a href="https://doi.org/10.1145/3265757.3265767">10.1145/3265757.3265767</a>.'
  short: 'K. Müller, C. Schulte, in: Proceedings of the 13th Workshop in Primary and
    Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018,
    2018, pp. 10:1-10:4.'
date_created: 2020-01-15T09:03:32Z
date_updated: 2022-01-06T06:52:30Z
department:
- _id: '67'
doi: 10.1145/3265757.3265767
language:
- iso: eng
page: 10:1-10:4
publication: Proceedings of the 13th Workshop in Primary and Secondary Computing Education,
  WiPSCE 2018, Potsdam, Germany, October 04-06, 2018
status: public
title: 'Are children perceiving robots as supporting or replacing humans?: first empirical
  results and classification of preconceptions within a theoretical framework'
type: conference
user_id: '21145'
year: '2018'
...
---
_id: '15587'
author:
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
- first_name: Jessica
  full_name: Krüger, Jessica
  last_name: Krüger
- first_name: Andreas
  full_name: Gödecke, Andreas
  last_name: Gödecke
- first_name: Ann-Katrin
  full_name: Schmidt, Ann-Katrin
  last_name: Schmidt
citation:
  ama: 'Schulte C, Krüger J, Gödecke A, Schmidt A-K. The computing repair cafe: a
    concept for repair cafes in computing edcuation. In: <i>Proceedings of the 13th
    Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany,
    October 04-06, 2018</i>. ; 2018:24:1-24:6. doi:<a href="https://doi.org/10.1145/3265757.3265781">10.1145/3265757.3265781</a>'
  apa: 'Schulte, C., Krüger, J., Gödecke, A., &#38; Schmidt, A.-K. (2018). The computing
    repair cafe: a concept for repair cafes in computing edcuation. In <i>Proceedings
    of the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018,
    Potsdam, Germany, October 04-06, 2018</i> (pp. 24:1-24:6). <a href="https://doi.org/10.1145/3265757.3265781">https://doi.org/10.1145/3265757.3265781</a>'
  bibtex: '@inproceedings{Schulte_Krüger_Gödecke_Schmidt_2018, title={The computing
    repair cafe: a concept for repair cafes in computing edcuation}, DOI={<a href="https://doi.org/10.1145/3265757.3265781">10.1145/3265757.3265781</a>},
    booktitle={Proceedings of the 13th Workshop in Primary and Secondary Computing
    Education, WiPSCE 2018, Potsdam, Germany, October 04-06, 2018}, author={Schulte,
    Carsten and Krüger, Jessica and Gödecke, Andreas and Schmidt, Ann-Katrin}, year={2018},
    pages={24:1-24:6} }'
  chicago: 'Schulte, Carsten, Jessica Krüger, Andreas Gödecke, and Ann-Katrin Schmidt.
    “The Computing Repair Cafe: A Concept for Repair Cafes in Computing Edcuation.”
    In <i>Proceedings of the 13th Workshop in Primary and Secondary Computing Education,
    WiPSCE 2018, Potsdam, Germany, October 04-06, 2018</i>, 24:1-24:6, 2018. <a href="https://doi.org/10.1145/3265757.3265781">https://doi.org/10.1145/3265757.3265781</a>.'
  ieee: 'C. Schulte, J. Krüger, A. Gödecke, and A.-K. Schmidt, “The computing repair
    cafe: a concept for repair cafes in computing edcuation,” in <i>Proceedings of
    the 13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam,
    Germany, October 04-06, 2018</i>, 2018, pp. 24:1-24:6.'
  mla: 'Schulte, Carsten, et al. “The Computing Repair Cafe: A Concept for Repair
    Cafes in Computing Edcuation.” <i>Proceedings of the 13th Workshop in Primary
    and Secondary Computing Education, WiPSCE 2018, Potsdam, Germany, October 04-06,
    2018</i>, 2018, pp. 24:1-24:6, doi:<a href="https://doi.org/10.1145/3265757.3265781">10.1145/3265757.3265781</a>.'
  short: 'C. Schulte, J. Krüger, A. Gödecke, A.-K. Schmidt, in: Proceedings of the
    13th Workshop in Primary and Secondary Computing Education, WiPSCE 2018, Potsdam,
    Germany, October 04-06, 2018, 2018, pp. 24:1-24:6.'
date_created: 2020-01-15T09:05:13Z
date_updated: 2022-01-06T06:52:30Z
department:
- _id: '67'
doi: 10.1145/3265757.3265781
language:
- iso: eng
page: 24:1-24:6
publication: Proceedings of the 13th Workshop in Primary and Secondary Computing Education,
  WiPSCE 2018, Potsdam, Germany, October 04-06, 2018
status: public
title: 'The computing repair cafe: a concept for repair cafes in computing edcuation'
type: conference
user_id: '21145'
year: '2018'
...
---
_id: '15588'
citation:
  ama: Bednarik R, Schulte C, eds. <i>Proceedings of the Workshop on Eye Movements
    in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>. (ACM); 2018.
  apa: Bednarik, R., &#38; Schulte, C. (Eds.). (2018). <i>Proceedings of the Workshop
    on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>.
    (ACM).
  bibtex: '@book{Bednarik_Schulte_2018, title={Proceedings of the Workshop on Eye
    Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018}, publisher={(ACM)},
    year={2018} }'
  chicago: Bednarik, Roman, and Carsten Schulte, eds. <i>Proceedings of the Workshop
    on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>.
    (ACM), 2018.
  ieee: R. Bednarik and C. Schulte, Eds., <i>Proceedings of the Workshop on Eye Movements
    in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>. (ACM), 2018.
  mla: Bednarik, Roman, and Carsten Schulte, editors. <i>Proceedings of the Workshop
    on Eye Movements in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018</i>.
    (ACM), 2018.
  short: R. Bednarik, C. Schulte, eds., Proceedings of the Workshop on Eye Movements
    in Programming, EMIP@ETRA 2018, Warsaw, Poland, June 15, 2018, (ACM), 2018.
date_created: 2020-01-15T09:07:01Z
date_updated: 2022-01-06T06:52:30Z
department:
- _id: '67'
editor:
- first_name: Roman
  full_name: Bednarik, Roman
  last_name: Bednarik
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
language:
- iso: eng
publisher: (ACM)
status: public
title: Proceedings of the Workshop on Eye Movements in Programming, EMIP@ETRA 2018,
  Warsaw, Poland, June 15, 2018
type: conference_editor
user_id: '21145'
year: '2018'
...
---
_id: '15595'
author:
- first_name: Sue
  full_name: Sentance, Sue
  last_name: Sentance
- first_name: Erik
  full_name: Barendsen, Erik
  last_name: Barendsen
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
citation:
  ama: 'Sentance S, Barendsen E, Schulte C. <i>Computer Science Education: Perspectives
    on Teaching and Learning in School</i>. Bloomsbury Publishing; 2018.'
  apa: 'Sentance, S., Barendsen, E., &#38; Schulte, C. (2018). <i>Computer Science
    Education: Perspectives on Teaching and learning in school</i>. Bloomsbury Publishing.'
  bibtex: '@book{Sentance_Barendsen_Schulte_2018, title={Computer Science Education:
    Perspectives on Teaching and learning in school}, publisher={Bloomsbury Publishing},
    author={Sentance, Sue and Barendsen, Erik and Schulte, Carsten}, year={2018} }'
  chicago: 'Sentance, Sue, Erik Barendsen, and Carsten Schulte. <i>Computer Science
    Education: Perspectives on Teaching and Learning in School</i>. Bloomsbury Publishing,
    2018.'
  ieee: 'S. Sentance, E. Barendsen, and C. Schulte, <i>Computer Science Education:
    Perspectives on Teaching and learning in school</i>. Bloomsbury Publishing, 2018.'
  mla: 'Sentance, Sue, et al. <i>Computer Science Education: Perspectives on Teaching
    and Learning in School</i>. Bloomsbury Publishing, 2018.'
  short: 'S. Sentance, E. Barendsen, C. Schulte, Computer Science Education: Perspectives
    on Teaching and Learning in School, Bloomsbury Publishing, 2018.'
date_created: 2020-01-16T08:29:15Z
date_updated: 2022-01-06T06:52:30Z
department:
- _id: '67'
language:
- iso: eng
publisher: Bloomsbury Publishing
status: public
title: 'Computer Science Education: Perspectives on Teaching and learning in school'
type: book
user_id: '21145'
year: '2018'
...
---
_id: '15647'
author:
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
- first_name: Lea
  full_name: Budde, Lea
  id: '32443'
  last_name: Budde
citation:
  ama: 'Schulte C, Budde L. A Framework for Computing Education: Hybrid Interaction
    System: The need for a bigger picture in computing education. In: <i>Koli Calling</i>.
    ACM; 2018:12:1-12:10.'
  apa: 'Schulte, C., &#38; Budde, L. (2018). A Framework for Computing Education:
    Hybrid Interaction System: The need for a bigger picture in computing education.
    In <i>Koli Calling</i> (pp. 12:1-12:10). ACM.'
  bibtex: '@inproceedings{Schulte_Budde_2018, title={A Framework for Computing Education:
    Hybrid Interaction System: The need for a bigger picture in computing education},
    booktitle={Koli Calling}, publisher={ACM}, author={Schulte, Carsten and Budde,
    Lea}, year={2018}, pages={12:1-12:10} }'
  chicago: 'Schulte, Carsten, and Lea Budde. “A Framework for Computing Education:
    Hybrid Interaction System: The Need for a Bigger Picture in Computing Education.”
    In <i>Koli Calling</i>, 12:1-12:10. ACM, 2018.'
  ieee: 'C. Schulte and L. Budde, “A Framework for Computing Education: Hybrid Interaction
    System: The need for a bigger picture in computing education,” in <i>Koli Calling</i>,
    2018, pp. 12:1-12:10.'
  mla: 'Schulte, Carsten, and Lea Budde. “A Framework for Computing Education: Hybrid
    Interaction System: The Need for a Bigger Picture in Computing Education.” <i>Koli
    Calling</i>, ACM, 2018, pp. 12:1-12:10.'
  short: 'C. Schulte, L. Budde, in: Koli Calling, ACM, 2018, pp. 12:1-12:10.'
date_created: 2020-01-28T10:28:42Z
date_updated: 2022-01-06T06:52:31Z
department:
- _id: '67'
language:
- iso: eng
page: 12:1-12:10
publication: Koli Calling
publisher: ACM
status: public
title: 'A Framework for Computing Education: Hybrid Interaction System: The need for
  a bigger picture in computing education'
type: conference
user_id: '21145'
year: '2018'
...
---
_id: '15845'
article_type: original
author:
- first_name: Ali
  full_name: Ameli, Ali
  last_name: Ameli
- first_name: Stefan
  full_name: Krauter, Stefan
  id: '28836'
  last_name: Krauter
  orcid: 0000-0002-3594-260X
- first_name: Mohammad Taghi
  full_name: Ameli, Mohammad Taghi
  last_name: Ameli
- first_name: Saeid
  full_name: Moslehpour, Saeid
  last_name: Moslehpour
citation:
  ama: Ameli A, Krauter S, Ameli MT, Moslehpour S. Smart charging management system
    of plugged-in EVs based on user driving patterns in micro-grids. <i>International
    Journal of Engineering Research &#38; Innovation</i>. 2018;10(1).
  apa: Ameli, A., Krauter, S., Ameli, M. T., &#38; Moslehpour, S. (2018). Smart charging
    management system of plugged-in EVs based on user driving patterns in micro-grids.
    <i>International Journal of Engineering Research &#38; Innovation</i>, <i>10</i>(1).
  bibtex: '@article{Ameli_Krauter_Ameli_Moslehpour_2018, title={Smart charging management
    system of plugged-in EVs based on user driving patterns in micro-grids}, volume={10},
    number={1}, journal={International Journal of Engineering Research &#38; Innovation},
    author={Ameli, Ali and Krauter, Stefan and Ameli, Mohammad Taghi and Moslehpour,
    Saeid}, year={2018} }'
  chicago: Ameli, Ali, Stefan Krauter, Mohammad Taghi Ameli, and Saeid Moslehpour.
    “Smart Charging Management System of Plugged-in EVs Based on User Driving Patterns
    in Micro-Grids.” <i>International Journal of Engineering Research &#38; Innovation</i>
    10, no. 1 (2018).
  ieee: A. Ameli, S. Krauter, M. T. Ameli, and S. Moslehpour, “Smart charging management
    system of plugged-in EVs based on user driving patterns in micro-grids,” <i>International
    Journal of Engineering Research &#38; Innovation</i>, vol. 10, no. 1, 2018.
  mla: Ameli, Ali, et al. “Smart Charging Management System of Plugged-in EVs Based
    on User Driving Patterns in Micro-Grids.” <i>International Journal of Engineering
    Research &#38; Innovation</i>, vol. 10, no. 1, 2018.
  short: A. Ameli, S. Krauter, M.T. Ameli, S. Moslehpour, International Journal of
    Engineering Research &#38; Innovation 10 (2018).
date_created: 2020-02-10T09:45:43Z
date_updated: 2022-01-06T06:52:38Z
department:
- _id: '53'
intvolume: '        10'
issue: '1'
language:
- iso: eng
publication: International Journal of Engineering Research & Innovation
publication_identifier:
  issn:
  - 2152 4157
publication_status: published
status: public
title: Smart charging management system of plugged-in EVs based on user driving patterns
  in micro-grids
type: journal_article
user_id: '16148'
volume: 10
year: '2018'
...
---
_id: '15876'
author:
- first_name: Alan Adam
  full_name: Camberg, Alan Adam
  id: '60544'
  last_name: Camberg
- first_name: Katja
  full_name: Engelkemeier, Katja
  last_name: Engelkemeier
- first_name: Jan
  full_name: Dietrich, Jan
  last_name: Dietrich
- first_name: Thomas
  full_name: Heggemann, Thomas
  last_name: Heggemann
citation:
  ama: Camberg AA, Engelkemeier K, Dietrich J, Heggemann T. Top-down design of tailored
    fiber-metal laminates. <i>Lightweight Design worldwide</i>. 2018;11(2):24-29.
    doi:<a href="https://doi.org/10.1007/s41777-018-0004-1">10.1007/s41777-018-0004-1</a>
  apa: Camberg, A. A., Engelkemeier, K., Dietrich, J., &#38; Heggemann, T. (2018).
    Top-down design of tailored fiber-metal laminates. <i>Lightweight Design Worldwide</i>,
    <i>11</i>(2), 24–29. <a href="https://doi.org/10.1007/s41777-018-0004-1">https://doi.org/10.1007/s41777-018-0004-1</a>
  bibtex: '@article{Camberg_Engelkemeier_Dietrich_Heggemann_2018, title={Top-down
    design of tailored fiber-metal laminates}, volume={11}, DOI={<a href="https://doi.org/10.1007/s41777-018-0004-1">10.1007/s41777-018-0004-1</a>},
    number={2}, journal={Lightweight Design worldwide}, publisher={Springer Vieweg},
    author={Camberg, Alan Adam and Engelkemeier, Katja and Dietrich, Jan and Heggemann,
    Thomas}, year={2018}, pages={24–29} }'
  chicago: 'Camberg, Alan Adam, Katja Engelkemeier, Jan Dietrich, and Thomas Heggemann.
    “Top-down Design of Tailored Fiber-Metal Laminates.” <i>Lightweight Design Worldwide</i>
    11, no. 2 (2018): 24–29. <a href="https://doi.org/10.1007/s41777-018-0004-1">https://doi.org/10.1007/s41777-018-0004-1</a>.'
  ieee: A. A. Camberg, K. Engelkemeier, J. Dietrich, and T. Heggemann, “Top-down design
    of tailored fiber-metal laminates,” <i>Lightweight Design worldwide</i>, vol.
    11, no. 2, pp. 24–29, 2018.
  mla: Camberg, Alan Adam, et al. “Top-down Design of Tailored Fiber-Metal Laminates.”
    <i>Lightweight Design Worldwide</i>, vol. 11, no. 2, Springer Vieweg, 2018, pp.
    24–29, doi:<a href="https://doi.org/10.1007/s41777-018-0004-1">10.1007/s41777-018-0004-1</a>.
  short: A.A. Camberg, K. Engelkemeier, J. Dietrich, T. Heggemann, Lightweight Design
    Worldwide 11 (2018) 24–29.
date_created: 2020-02-11T10:25:31Z
date_updated: 2022-01-06T06:52:39Z
department:
- _id: '9'
- _id: '321'
- _id: '149'
doi: 10.1007/s41777-018-0004-1
intvolume: '        11'
issue: '2'
language:
- iso: eng
page: 24-29
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: Lightweight Design worldwide
publication_identifier:
  issn:
  - 2510-2877
publication_status: published
publisher: Springer Vieweg
status: public
title: Top-down design of tailored fiber-metal laminates
type: journal_article
user_id: '60544'
volume: 11
year: '2018'
...
---
_id: '15892'
author:
- first_name: Martin R.
  full_name: Albrecht, Martin R.
  last_name: Albrecht
- first_name: Jake
  full_name: Massimo, Jake
  last_name: Massimo
- first_name: Kenneth G.
  full_name: Paterson, Kenneth G.
  last_name: Paterson
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
citation:
  ama: 'Albrecht MR, Massimo J, Paterson KG, Somorovsky J. Prime and Prejudice: Primality
    Testing Under Adversarial Conditions. In: <i>Proceedings of the 2018 ACM SIGSAC
    Conference on Computer and Communications Security</i>. ; 2018. doi:<a href="https://doi.org/10.1145/3243734.3243787">10.1145/3243734.3243787</a>'
  apa: 'Albrecht, M. R., Massimo, J., Paterson, K. G., &#38; Somorovsky, J. (2018).
    Prime and Prejudice: Primality Testing Under Adversarial Conditions. In <i>Proceedings
    of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>.
    <a href="https://doi.org/10.1145/3243734.3243787">https://doi.org/10.1145/3243734.3243787</a>'
  bibtex: '@inproceedings{Albrecht_Massimo_Paterson_Somorovsky_2018, title={Prime
    and Prejudice: Primality Testing Under Adversarial Conditions}, DOI={<a href="https://doi.org/10.1145/3243734.3243787">10.1145/3243734.3243787</a>},
    booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications
    Security}, author={Albrecht, Martin R. and Massimo, Jake and Paterson, Kenneth
    G. and Somorovsky, Juraj}, year={2018} }'
  chicago: 'Albrecht, Martin R., Jake Massimo, Kenneth G. Paterson, and Juraj Somorovsky.
    “Prime and Prejudice: Primality Testing Under Adversarial Conditions.” In <i>Proceedings
    of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>,
    2018. <a href="https://doi.org/10.1145/3243734.3243787">https://doi.org/10.1145/3243734.3243787</a>.'
  ieee: 'M. R. Albrecht, J. Massimo, K. G. Paterson, and J. Somorovsky, “Prime and
    Prejudice: Primality Testing Under Adversarial Conditions,” in <i>Proceedings
    of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>,
    2018.'
  mla: 'Albrecht, Martin R., et al. “Prime and Prejudice: Primality Testing Under
    Adversarial Conditions.” <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer
    and Communications Security</i>, 2018, doi:<a href="https://doi.org/10.1145/3243734.3243787">10.1145/3243734.3243787</a>.'
  short: 'M.R. Albrecht, J. Massimo, K.G. Paterson, J. Somorovsky, in: Proceedings
    of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.'
date_created: 2020-02-15T09:34:47Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1145/3243734.3243787
extern: '1'
language:
- iso: eng
main_file_link:
- url: https://eprint.iacr.org/2018/749
publication: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications
  Security
publication_identifier:
  isbn:
  - '9781450356930'
publication_status: published
status: public
title: 'Prime and Prejudice: Primality Testing Under Adversarial Conditions'
type: conference
user_id: '83504'
year: '2018'
...
---
_id: '15893'
author:
- first_name: Damian
  full_name: Poddebniak, Damian
  last_name: Poddebniak
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Sebastian
  full_name: Schinzel, Sebastian
  last_name: Schinzel
- first_name: Manfred
  full_name: Lochter, Manfred
  last_name: Lochter
- first_name: Paul
  full_name: Rosler, Paul
  last_name: Rosler
citation:
  ama: 'Poddebniak D, Somorovsky J, Schinzel S, Lochter M, Rosler P. Attacking Deterministic
    Signature Schemes Using Fault Attacks. In: <i>2018 IEEE European Symposium on
    Security and Privacy (EuroS&#38;P)</i>. ; 2018. doi:<a href="https://doi.org/10.1109/eurosp.2018.00031">10.1109/eurosp.2018.00031</a>'
  apa: Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., &#38; Rosler, P.
    (2018). Attacking Deterministic Signature Schemes Using Fault Attacks. In <i>2018
    IEEE European Symposium on Security and Privacy (EuroS&#38;P)</i>. <a href="https://doi.org/10.1109/eurosp.2018.00031">https://doi.org/10.1109/eurosp.2018.00031</a>
  bibtex: '@inproceedings{Poddebniak_Somorovsky_Schinzel_Lochter_Rosler_2018, title={Attacking
    Deterministic Signature Schemes Using Fault Attacks}, DOI={<a href="https://doi.org/10.1109/eurosp.2018.00031">10.1109/eurosp.2018.00031</a>},
    booktitle={2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)},
    author={Poddebniak, Damian and Somorovsky, Juraj and Schinzel, Sebastian and Lochter,
    Manfred and Rosler, Paul}, year={2018} }'
  chicago: Poddebniak, Damian, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter,
    and Paul Rosler. “Attacking Deterministic Signature Schemes Using Fault Attacks.”
    In <i>2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)</i>,
    2018. <a href="https://doi.org/10.1109/eurosp.2018.00031">https://doi.org/10.1109/eurosp.2018.00031</a>.
  ieee: D. Poddebniak, J. Somorovsky, S. Schinzel, M. Lochter, and P. Rosler, “Attacking
    Deterministic Signature Schemes Using Fault Attacks,” in <i>2018 IEEE European
    Symposium on Security and Privacy (EuroS&#38;P)</i>, 2018.
  mla: Poddebniak, Damian, et al. “Attacking Deterministic Signature Schemes Using
    Fault Attacks.” <i>2018 IEEE European Symposium on Security and Privacy (EuroS&#38;P)</i>,
    2018, doi:<a href="https://doi.org/10.1109/eurosp.2018.00031">10.1109/eurosp.2018.00031</a>.
  short: 'D. Poddebniak, J. Somorovsky, S. Schinzel, M. Lochter, P. Rosler, in: 2018
    IEEE European Symposium on Security and Privacy (EuroS&#38;P), 2018.'
date_created: 2020-02-15T09:35:53Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1109/eurosp.2018.00031
language:
- iso: eng
publication: 2018 IEEE European Symposium on Security and Privacy (EuroS&P)
publication_identifier:
  isbn:
  - '9781538642283'
publication_status: published
status: public
title: Attacking Deterministic Signature Schemes Using Fault Attacks
type: conference
user_id: '83504'
year: '2018'
...
---
_id: '15894'
author:
- first_name: Dennis
  full_name: Detering, Dennis
  last_name: Detering
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Christian
  full_name: Mainka, Christian
  last_name: Mainka
- first_name: Vladislav
  full_name: Mladenov, Vladislav
  last_name: Mladenov
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Detering D, Somorovsky J, Mainka C, Mladenov V, Schwenk J. On The (In-)Security
    Of JavaScript Object Signing And Encryption. In: <i>Proceedings of the 1st Reversing
    and Offensive-Oriented Trends Symposium on - ROOTS</i>. ; 2018. doi:<a href="https://doi.org/10.1145/3150376.3150379">10.1145/3150376.3150379</a>'
  apa: Detering, D., Somorovsky, J., Mainka, C., Mladenov, V., &#38; Schwenk, J. (2018).
    On The (In-)Security Of JavaScript Object Signing And Encryption. In <i>Proceedings
    of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS</i>. <a
    href="https://doi.org/10.1145/3150376.3150379">https://doi.org/10.1145/3150376.3150379</a>
  bibtex: '@inproceedings{Detering_Somorovsky_Mainka_Mladenov_Schwenk_2018, title={On
    The (In-)Security Of JavaScript Object Signing And Encryption}, DOI={<a href="https://doi.org/10.1145/3150376.3150379">10.1145/3150376.3150379</a>},
    booktitle={Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium
    on - ROOTS}, author={Detering, Dennis and Somorovsky, Juraj and Mainka, Christian
    and Mladenov, Vladislav and Schwenk, Jörg}, year={2018} }'
  chicago: Detering, Dennis, Juraj Somorovsky, Christian Mainka, Vladislav Mladenov,
    and Jörg Schwenk. “On The (In-)Security Of JavaScript Object Signing And Encryption.”
    In <i>Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium
    on - ROOTS</i>, 2018. <a href="https://doi.org/10.1145/3150376.3150379">https://doi.org/10.1145/3150376.3150379</a>.
  ieee: D. Detering, J. Somorovsky, C. Mainka, V. Mladenov, and J. Schwenk, “On The
    (In-)Security Of JavaScript Object Signing And Encryption,” in <i>Proceedings
    of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS</i>, 2018.
  mla: Detering, Dennis, et al. “On The (In-)Security Of JavaScript Object Signing
    And Encryption.” <i>Proceedings of the 1st Reversing and Offensive-Oriented Trends
    Symposium on - ROOTS</i>, 2018, doi:<a href="https://doi.org/10.1145/3150376.3150379">10.1145/3150376.3150379</a>.
  short: 'D. Detering, J. Somorovsky, C. Mainka, V. Mladenov, J. Schwenk, in: Proceedings
    of the 1st Reversing and Offensive-Oriented Trends Symposium on - ROOTS, 2018.'
date_created: 2020-02-15T09:36:33Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1145/3150376.3150379
language:
- iso: eng
publication: Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium
  on - ROOTS
publication_identifier:
  isbn:
  - '9781450353212'
publication_status: published
status: public
title: On The (In-)Security Of JavaScript Object Signing And Encryption
type: conference
user_id: '83504'
year: '2018'
...
---
_id: '15905'
author:
- first_name: Damian
  full_name: Poddebniak, Damian
  last_name: Poddebniak
- first_name: Christian
  full_name: Dresen, Christian
  last_name: Dresen
- first_name: Jens
  full_name: Müller, Jens
  last_name: Müller
- first_name: Fabian
  full_name: Ising, Fabian
  last_name: Ising
- first_name: Sebastian
  full_name: Schinzel, Sebastian
  last_name: Schinzel
- first_name: Simon
  full_name: Friedberger, Simon
  last_name: Friedberger
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Poddebniak D, Dresen C, Müller J, et al. Efail: Breaking S/MIME and OpenPGP
    Email Encryption using Exfiltration Channels. In: <i>27th {USENIX} Security Symposium
    ({USENIX} Security 18)</i>. Baltimore, MD: {USENIX} Association; 2018:549-566.'
  apa: 'Poddebniak, D., Dresen, C., Müller, J., Ising, F., Schinzel, S., Friedberger,
    S., … Schwenk, J. (2018). Efail: Breaking S/MIME and OpenPGP Email Encryption
    using Exfiltration Channels. In <i>27th {USENIX} Security Symposium ({USENIX}
    Security 18)</i> (pp. 549–566). Baltimore, MD: {USENIX} Association.'
  bibtex: '@inproceedings{Poddebniak_Dresen_Müller_Ising_Schinzel_Friedberger_Somorovsky_Schwenk_2018,
    place={Baltimore, MD}, title={Efail: Breaking S/MIME and OpenPGP Email Encryption
    using Exfiltration Channels}, booktitle={27th {USENIX} Security Symposium ({USENIX}
    Security 18)}, publisher={{USENIX} Association}, author={Poddebniak, Damian and
    Dresen, Christian and Müller, Jens and Ising, Fabian and Schinzel, Sebastian and
    Friedberger, Simon and Somorovsky, Juraj and Schwenk, Jörg}, year={2018}, pages={549–566}
    }'
  chicago: 'Poddebniak, Damian, Christian Dresen, Jens Müller, Fabian Ising, Sebastian
    Schinzel, Simon Friedberger, Juraj Somorovsky, and Jörg Schwenk. “Efail: Breaking
    S/MIME and OpenPGP Email Encryption Using Exfiltration Channels.” In <i>27th {USENIX}
    Security Symposium ({USENIX} Security 18)</i>, 549–66. Baltimore, MD: {USENIX}
    Association, 2018.'
  ieee: 'D. Poddebniak <i>et al.</i>, “Efail: Breaking S/MIME and OpenPGP Email Encryption
    using Exfiltration Channels,” in <i>27th {USENIX} Security Symposium ({USENIX}
    Security 18)</i>, 2018, pp. 549–566.'
  mla: 'Poddebniak, Damian, et al. “Efail: Breaking S/MIME and OpenPGP Email Encryption
    Using Exfiltration Channels.” <i>27th {USENIX} Security Symposium ({USENIX} Security
    18)</i>, {USENIX} Association, 2018, pp. 549–66.'
  short: 'D. Poddebniak, C. Dresen, J. Müller, F. Ising, S. Schinzel, S. Friedberger,
    J. Somorovsky, J. Schwenk, in: 27th {USENIX} Security Symposium ({USENIX} Security
    18), {USENIX} Association, Baltimore, MD, 2018, pp. 549–566.'
date_created: 2020-02-15T09:49:36Z
date_updated: 2022-01-06T06:52:40Z
extern: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/node/217635
oa: '1'
page: 549-566
place: Baltimore, MD
publication: 27th {USENIX} Security Symposium ({USENIX} Security 18)
publication_identifier:
  isbn:
  - 978-1-939133-04-5
publisher: '{USENIX} Association'
status: public
title: 'Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels'
type: conference
user_id: '83504'
year: '2018'
...
---
_id: '15906'
author:
- first_name: Hanno
  full_name: Böck, Hanno
  last_name: Böck
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Craig
  full_name: Young, Craig
  last_name: Young
citation:
  ama: 'Böck H, Somorovsky J, Young C. Return Of Bleichenbacher\textquoterights Oracle
    Threat (ROBOT). In: <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>.
    Baltimore, MD: {USENIX} Association; 2018:817-849.'
  apa: 'Böck, H., Somorovsky, J., &#38; Young, C. (2018). Return Of Bleichenbacher\textquoterights
    Oracle Threat (ROBOT). In <i>27th {USENIX} Security Symposium ({USENIX} Security
    18)</i> (pp. 817–849). Baltimore, MD: {USENIX} Association.'
  bibtex: '@inproceedings{Böck_Somorovsky_Young_2018, place={Baltimore, MD}, title={Return
    Of Bleichenbacher\textquoterights Oracle Threat (ROBOT)}, booktitle={27th {USENIX}
    Security Symposium ({USENIX} Security 18)}, publisher={{USENIX} Association},
    author={Böck, Hanno and Somorovsky, Juraj and Young, Craig}, year={2018}, pages={817–849}
    }'
  chicago: 'Böck, Hanno, Juraj Somorovsky, and Craig Young. “Return Of Bleichenbacher\textquoterights
    Oracle Threat (ROBOT).” In <i>27th {USENIX} Security Symposium ({USENIX} Security
    18)</i>, 817–49. Baltimore, MD: {USENIX} Association, 2018.'
  ieee: H. Böck, J. Somorovsky, and C. Young, “Return Of Bleichenbacher\textquoterights
    Oracle Threat (ROBOT),” in <i>27th {USENIX} Security Symposium ({USENIX} Security
    18)</i>, 2018, pp. 817–849.
  mla: Böck, Hanno, et al. “Return Of Bleichenbacher\textquoterights Oracle Threat
    (ROBOT).” <i>27th {USENIX} Security Symposium ({USENIX} Security 18)</i>, {USENIX}
    Association, 2018, pp. 817–49.
  short: 'H. Böck, J. Somorovsky, C. Young, in: 27th {USENIX} Security Symposium ({USENIX}
    Security 18), {USENIX} Association, Baltimore, MD, 2018, pp. 817–849.'
date_created: 2020-02-15T09:49:57Z
date_updated: 2022-01-06T06:52:40Z
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/node/217495
oa: '1'
page: 817-849
place: Baltimore, MD
publication: 27th {USENIX} Security Symposium ({USENIX} Security 18)
publication_identifier:
  isbn:
  - 978-1-939133-04-5
publisher: '{USENIX} Association'
status: public
title: Return Of Bleichenbacher\textquoterights Oracle Threat (ROBOT)
type: conference
user_id: '83504'
year: '2018'
...
---
_id: '15914'
author:
- first_name: Nils
  full_name: Engelbertz, Nils
  last_name: Engelbertz
- first_name: Nurullah
  full_name: Erinola, Nurullah
  last_name: Erinola
- first_name: David
  full_name: Herring, David
  last_name: Herring
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Vladislav
  full_name: Mladenov, Vladislav
  last_name: Mladenov
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Engelbertz N, Erinola N, Herring D, Somorovsky J, Mladenov V, Schwenk J. Security
    Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe. In: <i>12th
    {USENIX} Workshop on Offensive Technologies ({WOOT} 18)</i>. Baltimore, MD: {USENIX}
    Association; 2018.'
  apa: 'Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., &#38;
    Schwenk, J. (2018). Security Analysis of eIDAS -- The Cross-Country Authentication
    Scheme in Europe. In <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT}
    18)</i>. Baltimore, MD: {USENIX} Association.'
  bibtex: '@inproceedings{Engelbertz_Erinola_Herring_Somorovsky_Mladenov_Schwenk_2018,
    place={Baltimore, MD}, title={Security Analysis of eIDAS -- The Cross-Country
    Authentication Scheme in Europe}, booktitle={12th {USENIX} Workshop on Offensive
    Technologies ({WOOT} 18)}, publisher={{USENIX} Association}, author={Engelbertz,
    Nils and Erinola, Nurullah and Herring, David and Somorovsky, Juraj and Mladenov,
    Vladislav and Schwenk, Jörg}, year={2018} }'
  chicago: 'Engelbertz, Nils, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav
    Mladenov, and Jörg Schwenk. “Security Analysis of EIDAS -- The Cross-Country Authentication
    Scheme in Europe.” In <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT}
    18)</i>. Baltimore, MD: {USENIX} Association, 2018.'
  ieee: N. Engelbertz, N. Erinola, D. Herring, J. Somorovsky, V. Mladenov, and J.
    Schwenk, “Security Analysis of eIDAS -- The Cross-Country Authentication Scheme
    in Europe,” in <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)</i>,
    2018.
  mla: Engelbertz, Nils, et al. “Security Analysis of EIDAS -- The Cross-Country Authentication
    Scheme in Europe.” <i>12th {USENIX} Workshop on Offensive Technologies ({WOOT}
    18)</i>, {USENIX} Association, 2018.
  short: 'N. Engelbertz, N. Erinola, D. Herring, J. Somorovsky, V. Mladenov, J. Schwenk,
    in: 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), {USENIX} Association,
    Baltimore, MD, 2018.'
date_created: 2020-02-15T10:07:49Z
date_updated: 2022-01-06T06:52:40Z
extern: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/node/220571
oa: '1'
place: Baltimore, MD
publication: 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)
publisher: '{USENIX} Association'
status: public
title: Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe
type: conference
user_id: '83504'
year: '2018'
...
