---
_id: '15883'
author:
- first_name: Shankar
full_name: Kumar Jeyakumar, Shankar
last_name: Kumar Jeyakumar
citation:
ama: Kumar Jeyakumar S. Incremental Learning with Support Vector Machine on Embedded
Platforms.; 2019.
apa: Kumar Jeyakumar, S. (2019). Incremental learning with Support Vector Machine
on embedded platforms.
bibtex: '@book{Kumar Jeyakumar_2019, title={Incremental learning with Support Vector
Machine on embedded platforms}, author={Kumar Jeyakumar, Shankar}, year={2019}
}'
chicago: Kumar Jeyakumar, Shankar. Incremental Learning with Support Vector Machine
on Embedded Platforms, 2019.
ieee: S. Kumar Jeyakumar, Incremental learning with Support Vector Machine on
embedded platforms. 2019.
mla: Kumar Jeyakumar, Shankar. Incremental Learning with Support Vector Machine
on Embedded Platforms. 2019.
short: S. Kumar Jeyakumar, Incremental Learning with Support Vector Machine on Embedded
Platforms, 2019.
date_created: 2020-02-11T16:43:38Z
date_updated: 2022-01-06T06:52:39Z
department:
- _id: '78'
language:
- iso: eng
status: public
supervisor:
- first_name: Hassan
full_name: Ghasemzadeh Mohammadi, Hassan
id: '61186'
last_name: Ghasemzadeh Mohammadi
title: Incremental learning with Support Vector Machine on embedded platforms
type: mastersthesis
user_id: '61186'
year: '2019'
...
---
_id: '15908'
author:
- first_name: Jens
full_name: Müller, Jens
last_name: Müller
- first_name: Marcus
full_name: Brinkmann, Marcus
last_name: Brinkmann
- first_name: Damian
full_name: Poddebniak, Damian
last_name: Poddebniak
- first_name: Hanno
full_name: Böck, Hanno
last_name: Böck
- first_name: Sebastian
full_name: Schinzel, Sebastian
last_name: Schinzel
- first_name: Juraj
full_name: Somorovsky, Juraj
id: '83504'
last_name: Somorovsky
orcid: 0000-0002-3593-7720
- first_name: Jörg
full_name: Schwenk, Jörg
last_name: Schwenk
citation:
ama: 'Müller J, Brinkmann M, Poddebniak D, et al. “Johnny, you are fired!” -- Spoofing
OpenPGP and S/MIME Signatures in Emails. In: 28th {USENIX} Security Symposium
({USENIX} Security 19). Santa Clara, CA: {USENIX} Association; 2019:1011-1028.'
apa: 'Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky,
J., & Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and
S/MIME Signatures in Emails. In 28th {USENIX} Security Symposium ({USENIX}
Security 19) (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.'
bibtex: '@inproceedings{Müller_Brinkmann_Poddebniak_Böck_Schinzel_Somorovsky_Schwenk_2019,
place={Santa Clara, CA}, title={“Johnny, you are fired!” -- Spoofing OpenPGP and
S/MIME Signatures in Emails}, booktitle={28th {USENIX} Security Symposium ({USENIX}
Security 19)}, publisher={{USENIX} Association}, author={Müller, Jens and Brinkmann,
Marcus and Poddebniak, Damian and Böck, Hanno and Schinzel, Sebastian and Somorovsky,
Juraj and Schwenk, Jörg}, year={2019}, pages={1011–1028} }'
chicago: 'Müller, Jens, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian
Schinzel, Juraj Somorovsky, and Jörg Schwenk. “‘Johnny, You Are Fired!’ -- Spoofing
OpenPGP and S/MIME Signatures in Emails.” In 28th {USENIX} Security Symposium
({USENIX} Security 19), 1011–28. Santa Clara, CA: {USENIX} Association, 2019.'
ieee: J. Müller et al., “‘Johnny, you are fired!’ -- Spoofing OpenPGP and
S/MIME Signatures in Emails,” in 28th {USENIX} Security Symposium ({USENIX}
Security 19), 2019, pp. 1011–1028.
mla: Müller, Jens, et al. “‘Johnny, You Are Fired!’ -- Spoofing OpenPGP and S/MIME
Signatures in Emails.” 28th {USENIX} Security Symposium ({USENIX} Security
19), {USENIX} Association, 2019, pp. 1011–28.
short: 'J. Müller, M. Brinkmann, D. Poddebniak, H. Böck, S. Schinzel, J. Somorovsky,
J. Schwenk, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX}
Association, Santa Clara, CA, 2019, pp. 1011–1028.'
date_created: 2020-02-15T09:50:57Z
date_updated: 2022-01-06T06:52:40Z
language:
- iso: eng
main_file_link:
- open_access: '1'
url: https://www.usenix.org/conference/usenixsecurity19/presentation/muller
oa: '1'
page: 1011-1028
place: Santa Clara, CA
publication: 28th {USENIX} Security Symposium ({USENIX} Security 19)
publication_identifier:
isbn:
- 978-1-939133-06-9
publisher: '{USENIX} Association'
status: public
title: '"Johnny, you are fired!" -- Spoofing OpenPGP and S/MIME Signatures in Emails'
type: conference
user_id: '83504'
year: '2019'
...
---
_id: '15909'
author:
- first_name: Robert
full_name: Merget, Robert
last_name: Merget
- first_name: Juraj
full_name: Somorovsky, Juraj
id: '83504'
last_name: Somorovsky
orcid: 0000-0002-3593-7720
- first_name: Nimrod
full_name: Aviram, Nimrod
last_name: Aviram
- first_name: Craig
full_name: Young, Craig
last_name: Young
- first_name: Janis
full_name: Fliegenschmidt, Janis
last_name: Fliegenschmidt
- first_name: Jörg
full_name: Schwenk, Jörg
last_name: Schwenk
- first_name: Yuval
full_name: Shavitt, Yuval
last_name: Shavitt
citation:
ama: 'Merget R, Somorovsky J, Aviram N, et al. Scalable Scanning and Automatic Classification
of TLS Padding Oracle Vulnerabilities. In: 28th {USENIX} Security Symposium
({USENIX} Security 19). Santa Clara, CA: {USENIX} Association; 2019:1029-1046.'
apa: 'Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk,
J., & Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of
TLS Padding Oracle Vulnerabilities. In 28th {USENIX} Security Symposium ({USENIX}
Security 19) (pp. 1029–1046). Santa Clara, CA: {USENIX} Association.'
bibtex: '@inproceedings{Merget_Somorovsky_Aviram_Young_Fliegenschmidt_Schwenk_Shavitt_2019,
place={Santa Clara, CA}, title={Scalable Scanning and Automatic Classification
of TLS Padding Oracle Vulnerabilities}, booktitle={28th {USENIX} Security Symposium
({USENIX} Security 19)}, publisher={{USENIX} Association}, author={Merget, Robert
and Somorovsky, Juraj and Aviram, Nimrod and Young, Craig and Fliegenschmidt,
Janis and Schwenk, Jörg and Shavitt, Yuval}, year={2019}, pages={1029–1046} }'
chicago: 'Merget, Robert, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt,
Jörg Schwenk, and Yuval Shavitt. “Scalable Scanning and Automatic Classification
of TLS Padding Oracle Vulnerabilities.” In 28th {USENIX} Security Symposium
({USENIX} Security 19), 1029–46. Santa Clara, CA: {USENIX} Association, 2019.'
ieee: R. Merget et al., “Scalable Scanning and Automatic Classification of
TLS Padding Oracle Vulnerabilities,” in 28th {USENIX} Security Symposium ({USENIX}
Security 19), 2019, pp. 1029–1046.
mla: Merget, Robert, et al. “Scalable Scanning and Automatic Classification of TLS
Padding Oracle Vulnerabilities.” 28th {USENIX} Security Symposium ({USENIX}
Security 19), {USENIX} Association, 2019, pp. 1029–46.
short: 'R. Merget, J. Somorovsky, N. Aviram, C. Young, J. Fliegenschmidt, J. Schwenk,
Y. Shavitt, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX}
Association, Santa Clara, CA, 2019, pp. 1029–1046.'
date_created: 2020-02-15T09:51:09Z
date_updated: 2022-01-06T06:52:40Z
language:
- iso: eng
main_file_link:
- open_access: '1'
url: https://www.usenix.org/conference/usenixsecurity19/presentation/merget
oa: '1'
page: 1029-1046
place: Santa Clara, CA
publication: 28th {USENIX} Security Symposium ({USENIX} Security 19)
publication_identifier:
isbn:
- 978-1-939133-06-9
publisher: '{USENIX} Association'
status: public
title: Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities
type: conference
user_id: '83504'
year: '2019'
...
---
_id: '15910'
author:
- first_name: Nils
full_name: Engelbertz, Nils
last_name: Engelbertz
- first_name: Vladislav
full_name: Mladenov, Vladislav
last_name: Mladenov
- first_name: Juraj
full_name: Somorovsky, Juraj
id: '83504'
last_name: Somorovsky
orcid: 0000-0002-3593-7720
- first_name: David
full_name: Herring, David
last_name: Herring
- first_name: Nurullah
full_name: Erinola, Nurullah
last_name: Erinola
- first_name: Jörg
full_name: Schwenk, Jörg
last_name: Schwenk
citation:
ama: 'Engelbertz N, Mladenov V, Somorovsky J, Herring D, Erinola N, Schwenk J. Security
Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In:
Roßnagel H, Wagner S, Hühnlein D, eds. Open Identity Summit 2019. Gesellschaft
für Informatik, Bonn; 2019:95-106.'
apa: Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., &
Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature
Services (DSS). In H. Roßnagel, S. Wagner, & D. Hühnlein (Eds.), Open Identity
Summit 2019 (pp. 95–106). Gesellschaft für Informatik, Bonn.
bibtex: '@inproceedings{Engelbertz_Mladenov_Somorovsky_Herring_Erinola_Schwenk_2019,
title={Security Analysis of XAdES Validation in the CEF Digital Signature Services
(DSS)}, booktitle={Open Identity Summit 2019}, publisher={Gesellschaft für Informatik,
Bonn}, author={Engelbertz, Nils and Mladenov, Vladislav and Somorovsky, Juraj
and Herring, David and Erinola, Nurullah and Schwenk, Jörg}, editor={Roßnagel,
Heiko and Wagner, Sven and Hühnlein, DetlefEditors}, year={2019}, pages={95–106}
}'
chicago: Engelbertz, Nils, Vladislav Mladenov, Juraj Somorovsky, David Herring,
Nurullah Erinola, and Jörg Schwenk. “Security Analysis of XAdES Validation in
the CEF Digital Signature Services (DSS).” In Open Identity Summit 2019,
edited by Heiko Roßnagel, Sven Wagner, and Detlef Hühnlein, 95–106. Gesellschaft
für Informatik, Bonn, 2019.
ieee: N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, and J.
Schwenk, “Security Analysis of XAdES Validation in the CEF Digital Signature Services
(DSS),” in Open Identity Summit 2019, 2019, pp. 95–106.
mla: Engelbertz, Nils, et al. “Security Analysis of XAdES Validation in the CEF
Digital Signature Services (DSS).” Open Identity Summit 2019, edited by
Heiko Roßnagel et al., Gesellschaft für Informatik, Bonn, 2019, pp. 95–106.
short: 'N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, J. Schwenk,
in: H. Roßnagel, S. Wagner, D. Hühnlein (Eds.), Open Identity Summit 2019, Gesellschaft
für Informatik, Bonn, 2019, pp. 95–106.'
date_created: 2020-02-15T10:01:05Z
date_updated: 2022-01-06T06:52:40Z
editor:
- first_name: Heiko
full_name: Roßnagel, Heiko
last_name: Roßnagel
- first_name: Sven
full_name: Wagner, Sven
last_name: Wagner
- first_name: Detlef
full_name: Hühnlein, Detlef
last_name: Hühnlein
language:
- iso: eng
page: ' 95-106 '
publication: Open Identity Summit 2019
publisher: Gesellschaft für Informatik, Bonn
status: public
title: Security Analysis of XAdES Validation in the CEF Digital Signature Services
(DSS)
type: conference
user_id: '83504'
year: '2019'
...
---
_id: '15920'
abstract:
- lang: eng
text: "Secure hardware design is the most important aspect to be considered in addition
to functional correctness. Achieving hardware security in today’s globalized Integrated
Cir- cuit(IC) supply chain is a challenging task. One solution that is widely
considered to help achieve secure hardware designs is Information Flow Tracking(IFT).
It provides an ap- proach to verify that the systems adhere to security properties
either by static verification during design phase or dynamic checking during runtime.\r\nProof-Carrying
Hardware(PCH) is an approach to verify a functional design prior to using it in
hardware. It is a two-party verification approach, where the target party, the
consumer requests new functionalities with pre-defined properties to the producer.
In response, the producer designs the IP (Intellectual Property) cores with the
requested functionalities that adhere to the consumer-defined properties. The
producer provides the IP cores and a proof certificate combined into a proof-carrying
bitstream to the consumer to verify it. If the verification is successful, the
consumer can use the IP cores in his hardware. In essence, the consumer can only
run verified IP cores. Correctly applied, PCH techniques can help consumers to
defend against many unintentional modifications and malicious alterations of the
modules they receive. There are numerous published examples of how to use PCH
to detect any change in the functionality of a circuit, i.e., pairing a PCH approach
with functional equivalence checking for combinational or sequential circuits.
For non-functional properties, since opening new covert channels to leak secret
information from secure circuits is a viable attack vector for hardware trojans,
i.e., intentionally added malicious circuitry, IFT technique is employed to make
sure that secret/untrusted information never reaches any unclassified/trusted
outputs.\r\nThis master thesis aims to explore the possibility of adapting Information
Flow Tracking into a Proof-Carrying Hardware scenario. It aims to create a method
that combines Infor- mation Flow Tracking(IFT) with a PCH approach at bitstream
level enabling consumers to validate the trustworthiness of a module’s information
flow without the computational costs of a complete flow analysis."
author:
- first_name: Monica
full_name: Keerthipati, Monica
last_name: Keerthipati
citation:
ama: Keerthipati M. A Bitstream-Level Proof-Carrying Hardware Technique for Information
Flow Tracking. Universität Paderborn; 2019.
apa: Keerthipati, M. (2019). A Bitstream-Level Proof-Carrying Hardware Technique
for Information Flow Tracking. Universität Paderborn.
bibtex: '@book{Keerthipati_2019, title={A Bitstream-Level Proof-Carrying Hardware
Technique for Information Flow Tracking}, publisher={Universität Paderborn}, author={Keerthipati,
Monica}, year={2019} }'
chicago: Keerthipati, Monica. A Bitstream-Level Proof-Carrying Hardware Technique
for Information Flow Tracking. Universität Paderborn, 2019.
ieee: M. Keerthipati, A Bitstream-Level Proof-Carrying Hardware Technique for
Information Flow Tracking. Universität Paderborn, 2019.
mla: Keerthipati, Monica. A Bitstream-Level Proof-Carrying Hardware Technique
for Information Flow Tracking. Universität Paderborn, 2019.
short: M. Keerthipati, A Bitstream-Level Proof-Carrying Hardware Technique for Information
Flow Tracking, Universität Paderborn, 2019.
date_created: 2020-02-17T12:03:40Z
date_updated: 2022-01-06T06:52:41Z
department:
- _id: '78'
language:
- iso: eng
project:
- _id: '12'
name: SFB 901 - Subproject B4
- _id: '3'
name: SFB 901 - Project Area B
- _id: '1'
name: SFB 901
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Tobias
full_name: Wiersema, Tobias
id: '3118'
last_name: Wiersema
- first_name: Marco
full_name: Platzner, Marco
id: '398'
last_name: Platzner
- first_name: Sybille
full_name: Hellebrand, Sybille
id: '209'
last_name: Hellebrand
orcid: 0000-0002-3717-3939
title: A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking
type: mastersthesis
user_id: '477'
year: '2019'
...
---
_id: '15921'
abstract:
- lang: eng
text: "Ranking plays a central role in a large number of applications driven by
RDF knowledge graphs. Over the last years, many popular RDF knowledge graphs have
grown so large that rankings for the facts they contain cannot be computed directly
using the currently common 64-bit platforms. In this paper, we tackle two problems:\r\nComputing
ranks on such large knowledge bases efficiently and incrementally. First, we present
D-HARE, a distributed approach for computing ranks on very large knowledge graphs.
D-HARE assumes the random surfer model and relies on data partitioning to compute
matrix multiplications and transpositions on disk for matrices of arbitrary size.
Moreover, the data partitioning underlying D-HARE allows the execution of most
of its steps in parallel.\r\nAs very large knowledge graphs are often updated
periodically, we tackle the incremental computation of ranks on large knowledge
bases as a second problem. We address this problem by presenting\r\nI-HARE, an
approximation technique for calculating the overall ranking scores of a knowledge
without the need to recalculate the ranking from scratch at each new revision.
We evaluate our approaches by calculating ranks on the 3 × 10^9 and 2.4 × 10^9
triples from Wikidata resp. LinkedGeoData. Our evaluation demonstrates\r\nthat
D-HARE is the first holistic approach for computing ranks on very large RDF knowledge
graphs. In addition, our incremental approach achieves a root mean squared error
of less than 10E−7 in the best case. Both D-HARE\r\n and I-HARE are open-source
and are available at: https://github.com/dice-group/incrementalHARE.\r\n"
author:
- first_name: Abdelmoneim Amer
full_name: Desouki, Abdelmoneim Amer
last_name: Desouki
- first_name: Michael
full_name: Röder, Michael
last_name: Röder
- first_name: Axel-Cyrille
full_name: Ngonga Ngomo, Axel-Cyrille
last_name: Ngonga Ngomo
citation:
ama: 'Desouki AA, Röder M, Ngonga Ngomo A-C. Ranking on Very Large Knowledge Graphs.
In: Proceedings of the 30th ACM Conference on Hypertext and Social Media -
HT ’19. ACM; 2019:163-171. doi:10.1145/3342220.3343660'
apa: Desouki, A. A., Röder, M., & Ngonga Ngomo, A.-C. (2019). Ranking on Very
Large Knowledge Graphs. In Proceedings of the 30th ACM Conference on Hypertext
and Social Media - HT ’19 (pp. 163–171). ACM. https://doi.org/10.1145/3342220.3343660
bibtex: '@inproceedings{Desouki_Röder_Ngonga Ngomo_2019, title={Ranking on Very
Large Knowledge Graphs}, DOI={10.1145/3342220.3343660},
booktitle={Proceedings of the 30th ACM Conference on Hypertext and Social Media
- HT ’19}, publisher={ACM}, author={Desouki, Abdelmoneim Amer and Röder, Michael
and Ngonga Ngomo, Axel-Cyrille}, year={2019}, pages={163–171} }'
chicago: Desouki, Abdelmoneim Amer, Michael Röder, and Axel-Cyrille Ngonga Ngomo.
“Ranking on Very Large Knowledge Graphs.” In Proceedings of the 30th ACM Conference
on Hypertext and Social Media - HT ’19, 163–71. ACM, 2019. https://doi.org/10.1145/3342220.3343660.
ieee: A. A. Desouki, M. Röder, and A.-C. Ngonga Ngomo, “Ranking on Very Large Knowledge
Graphs,” in Proceedings of the 30th ACM Conference on Hypertext and Social
Media - HT ’19, 2019, pp. 163–171.
mla: Desouki, Abdelmoneim Amer, et al. “Ranking on Very Large Knowledge Graphs.”
Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT
’19, ACM, 2019, pp. 163–71, doi:10.1145/3342220.3343660.
short: 'A.A. Desouki, M. Röder, A.-C. Ngonga Ngomo, in: Proceedings of the 30th
ACM Conference on Hypertext and Social Media - HT ’19, ACM, 2019, pp. 163–171.'
conference:
end_date: 2019-09-20
name: 30th ACM Conference on Hypertext and Social Media
start_date: 2019-09-17
date_created: 2020-02-18T16:39:35Z
date_updated: 2022-01-06T06:52:41Z
department:
- _id: '574'
doi: 10.1145/3342220.3343660
keyword:
- Knowledge Graphs
- Ranking
- RDF
language:
- iso: eng
page: 163-171
project:
- _id: '52'
name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: Proceedings of the 30th ACM Conference on Hypertext and Social Media -
HT '19
publication_identifier:
isbn:
- '9781450368858'
publication_status: published
publisher: ACM
status: public
title: Ranking on Very Large Knowledge Graphs
type: conference
user_id: '69382'
year: '2019'
...
---
_id: '14568'
author:
- first_name: Stefan
full_name: Heindorf, Stefan
id: '11871'
last_name: Heindorf
orcid: 0000-0002-4525-6865
- first_name: Yan
full_name: Scholten, Yan
last_name: Scholten
- first_name: Gregor
full_name: Engels, Gregor
id: '107'
last_name: Engels
- first_name: Martin
full_name: Potthast, Martin
last_name: Potthast
citation:
ama: 'Heindorf S, Scholten Y, Engels G, Potthast M. Debiasing Vandalism Detection
Models at Wikidata (Extended Abstract). In: INFORMATIK. ; 2019:289-290.
doi:10.18420/inf2019_48'
apa: Heindorf, S., Scholten, Y., Engels, G., & Potthast, M. (2019). Debiasing
Vandalism Detection Models at Wikidata (Extended Abstract). In INFORMATIK
(pp. 289–290). https://doi.org/10.18420/inf2019_48
bibtex: '@inproceedings{Heindorf_Scholten_Engels_Potthast_2019, title={Debiasing
Vandalism Detection Models at Wikidata (Extended Abstract)}, DOI={10.18420/inf2019_48},
booktitle={INFORMATIK}, author={Heindorf, Stefan and Scholten, Yan and Engels,
Gregor and Potthast, Martin}, year={2019}, pages={289–290} }'
chicago: Heindorf, Stefan, Yan Scholten, Gregor Engels, and Martin Potthast. “Debiasing
Vandalism Detection Models at Wikidata (Extended Abstract).” In INFORMATIK,
289–90, 2019. https://doi.org/10.18420/inf2019_48.
ieee: S. Heindorf, Y. Scholten, G. Engels, and M. Potthast, “Debiasing Vandalism
Detection Models at Wikidata (Extended Abstract),” in INFORMATIK, 2019,
pp. 289–290.
mla: Heindorf, Stefan, et al. “Debiasing Vandalism Detection Models at Wikidata
(Extended Abstract).” INFORMATIK, 2019, pp. 289–90, doi:10.18420/inf2019_48.
short: 'S. Heindorf, Y. Scholten, G. Engels, M. Potthast, in: INFORMATIK, 2019,
pp. 289–290.'
date_created: 2019-11-05T15:48:52Z
date_updated: 2022-01-06T06:52:03Z
department:
- _id: '66'
doi: 10.18420/inf2019_48
language:
- iso: eng
main_file_link:
- open_access: '1'
url: https://dl.gi.de/bitstream/handle/20.500.12116/24997/paper3_25.pdf
oa: '1'
page: 289-290
publication: INFORMATIK
status: public
title: Debiasing Vandalism Detection Models at Wikidata (Extended Abstract)
type: conference
user_id: '11871'
year: '2019'
...
---
_id: '14817'
article_number: '101975'
author:
- first_name: Christoph
full_name: Sommer, Christoph
id: '49154'
last_name: Sommer
orcid: 0000-0002-4336-7350
- first_name: Stefano
full_name: Basagni, Stefano
last_name: Basagni
citation:
ama: Sommer C, Basagni S. Advances and novel applications of mobile wireless networking.
Ad Hoc Networks. 2019. doi:10.1016/j.adhoc.2019.101975
apa: Sommer, C., & Basagni, S. (2019). Advances and novel applications of mobile
wireless networking. Ad Hoc Networks. https://doi.org/10.1016/j.adhoc.2019.101975
bibtex: '@article{Sommer_Basagni_2019, title={Advances and novel applications of
mobile wireless networking}, DOI={10.1016/j.adhoc.2019.101975},
number={101975}, journal={Ad Hoc Networks}, author={Sommer, Christoph and Basagni,
Stefano}, year={2019} }'
chicago: Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications
of Mobile Wireless Networking.” Ad Hoc Networks, 2019. https://doi.org/10.1016/j.adhoc.2019.101975.
ieee: C. Sommer and S. Basagni, “Advances and novel applications of mobile wireless
networking,” Ad Hoc Networks, 2019.
mla: Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications of
Mobile Wireless Networking.” Ad Hoc Networks, 101975, 2019, doi:10.1016/j.adhoc.2019.101975.
short: C. Sommer, S. Basagni, Ad Hoc Networks (2019).
date_created: 2019-11-05T18:38:44Z
date_updated: 2022-01-06T06:52:06Z
department:
- _id: '589'
doi: 10.1016/j.adhoc.2019.101975
language:
- iso: eng
publication: Ad Hoc Networks
publication_identifier:
issn:
- 1570-8705
publication_status: published
status: public
title: Advances and novel applications of mobile wireless networking
type: journal_article
user_id: '49154'
year: '2019'
...
---
_id: '14819'
author:
- first_name: Julian
full_name: Heinovski, Julian
last_name: Heinovski
- first_name: Lukas
full_name: Stratmann, Lukas
last_name: Stratmann
- first_name: Dominik S.
full_name: Buse, Dominik S.
last_name: Buse
- first_name: Florian
full_name: Klingler, Florian
last_name: Klingler
- first_name: Mario
full_name: Franke, Mario
last_name: Franke
- first_name: Marie-Christin H.
full_name: Oczko, Marie-Christin H.
last_name: Oczko
- first_name: Christoph
full_name: Sommer, Christoph
id: '49154'
last_name: Sommer
orcid: 0000-0002-4336-7350
- first_name: Ingrid
full_name: Scharlau, Ingrid
last_name: Scharlau
- first_name: Falko
full_name: Dressler, Falko
last_name: Dressler
citation:
ama: 'Heinovski J, Stratmann L, Buse DS, et al. Modeling Cycling Behavior to Improve
Bicyclists’ Safety at Intersections - A Networking Perspective. In: 2019 IEEE
20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks”
(WoWMoM). ; 2019. doi:10.1109/wowmom.2019.8793008'
apa: Heinovski, J., Stratmann, L., Buse, D. S., Klingler, F., Franke, M., Oczko,
M.-C. H., … Dressler, F. (2019). Modeling Cycling Behavior to Improve Bicyclists’
Safety at Intersections - A Networking Perspective. In 2019 IEEE 20th International
Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM).
https://doi.org/10.1109/wowmom.2019.8793008
bibtex: '@inproceedings{Heinovski_Stratmann_Buse_Klingler_Franke_Oczko_Sommer_Scharlau_Dressler_2019,
title={Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections
- A Networking Perspective}, DOI={10.1109/wowmom.2019.8793008},
booktitle={2019 IEEE 20th International Symposium on “A World of Wireless, Mobile
and Multimedia Networks” (WoWMoM)}, author={Heinovski, Julian and Stratmann, Lukas
and Buse, Dominik S. and Klingler, Florian and Franke, Mario and Oczko, Marie-Christin
H. and Sommer, Christoph and Scharlau, Ingrid and Dressler, Falko}, year={2019}
}'
chicago: Heinovski, Julian, Lukas Stratmann, Dominik S. Buse, Florian Klingler,
Mario Franke, Marie-Christin H. Oczko, Christoph Sommer, Ingrid Scharlau, and
Falko Dressler. “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections
- A Networking Perspective.” In 2019 IEEE 20th International Symposium on “A
World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019. https://doi.org/10.1109/wowmom.2019.8793008.
ieee: J. Heinovski et al., “Modeling Cycling Behavior to Improve Bicyclists’
Safety at Intersections - A Networking Perspective,” in 2019 IEEE 20th International
Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM),
2019.
mla: Heinovski, Julian, et al. “Modeling Cycling Behavior to Improve Bicyclists’
Safety at Intersections - A Networking Perspective.” 2019 IEEE 20th International
Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM),
2019, doi:10.1109/wowmom.2019.8793008.
short: 'J. Heinovski, L. Stratmann, D.S. Buse, F. Klingler, M. Franke, M.-C.H. Oczko,
C. Sommer, I. Scharlau, F. Dressler, in: 2019 IEEE 20th International Symposium
on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019.'
date_created: 2019-11-05T18:38:48Z
date_updated: 2022-01-06T06:52:06Z
department:
- _id: '589'
doi: 10.1109/wowmom.2019.8793008
language:
- iso: eng
publication: 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile
and Multimedia Networks" (WoWMoM)
publication_identifier:
isbn:
- '9781728102702'
publication_status: published
status: public
title: Modeling Cycling Behavior to Improve Bicyclists' Safety at Intersections -
A Networking Perspective
type: conference
user_id: '49154'
year: '2019'
...
---
_id: '14821'
article_type: original
author:
- first_name: Agnes Regina
full_name: Seipelt, Agnes Regina
id: '24239'
last_name: Seipelt
citation:
ama: Seipelt AR. Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript
der Freischütz-Erstaufführung 1821 in Wien. Weberiana. 2019;29:107–161.
apa: Seipelt, A. R. (2019). Aufführungs- und zensurbedingte Veränderungen im Wiener
Manuskript der Freischütz-Erstaufführung 1821 in Wien. Weberiana, 29,
107–161.
bibtex: '@article{Seipelt_2019, title={Aufführungs- und zensurbedingte Veränderungen
im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien}, volume={29},
journal={Weberiana}, publisher={Allitera}, author={Seipelt, Agnes Regina}, year={2019},
pages={107–161} }'
chicago: 'Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen
im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien.” Weberiana
29 (2019): 107–161.'
ieee: A. R. Seipelt, “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript
der Freischütz-Erstaufführung 1821 in Wien,” Weberiana, vol. 29, pp. 107–161,
2019.
mla: Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen im Wiener
Manuskript der Freischütz-Erstaufführung 1821 in Wien.” Weberiana, vol.
29, Allitera, 2019, pp. 107–161.
short: A.R. Seipelt, Weberiana 29 (2019) 107–161.
date_created: 2019-11-06T08:34:40Z
date_updated: 2022-01-06T06:52:06Z
intvolume: ' 29'
keyword:
- Weber
- Wien
- Zensur
language:
- iso: ger
page: 107–161
publication: Weberiana
publication_identifier:
isbn:
- 978-3-96233-182-5
publication_status: published
publisher: Allitera
status: public
title: Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung
1821 in Wien
type: journal_article
user_id: '24239'
volume: 29
year: '2019'
...