--- _id: '15883' author: - first_name: Shankar full_name: Kumar Jeyakumar, Shankar last_name: Kumar Jeyakumar citation: ama: Kumar Jeyakumar S. Incremental Learning with Support Vector Machine on Embedded Platforms.; 2019. apa: Kumar Jeyakumar, S. (2019). Incremental learning with Support Vector Machine on embedded platforms. bibtex: '@book{Kumar Jeyakumar_2019, title={Incremental learning with Support Vector Machine on embedded platforms}, author={Kumar Jeyakumar, Shankar}, year={2019} }' chicago: Kumar Jeyakumar, Shankar. Incremental Learning with Support Vector Machine on Embedded Platforms, 2019. ieee: S. Kumar Jeyakumar, Incremental learning with Support Vector Machine on embedded platforms. 2019. mla: Kumar Jeyakumar, Shankar. Incremental Learning with Support Vector Machine on Embedded Platforms. 2019. short: S. Kumar Jeyakumar, Incremental Learning with Support Vector Machine on Embedded Platforms, 2019. date_created: 2020-02-11T16:43:38Z date_updated: 2022-01-06T06:52:39Z department: - _id: '78' language: - iso: eng status: public supervisor: - first_name: Hassan full_name: Ghasemzadeh Mohammadi, Hassan id: '61186' last_name: Ghasemzadeh Mohammadi title: Incremental learning with Support Vector Machine on embedded platforms type: mastersthesis user_id: '61186' year: '2019' ... --- _id: '15908' author: - first_name: Jens full_name: Müller, Jens last_name: Müller - first_name: Marcus full_name: Brinkmann, Marcus last_name: Brinkmann - first_name: Damian full_name: Poddebniak, Damian last_name: Poddebniak - first_name: Hanno full_name: Böck, Hanno last_name: Böck - first_name: Sebastian full_name: Schinzel, Sebastian last_name: Schinzel - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 - first_name: Jörg full_name: Schwenk, Jörg last_name: Schwenk citation: ama: 'Müller J, Brinkmann M, Poddebniak D, et al. “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In: 28th {USENIX} Security Symposium ({USENIX} Security 19). Santa Clara, CA: {USENIX} Association; 2019:1011-1028.' apa: 'Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky, J., & Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.' bibtex: '@inproceedings{Müller_Brinkmann_Poddebniak_Böck_Schinzel_Somorovsky_Schwenk_2019, place={Santa Clara, CA}, title={“Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails}, booktitle={28th {USENIX} Security Symposium ({USENIX} Security 19)}, publisher={{USENIX} Association}, author={Müller, Jens and Brinkmann, Marcus and Poddebniak, Damian and Böck, Hanno and Schinzel, Sebastian and Somorovsky, Juraj and Schwenk, Jörg}, year={2019}, pages={1011–1028} }' chicago: 'Müller, Jens, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, and Jörg Schwenk. “‘Johnny, You Are Fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails.” In 28th {USENIX} Security Symposium ({USENIX} Security 19), 1011–28. Santa Clara, CA: {USENIX} Association, 2019.' ieee: J. Müller et al., “‘Johnny, you are fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails,” in 28th {USENIX} Security Symposium ({USENIX} Security 19), 2019, pp. 1011–1028. mla: Müller, Jens, et al. “‘Johnny, You Are Fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails.” 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, 2019, pp. 1011–28. short: 'J. Müller, M. Brinkmann, D. Poddebniak, H. Böck, S. Schinzel, J. Somorovsky, J. Schwenk, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, Santa Clara, CA, 2019, pp. 1011–1028.' date_created: 2020-02-15T09:50:57Z date_updated: 2022-01-06T06:52:40Z language: - iso: eng main_file_link: - open_access: '1' url: https://www.usenix.org/conference/usenixsecurity19/presentation/muller oa: '1' page: 1011-1028 place: Santa Clara, CA publication: 28th {USENIX} Security Symposium ({USENIX} Security 19) publication_identifier: isbn: - 978-1-939133-06-9 publisher: '{USENIX} Association' status: public title: '"Johnny, you are fired!" -- Spoofing OpenPGP and S/MIME Signatures in Emails' type: conference user_id: '83504' year: '2019' ... --- _id: '15909' author: - first_name: Robert full_name: Merget, Robert last_name: Merget - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 - first_name: Nimrod full_name: Aviram, Nimrod last_name: Aviram - first_name: Craig full_name: Young, Craig last_name: Young - first_name: Janis full_name: Fliegenschmidt, Janis last_name: Fliegenschmidt - first_name: Jörg full_name: Schwenk, Jörg last_name: Schwenk - first_name: Yuval full_name: Shavitt, Yuval last_name: Shavitt citation: ama: 'Merget R, Somorovsky J, Aviram N, et al. Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In: 28th {USENIX} Security Symposium ({USENIX} Security 19). Santa Clara, CA: {USENIX} Association; 2019:1029-1046.' apa: 'Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk, J., & Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1029–1046). Santa Clara, CA: {USENIX} Association.' bibtex: '@inproceedings{Merget_Somorovsky_Aviram_Young_Fliegenschmidt_Schwenk_Shavitt_2019, place={Santa Clara, CA}, title={Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities}, booktitle={28th {USENIX} Security Symposium ({USENIX} Security 19)}, publisher={{USENIX} Association}, author={Merget, Robert and Somorovsky, Juraj and Aviram, Nimrod and Young, Craig and Fliegenschmidt, Janis and Schwenk, Jörg and Shavitt, Yuval}, year={2019}, pages={1029–1046} }' chicago: 'Merget, Robert, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, and Yuval Shavitt. “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.” In 28th {USENIX} Security Symposium ({USENIX} Security 19), 1029–46. Santa Clara, CA: {USENIX} Association, 2019.' ieee: R. Merget et al., “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities,” in 28th {USENIX} Security Symposium ({USENIX} Security 19), 2019, pp. 1029–1046. mla: Merget, Robert, et al. “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.” 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, 2019, pp. 1029–46. short: 'R. Merget, J. Somorovsky, N. Aviram, C. Young, J. Fliegenschmidt, J. Schwenk, Y. Shavitt, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, Santa Clara, CA, 2019, pp. 1029–1046.' date_created: 2020-02-15T09:51:09Z date_updated: 2022-01-06T06:52:40Z language: - iso: eng main_file_link: - open_access: '1' url: https://www.usenix.org/conference/usenixsecurity19/presentation/merget oa: '1' page: 1029-1046 place: Santa Clara, CA publication: 28th {USENIX} Security Symposium ({USENIX} Security 19) publication_identifier: isbn: - 978-1-939133-06-9 publisher: '{USENIX} Association' status: public title: Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities type: conference user_id: '83504' year: '2019' ... --- _id: '15910' author: - first_name: Nils full_name: Engelbertz, Nils last_name: Engelbertz - first_name: Vladislav full_name: Mladenov, Vladislav last_name: Mladenov - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 - first_name: David full_name: Herring, David last_name: Herring - first_name: Nurullah full_name: Erinola, Nurullah last_name: Erinola - first_name: Jörg full_name: Schwenk, Jörg last_name: Schwenk citation: ama: 'Engelbertz N, Mladenov V, Somorovsky J, Herring D, Erinola N, Schwenk J. Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In: Roßnagel H, Wagner S, Hühnlein D, eds. Open Identity Summit 2019. Gesellschaft für Informatik, Bonn; 2019:95-106.' apa: Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., & Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In H. Roßnagel, S. Wagner, & D. Hühnlein (Eds.), Open Identity Summit 2019 (pp. 95–106). Gesellschaft für Informatik, Bonn. bibtex: '@inproceedings{Engelbertz_Mladenov_Somorovsky_Herring_Erinola_Schwenk_2019, title={Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS)}, booktitle={Open Identity Summit 2019}, publisher={Gesellschaft für Informatik, Bonn}, author={Engelbertz, Nils and Mladenov, Vladislav and Somorovsky, Juraj and Herring, David and Erinola, Nurullah and Schwenk, Jörg}, editor={Roßnagel, Heiko and Wagner, Sven and Hühnlein, DetlefEditors}, year={2019}, pages={95–106} }' chicago: Engelbertz, Nils, Vladislav Mladenov, Juraj Somorovsky, David Herring, Nurullah Erinola, and Jörg Schwenk. “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS).” In Open Identity Summit 2019, edited by Heiko Roßnagel, Sven Wagner, and Detlef Hühnlein, 95–106. Gesellschaft für Informatik, Bonn, 2019. ieee: N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, and J. Schwenk, “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS),” in Open Identity Summit 2019, 2019, pp. 95–106. mla: Engelbertz, Nils, et al. “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS).” Open Identity Summit 2019, edited by Heiko Roßnagel et al., Gesellschaft für Informatik, Bonn, 2019, pp. 95–106. short: 'N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, J. Schwenk, in: H. Roßnagel, S. Wagner, D. Hühnlein (Eds.), Open Identity Summit 2019, Gesellschaft für Informatik, Bonn, 2019, pp. 95–106.' date_created: 2020-02-15T10:01:05Z date_updated: 2022-01-06T06:52:40Z editor: - first_name: Heiko full_name: Roßnagel, Heiko last_name: Roßnagel - first_name: Sven full_name: Wagner, Sven last_name: Wagner - first_name: Detlef full_name: Hühnlein, Detlef last_name: Hühnlein language: - iso: eng page: ' 95-106 ' publication: Open Identity Summit 2019 publisher: Gesellschaft für Informatik, Bonn status: public title: Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS) type: conference user_id: '83504' year: '2019' ... --- _id: '15920' abstract: - lang: eng text: "Secure hardware design is the most important aspect to be considered in addition to functional correctness. Achieving hardware security in today’s globalized Integrated Cir- cuit(IC) supply chain is a challenging task. One solution that is widely considered to help achieve secure hardware designs is Information Flow Tracking(IFT). It provides an ap- proach to verify that the systems adhere to security properties either by static verification during design phase or dynamic checking during runtime.\r\nProof-Carrying Hardware(PCH) is an approach to verify a functional design prior to using it in hardware. It is a two-party verification approach, where the target party, the consumer requests new functionalities with pre-defined properties to the producer. In response, the producer designs the IP (Intellectual Property) cores with the requested functionalities that adhere to the consumer-defined properties. The producer provides the IP cores and a proof certificate combined into a proof-carrying bitstream to the consumer to verify it. If the verification is successful, the consumer can use the IP cores in his hardware. In essence, the consumer can only run verified IP cores. Correctly applied, PCH techniques can help consumers to defend against many unintentional modifications and malicious alterations of the modules they receive. There are numerous published examples of how to use PCH to detect any change in the functionality of a circuit, i.e., pairing a PCH approach with functional equivalence checking for combinational or sequential circuits. For non-functional properties, since opening new covert channels to leak secret information from secure circuits is a viable attack vector for hardware trojans, i.e., intentionally added malicious circuitry, IFT technique is employed to make sure that secret/untrusted information never reaches any unclassified/trusted outputs.\r\nThis master thesis aims to explore the possibility of adapting Information Flow Tracking into a Proof-Carrying Hardware scenario. It aims to create a method that combines Infor- mation Flow Tracking(IFT) with a PCH approach at bitstream level enabling consumers to validate the trustworthiness of a module’s information flow without the computational costs of a complete flow analysis." author: - first_name: Monica full_name: Keerthipati, Monica last_name: Keerthipati citation: ama: Keerthipati M. A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn; 2019. apa: Keerthipati, M. (2019). A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn. bibtex: '@book{Keerthipati_2019, title={A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking}, publisher={Universität Paderborn}, author={Keerthipati, Monica}, year={2019} }' chicago: Keerthipati, Monica. A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn, 2019. ieee: M. Keerthipati, A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn, 2019. mla: Keerthipati, Monica. A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn, 2019. short: M. Keerthipati, A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking, Universität Paderborn, 2019. date_created: 2020-02-17T12:03:40Z date_updated: 2022-01-06T06:52:41Z department: - _id: '78' language: - iso: eng project: - _id: '12' name: SFB 901 - Subproject B4 - _id: '3' name: SFB 901 - Project Area B - _id: '1' name: SFB 901 publisher: Universität Paderborn status: public supervisor: - first_name: Tobias full_name: Wiersema, Tobias id: '3118' last_name: Wiersema - first_name: Marco full_name: Platzner, Marco id: '398' last_name: Platzner - first_name: Sybille full_name: Hellebrand, Sybille id: '209' last_name: Hellebrand orcid: 0000-0002-3717-3939 title: A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking type: mastersthesis user_id: '477' year: '2019' ... --- _id: '15921' abstract: - lang: eng text: "Ranking plays a central role in a large number of applications driven by RDF knowledge graphs. Over the last years, many popular RDF knowledge graphs have grown so large that rankings for the facts they contain cannot be computed directly using the currently common 64-bit platforms. In this paper, we tackle two problems:\r\nComputing ranks on such large knowledge bases efficiently and incrementally. First, we present D-HARE, a distributed approach for computing ranks on very large knowledge graphs. D-HARE assumes the random surfer model and relies on data partitioning to compute matrix multiplications and transpositions on disk for matrices of arbitrary size. Moreover, the data partitioning underlying D-HARE allows the execution of most of its steps in parallel.\r\nAs very large knowledge graphs are often updated periodically, we tackle the incremental computation of ranks on large knowledge bases as a second problem. We address this problem by presenting\r\nI-HARE, an approximation technique for calculating the overall ranking scores of a knowledge without the need to recalculate the ranking from scratch at each new revision. We evaluate our approaches by calculating ranks on the 3 × 10^9 and 2.4 × 10^9 triples from Wikidata resp. LinkedGeoData. Our evaluation demonstrates\r\nthat D-HARE is the first holistic approach for computing ranks on very large RDF knowledge graphs. In addition, our incremental approach achieves a root mean squared error of less than 10E−7 in the best case. Both D-HARE\r\n and I-HARE are open-source and are available at: https://github.com/dice-group/incrementalHARE.\r\n" author: - first_name: Abdelmoneim Amer full_name: Desouki, Abdelmoneim Amer last_name: Desouki - first_name: Michael full_name: Röder, Michael last_name: Röder - first_name: Axel-Cyrille full_name: Ngonga Ngomo, Axel-Cyrille last_name: Ngonga Ngomo citation: ama: 'Desouki AA, Röder M, Ngonga Ngomo A-C. Ranking on Very Large Knowledge Graphs. In: Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19. ACM; 2019:163-171. doi:10.1145/3342220.3343660' apa: Desouki, A. A., Röder, M., & Ngonga Ngomo, A.-C. (2019). Ranking on Very Large Knowledge Graphs. In Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19 (pp. 163–171). ACM. https://doi.org/10.1145/3342220.3343660 bibtex: '@inproceedings{Desouki_Röder_Ngonga Ngomo_2019, title={Ranking on Very Large Knowledge Graphs}, DOI={10.1145/3342220.3343660}, booktitle={Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19}, publisher={ACM}, author={Desouki, Abdelmoneim Amer and Röder, Michael and Ngonga Ngomo, Axel-Cyrille}, year={2019}, pages={163–171} }' chicago: Desouki, Abdelmoneim Amer, Michael Röder, and Axel-Cyrille Ngonga Ngomo. “Ranking on Very Large Knowledge Graphs.” In Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19, 163–71. ACM, 2019. https://doi.org/10.1145/3342220.3343660. ieee: A. A. Desouki, M. Röder, and A.-C. Ngonga Ngomo, “Ranking on Very Large Knowledge Graphs,” in Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19, 2019, pp. 163–171. mla: Desouki, Abdelmoneim Amer, et al. “Ranking on Very Large Knowledge Graphs.” Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19, ACM, 2019, pp. 163–71, doi:10.1145/3342220.3343660. short: 'A.A. Desouki, M. Röder, A.-C. Ngonga Ngomo, in: Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19, ACM, 2019, pp. 163–171.' conference: end_date: 2019-09-20 name: 30th ACM Conference on Hypertext and Social Media start_date: 2019-09-17 date_created: 2020-02-18T16:39:35Z date_updated: 2022-01-06T06:52:41Z department: - _id: '574' doi: 10.1145/3342220.3343660 keyword: - Knowledge Graphs - Ranking - RDF language: - iso: eng page: 163-171 project: - _id: '52' name: Computing Resources Provided by the Paderborn Center for Parallel Computing publication: Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT '19 publication_identifier: isbn: - '9781450368858' publication_status: published publisher: ACM status: public title: Ranking on Very Large Knowledge Graphs type: conference user_id: '69382' year: '2019' ... --- _id: '14568' author: - first_name: Stefan full_name: Heindorf, Stefan id: '11871' last_name: Heindorf orcid: 0000-0002-4525-6865 - first_name: Yan full_name: Scholten, Yan last_name: Scholten - first_name: Gregor full_name: Engels, Gregor id: '107' last_name: Engels - first_name: Martin full_name: Potthast, Martin last_name: Potthast citation: ama: 'Heindorf S, Scholten Y, Engels G, Potthast M. Debiasing Vandalism Detection Models at Wikidata (Extended Abstract). In: INFORMATIK. ; 2019:289-290. doi:10.18420/inf2019_48' apa: Heindorf, S., Scholten, Y., Engels, G., & Potthast, M. (2019). Debiasing Vandalism Detection Models at Wikidata (Extended Abstract). In INFORMATIK (pp. 289–290). https://doi.org/10.18420/inf2019_48 bibtex: '@inproceedings{Heindorf_Scholten_Engels_Potthast_2019, title={Debiasing Vandalism Detection Models at Wikidata (Extended Abstract)}, DOI={10.18420/inf2019_48}, booktitle={INFORMATIK}, author={Heindorf, Stefan and Scholten, Yan and Engels, Gregor and Potthast, Martin}, year={2019}, pages={289–290} }' chicago: Heindorf, Stefan, Yan Scholten, Gregor Engels, and Martin Potthast. “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract).” In INFORMATIK, 289–90, 2019. https://doi.org/10.18420/inf2019_48. ieee: S. Heindorf, Y. Scholten, G. Engels, and M. Potthast, “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract),” in INFORMATIK, 2019, pp. 289–290. mla: Heindorf, Stefan, et al. “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract).” INFORMATIK, 2019, pp. 289–90, doi:10.18420/inf2019_48. short: 'S. Heindorf, Y. Scholten, G. Engels, M. Potthast, in: INFORMATIK, 2019, pp. 289–290.' date_created: 2019-11-05T15:48:52Z date_updated: 2022-01-06T06:52:03Z department: - _id: '66' doi: 10.18420/inf2019_48 language: - iso: eng main_file_link: - open_access: '1' url: https://dl.gi.de/bitstream/handle/20.500.12116/24997/paper3_25.pdf oa: '1' page: 289-290 publication: INFORMATIK status: public title: Debiasing Vandalism Detection Models at Wikidata (Extended Abstract) type: conference user_id: '11871' year: '2019' ... --- _id: '14817' article_number: '101975' author: - first_name: Christoph full_name: Sommer, Christoph id: '49154' last_name: Sommer orcid: 0000-0002-4336-7350 - first_name: Stefano full_name: Basagni, Stefano last_name: Basagni citation: ama: Sommer C, Basagni S. Advances and novel applications of mobile wireless networking. Ad Hoc Networks. 2019. doi:10.1016/j.adhoc.2019.101975 apa: Sommer, C., & Basagni, S. (2019). Advances and novel applications of mobile wireless networking. Ad Hoc Networks. https://doi.org/10.1016/j.adhoc.2019.101975 bibtex: '@article{Sommer_Basagni_2019, title={Advances and novel applications of mobile wireless networking}, DOI={10.1016/j.adhoc.2019.101975}, number={101975}, journal={Ad Hoc Networks}, author={Sommer, Christoph and Basagni, Stefano}, year={2019} }' chicago: Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications of Mobile Wireless Networking.” Ad Hoc Networks, 2019. https://doi.org/10.1016/j.adhoc.2019.101975. ieee: C. Sommer and S. Basagni, “Advances and novel applications of mobile wireless networking,” Ad Hoc Networks, 2019. mla: Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications of Mobile Wireless Networking.” Ad Hoc Networks, 101975, 2019, doi:10.1016/j.adhoc.2019.101975. short: C. Sommer, S. Basagni, Ad Hoc Networks (2019). date_created: 2019-11-05T18:38:44Z date_updated: 2022-01-06T06:52:06Z department: - _id: '589' doi: 10.1016/j.adhoc.2019.101975 language: - iso: eng publication: Ad Hoc Networks publication_identifier: issn: - 1570-8705 publication_status: published status: public title: Advances and novel applications of mobile wireless networking type: journal_article user_id: '49154' year: '2019' ... --- _id: '14819' author: - first_name: Julian full_name: Heinovski, Julian last_name: Heinovski - first_name: Lukas full_name: Stratmann, Lukas last_name: Stratmann - first_name: Dominik S. full_name: Buse, Dominik S. last_name: Buse - first_name: Florian full_name: Klingler, Florian last_name: Klingler - first_name: Mario full_name: Franke, Mario last_name: Franke - first_name: Marie-Christin H. full_name: Oczko, Marie-Christin H. last_name: Oczko - first_name: Christoph full_name: Sommer, Christoph id: '49154' last_name: Sommer orcid: 0000-0002-4336-7350 - first_name: Ingrid full_name: Scharlau, Ingrid last_name: Scharlau - first_name: Falko full_name: Dressler, Falko last_name: Dressler citation: ama: 'Heinovski J, Stratmann L, Buse DS, et al. Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective. In: 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM). ; 2019. doi:10.1109/wowmom.2019.8793008' apa: Heinovski, J., Stratmann, L., Buse, D. S., Klingler, F., Franke, M., Oczko, M.-C. H., … Dressler, F. (2019). Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective. In 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM). https://doi.org/10.1109/wowmom.2019.8793008 bibtex: '@inproceedings{Heinovski_Stratmann_Buse_Klingler_Franke_Oczko_Sommer_Scharlau_Dressler_2019, title={Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective}, DOI={10.1109/wowmom.2019.8793008}, booktitle={2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)}, author={Heinovski, Julian and Stratmann, Lukas and Buse, Dominik S. and Klingler, Florian and Franke, Mario and Oczko, Marie-Christin H. and Sommer, Christoph and Scharlau, Ingrid and Dressler, Falko}, year={2019} }' chicago: Heinovski, Julian, Lukas Stratmann, Dominik S. Buse, Florian Klingler, Mario Franke, Marie-Christin H. Oczko, Christoph Sommer, Ingrid Scharlau, and Falko Dressler. “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective.” In 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019. https://doi.org/10.1109/wowmom.2019.8793008. ieee: J. Heinovski et al., “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective,” in 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019. mla: Heinovski, Julian, et al. “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective.” 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019, doi:10.1109/wowmom.2019.8793008. short: 'J. Heinovski, L. Stratmann, D.S. Buse, F. Klingler, M. Franke, M.-C.H. Oczko, C. Sommer, I. Scharlau, F. Dressler, in: 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019.' date_created: 2019-11-05T18:38:48Z date_updated: 2022-01-06T06:52:06Z department: - _id: '589' doi: 10.1109/wowmom.2019.8793008 language: - iso: eng publication: 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) publication_identifier: isbn: - '9781728102702' publication_status: published status: public title: Modeling Cycling Behavior to Improve Bicyclists' Safety at Intersections - A Networking Perspective type: conference user_id: '49154' year: '2019' ... --- _id: '14821' article_type: original author: - first_name: Agnes Regina full_name: Seipelt, Agnes Regina id: '24239' last_name: Seipelt citation: ama: Seipelt AR. Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien. Weberiana. 2019;29:107–161. apa: Seipelt, A. R. (2019). Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien. Weberiana, 29, 107–161. bibtex: '@article{Seipelt_2019, title={Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien}, volume={29}, journal={Weberiana}, publisher={Allitera}, author={Seipelt, Agnes Regina}, year={2019}, pages={107–161} }' chicago: 'Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien.” Weberiana 29 (2019): 107–161.' ieee: A. R. Seipelt, “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien,” Weberiana, vol. 29, pp. 107–161, 2019. mla: Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien.” Weberiana, vol. 29, Allitera, 2019, pp. 107–161. short: A.R. Seipelt, Weberiana 29 (2019) 107–161. date_created: 2019-11-06T08:34:40Z date_updated: 2022-01-06T06:52:06Z intvolume: ' 29' keyword: - Weber - Wien - Zensur language: - iso: ger page: 107–161 publication: Weberiana publication_identifier: isbn: - 978-3-96233-182-5 publication_status: published publisher: Allitera status: public title: Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien type: journal_article user_id: '24239' volume: 29 year: '2019' ...