Go to content
UR Home

Dewey Decimal Classification

Up a level
Export as
[feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items at this level: 1645.

Seidel, Philipp (2025) Assessing performance and explainability of convolutional neural networks in brain state decoding. PhD, Universität Regensburg.

Pfaller, Tobias, Skopik, Florian, Smith, Paul and Leitner, Maria (2025) Exploring a comprehensive approach to customize cyber exercises utilizing a process-based lifecycle model. International Journal of Information Security 24, p. 96.

Reichert, Emma-Sophie, Babl, Anna-Lena, Kim, Kyuhee, Achmann-Denkler, Michael and Wolff, Christian (2025) Aspektbasierte Sentimentanalyse von Bookstagram-Posts. In: DHd 2025: Under Construction. 11. Jahrestagung des Verbands Digital Humanities im deutschsprachigen Raum e.V. Dhd e.V., Bielefeld, pp. 399-402.

Rosenberger, Julian , Wolfrum, Lukas, Weinzierl, Sven, Kraus, Mathias and Zschech, Patrick (2025) CareerBERT: Matching resumes to ESCO jobs in a shared embedding space for generic job recommendations. Expert Systems with Applications 275, p. 127043.

Empl, Philip Maurice (2025) Incident Response for the Internet of Things. PhD, Universität Regensburg.

Mielke, Bettina and Wolff, Christian (2025) Das digitale Basisdokument. Ergebnisse aus dem Deutschlandweit ersten Reallabor im Rechtswesen. In: Der Mensch im Zentrum - KI, Ethik & Recht / Human-Centred AI for Good - AI, Ethics & Law. Proceedings des 28. Internationalen Rechtsinformatiksymposions IRIS 2025. Editions Weblaw, Bern, pp. 197-204.

Mielke, Bettina and Wolff, Christian (2025) „KI, lös‘ mir den Fall!“ Zur Evaluierung grosser Sprachmodelle für Anwendungen im deutschsprachigen Rechtswesen. In: Schweighofer, Erich and Eder, Stefan and Constantini, Federico and Schmautzer, Jakob, (eds.) Der Mensch im Zentrum - KI, Ethik & Recht / Human-Centred AI for Good - AI, Ethics & Law. Proceedings des 28. Internationalen Rechtsinformatiksymposions IRIS 2025. Editions Weblaw, Bern, pp. 137-146.

Pfaller, Tobias, Skopik, Florian, Reuter, Lenhard and Leitner, Maria (2025) Data Collection in Cyber Exercises Through Monitoring Points: Observing, Steering, and Scoring. In: 11th International Conference on Information Systems Security and Privacy, February 20-22, 2025, Porto, Portugal.

Diemt, Sabine (2024) A Requirements Review Based on a User Survey for a University-Wide User-Centered Research Data Management System. Bachelorarbeit, Universität Regensburg.

Hauser, Florian (2024) Visuelle Expertise bei Code Reviews. PhD, Universität Regensburg.

Konadl, Daniel (2024) A Generative AI-Based Approach to Support Automated Utterance Generation for Different Conversational Contexts within AAC Systems. In: International Conference on Information Systems (ICIS 2024), 15.12.2024 - 18.12.2024, Bangkok, Thailand.

Simeth, Jakob , Hüttl, Paul , Schön, Marian, Nozari, Zahra, Huttner, Michael , Schmidt, Tobias, Altenbuchinger, Michael and Spang, Rainer (2024) Virtual Tissue Expression Analysis. Bioinformatics, btae709.

Hornsteiner, Markus, Kreussel, Michael, Steindl, Christoph, Ebner, Fabian, Empl, Philip and Schönig, Stefan (2024) Real-Time Text-to-Cypher Query Generation with Large Language Models for Graph Databases. Future Internet 16 (12), p. 438.

Bachmaier, Regine, Schmalenströer, Manuela and Lemberger, Sonja (2024) Modul 5: Offline-Tools. Fit fürs Studium. [Lecture notes]

Weisheit, Silke , Doß, Brigitte , Schüler, Daniela, Weber, Hanna, Rupp, Daniel, Brettschneider, Peter, von Francken-Welz, Marion, Hubrich, Jessica and Becker, Miriam (2024) Beiträge zur EZB-DBIS-Konferenz 2024. In: EZB-DBIS-Konferenz 2024, 12.11.2024, Universitätsbibliothek Regensburg.

Striegl, Holger, Schwarz, Gerhard and Ritzinger, Julia (2024) Modul 3: Online-Tools. Fit fürs Studium. [Lecture notes]

Poss, Leo and Schönig, Stefan (2024) Location-aware business process modeling and execution. Software and Systems Modeling.

Hausler, Dominique and Klettke, Meike (2024) Nautilus: Implementation of an Evolution Approach for Graph Databases. In: MODELS Companion '24: ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, September 22 - 27, 2024, Linz, Austria.

Schill, Rudolf , Klever, Maren, Lösch, Andreas, Hu, Y. Linda , Vocht, Stefan, Rupp, Kevin, Grasedyck, Lars, Spang, Rainer and Beerenwinkel, Niko (2024) Correcting for Observation Bias in Cancer Progression Modeling. Journal of Computational Biology 31 (10), pp. 927-945. Fulltext not available.

Heinrich, Bernd, Krapf, Thomas and Miethaner, Paul (2024) EXPLORE: A Novel Method for Local Explanations. In: International Conference on Information Systems (ICIS 2024), 15.12.2024 - 18.12.2024, Bangkok, Thailand.

Hellwig, Nils Constantin , Fehle, Jakob , Bink, Markus, Schmidt, Thomas and Wolff, Christian (2024) Exploring Twitter discourse with BERTopic: topic modeling of tweets related to the major German parties during the 2021 German federal election. International Journal of Speech Technology.

Fahr, Marie Christine, Förster, Maximilian, Moestue, Lars, Brasse, Julia, Klier, Julia and Klier, Mathias (2024) Improving the use of public e-services through explainability. Journal of Business Economics.

Plazotta, Maximilian and Klettke, Meike (2024) Data Architectures in Cloud Environments. Datenbank-Spektrum.

Weiß, Daniel and Wörle, Sonja (2024) Modul 1: Kennenlernen des Rechenzentrums. Fit fürs Studium. [Lecture notes]

Hellwig, Nils Constantin , Fehle, Jakob and Wolff, Christian (2024) Exploring large language models for the generation of synthetic training samples for aspect-based sentiment analysis in low resource settings. Expert Systems with Applications 261, p. 125514.

Schmid, Andreas , Ambros, Maria , Bogon, Johanna and Wimmer, Raphael (2024) Measuring the Just Noticeable Difference for Audio Latency. In: AM '24: Audio Mostly 2024 - Explorations in Sonic Cultures, September 18 - 20, 2024, Milan, Italy.

Lohninger, Daniel (2024) Concepts and Methods for Decision Support - Contributions to Item and Service Recommendations for Users in Web and Mobile Environments. PhD, Universität Regensburg.

Achmann-Denkler, Michael , Fehle, Jakob, Haim, Mario and Wolff, Christian (2024) Detecting Calls to Action in Multimodal Content: Analysis of the 2021 German Federal Election Campaign on Instagram. arXiv, 2409.02690.

Achmann-Denkler, Michael and Wolff, Christian (2024) Preserving the Ephemeral: Instagram Story Archiving with the Tidal Tales Plugin. arXiv.

Wührl, Christoph , Schmid, Andreas , Sabrina, Hößl and Wimmer, Raphael (2024) Comparing the Effectiveness and Ergonomics of Smartphone-Based Gamepads. In: MuC '24: Mensch und Computer 2024, September 1 - 4, 2024, Karlsruhe, Germany.

Emmert, Martina , Schönwerth, Nicole , Schmid, Andreas , Wimmer, Raphael and Wolff, Christian (2024) I've Got the Data in My Pocket! Exploring Interaction Techniques with Everyday Objects for Cross-Device Data Transfer. In: MuC '24: Mensch und Computer 2024, September 1 - 4, 2024, Karlsruhe, Germany.

Pfahler, Simon, Georg, Peter, Schill, Rudolf , Klever, Maren, Grasedyck, Lars, Spang, Rainer and Wettig, Tilo (2024) Taming numerical imprecision by adapting the KL divergence to negative probabilities. arXiv.

Huber, Florian (2024) Konzeption und prototypische Entwicklung eines computergestützten Systems zur Lehre von UML-Klassendiagrammen für die Unterstützung der hochschulischen Lehre von Software Engineering. PhD, Universität Regensburg.

Bock, Sebastian (2024) 3D Pose Estimation Problem and a Convergence Analysis of Adaptive Gradient Descent Algorithms. PhD, Universität Regensburg.

Schleicher, Daniel , Jarvers, Irina, Kocur, Martin , Kandsperger, Stephanie, Brunner, Romuald and Ecker, Angelika (2024) Does it need an app? – Differences between app-guided breathing and natural relaxation in adolescents after acute stress. Psychoneuroendocrinology 169, p. 107148.

Baumer, Thomas , Reittinger, Tobias , Kern, Sascha and Pernul, Günther (2024) Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations. In: Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 11 - 13 Aug 2024, Philadelphia, PA, USA.

Baumer, Thomas , Grill, Johannes , Adan, Jacob and Pernul, Günther (2024) A Trust and Reputation System for Examining Compliance with Access Control. In: ARES 2024 The 19th International Conference on Availability, Reliability and Security, July 30 - August 02, 2024, Vienna, Austria.

Grabinger, Lisa, Hauser, Florian, Wolff, Christian and Mottok, Jürgen (2024) On Eye Tracking in Software Engineering. SN Computer Science 5.

Althammer, Christoph and Wolff, Christian, eds. (2024) Abschlussbericht des Forschungsprojekts Reallabor Basisdokument im Auftrag der Justizministerien Bayerns und Niedersachsens. Project Report, Universität Regensburg, Regensburg.

Januzaj, Eshref (2024) Dichte-basiertes verteiltes Clustering. PhD, Universität Regensburg.

Puchta, Alexander , Baumer, Thomas , Müller, Mathis and Pernul, Günther (2024) IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence. In: DBSec 2024, 15.-17. Jul 2024, San José, CA, USA. Fulltext restricted.

Hornsteiner, Markus, Empl, Philip , Bunghardt, Timo and Schönig, Stefan (2024) Reading between the Lines: Process Mining on OPC UA Network Data. Sensors 24 (14), p. 4497.

Dietz, Marietheres , Reichvilser, Thomas and Pernul, Günther (2024) A Data-Driven Framework for Digital Twin Creation in Industrial Environments. IEEE Access 12, pp. 93294-93304.

Kroczek, Leon O.H., Lingnau, Angelika , Schwind, Valentin, Wolff, Christian and Mühlberger, Andreas (2024) Observers predict actions from facial emotional expressions during real-time social interactions. Behavioural Brain Research 471, p. 115126.

Glehr, Gunther , Riquelme, Paloma , Kronenberg, Katharina, Lohmayer, Robert, López-Madrona, Víctor J., Kapinsky, Michael, Schlitt, Hans J. , Geissler, Edward K. , Spang, Rainer, Haferkamp, Sebastian and Hutchinson, James A. (2024) Restricting datasets to classifiable samples augments discovery of immune disease biomarkers. Nature Communications 15 (1).

Glas, Magdalena , Messmann, Gerhard and Pernul, Günther (2024) Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises. Computers & Security 144, p. 103965.

Mora, Sara, Gazzarata, Roberta, Blobel, Bernd, Murgia, Ylenia and Giacomini, Mauro (2024) Transforming Ontology Web Language Elements into Common Terminology Service 2 Terminology Resources. Journal of Personalized Medicine 14 (7), p. 676.

Strasser, Sebastian and Klettke, Meike (2024) Transparent Data Preprocessing for Machine Learning. In: HILDA 24: 2024 Workshop on Human-In-the-Loop Data Analytics, June 14, 2024, AA, Santiago, Chile.

Canzar, Stefan, Do, Van Hoan, Jelić, Slobodan, Laue, Sören, Matijević, Domagoj and Prusina, Tomislav (2024) Metric multidimensional scaling for large single-cell datasets using neural networks. Algorithms for Molecular Biology 19 (1).

Balluff, Maximilian, Mandl, Peter and Wolff, Christian (2024) Innovations in Cover Song Detection: A Lyrics-Based Approach. arXiv.

Pfaller, Tobias, Skopik, Florian, Smith, Paul and Leitner, Maria (2024) Towards Customized Cyber Exercises using a Process-based Lifecycle Model. In: European Interdisciplinary Cybersecurity Conference, EICC 2024, June 5-6, 2024, Xanthi, Greece.

Luttmann, Carla , Mayer, Manuel, Siebertz, Markus, Jost, Leonardo , Henze, Niels and Jansen, Petra (2024) Effects of visual flow velocity on cycling experience in virtual reality. German Journal of Exercise and Sport Research.

Friedl, Sabrina and Pernul, Günther (2024) IoT Forensics Readiness - influencing factors. Forensic Science International: Digital Investigation 49, p. 301768.

Huttner, Michael (2024) Infrastructure for digital medicine and AI enhanced pathology. PhD, Universität Regensburg.

Mielke, Bettina and Wolff, Christian (2024) Maschinelle Lernverfahren als KI-Komponenten in Digitalisierungsprojekten der Justiz. LegalTech : Zeitschrift für die digitale Rechtsanwendung (LTZ) 3 (2), pp. 144-153. Fulltext restricted.

Schlette, Daniel , Empl, Philip , Caselli, Marco, Schreck, Thomas and Pernul, Günther (2024) Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors. In: 45th IEEE Symposium on Security and Privacy (SP 2024), MAY 20-23, 2024, San Francisco, CA, USA. Fulltext not available.

Stjerna, Amanda and Rümmer, Philipp (2024) A Constraint Solving Approach to Parikh Images of Regular Languages. Proceedings of the ACM on Programming Languages 8 (OOPSLA), pp. 1235-1263.

Stoiber, Christoph and Schönig, Stefan (2024) Leveraging the industrial internet of things for business process improvement: a metamodel and patterns. Information Systems and e-Business Management.

Hertlein, Franziska (2024) Licht Sehen Verstehen. Untersuchungen der Kommunikationseigenschaft von Lichteffekten im Fahrzeuginnenraum. PhD, Universität Regensburg.

Leitner, Maria , Skopik, Florian and Pahi, Timea (2024) Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries. Information Security Journal: A Global Perspective 33 (5), pp. 486-507.

Bommer, Marinus (2024) Root Cause Analysis in Sparsely Labeled Environments using Machine Learning. PhD, Universität Regensburg.

Wittig, Maximilian and Kesdoğan, Doğan (2024) Detecting Web Tracking at the Network Layer. In: Meyer, N. and Grocholewska-Czuryło, A., (eds.) ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, 679. Springer Nature Switzerland, Cham, pp. 131-148. ISBN 978-3-031-56326-3. Fulltext restricted.

Mielke, Bettina and Wolff, Christian (2024) Von Legal Design Thinking bis Virtual Reality. Aktuelle Trends der Rechtsvisualisierung. Jusletter IT, pp. 303-311. Fulltext restricted.

Rieger, Franz (2024) Prototyp eines digitalen Zwillings im Bereich der Schnittstelle zwischen ambulanter Indikationsstellung und stationärer operativer Therapie am Beispiel des Prostatakarzinoms. PhD, Universität Regensburg.

Auch, Maximilian , Balluff, Maximilian, Mandl, Peter and Wolff, Christian (2024) Towards an Automated Classification of Software Libraries. SN Computer Science 5 (4).

Krapf, Thomas, Hagn, Michael, Miethaner, Paul, Schiller, Alexander, Luttner, Lucas and Heinrich, Bernd (2024) Piecewise Linear Transformation − Propagating Aleatoric Uncertainty in Neural Networks. In: 38th Annual AAAI Conference on Artificial Intelligence, 20.02.-27.02.2024, Vancouver, Kanada.

Frummet, Alexander , Speggiorin, Alessandro, Elsweiler, David , Leuski, Anton and Dalton, Jeff (2024) Cooking with Conversation: Enhancing User Engagement and Learning with a Knowledge-Enhancing Assistant. ACM Transactions on Information Systems 42 (5), pp. 1-29.

Schönig, Stefan and Jablonski, Stefan (2024) Digitales Prozessmanagement: Eine Reflexion aus praktischer Sicht zur Förderung des Austauschs zwischen Forschung und Praxis. HMD Praxis der Wirtschaftsinformatik 61, pp. 1348-1365.

Sautmann, Marie (2024) Evaluation im Reallabor: Analyse und Anwendung von Evaluationsmethoden der Mensch-Maschine-Interaktion in Reallaboren im Rahmen des Forschungsprojekts „Strukturvorgaben für den Parteivortrag“. Masters, Universität Regensburg.

Khatiwada, Pankaj, Yang, Bian, Lin, Jia-Chun and Blobel, Bernd (2024) Patient-Generated Health Data (PGHD): Understanding, Requirements, Challenges, and Existing Techniques for Data Security and Privacy. Journal of Personalized Medicine 14 (3), p. 282.

Huth, Benjamin (2024) Track reconstruction for future high-energy-physics experiments with classical and machine-learning methods. PhD, Universität Regensburg.

Schaub, Henry, Wolff, Christian , Hoh, Maximilian and Schöttl, Alfred (2024) Probabilistic Closed-Loop Active Grasping. IEEE Robotics and Automation Letters 9 (4), pp. 3964-3971. Fulltext restricted.

Berg, Kevin, Lodha, Manivel , Delazer, Isabel, Bartosik, Karolina, Garcia, Yilliam Cruz, Hennig, Thomas, Wolf, Elmar, Dölken, Lars, Lusser, Alexandra, Prusty, Bhupesh K. and Erhard, Florian (2024) Correcting 4sU induced quantification bias in nucleotide conversion RNA-seq data. Nucleic Acids Research 52 (7), e35.

Führlein, Lisa (2024) Individualisierte auditorische Stimulation bei Tinnitus: Die App „Shades of Noise“. PhD, Universität Regensburg.

Mielke, Bettina and Wolff, Christian (2024) Verständliche Rechtstexte mit Hilfe grosser Sprachmodelle. In: Sprachmodelle: Juristische Papageien oder mehr ? / Language Models: Lergal Parrots or more? Proceedings des 27. Internationalen Rechtsinformatiksymposions IRIS 2024. Editions Weblaw, Bern, pp. 27-37. ISBN 978-3-03916-222-2.

Schmidt, Thomas , Sasse, Jonathan and Wolff, Christian (2024) Fanfictions – Literatur von Frauen über Männer? Korpusbasierte Analyse der Geschlechterrollen bei Texten und Autor*innen deutschsprachiger Fanfictions. In: Weis, Joëlle and Bunout, Estelle and Haider, Thomas and Helling, Patrick, (eds.) DHd2024: Quo Vadis DH? Zenodo, Passau, Germany, pp. 193-200.

Maierhöfer, Vitus , Schmid, Andreas and Wimmer, Raphael (2024) 18. TipTrack: Precise, Low-Latency, Robust Optical Pen Tracking on Arbitrary Surfaces Using an IR-Emitting Pen Tip. In: TEI '24: Proceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction. Association for Computing Machinery, New York, United States, pp. 1-13. ISBN 979-8-4007-0402-4.

Ludwig, Bernd (2024) Large Models Reshape AI Research and Applications. KI - Künstliche Intelligenz 37, pp. 111-112.

Jaki, Thomas , Chang, Chi, Kuhlemeier, Alena and Van Horn, M. Lee (2024) Predicting Individual Treatment Effects: Challenges and Opportunities for Machine Learning and Artificial Intelligence. KI - Künstliche Intelligenz.

Rameseder, Stefan (2024) The Applicability of Functional Data in Multi-Unit Auctions. PhD, Universität Regensburg.

Erhard, Florian (2024) Two-Step Parameter Estimation for Read Feature Models. KI - Künstliche Intelligenz.

Groll, Sebastian, Kern, Sascha , Fuchs, Ludwig and Pernul, Günther (2024) A Framework for Managing Separation of Duty Policies. In: ARES 2024: The 19th International Conference on Availability, Reliability and Security, July 30 - August 2, 2024, Vienna, Austria.

Hauser, Florian , Grabinger, Lisa, Ezer, Timur, Mottok, Jürgen Horst and Gruber, Hans (2024) Analyzing and Interpreting Eye Movements in C++: Using Holistic Models of Image Perception. In: ETRA '24: The 2024 Symposium on Eye Tracking Research and Applications, June 4 - 7, 2024, Glasgow, United Kingdom.

Kiefer, Sandra and Neuen, Daniel (2024) Bounding the Weisfeiler-Leman Dimension via a Depth Analysis of I/R-Trees. In: LICS '24: 39th Annual ACM/IEEE Symposium on Logic in Computer Science, July 8 - 11, 2024, Tallinn, Estonia.

Vielberth, Manfred , Raab, Kristina , Glas, Magdalena , Grümer, Patrick and Pernul, Günther (2024) Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk Assessment. In: ARES 2024 The 19th International Conference on Availability, Reliability and Security, July 30 - August 02, 2024, Vienna, Austria.

Reittinger, Tobias , Glas, Magdalena , Aminzada, Sarah and Pernul, Günther (2024) Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality. In: IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2024), 9th - 11th July 2024, Skövde, Sweden. Fulltext restricted.

Hausler, Dominique (2024) Estimation, Impact and Visualization of Schema Evolution in Graph Databases. In: MODELS Companion '24: ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, September 22 - 27, 2024, Linz, Austria.

Wittig, Maximilian and Kesdogan, Dogan (2024) Extended Abstract: Privacy Threats in Online Advertising. In: The 3rd Workshop on Privacy Threat Modeling (WPTM), August 8th, 2024, Virtual event. (Unpublished)

Hellwig, Nils Constantin, Fehle, Jakob, Bink, Markus and Wolff, Christian (2024) GERestaurant: A German Dataset of Annotated Restaurant Reviews for Aspect-Based Sentiment Analysis. In: Proceedings of the 20th Conference on Natural Language Processing (Konferenz zur Verarbeitung natürlicher Sprache, KONVENS 2024). Association for Computational Linguistics, pp. 123-133.

Blobel, Bernd (2024) Healthcare Transformation Impacts Design and Management of Health and Social Care Ecosystems IN: The Newsletter of the European Federation for Medical Informatics. International Journal on Biomedicine and Healthcare (IJBH) 12 (3), pp. 241-242.

Weisheit, Silke and Schirmer, Vicky (2024) Informationen zum Publizieren in der EZB. In: openCost-Sprechstunden zur Erweiterung der EZB um Informationen zum Publizieren, 22.8.2024 und 24.9.2024, Zoom.

Weisheit, Silke and Sippl, Colin (2024) Informationen zum Publizieren in der EZB. In: Open Access Staff Week, 26.-28.11.2024, Regensburg.

Balluff, Maximilian, Auch, Maximilian , Mandl, Peter and Wolff, Christian (2024) Lyriccovers 2.0: An Enhanced Dataset for Cover Song Analysis. IADIS International Journal on WWW/Internet 22 (2), pp. 75-92.

Kalus, Alexander , Klein, Johannes, Ho, Tien-Julian, Seegets, Lee-Ann and Henze, Niels (2024) MobileGravity: Mobile Simulation of a High Range of Weight in Virtual Reality. In: CHI '24: CHI Conference on Human Factors in Computing Systems, May 11 - 16, 2024, Honolulu, HI, USA.

Mielke, Bettina and Wolff, Christian (2024) Neue Wege im Zivilprozess: Das digitale Basisdokument – Einblick in das bundesweit erste Reallabor im Rechtswesen. RDi - Recht Digital 4 (8), pp. 361-370. Fulltext restricted.

Weisheit, Silke , Hubrich, Jessica, Rolschewski, Johann and Stei, Andrea (2024) Online-Sprechstunde zum EZB-ZDB-Datendienst. In: Online-Sprechstunde zum EZB-ZDB-Datendienst, 28.11.2024, Online.

Kocur, Martin , Noack, Thomas, Schwind, Valentin, Bogon, Johanna and Henze, Niels (2024) Physiological and Perceptual Effects of Avatars' Muscularity while Rowing in Virtual Reality. In: MuC '24: Mensch und Computer 2024, September 1 - 4, 2024, Karlsruhe, Germany.

Empl, Philip , Böhm, Fabian and Pernul, Günther (2024) Process-Aware Intrusion Detection in MQTT Networks. In: CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy, June 19 - 21, 2024, Porto, Portugal.

Hartlmüller, Lisa, Weisheit, Silke and Doß, Brigitte (2024) Protokoll zur EZB-DBIS-Beiratssitzung am 16.05.2024.

Kimbel, Angelika, Glas, Magdalena and Pernul, Günther (2024) Security and Privacy Perspectives on Using ChatGPT at the Workplace: An Interview Study. In: IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2024), 9th - 11th July 2024, Skövde, Sweden. Fulltext restricted.

Kalus, Alexander , Klein, Johannes, Ho, Tien-Julian, Seegets, Lee-Ann and Henze, Niels (2024) Showcasing MobileGravity. In: CHI '24: CHI Conference on Human Factors in Computing Systems, May 11 - 16, 2024, Honolulu, HI, USA. Fulltext not available.

Kalus, Alexander , Klein, Johannes, Ho, Tien-Julian and Henze, Niels (2024) Simulating Object Weight in Virtual Reality: The Role of Absolute Mass and Weight Distributions. In: VRST '24: 30th ACM Symposium on Virtual Reality Software and Technology, October 9 - 11, 2024, Trier, Germany.

Weisheit, Silke and Hentschke, Jana (2024) Werkstattbericht: EZB-Kollektionen aus GOKB-Paketen befüllen. In: 1. GOKB-Anwendertreffen 2024, 6.-7.11.2024, Göttingen.

Hinterleitner, Bastian (2023) Erarbeitung und Evaluation von Interaktionskonzepten auf Basis von Blickdaten im Fahrzeug. PhD, Universität Regensburg.

Empl, Philip , Schlette, Daniel , Stöger, Lukas and Pernul, Günther (2023) Generating ICS vulnerability playbooks with open standards. International Journal of Information Security 23, pp. 1215-1230.

Wörner, Janik, Konadl, Daniel , Leist, Susanne and Schmid, Isabel (2023) MANTRA: A Topic Modeling-Based Tool to Support Automated Trend Analysis on Unstructured Social Media Data. In: 44. International Conference on Information Systems (ICIS), 10.12.2023 bis 13.12.2023, Hyderabad, Indien. Fulltext restricted.

Heinrich, Bernd , Huber, Maximilian, Krapf, Thomas and Schiller, Alexander (2023) The Currency of Wiki Articles – A Language Model-based Approach. In: International Conference on Information Systems, ICIS 2023, 10.12.-13.12.2023, Hyderabad, Indien.

Schill, Rudolf, Klever, Maren, Lösch, Andreas, Hu, Y. Linda , Vocht, Stefan, Rupp, Kevin, Grasedyck, Lars, Spang, Rainer and Beerenwinkel, Niko (2023) Overcoming Observation Bias for Cancer Progression Modeling. bioRxiv. (Submitted)

Schmid, Andreas , Bierschneider, Michael , Hoffmann, Johannes , Liu, Yu and Wimmer, Raphael (2023) Effects of Text Input Latency on Performance and Task Load. In: MUM '23: International Conference on Mobile and Ubiquitous Multimedia, December 3 - 6, 2023, Vienna, Austria.

Echtler, Florian , Maierhöfer, Vitus, Hansen, Nicolai Brodersen and Wimmer, Raphael (2023) SurfaceCast: Ubiquitous, Cross-Device Surface Sharing. Proceedings of the ACM on Human-Computer Interaction 7 (ISS), pp. 286-308.

Raab, Florian, Malloni, Wilhelm, Wein, Simon, Greenlee, Mark W. and Lang, Elmar W. (2023) Investigation of an efficient multi-modal convolutional neural network for multiple sclerosis lesion detection. Scientific Reports 13.

Grünbaum, Daniel (2023) Causal modelling and validation based on observational data and domain knowledge. PhD, Universität Regensburg.

Yaacoub, Ahmed El, Mottola, Luca, Voigt, Thiemo and Rümmer, Philipp (2023) Scheduling Dynamic Software Updates in Mobile Robots. ACM Transactions on Embedded Computing Systems 22 (6), pp. 1-27.

Rudolf, Nico, Böhmer, Kristof and Leitner, Maria (2023) BAnDIT: Business Process Anomaly Detection in Transactions. In: Cooperative Information Systems - 29th International Conference, CoopIS 2023, Proceedings, October 30 - November 3, 2023, Groningen, The Netherlands. Fulltext restricted.

Behr, Merle , Burghaus, Rolf, Diedrich, Christian and Lippert, Jörg (2023) Opportunities and Challenges for AI-Based Analysis of RWD in Pharmaceutical R&D: A Practical Perspective. KI - Künstliche Intelligenz.

Schmid, Andreas , Halbhuber, David , Fischer, Thomas , Wimmer, Raphael and Henze, Niels (2023) Small Latency Variations Do Not Affect Player Performance in First-Person Shooters. Proceedings of the ACM on Human-Computer Interaction 7 (CHI PL), pp. 197-216.

Sadegheih, Yousef, Weninger, Leon and Merhof, Dorit (2023) Novel Deep Learning Approaches for Analyzing Diffusion Imaging Data. KI - Künstliche Intelligenz.

Bogon, Johanna , Högerl, Julian, Kocur, Martin , Wolff, Christian , Henze, Niels and Riemer, Martin (2023) Validating virtual reality for time perception research: Virtual reality changes expectations about the duration of physical processes, but not the sense of time. Behavior Research Methods.

Deppner, Juergen (2023) From Data to Insights: Unveiling Price Formation Processes in Direct Real Estate Markets with Machine Learning. PhD, Universität Regensburg.

Emmert, Martina, Schmid, Andreas , Wimmer, Raphael and Henze, Niels (2023) CoShare: a Multi-Pointer Collaborative Screen Sharing Tool. In: MuC '23: Mensch und Computer 2023, September 3 - 6, 2023, Rapperswil Switzerland.

Schmid, Andreas , Kalus, Alexander and Wimmer, Raphael (2023) From Trash to Treasure: Experiences from Building Tangible Artifacts out of Discarded Components. In: Mensch und Computer 2023, September 3-6, 2023, Rapperswil, Switzerland.

Emmert, Martina , Schönwerth, Nicole , Schmid, Andreas , Alešik, Anton and Wimmer, Raphael (2023) How Do Users Like Their Tangibles? — An Exploration of Interaction Techniques for Data Transfer with Everyday Objects. In: Mensch und Computer 2023, September 3-6, 2023, Rapperswil, Switzerland.

Schmid, Andreas , Sautmann, Marie , Wittmann, Vera , Kaindl, Florian , Schauhuber, Philipp , Gottschalk, Philipp and Wimmer, Raphael (2023) Influence of Annotation Media on Proof-Reading Tasks. In: MuC '23: Mensch und Computer 2023, September 3 - 6, 2023, Rapperswil Switzerland.

Schmidt, Thomas , Schiller, Fabian, Götz, Mathias and Wolff, Christian (2023) A Corpus of Memes from Reddit: Acquisition, Preparation and First Case Studies. In: Klein, Maike and Krupka, Daniel and Winter, Cornelia and Wohlgemuth, Volker, (eds.) INFORMATIK 2023. Designing Futures: Zukünfte gestalten. Lecture Notes in Informatics (LNI), 337. Gesellschaft für Informatik e.V. (GI), Bonn, pp. 795-804. ISBN 978-3-88579-731-9.

Achmann, Michael and Wolff, Christian (2023) Computergestützte Bildtypenanalyse durch Zero-Shot Klassifikation mit CLIP. In: Klein, Maike and Krupka, Daniel and Winter, Cornelia and Wohlgemuth, Volker, (eds.) INFORMATIK 2023 : Designing Futures: Zukünfte gestalten, Workshop Kultur Design - Digital Cultures Cultural Analytics (InfDH 2023). Lecture Notes in Informatics (LNI), P337. Gesellschaft für Informatik e.V. (GI), Bonn, pp. 821-830. ISBN 978-3-88579-731-9.

Schlette, Daniel (2023) Collaborative Security with Cyber Threat Intelligence. PhD, Universität Regensburg.

Wechsler, Theresa F. , Kocur, Martin, Schumacher, Sandra, Rubenbauer, Mirjam, Ruider, Andreas, Brockelmann, Martin, Lankes, Michael, Wolff, Christian and Mühlberger, Andreas (2023) Looking fear in the eye: Gamified virtual reality exposure towards spiders for children using attention based feedback. Clinical Child Psychology and Psychiatry.

Baumer, Thomas , Müller, Mathis and Pernul, Günther (2023) System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC. IEEE Access 11, pp. 86872-86894.

Mielke, Bettina and Wolff, Christian (2023) Künstliche Intelligenz und Large Language Models in der Rechtsprechung. LRZ - E-Zeitschrift für Wirtschaftsrecht und Digitalisierung.

Brasse, Julia, Förster, Maximilian, Hühn, Philipp, Klier, Julia , Klier, Mathias and Moestue, Lars (2023) Preparing for the future of work: a novel data-driven approach for the identification of future skills. Journal of Business Economics 94, pp. 467-500.

Dennerlein, Katrin , Schmidt, Thomas and Wolff, Christian (2023) Computational emotion classification for genre corpora of German tragedies and comedies from 17th to early 19th century. Digital Scholarship in the Humanities.

Kern, Sascha , Baumer, Thomas , Fuchs, Ludwig and Pernul, Günther (2023) Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach. In: DBSec 2023, 19.-21. Jul 2023, Sophia Antipolis, France.

Glas, Magdalena , Böhm, Fabian , Schönteich, Falko and Pernul, Günther (2023) Cyber Range Exercises: Potentials and Open Challenges for Organizations. In: Furnell, Steven and Clarke, Nathan, (eds.) Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings. IFIP Advances in Information and Communication Technology (IFIPAICT), 674. Springer, Cham, pp. 24-35. ISBN 978-3-031-38532-2, 978-3-031-38530-8. Fulltext not available.

Konadl, Daniel, Wörner, Janik, Luttner, Lucas and Leist, Susanne (2023) ARTIFICIAL INTELLIGENCE IN AUGMENTATIVE AND ALTERNATIVE COMMUNICATION SYSTEMS – A LITERATURE-BASED ASSESSMENT AND IMPLICATIONS OF DIFFERENT CONVERSATION PHASES AND CONTEXTS. In: European Conference on Information Systems (ECIS), 12.06.2023 bis 16.06.2023, Kristiansand, Norwegen.

Jackermeier, Robert (2023) Nutzerzentrierte Indoor-Positionierung für smartphonegestützte Fußgängernavigation. PhD, Universität Regensburg.

Bortlik, Michael, Heinrich, Bernd and Lohninger, Daniel (2023) Service Re-Selection for Disruptive Events in Mobile Environments: A Heuristic Technique for Decision Support at Runtime. Information Systems Frontiers 26, pp. 1063-1090.

Behr, Merle (2023) Interview, Building Trust in Medical AI Algorithms with Veridical Data Science. KI - Künstliche Intelligenz. Fulltext restricted.

Schmid, Andreas and Wimmer, Raphael (2023) Measuring the Latency of Graphics Frameworks on X11 Based Systems. In: Conference on Human Factors in Computing Systems 20233, 23.04.2023 - 28.04.2023, Hamburg, Germany. Fulltext restricted.

Bauer, Julian (2023) Design und Implementierung eines Identity and Access Management Reporting Moduls basierend auf Metriken. Masters, Universität Regensburg.

Glas, Magdalena , Vielberth, Manfred and Pernul, Günther (2023) Train as you Fight: Evaluating Authentic Cybersecurity Training in Cyber Ranges. In: CHI '23: CHI Conference on Human Factors in Computing Systems, April 23 - 28, 2023, Hamburg Germany.

Stoiber, Christoph, Stöter, Maximilian, Englbrecht, Ludwig , Schönig, Stefan and Häckel, Björn (2023) Keeping Your Maturity Assessment Alive. Business & Information Systems Engineering 65, pp. 703-721.

Rösler, Wiebke, Altenbuchinger, Michael, Baeßler, Bettina, Beissbarth, Tim, Beutel, Gernot, Bock, Robert, von Bubnoff, Nikolas, Eckardt, Jan-Niklas , Foersch, Sebastian, Loeffler, Chiara M L , Middeke, Jan Moritz, Mueller, Martha-Lena, Oellerich, Thomas, Risse, Benjamin, Scherag, André, Schliemann, Christoph, Scholz, Markus, Spang, Rainer, Thielscher, Christian, Tsoukakis, Ioannis and Kather, Jakob Nikolas (2023) An overview and a roadmap for artificial intelligence in hematology and oncology. Journal of cancer research and clinical oncology.

Glas, Magdalena , Vielberth, Manfred , Böhm, Fabian , Reittinger, Tobias and Pernul, Günther (2023) Improving Cybersecurity Skill Development through Visual Programming. Information and Computer Security 31 (2).

Empl, Philip and Pernul, Günther (2023) Digital-Twin-Based Security Analytics for the Internet of Things. Information 14 (2), p. 95.

Schmid, Isabel (2023) Weiterentwicklung von Methoden und Ansätzen zur automatisierten Informationsextraktion aus Social Networks. PhD, Universität Regensburg.

Kaltdorf, Martin, Breitenbach, Tim, Karl, Stefan, Fuchs, Maximilian, Kessie, David Komla, Psota, Eric, Prelog, Martina, Sarukhanyan, Edita, Ebert, Regina, Jakob, Franz, Dandekar, Gudrun, Naseem, Muhammad, Liang, Chunguang and Dandekar, Thomas (2023) Software JimenaE allows efficient dynamic simulations of Boolean networks, centrality and system state analysis. Scientific Reports 13 (1).

Schwappach, Florin (2023) Data archive of "Note Taking in the Digital Age – Towards a Ubiquitous Pen Interface". [Dataset]

Ludwig, Bernd , Donabauer, Gregor, Ramsauer, Dominik and al Subari, Karema (2023) URWalking: Indoor Navigation for Research and Daily Use. KI - Künstliche Intelligenz 37, pp. 83-90.

Berijanian, Maryam, Schaadt, Nadine S., Huang, Boqiang, Lotz, Johannes, Feuerhake, Friedrich and Merhof, Dorit (2023) Unsupervised many-to-many stain translation for histological image augmentation to improve classification accuracy. Journal of Pathology Informatics 14, p. 100195.

Schmid, Andreas, van Koningsbruggen, Rosa, Delgado Rodriguez, Sarah, Maierhöfer, Vitus, Waldschütz, Hannes and Kalus, Alexander (2023) 16. Workshop Be-greifbare Interaktion. In: Mensch und Computer 2023 - Workshopband, September 3-6, 2023, Rapperswil, Switzerland. Fulltext not available.

Serra, Alessandra , Mozgunov, Pavel and Jaki, Thomas (2023) A Bayesian multi‐arm multi‐stage clinical trial design incorporating information about treatment ordering. Statistics in Medicine 42 (16), pp. 2841-2854. Fulltext not available.

Daniells, Libby , Mozgunov, Pavel, Bedding, Alun and Jaki, Thomas (2023) A comparison of Bayesian information borrowing methods in basket trials and a novel proposal of modified exchangeability‐nonexchangeability method. Statistics in Medicine 42 (24), pp. 4392-4417. Fulltext not available.

Curticapean, Radu (2023) Algorithmen und Komplexitätstheorie. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 13-15. Fulltext not available.

Rojas Ringeling, Francisca and Canzar, Stefan (2023) Algorithmen zum Entschlüsseln der Genregulation. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 46-48. Fulltext not available.

Wimmer, Raphael , Bogon, Johanna , Henze, Niels and Wolff, Christian (2023) Allgegenwärtige Mensch-Maschine-Interaktion : Entwicklung, Forschung und Infrastruktur der Medieninformatik. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 54-59. Fulltext not available.

Sawant, Shrutika S., Erick, F. X., Göb, St., Holzer, Nina, Lang, Elmar W. and Götz, Theresa (2023) An adaptive binary particle swarm optimization for solving multi-objective convolutional filter pruning problem. The Journal of Supercomputing 79 (12), pp. 13287-13306. Fulltext not available.

Fehle, Jakob, Münster, Leonie, Schmidt, Thomas and Wolff, Christian (2023) Aspect-Based Sentiment Analysis as a Multi-Label Classification Task on the Domain of German Hotel Reviews. In: Georges, Munir and Herygers, Aaricia and Friedrich, Annemarie and Roth, Benjamin, (eds.) Proceedings of the 19th Conference on Natural Language Processing (KONVENS 2023). The Association for Computational Linguistics, Stroudsburg, PA, pp. 202-218. ISBN 979-8-89176-029-5.

Cailler, Julie and Rümmer, Philipp (2023) Automatisches Beweisen: Methoden und Anwendungen. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 10-12. Fulltext not available.

Merhof, Dorit (2023) Automatisierte, KI-basierte Analyse von Bilddaten : Der Lehrstuhl für Bildverarbeitung. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 40-42. Fulltext not available.

Barnett, Helen, Boix, Oliver, Kontos, Dimitris and Jaki, Thomas (2023) Backfilling cohorts in phase I dose-escalation studies. Clinical Trials 20 (3), pp. 261-268. Fulltext not available.

Bogon, Johanna, Köllnberger, Katrin, Thomaschke, Roland and Pfister, Roland (2023) Binding and retrieval of temporal action features: Probing the precision level of feature representations in action planning. Journal of Experimental Psychology: Human Perception and Performance 49 (7), pp. 989-998. Fulltext not available.

Bacri, Timothée, Berentsen, Geir D., Bulla, Jan and Støve, Bård (2023) Computational issues in parameter estimation for hidden Markov models with template model builder. Journal of Statistical Computation and Simulation 93 (18), pp. 3421-3457. Fulltext not available.

Grill, Johannes, Schlette, Daniel and Pernul, Günther (2023) Cyber Threat Intelligence : Gemeinschaftliche IT-Sicherheit durch den Austausch von Informationen. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 23-25. Fulltext not available.

Althammer, Christoph, Bauer, Jens, Böhm, Viktoria, Fehle, Jakob, Mielke, Bettina and Wolff, Christian (2023) Das Basisdokument geht ins Reallabor: zur Evaluation des Einsatzes bei Gericht. In: Schweighofer, Erich and Zanol, Jakob and Eder, Stefan, (eds.) Rechtsinformatik als Methodenwissenschaft des Rechts : Tagungsband des 26. Internationalen Rechtsinformatik Symposions : IRIS 2023. Edition Weblaw. 2, Colloquium, 33. Editions Weblaw, Bern, pp. 159-168. ISBN 978-3-98595-714-9.

Echtler, Florian , Maierhöfer, Vitus, Hansen, Nicolai Brodersen and Wimmer, Raphael (2023) Demonstrating SurfaceCast: Ubiquitous, Cross-Device Surface Sharing. In: ISS '23: Conference on Interactive Surfaces and Spaces, November 5 - 8, 2023, Pittsburgh PA USA. Fulltext not available.

Serra, Alessandra , Mozgunov, Pavel, Davies, Geraint and Jaki, Thomas (2023) Determining the minimum duration of treatment in tuberculosis: An order restricted non‐inferiority trial design. Pharmaceutical Statistics 22 (5), pp. 938-962. Fulltext not available.

Kehr, Birte (2023) Die Genome des Menschen : Forschungsschwerpunkte der Arbeitsgruppe für Algorithmische Bioinformatik. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 43-45. Fulltext not available.

Kazerouni, Amirhossein , Aghdam, Ehsan Khodapanah, Heidari, Moein , Azad, Reza, Fayyaz, Mohsen, Hacihaliloglu, Ilker and Merhof, Dorit (2023) Diffusion models in medical imaging: A comprehensive survey. Medical Image Analysis 88, p. 102846. Fulltext not available.

Empl, Philip , Hager, Henric and Pernul, Günther (2023) Digital Twins for IoT Security Management. In: Data and Applications Security and Privac Data and Applications Security and Privacy XXXVII 37th Annual IFIP WG 11.3 Conference, DBSec 2023, July 19–21, 2023, Sophia-Antipolis, France. Fulltext not available.

Völkl, Paul (2023) Dispositiv(e) der Pandemie : Die Corona-Warn-App. ForAP: Forschungsergebnisse von Absolventen und Promovierenden der Fakultät für Sprach-, Literatur- und Kulturwissenschaften 6 (6), pp. 105-120.

Jaki, Thomas , Burdon, Abigail , Chen, Xijin , Mozgunov, Pavel, Zheng, Haiyan and Baird, Richard (2023) Early phase clinical trials in oncology: Realising the potential of seamless designs. European Journal of Cancer 189, p. 112916. Fulltext not available.

Aksoy, Alperen and Kesdoğan, Doğan (2023) Effect of Group Based Synchronization on User Anonymity in Mix Networks. In: ARES 2023: The 18th International Conference on Availability, Reliability and Security, 29 August 2023 - 1 September 2023, Benevento Italy. Fulltext not available.

Erhard, Florian , Heinrich, Bernd , Klettke, Meike and Wolff, Christian (2023) Einleitung [zum Themenheft Fakultät für Informatik und Data Science]. Blick in die Wissenschaft: Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 5-6.

Yap, Christina , Rekowski, Jan , Ursino, Moreno, Solovyeva, Olga , Patel, Dhrusti , Dimairo, Munyaradzi , Weir, Christopher J , Chan, An-Wen, Jaki, Thomas , Mander, Adrian , Evans, Thomas R Jeffry, Peck, Richard, Hayward, Kathryn S, Calvert, Melanie, Rantell, Khadija Rerhou, Lee, Shing, Kightley, Andrew, Hopewell, Sally, Ashby, Deborah, Garrett-Mayer, Elizabeth, Isaacs, John, Golub, Robert, Kholmanskikh, Olga, Richards, Dawn P, Boix, Oliver, Matcham, James, Seymour, Lesley, Ivy, S Percy, Marshall, Lynley V, Hommais, Antoine, Liu, Rong, Tanaka, Yoshiya, Berlin, Jordan, Espinasse, Aude and de Bono, Johann (2023) Enhancing quality and impact of early phase dose-finding clinical trial protocols: SPIRIT Dose-finding Extension (SPIRIT-DEFINE) guidance. BMJ, e076386. Fulltext not available.

Yap, Christina , Solovyeva, Olga , de Bono, Johann , Rekowski, Jan , Patel, Dhrusti , Jaki, Thomas , Mander, Adrian , Evans, Thomas R Jeffry, Peck, Richard, Hayward, Kathryn S , Hopewell, Sally, Ursino, Moreno, Rantell, Khadija Rerhou, Calvert, Melanie, Lee, Shing, Kightley, Andrew, Ashby, Deborah, Chan, An-Wen, Garrett-Mayer, Elizabeth, Isaacs, John D, Golub, Robert, Kholmanskikh, Olga, Richards, Dawn, Boix, Oliver, Matcham, James, Seymour, Lesley, Ivy, S Percy, Marshall, Lynley V, Hommais, Antoine, Liu, Rong, Tanaka, Yoshiya, Berlin, Jordan, Espinasse, Aude, Dimairo, Munyaradzi and Weir, Christopher J (2023) Enhancing reporting quality and impact of early phase dose-finding clinical trials: CONSORT Dose-finding Extension (CONSORT-DEFINE) guidance. BMJ, e076387. Fulltext not available.

Klettke, Meike (2023) Evolution in Datenbanken und Data Engineering Workflows. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 16-18. Fulltext not available.

Huber, Florian, Eigler, Tobias, Hagel, Georg and Wolff, Christian (2023) From Difficulties to Functional Requirements - Deriving Requirements from Literature about Tool-supported Teaching of UML Diagrams in Software Engineering Education. In: ECSEE 2023: 5th European Conference on Software Engineering Education, 19. - 21. Juni 2023, Seeon/Bavaria, Germany.

Schweiger, Nadine and Wolff, Christian (2023) Interaction Concepts for an Adaptable Dementia Therapy Robot. In: 2023 15th International Conference on Computer and Automation Engineering (ICCAE), 3-5 March 2023, Sydney.

Bink, Markus, Schwarz, Sebastian, Draws, Tim and Elsweiler, David (2023) Investigating the Influence of Featured Snippets on User Attitudes. In: CHIIR '23: ACM SIGIR Conference on Human Information Interaction and Retrieval, March 19 - 23, 2023, Austin, TX, USA. Fulltext restricted.

Schönig, Stefan (2023) IoT-basiertes Prozessmanagement : Mobile Benutzerführung in der digitalen Fabrik. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 19-22. Fulltext not available.

Krapf, Thomas and Heinrich, Bernd (2023) Kann man den Entscheidungen Künstlicher Intelligenz trauen? Zu den Auswirkungen unsicherer Daten auf die Entscheidungen Neuronaler Netze. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 26-29. Fulltext not available.

Doering, Claudia, Timinger, Holger and Wolff, Christian (2023) Knowledge Sharing Between Higher Educational Institutions: Evaluation of a Transfer Platform. In: Gruenwald, Le and Masciari, Elio and Rolland, Colette and Bernardino, Jorge, (eds.) Proceedings of the 15th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2023) - Volume 3: KMIS. SCITEPRESS – Science and Technology Publications, Lda, Rom/Setúbal, Portugal, pp. 166-173. ISBN 978-989-758-671-2.

Mielke, Bettina (2023) Law goes digital: Lehrkonzepte zur Digitalisierung – vom Grundstudium bis zum Referendariat. In: Schmidt, Mareike and Trute, Hans-Heinrich, (eds.) Lehre der Digitalisierung in der Rechtswissenschaft. Recht und Digitalisierung | Digitization and the Law, 11. Nomos, Baden-Baden, pp. 229-248. ISBN 978-3-7489-3618-3.

Erhard, Florian , Kruschwitz, Udo, Heinrich, Bernd and Wolff, Christian (2023) Lehre an der Fakultät für Informatik und Data Science. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 7-9. Fulltext not available.

Georg, Peter, Grasedyck, Lars, Klever, Maren, Schill, Rudolf, Spang, Rainer and Wettig, Tilo (2023) Low-rank tensor methods for Markov chains with applications to tumor progression models. Journal of Mathematical Biology 86 (1). Fulltext not available.

Torow, Natalia , Li, Ronghui, Hitch, Thomas Charles Adrian, Mingels, Clemens, Al Bounny, Shahed, van Best, Niels, Stange, Eva-Lena, Simons, Britta, Maié, Tiago, Rüttger, Lennart, Gubbi, Narasimha Murthy Keshava Prasad, Abbott, Darryl Adelaide, Benabid, Adam, Gadermayr, Michael, Runge, Solveig, Treichel, Nicole, Merhof, Dorit, Rosshart, Stephan Patrick, Jehmlich, Nico , Hand, Timothy Wesley, von Bergen, Martin, Heymann, Felix , Pabst, Oliver, Clavel, Thomas, Tacke, Frank, Lelouard, Hugues, Costa, Ivan Gesteira and Hornef, Mathias Walter (2023) M cell maturation and cDC activation determine the onset of adaptive immune priming in the neonatal Peyer’s patch. Immunity 56 (6), 1220-1238.e7. Fulltext not available.

Behr, Merle and Schmitt, Markus (2023) Maschinelles Lernen mit Anwendungen in den Naturwissenschaften. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 37-39. Fulltext not available.

Hu, Linda, Lösch, Andreas and Spang, Rainer (2023) Maschinelles lernen enthüllt den verborgenen Prozess der Tumorentstehung. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 52-53. Fulltext not available.

Law, Martin, Couturier, Dominique-Laurent, Choodari-Oskooei, Babak, Crout, Phillip, Gamble, Carrol, Jacko, Peter, Pallmann, Philip, Pilling, Mark, Robertson, David S., Robling, Michael, Sydes, Matthew R. , Villar, Sofía S., Wason, James, Wheeler, Graham, Williamson, S. Faye, Yap, Christina and Jaki, Thomas (2023) Medicines and Healthcare products Regulatory Agency’s “Consultation on proposals for legislative changes for clinical trials”: a response from the Trials Methodology Research Partnership Adaptive Designs Working Group, with a focus on data sharing. Trials 24 (1). Fulltext not available.

Schauer, Andreas and Schnurr, Daniel (2023) Mensch vs. Maschine : Wettbewerb und Kooperaton mit künstlicher Intelligenz in digitalen Märkten. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 30-33. Fulltext not available.

Erhard, Florian (2023) Mit Hilfe von Daten Immunprozesse entschlüsseln : Der Lehrstuhl Computational Immunology. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 49-51. Fulltext not available.

Leitner, Maria (2023) Notfallpläne für den Ernstfall testen. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 34-36. Fulltext not available.

Robertson, David S., Wason, James M. S. , König, Franz, Posch, Martin and Jaki, Thomas (2023) Online error rate control for platform trials. Statistics in Medicine 42 (14), pp. 2475-2495. Fulltext not available.

Halbhuber, David , Thomaschke, Roland, Henze, Niels , Wolff, Christian , Probst, Kilian and Bogon, Johanna (2023) Play with my Expectations: Players Implicitly Anticipate Game Events Based on In-Game Time-Event Correlations. In: MUM '23: International Conference on Mobile and Ubiquitous Multimedia, December 3 - 6, 2023, Vienna, Austria.

Robertson, David S., Choodari‐Oskooei, Babak, Dimairo, Munya , Flight, Laura, Pallmann, Philip and Jaki, Thomas (2023) Point estimation for adaptive trial designs II: Practical considerations and guidance. Statistics in Medicine 42 (14), pp. 2496-2520. Fulltext not available.

Achmann, Michael and Wolff, Christian (2023) Policy Issues vs. Documentation: Using BERTopic to Gain Insight in the Political Communication in Instagram Stories and Posts During the 2021 German Federal Election Campaign. In: Sustainability: Environment, Community, Data. Seventh Conference Digital Humanities in the Nordic and Baltic Countries (DHNB 2023), 08. - 10. März 2023, Stavanger, Bergen, Oslo.

Wiese, Jannik and Henze, Niels (2023) Predicting Mouse Positions Beyond a System’s Latency Can Increase Throughput and User Experience in Linear Steering Tasks. In: MuC '23: Mensch und Computer 2023, September 3 - 6, 2023, Rapperswil Switzerland. Fulltext not available.

Auge, Tanja , Bali, Gunnar , Klettke, Meike , Ludäscher, Bertram, Söldner, Wolfgang , Weishäupl, Simon and Wettig, Tilo (2023) Provenance for Lattice QCD workflows. In: WWW '23: The ACM Web Conference 2023, 30 April 2023- 4 May 2023, Austin TX USA.

Kalus, Alexander , Kocur, Martin , Klein, Johannes, Mayer, Manuel and Henze, Niels (2023) PumpVR: Rendering the Weight of Objects and Avatars through Liquid Mass Transfer in Virtual Reality. In: CHI '23: CHI Conference on Human Factors in Computing Systems, April 23 - 28, 2023, Hamburg Germany.

Huber, Florian, Eigler, Tobias, Hagel, Georg and Wolff, Christian (2023) Qualitative Requirements Elicitation of Student Requirements for Tool-supported Teaching of UML Diagrams. In: ECSEE 2023: 5th European Conference on Software Engineering Education, 19. - 21. Juni 2023, Seeon/Bavaria, Germany.

Iyadurai, Lalitha, Highfield, Julie, Kanstrup, Marie, Markham, Alfred, Ramineni, Varsha , Guo, Boliang, Jaki, Thomas, Kingslake, Jonathan , Goodwin, Guy M., Summers, Charlotte , Bonsall, Michael B. and Holmes, Emily A. (2023) Reducing intrusive memories after trauma via an imagery-competing task intervention in COVID-19 intensive care staff: a randomised controlled trial. Translational Psychiatry 13 (1). Fulltext not available.

Fast, Victoria, Schnurr, Daniel and Wohlfarth, Michael (2023) Regulation of data-driven market power in the digital economy: Business value creation and competitive advantages from big data. Journal of Information Technology 38 (2), pp. 202-229. Fulltext not available.

Schweiger, Nadine and Wolff, Christian (2023) Robotic Support for Haptic Dementia Exercises. In: 2023 IEEE 11th International Conference on Serious Games and Applications for Health (SeGAH), 28-30 August 2023, Athen.

Espinasse, Aude, Solovyeva, Olga, Dimairo, Munyaradzi , Weir, Christopher , Jaki, Thomas, Mander, Adrian , Kightley, Andrew, Evans, Jeffry, Lee, Shing, Bedding, Alun, Hopewell, Sally, Rantell, Khadija, Liu, Rong, Chan, An-Wen, De Bono, Johann and Yap, Christina (2023) SPIRIT and CONSORT extensions for early phase dose-finding clinical trials: the DEFINE (DosE-FIndiNg Extensions) study protocol. BMJ Open 13 (3), e068173. Fulltext not available.

Glas, Julia, Wolff, Christian , Ludwig, Bernd and Achmann, Michael (2023) Selbstoptimierung vs. Selbstliebe? Eine vergleichende Inhaltsanalyse von Fitspiration- und Bodypositivity-Bildern auf Instagram mit Methoden der automatischen Bildklassifikation. In: DHd 2023: Open Humanities, Open Culture. 9. Jahrestagung des Verbands Digital Humanities im deutschsprachigen Raum e.V., 13. - 17. März 2023, Luxemburg/Trier.

Baumer, Thomas, Müller, Mathis and Pernul, Günther (2023) System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC. IEEE Access 11, pp. 86872-86894. Fulltext not available.

Böhm, Viktoria, Gebhard, Alexander, Mielke, Bettina and Wolff, Christian (2023) Technikakzeptanz für Legal Tech am Beispiel des Basisdokumentes für den strukturierten Parteivortrag. In: Schweighofer, Erich and Zanol, Jakob and Eder, Stefan, (eds.) Rechtsinformatik als Methodenwissenschaft des Rechts : Tagungsband des 26. Internationalen Rechtsinformatik Symposions : IRIS 2023. Edition Weblaw. 2, Colloquium, 33. Editions Weblaw, Bern, pp. 169-178. ISBN 978-3-98595-714-9.

Kocur, Martin , Mayer, Manuel, Karber, Amelie, Witte, Miriam, Henze, Niels and Bogon, Johanna (2023) The Absence of Athletic Avatars' Effects on Physiological and Perceptual Responses while Cycling in Virtual Reality. In: MUM '23: International Conference on Mobile and Ubiquitous Multimedia, December 3 - 6, 2023, Vienna, Austria.

Kocur, Martin , Jackermeier, Lukas, Schwind, Valentin and Henze, Niels (2023) The Effects of Avatar and Environment on Thermal Perception and Skin Temperature in Virtual Reality. In: CHI '23: CHI Conference on Human Factors in Computing Systems, April 23 - 28, 2023, Hamburg Germany.

Halbhuber, David , Schauhuber, Philipp, Schwind, Valentin and Henze, Niels (2023) The Effects of Latency and In-Game Perspective on Player Performance and Game Experience. Proceedings of the ACM on Human-Computer Interaction 7 (CHI PL), pp. 1308-1329.

Meyer, Selina and Elsweiler, David (2023) Towards Cross-Content Conversational Agents for Behaviour Change: Investigating Domain Independence and the Role of Lexical Features in Written Language Around Change. In: CUI '23: ACM conference on Conversational User Interfaces, July 19 - 21, 2023, Eindhoven Netherlands.

Hellwig, Nils Constantin, Bink, Markus, Schmidt, Thomas , Fehle, Jakob and Wolff, Christian (2023) Transformer-Based Analysis of Sentiment Towards German Political Parties on Twitter During the 2021 Election Year. In: Proceedings of the 6th International Conference on Natural Language and Speech Processing (ICNLSP 2023). The Association for Computational Linguistics, Stroudsburg, PA, pp. 84-98. ISBN 979-8-89176-065-3.

Ramineni, Varsha , Millroth, Philip, Iyadurai, Lalitha, Jaki, Thomas , Kingslake, Jonathan , Highfield, Julie, Summers, Charlotte , Bonsall, Michael B. and Holmes, Emily A. (2023) Treating intrusive memories after trauma in healthcare workers: a Bayesian adaptive randomised trial developing an imagery-competing task intervention. Molecular Psychiatry 28 (7), pp. 2985-2994. Fulltext not available.

Zhang, Qing, Elsweiler, David and Trattner, Christoph (2023) Understanding and predicting cross-cultural food preferences with online recipe images. Information Processing & Management 60 (5), p. 103443. Fulltext not available.

Halbhuber, David , Kocur, Martin, Kalus, Alexander , Angermeyer, Kevin, Schwind, Valentin and Henze, Niels (2023) Understanding the Effects of Perceived Avatar Appearance on Latency Sensitivity in Full-Body Motion-Tracked Virtual Reality. In: MuC '23: Mensch und Computer 2023, September 3 - 6, 2023, Rapperswil Switzerland.

Graham, Emily , Harbron, Chris and Jaki, Thomas (2023) Updating the probability of study success for combination therapies using related combination study data. Statistical Methods in Medical Research 32 (4), pp. 712-731. Fulltext not available.

Kalus, Alexander , Klein, Johannes and Henze, Niels (2023) Utilizing Liquid Transfer for Weight Simulation: Challenges and Future Directions. In: Mensch und Computer 2023 - Workshopband, September 3-6, 2023, Rapperswil, Switzerland. Fulltext not available.

Aja-Fernández, Santiago, Martín-Martín, Carmen, Planchuelo-Gómez, Álvaro, Faiyaz, Abrar, Uddin, Md Nasir , Schifitto, Giovanni, Tiwari, Abhishek , Shigwan, Saurabh J. , Kumar Singh, Rajeev, Zheng, Tianshu, Cao, Zuozhen, Wu, Dan, Blumberg, Stefano B., Sen, Snigdha, Goodwin-Allcock, Tobias, Slator, Paddy J., Yigit Avci, Mehmet, Li, Zihan, Bilgic, Berkin, Tian, Qiyuan, Wang, Xinyi , Tang, Zihao, Cabezas, Mariano , Rauland, Amelie , Merhof, Dorit, Manzano Maria, Renata, Campos, Vinícius Paraníba, Santini, Tales, da Costa Vieira, Marcelo Andrade, HashemizadehKolowri, SeyyedKazem, DiBella, Edward, Peng, Chenxu, Shen, Zhimin, Chen, Zan, Ullah, Irfan, Mani, Merry , Abdolmotalleby, Hesam, Eckstrom, Samuel, Baete, Steven H., Filipiak, Patryk, Dong, Tanxin, Fan, Qiuyun, de Luis-García, Rodrigo, Tristán-Vega, Antonio and Pieciak, Tomasz (2023) Validation of deep learning techniques for quality augmentation in diffusion MRI for clinical studies. NeuroImage: Clinical 39, p. 103483. Fulltext not available.

Hauser, Florian, Grabinger, Lisa, Mottok, Jürgen and Gruber, Hans (2023) Visual Expertise in Code Reviews. In: ETRA '23: 2023 Symposium on Eye Tracking Research and Applications, 30 May 2023- 2 June 2023, Tübingen Germany. Fulltext not available.

Kruschwitz, Udo , Ludwig, Bernd and Elsweiler, David (2023) Wissen aus dem Internet - Genug, genau, geprüft und geeignet? Informationswissenschaft in Regensburg. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 60-64. Fulltext not available.

Rummel, Teresa, Sakellaridi, Lygeri and Erhard, Florian (2023) grandR: a comprehensive package for nucleotide conversion RNA-seq data analysis. Nature Communications 14 (1). Fulltext not available.

Schwappach, Florin (2022) Note Taking in the Digital Age – Towards a Ubiquitous Pen Interface. PhD, Universität Regensburg.

Binder, Markus, Heinrich, Bernd , Hopf, Marcus and Schiller, Alexander (2022) Global reconstruction of language models with linguistic rules – Explainable AI for online consumer reviews. Electronic Markets.

Georg, Peter, Grasedyck, Lars, Klever, Maren, Schill, Rudolf , Spang, Rainer and Wettig, Tilo (2022) Low-rank tensor methods for Markov chains with applications to tumor progression models. Journal of Mathematical Biology 86 (7).

Heinrich, Paul (2022) IsoCorrectoR: Isotope correction in stable isotope labeling experiments in metabolomics. PhD, Universität Regensburg.

Knoedler, Leonard , Miragall, Maximilian, Kauke-Navarro, Martin, Obed, Doha, Bauer, Maximilian, Tißler, Patrick, Prantl, Lukas , Machens, Hans-Guenther, Broer, Peter Niclas, Baecher, Helena, Panayi, Adriana C. , Knoedler, Samuel and Kehrer, Andreas (2022) A Ready-to-Use Grading Tool for Facial Palsy Examiners—Automated Grading System in Facial Palsy Patients Made Easy. Journal of Personalized Medicine 12 (10), p. 1739.

Schleicher, Daniel, Ecker, Angelika, Kocur, Martin , Jarvers, Irina, Nash, Colin, Götz, Leonie, Otto, Alexandra H., Kandsperger, Stephanie and Brunner, Romuald (2022) Psychosocial stress induction in vivo vs. in virtuo and the influence of a health app on the acute stress reaction in youths: a study protocol for a randomized controlled trial. Trials 23 (1).

Halbhuber, David, Schwind, Valentin and Henze, Niels (2022) Don't Break my Flow: Effects of Switching Latency in Shooting Video Games. Proceedings of the ACM on Human-Computer Interaction 6 (CHI PL), Art. no. 229.

Putz, Benedikt (2022) Secure Information Sharing with Distributed Ledgers. PhD, Universität Regensburg.

Kocur, Martin (2022) Utilizing the Proteus Effect to Improve Performance Using Avatars in Virtual Reality. PhD, Universität Regensburg.

Szubartowicz, Michael (2022) The Challenges of Big Data - Contributions in the Field of Data Quality and Artificial Intelligence Applications. PhD, Universität Regensburg.

Maierhöfer, Vitus, Schmid, Andreas and Wimmer, Raphael (2022) Using an Infrared Pen as an Input Device for Projected
Augmented Reality Tabletops.
In: 15. Workshop Be-greifbare Interaktion, 04.09.2022, Darmstadt. Fulltext restricted.

Dietz, Marietheres (2022) A two-fold Perspective on Enterprise Security in the Digital Twin Context. PhD, Universität Regensburg.

Hopf, Marcus (2022) Artificial Intelligence for Online Review Platforms - Data Understanding, Enhanced Approaches and Explanations in Recommender Systems and Aspect-based Sentiment Analysis. PhD, Universität Regensburg.

Putz, Benedikt , Vielberth, Manfred and Pernul, Günther (2022) BISCUIT - Blockchain Security Incident Reporting Based on Human Observations. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, 23-26 August 2022, Vienna.

Empl, Philip , Schlette, Daniel , Zupfer, Daniel and Pernul, Günther (2022) SOAR4IoT: Securing IoT Assets with Digital Twins. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, August 23 - 26, 2022, Vienna Austria.

Böhm, Fabian Konrad (2022) Leveraging Visual Analytics for Cybersecurity. PhD, Universität Regensburg.

Schmid, Andreas , Lippl, Stefan and Wimmer, Raphael (2022) Determining the Orientation of Low Resolution Images of a De-Bruijn Tracking Pattern with a CNN. Special Interest Group on Computer Graphics and Interactive Techniques Conference Posters.

Glas, Magdalena , Vielberth, Manfred , Reittinger, Tobias , Böhm, Fabian and Pernul, Günther (2022) Visual Programming in Cyber Range Training to Improve Skill Development. In: Clarke, Nathan and Furnell, Steven, (eds.) Human Aspects of Information Security and Assurance. HAISA 2022. IFIP Advances in Information and Communication Technology, 658. Springer, Cham, Switzerland, pp. 3-13. ISBN 978-3-031-12172-2. Fulltext not available.

Dietz, Marietheres , Schlette, Daniel and Pernul, Günther (2022) Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence. In: The 46th IEEE Computer Society Signature Conference on Computers, Software, and Applications (COMPSAC 2022), June 27 - July 1 2022, Virtual Only. Fulltext restricted.

Schrod, Stefan, Schäfer, Andreas, Solbrig, Stefan, Lohmayer, Robert, Gronwald, Wolfram , Oefner, Peter J. , Beißbarth, Tim, Spang, Rainer , Zacharias, Helena and Altenbuchinger, Michael (2022) BITES: balanced individual treatment effect for survival data. Bioinformatics 38 (Suppl1), i60-i67.

Böhm, Fabian , Vielberth, Manfred and Pernul, Günther (2022) Formalizing and Integrating User Knowledge into Security Analytics. SN Computer Science 3 (347), pp. 1-17.

Vielberth, Manfred (2022) Harnessing Human Potential for Security Analytics. PhD, Universität Regensburg.

Kalus, Alexander , Kocur, Martin and Henze, Niels (2022) Towards Inducing Weight Perception in Virtual Reality Through a Liquid-based Haptic Controller. In: Workshop on Visuo-Haptic Interaction, AVI '22, 6. - 10. Jun. 2022, Rom, Italien.

Ramming, Lukas , Konadl, Daniel and Leist, Susanne (2022) Chatbot Design Features to Increase Productivity. In: International Conference on Design Science Research in Information Systems and Technology (DESRIST), 01.06. - 03.06.2022, University of South Florida.

Wörner, Janik, Konadl, Daniel, Schmid, Isabel and Leist, Susanne (2022) Supporting Product Development by a Trend Analysis Tool applying Aspect-Based Sentiment Detection. In: International Conference on Design Science Research in Information Systems and Technology (DESRIST), 01.06. - 03.06.2022, University of South Florida. (Submitted)

Friedl, Sabrina , Glas, Magdalena , Englbrecht, Ludwig , Böhm, Fabian and Pernul, Günther (2022) ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics. In: Drevin, Lynette and Miloslavskaya, Natalia and Leung, Wai Sze and Solms, Suné von, (eds.) Information Security Education - Adapting to the Fourth Industrial Revolution. IFIP Advances in Information and Communication Technology, 650. Springer International Publishing, Cham, pp. 77-91. ISBN 978-3-031-08172-9, 978-3-031-08171-2. Fulltext restricted.

Heinrich, Bernd , Hollnberger, Theresa, Hopf, Marcus and Schiller, Alexander (2022) Long-term Sequential and Temporal Dynamics in Online Consumer Ratings. In: European Conference on Information Systems (ECIS), 20th June to 25th of June 2022, Timisoara, Romania. Fulltext restricted.

Lamm, Lukas (2022) Evaluation of User Interaction Concepts for Driver Displays - Analysis of Expert-Based Approaches for Usability Evaluation During Development. PhD, Universität Regensburg.

Doß, Brigitte , Weisheit, Silke , Schirmer, Vicky , Reisinger, Claudia and Lehenmeier, Constantin (2022) Protokoll der 1. EZB-DBIS-Beiratssitzung am 19.05.2022. , Regensburg.

Schmid, Andreas , Heckelbacher, Lorenz and Wimmer, Raphael (2022) Extracting Handwritten Annotations from Printed Documents Via Infrared Scanning. In: CHI Conference on Human Factors in Computing SystemsExtended Abstracts (CHI ’22 Extended Abstracts), April 29 - May 5, 2022, New Orleans, LA, USA.

Dietz, Marietheres , Hageman, Leon, von Hornung, Constantin and Pernul, Günther (2022) Employing Digital Twins for Security-by-Design System Testing. In: CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, 27 April 2022, Baltimore MD USA.

Mielke, Bettina and Wolff, Christian (2022) Möglichkeiten und Perspektiven der Korpuslinguistik für die Analyse von Rechtstexten. Wirtschaftsführer für junge Juristen (2022), pp. 13-17.

Achmann, Michael , Hampel, Lisa, Asabidi, Ruslan and Wolff, Christian (2022) Studying the ephemeral, cultures of digital oblivion Identifying patterns in Instagram Stories. In: DHd 2022 Kulturen des digitalen Gedächtnisses. 8. Tagung des Verbands "Digital Humanities im deutschsprachigen Raum" (DHd 2022), 07.03.2022 - 11.03.2022, Potsdam.

Knierim, Aenne, Achmann, Michael and Wolff, Christian (2022) Zeitgeschichte untersuchen - Topic Modeling von #blackouttuesday-Inhalten auf Instagram. In: DHd 2022 Kulturen des digitalen Gedächtnisses. 8. Tagung des Verbands "Digital Humanities im deutschsprachigen Raum" (DHd 2022), 07.03.2022 - 11.03.2022, Potsdam.

El-Keilany, Alina, Schmidt, Thomas and Wolff, Christian (2022) Distant Viewing of the Harry Potter Movies via Computer Vision. In: Berglund, Karl and La Mela, Matti and Zwart, Inga, (eds.) Proceedings of the 6th Digital Humanities in the Nordic and Baltic Countries Conference (DHNB 2022). CEUR Workshop Proceedings, 3232. CEUR Workshop Proceedings, Uppsala, Sweden, pp. 33-49.

Schmidt, Thomas , Dennerlein, Katrin and Wolff, Christian (2022) Evaluation computergestützter Verfahren der Emotionsklassifikation für deutschsprachige Dramen um 1800. In: Geierhos, Michaela and Trilcke, Peer and Börner, Ingo and Seifert, Sabine and Busch, Anna and Helling, Patrick, (eds.) DHd 2022 Kulturen des digitalen Gedächtnisses. 8. Tagung des Verbands "Digital Humanities im deutschsprachigen Raum" (DHd 2022). Zenodo, Potsdam, Germany, pp. 107-113.

Reuter, Rebecca (2022) Technologiebasierte Unterstützungsmaßnahmen in der akademischen Software Engineering-Ausbildung. Konzeption, Entwicklung und Evaluation einer lernerzentrierten Analyse- und Designumgebung. PhD, Universität Regensburg.

Roth, Christian (2022) Dual use of sensor data – between potential and privacy. PhD, Universität Regensburg.

Putz, Benedikt and Pernul, Günther (2022) Comparing Successful DLT Consortia: A Lifecycle Perspective. In: 55th Hawaii International Conference on System Sciences 2022, Jan 4, 2022 - Jan 7, 2022, virtual.

Nitschke, Mirja , Roth, Christian , Hoyer, Christian and Kesdogan, Dogan (2022) Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments. In: Furnell, Steven and Mori, Paolo and Weippl, Edgar and Camp, Olivier, (eds.) Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers. Communications in Computer and Information Science (CCIS), 1545. Springer, Cham. ISBN 978-3-030-94900-6 (online), 978-3-030-94899-3 (print). Fulltext not available.

Losada, David E. , Elsweiler, David, Harvey, Morgan and Trattner, Christoph (2022) A day at the races. Applied Intelligence 52 (5), pp. 5617-5632. Fulltext not available.

Windl, Maximiliane, Henze, Niels , Schmidt, Albrecht and Feger, Sebastian S. (2022) Automating Contextual Privacy Policies: Design and Evaluation of a Production Tool for Digital Consumer Privacy Awareness. In: CHI Conference on Human Factors in Computing SystemsExtended Abstracts (CHI ’22 Extended Abstracts), April 29 - May 5, 2022, New Orleans, LA, USA. Fulltext not available.

Zheng, Haiyan , Grayling, Michael J, Mozgunov, Pavel, Jaki, Thomas and Wason, James M S (2022) Bayesian sample size determination in basket trials borrowing information between subsets. Biostatistics 24 (4), pp. 1000-1016. Fulltext not available.

Halbhuber, David, Schlenczek, Maximilian, Bogon, Johanna and Henze, Niels (2022) Better be quiet about it! The Effects of Phantom Latency on Experienced First-Person Shooter Players. In: MUM 2022: 21th International Conference on Mobile and Ubiquitous Multimedia, November 27 - 30, 2022, Lisbon, Portugal.

Störl, Uta and Klettke, Meike (2022) Darwin: A Data Platform for Schema Evolution Management and Data Migration. In: EDBT/ICDT Workshops, March 29, 2022, Edinburgh, UK.

Yusufi, Ziba, Preis, Simon J., Kraus, Daniel, Kruschwitz, Udo and Ludwig, Bernd (2022) Data Value Assessment in Semiconductor Production. In: ICEEG 2022: 2022 6th International Conference on E-Commerce, E-Business and E-Government, April 27 - 29, 2022, Plymouth, United Kingdom. Fulltext not available.

Mielke, Bettina and Wolff, Christian (2022) Der Strukturierte Parteivortrag im Zivilprozess. In: Schweighofer, Erich and Saarenpää, Ahti and Eder, Stefan and Zanol, Jakov and Schmautzer, Felix and Kummer, Franz and Hanke, Philip, (eds.) Recht DIGITAL - 25 Jahre IRIS ; Tagungsband des 25. Internationalen Rechtsinformatik Symposions : IRIS 2022. Edition Weblaw. 2, Colloquium, 31. Editions Weblaw, Bern, pp. 195-204. ISBN 978-3-98595-114-7.

Brenning, Stefanie, Heckner, Markus and Wolff, Christian (2022) Design Thinking als Innovationsmethode im Hochschulkontext - Konzepte und Erfahrungen. Die neue Hochschule (3), pp. 22-25.

Meyer, Selina, Elsweiler, David , Ludwig, Bernd , Fernández-Pichel, Marcos and Losada, David E. (2022) Do We Still Need Human Assessors? Prompt-Based GPT-3 User Simulation in Conversational AI. In: CUI 2022: 4th Conference on Conversational User Interfaces, July 26 - 28, 2022, Glasgow, United Kingdom.

Barnett, Helen, Boix, Oliver, Kontos, Dimitris and Jaki, Thomas (2022) Dose finding studies for therapies with late‐onset toxicities: A comparison study of designs. Statistics in Medicine 41 (30), pp. 5767-5788. Fulltext not available.

Dennerlein, Katrin, Schmidt, Thomas and Wolff, Christian (2022) Emotionen im kulturellen Gedächtnis bewahren. In: Kulturen des digitalen Gedächtnisses. 8. Tagung des Verbandes "Digital Humanities im deutschsprachigen Raum" (DHd 2022), 07. - 11.03.2022, Potsdam, virtuel.

Mielke, Bettina and Wolff, Christian (2022) Entwicklung eines digitalen Basisdokuments. In: Schweighofer, Erich and Saarenpää, Ahti and Eder, Stefan and Zanol, Jakov and Schmautzer, Felix and Kummer, Franz and Hanke, Philip, (eds.) Recht DIGITAL - 25 Jahre IRIS ; Tagungsband des 25. Internationalen Rechtsinformatik Symposions : IRIS 2022. Edition Weblaw. 2, Colloquium, 31. Editions Weblaw, Bern, pp. 205-214. ISBN 978-3-98595-114-7.

Bink, Markus, Zimmerman, Steven and Elsweiler, David (2022) Featured Snippets and their Influence on Users’ Credibility Judgements. In: CHIIR '22: ACM SIGIR Conference on Human Information Interaction and Retrieval, March 14 - 18, 2022, Regensburg Germany.

Kalus, Alexander , Kocur, Martin , Henze, Niels , Bogon, Johanna and Schwind, Valentin (2022) How to Induce a Physical and Virtual Rubber Hand Illusion. In: MuC '22: Mensch und Computer 2022, September 4 - 7, 2022, Darmstadt, Germany. Fulltext not available.

Schmid, Isabel, Wehner, Benjamin and Leist, Susanne (2022) Identifying Value-adding Users in Enterprise Social Networks. In: Proceedings of the 55th Hawaii International Conference on System Sciences | 2022, 2022, Hawaii. (Submitted)

Schweiger, Nadine and Wolff, Christian (2022) Improving Resilience in the Elderly Through Robot-Assisted Dementia Therapy. In: The European Conference on Aging & Gerontology 2022 (EGen2022), 14. - 17. Juli 2022, London.

Weiherer, Maximilian, Eigenberger, Andreas, Egger, Bernhard , Brébant, Vanessa, Prantl, Lukas and Palm, Christoph (2022) Learning the shape of female breasts: an open-access 3D statistical shape model of the female breast built from 110 breast scans. The Visual Computer. Fulltext not available.

Madge, Chris, Brightmore, Jussi, Kicikoglu, Doruk, Althani, Fatima, Bartle, Richard, Chamberlain, Jon, Kruschwitz, Udo and Poesio, Massimo (2022) LingoTowns: A Virtual World For Natural Language Annotation and Language Learning. In: CHI PLAY '22: Extended Abstracts of the 2022 Annual Symposium on Computer-Human Interaction in Play, November 2 – 5, 2022, Bremen, Germany. Fulltext not available.

Marzougui, Soundes, Wisiol, Nils, Gersch, Patrick, Krämer, Juliane and Seifert, Jean-Pierre (2022) Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, 23-26 August 2022, Vienna. Fulltext not available.

Conrad, André, Utzmann, Philipp, Klettke, Meike and Störl, Uta (2022) Metamodels to support database migration between heterogeneous data stores. In: MODELS '22: ACM/IEEE 25th International Conference on Model Driven Engineering Languages and Systems, October 23 - 28, 2022, Montreal Quebec Canada. Fulltext not available.

Mozgunov, Pavel, Jaki, Thomas, Gounaris, Ioannis, Goddemeier, Thomas, Victor, Anja and Grinberg, Marianna (2022) Practical implementation of the partial ordering continual reassessment method in a Phase I combination‐schedule dose‐finding trial. Statistics in Medicine 41 (30), pp. 5789-5809. Fulltext not available.

Schmidt, Thomas , Fehle, Jakob, Weissenbacher, Maximilian, Richter, Jonathan, Gottschalk, Philipp and Wolff, Christian (2022) Sentiment Analysis on Twitter for the Major German Parties during the 2021 German Federal Election. In: Proceedings of the 18th Conference on Natural Language Processing (KONVENS 2022). KONVENS 2022 Organizers, Potsdam, Germany, pp. 74-87.

Kocur, Martin , Bogon, Johanna, Mayer, Manuel, Witte, Miriam, Karber, Amelie, Henze, Niels and Schwind, Valentin (2022) Sweating Avatars Decrease Perceived Exertion and Increase Perceived Endurance while Cycling in Virtual Reality. In: VRST '22: 28th ACM Symposium on Virtual Reality Software and Technology, 29 November 2022- 1 December 2022, Tsukuba, Japan.

Halbhuber, David, Köhler, Annika, Schmidbauer, Markus, Wiese, Jannik and Henze, Niels (2022) The Effects of Auditory Latency on Experienced First-Person Shooter Players. In: MuC '22: Mensch und Computer 2022, September 4 - 7, 2022, Darmstadt, Germany.

Kocur, Martin , Kalus, Alexander , Bogon, Johanna, Henze, Niels , Wolff, Christian and Schwind, Valentin (2022) The Rubber Hand Illusion in Virtual Reality and the Real World - Comparable but Different. In: VRST '22: 28th ACM Symposium on Virtual Reality Software and Technology, 29 November 2022- 1 December 2022, Tsukuba, Japan.

Azad, Reza, Al-Antary, Mohammad T. , Heidari, Moein and Merhof, Dorit (2022) TransNorm: Transformer Provides a Strong Spatial Normalization Mechanism for a Deep Segmentation Model. IEEE Access 10, pp. 108205-108215. Fulltext not available.

Halbhuber, David, Seewald, Maximilian, Schiller, Fabian, Götz, Mathias, Fehle, Jakob and Henze, Niels (2022) Using Artificial Neural Networks to Compensate Negative Effects of Latency in Commercial Real-Time Strategy Games. In: MuC '22: Mensch und Computer 2022, September 4 - 7, 2022, Darmstadt, Germany.

Meyerowitz‐Katz, Gideon , Besançon, Lonni , Flahault, Antoine and Wimmer, Raphael (2021) Impact of mobility reduction on COVID-19 mortality: absence of evidence might be due to methodological issues. Scientific Reports 11 (1), p. 23533.

Hilbert, Sven , Coors, Stefan, Kraus, Elisabeth, Frei, Mario, Lindl, Alfred , Wild, Johannes , Krauss, Stefan , Goretzko, David, Bischl, Bernd and Stachl, Clemens (2021) Machine Learning for the Educational Sciences. Review of Education 9 (3), e3310. Fulltext not available.

Böhm, Fabian , Englbrecht, Ludwig , Friedl, Sabrina and Pernul, Günther (2021) Visual Decision-Support for Live Digital Forensics. In: 2021 IEEE Symposium on Visualization for Cyber Security (VizSec), 27.10.2021, virtuell.

Dietz, Marietheres , Englbrecht, Ludwig and Pernul, Günther (2021) 2. Enhancing Industrial Control System Forensics using replication-based Digital Twins. In: Peterson, Gilbert and Shenoi, Sujeet, (eds.) Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers. IFIP Advances in Information and Communication Technology (IFIPAICT), 612 (2). Springer International Publishing, Cham, pp. 21-38. ISBN 978-3-030-88381-2. Fulltext not available.

Kulik, Konstantin, Achmann, Michael and Wolff, Christian (2021) Evaluation of a Chat Interface for Diary Studies in Information Behavior Research. In: 84th Annual Meeting of the Association for Information Science & Technology, 30 Oct - 02 Nov 2021, Salt Lake City.

Schlette, Daniel , Caselli, Marco and Pernul, Günther (2021) A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective. IEEE Communications Surveys & Tutorials 23 (4), pp. 2525-2556.

Schmidt, Thomas, Engl, Isabella, Halbhuber, David and Wolff, Christian (2021) Comparing Live Sentiment Annotation of Movies via Arduino and a Slider with Textual Annotation of Subtitles. Post-Proceedings of the 5th Conference Digital Humanities in the Nordic Countries (DHN 2020) 2865, pp. 212-223.

Schlette, Daniel , Vielberth, Manfred and Pernul, Günther (2021) CTI-SOC2M2 – The quest for mature, intelligence-driven security operations and incident response capabilities. Computers & Security 111, p. 102482. Fulltext not available.

Schwaiger, Josef Michael, Hammerl, Timo, Johannsen, Florian and Leist, Susanne (2021) UR: SMART--A tool for analyzing social media content. Information Systems and e-Business Management 19 (4), pp. 1275-1320.

Böhm, Victoria, Wolff, Christian , Geiselhart, Corinna, Karl, Eric and Kleindienst, Nina (2021) Investigating Barriers for the Adoption of the German Contact-Tracing App and the Influence of a Video Intervention on User Acceptance. In: MuC '21: Mensch und Computer 2021, September 5 - 8, 2021, Ingolstadt, Germany.

Böhm, Fabian , Dietz, Marietheres , Preindl, Tobias and Pernul, Günther (2021) Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. Journal of Cybersecurity and Privacy 1 (3), pp. 519-538.

Schüsselbauer, Dennis, Schmid, Andreas and Wimmer, Raphael (2021) Demonstrating Dothraki: Tracking Tangibles Atop Tabletops Through De-Bruijn Tori. In: Mensch und Computer 2021 (MuC ’21), September 5–8, 2021, Ingolstadt, Germany. (Submitted) Fulltext restricted.

Schmid, Andreas , Fischer, Thomas, Weichart, Alexander, Hartmann, Alexander and Wimmer, Raphael (2021) Demonstrating ScreenshotMatcher: Taking Smartphone Photos to Capture Screenshots. In: Mensch und Computer 2021 (MuC ’21), September 5–8, 2021, Ingolstadt, Germany. (Submitted) Fulltext restricted.

Schmid, Andreas , Fischer, Thomas, Weichart, Alexander, Hartmann, Alexander and Wimmer, Raphael (2021) ScreenshotMatcher: Taking Smartphone Photos to Capture Screenshots. In: Mensch und Computer 2021 (MuC ’21), September 5–8, 2021, Ingolstadt, Germany.

Kroczek, Leon O. H. , Lingnau, Angelika , Schwind, Valentin, Wolff, Christian and Mühlberger, Andreas (2021) Angry facial expressions bias towards aversive actions. PLOS ONE 16 (9), pp. 1-13.

Groll, Sebastian, Kern, Sascha , Fuchs, Ludwig and Pernul, Günther (2021) Monitoring Access Reviews by Crowd Labelling. In: Fischer-Hübner, Simone and Lambrinoudakis, Costas and Kotsis, Gabriele and Khalil, Ismail and Tjoa, A. Min, (eds.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 12927. Springer, Cham, pp. 3-17. ISBN 978-3-030-86586-3, 978-3-030-86585-6. Fulltext restricted.

Schneider, Matthias (2021) Navigation in the Augmented Reality Head-up Display: Guidelines for the Development of AR HUD Navigation Concepts. Hochschulschrift der Universität Regensburg PhD, Universität Regensburg.

Schmidt, Thomas, El-Keilany, Alina, Eger, Johannes and Kurek, Sarah (2021) Exploring Computer Vision for Film Analysis: A Case Study for Five Canonical Movies. 2nd International Conference of the European Association for Digital Humanities (EADH 2021).

Fehle, Jakob, Schmidt, Thomas and Wolff, Christian (2021) Lexicon-based Sentiment Analysis in German: Systematic Evaluation of Resources and Preprocessing Techniques. In: Proceedings of the 17th Conference on Natural Language Processing (KONVENS 2021), September 6-9, 2021, Düsseldorf, Germany.

Schmidt, Thomas, Dennerlein, Katrin and Wolff, Christian (2021) Towards a Corpus of Historical German Plays with Emotion Annotations. In: 3rd Conference on Language, Data and Knowledge (LDK 2021), September 1-4, 2021, Zaragoza, Spain.

Schmidt, Thomas, Grünler, Johanna, Schönwerth, Nicole and Wolff, Christian (2021) Towards the Analysis of Fan Fictions in German Language: Exploration of a Corpus from the Platform Archive of Our Own. In: 2nd International Conference of the European Association for Digital Humanities (EADH 2021), 21.-25. September 2021, Krasnoyarsk, Russia.

Kautetzky, Maximilian Reinhard Eduard (2021) Schnittstellengestaltung für ein digitales Ökosystem im Kontext einer geräte- und plattformübergreifenden Anwendung im Fahrzeug - User-Experience-Gestaltungsempfehlungen für touchbasierte Nutzerschnittstellen von im Fahrzeug verwendeten mobilen Anwendungen für ein Fond-Entertainment-System auf persönlichen Geräten. PhD, Universität Regensburg.

Heizinger, Leonhard Josef (2021) Exploring Early Stages of Protein Evolution. PhD, Universität Regensburg.

Schmidt, Thomas, Dennerlein, Katrin and Wolff, Christian (2021) Using Deep Learning for Emotion Analysis of 18th and 19th Century German Plays. In: Burghardt, Manuel and Dieckmann, Lisa and Steyer, Timo and Trilcke, Peer and Walkowski, Niels-Oliver and Weis, Joëlle and Wuttke, Ulrike, (eds.) Fabrikation von Erkenntnis: Experimente in den Digital Humanities. Teilband 1. Melusina Press, Esch-sur-Alzette, Luxembourg. ISBN 978-2-919815-25-8.

Klauer, Alexander, Johannsen, Florian and Leist, Susanne (2021) “BeMyVoice”--An iPad-Based Helper for Speech Impaired Persons. In: Kruse, Leona Chandra and Seidel, Stefan and Hausvik, Geir Inge, (eds.) The Next Wave of Sociotechnical Design. DESRIST 2021. Lecture Notes in Computer Science, 12807. Springer Publ. Int., Cham, Switzerland, pp. 40-51. ISBN 978-3-030-82405-1 (online), 978-3-030-82404-4 (print). Fulltext not available.

Ortloff, Anna-Marie (2021) A Comparison of Nudging and Boosting for Privacy during Web Browsing. Masters, Universität Regensburg.

Sautmann, Marie (2021) Einfluss von Technologie und Größe verschiedener Anzeigemedien auf das Leseverhalten. Bachelorarbeit, Universität Regensburg.

Dangel, Johanna (2021) Entwicklung und Evaluation eines Tools zur lexikonbasierten Sentiment Analysis für die Digital Humanities. Bachelorarbeit, Universität Regensburg.

Roth, Christian , Stöger, Lukas, Nitschke, Mirja , Hörmann, Matthias and Kesdogan, Dogan (2021) iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management. In: Hammoudi, Slimane and Quix, Christoph and Bernardino, Jorge, (eds.) Data Management Technologies and Applications. Communications in Computer and Information Science, 1446. Springer, Cham, pp. 56-79. ISBN 978-3-030-83014-4. Fulltext not available.

Kocur, Martin, Dechant, Martin, Wolff, Christian, Nothdurfter, Caroline, Wetter, Thomas C., Rupprecht, Rainer and Shiban, Youssef (2021) Computer-Assisted Avatar-Based Treatment for Dysfunctional Beliefs in Depressive Inpatients: A Pilot Study. Frontiers in Psychiatry 12, pp. 1-13.

Schwabl, Patrick (2021) Classifying user information needs in cooking dialogues – an empirical performance evaluation of transformer networks. Masters, Universität Regensburg.

Vielberth, Manfred , Glas, Magdalena , Dietz, Marietheres , Karagiannis, Stylianos , Magkos, Emmanouil and Pernul, Günther (2021) A Digital Twin-Based Cyber Range for SOC Analysts. In: Barker, Ken and Ghazinour, Kambiz, (eds.) Data and Applications Security and Privacy XXXV, 35th Annual IFIP WG 11.3 Conference, DBSec 2021. Information Systems and Applications, incl. Internet/Web, and HCI, 12840. Springer, Calgary, Canada, pp. 293-311. ISBN 978-3-030-81242-3; 978-3-030-81241-6. Fulltext not available.

Roth, Christian , Ngoc, Thanh-Dinh, Hornsteiner, Markus, Schröppel, Verena, Roßberger, Marc and Kesdogan, Dogan (2021) ROADR: Towards Road Network Assessment using Everyone-as-a-Sensor. In: International Conference on Distributed Sensing and Intelligent Systems (ICDSIS), Haifa, China. (In Press) Fulltext not available.

Putz, Benedikt , Böhm, Fabian and Pernul, Günther (2021) HyperSec: Visual Analytics for Blockchain Security Monitoring. In: ICT Systems Security and Privacy Protection. SEC 2021., 22 June - 24 June 2021, Oslo, Norway (virtual).

Wörner, Janik, Konadl, Daniel, Schmid, Isabel and Leist, Susanne (2021) COMPARISON OF TOPIC MODELLING TECHNIQUES IN MARKETING - RESULTS FROM AN ANALYSIS OF DISTINCTIVE USE CASES. In: 29th European Conference on Information Systems (ECIS2021), 14.06.2021 - 16.06.2021, Virtuell.

Johannsen, Florian and Leist, Susanne (2021) Six Sigma for Smart production Services-towards a Modeling Tool-based Approach. In: ECIS, 2021, Marrakesh, Morocco.

Gehr, Tanja (2021) Wahrnehmung von personalisierter Online-Werbung. Bachelorarbeit, Universität Regensburg.

Wein, Simon , Deco, Gustavo, Tomé, Ana Maria, Goldhacker, Markus , Malloni, Wilhelm M., Greenlee, Mark W. and Lang, Elmar W. (2021) Brain Connectivity Studies on Structure-Function Relationships: A Short Survey with an Emphasis on Machine Learning. Computational Intelligence and Neuroscience 2021, pp. 1-31.

Mielke, Bettina and Wolff, Christian (2021) Korpuslinguistik in der Rechtswissenschaft. Eine webbasierte Analyseplattform für EuGH-Entscheidungen. Jusletter IT, pp. 111-119.

Mielke, Bettina and Wolff, Christian (2021) Wieviel Tech steckt in Legal Tech? Überlegungen zur automatisierten Rechtsdurchsetzung. Jusletter IT, pp. 103-110.

Achmann, Michael (2021) Qualitative Analyse und Modellierung des wissenschaftlichen Arbeitens. Masters, Universität Regensburg.

Hahn, Jürgen and Wimmer, Raphael (2021) Sketchable Interaction: Drawing User Interfaces with Interactive Regions. In: Conference on Human Factors in Computing Systems 2021, 8.5. - 13.5. 2021, Yokohama, Japan.

Schmid, Andreas and Wimmer, Raphael (2021) Yet Another Latency Measuring Device. In: EHPHCI: Esports and High Performance HCI, 08.05.2021, Yokohama, Japan.

Jackermeier, Robert and Ludwig, Bernd (2021) Smartphone-Based Activity Recognition in a Pedestrian Navigation Context. Sensors 21 (3243), pp. 1-20.

Lamm, Lukas and Wolff, Christian (2021) GCS: A Quick and Dirty Guideline Compliance Scale. Journal of Usability Studies 16 (3), pp. 179-202.

Empl, Philip and Pernul, Günther (2021) A Flexible Security Analytics Service for the Industrial IoT. In: CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 28 April 2021, Virtual Event.

Englbrecht, Ludwig and Pernul, Günther (2021) A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises. Journal of Cyber Security and Mobility 10 (1), pp. 27-64. Fulltext not available.

Taruttis-Glagoleff, Franziska (2021) Modeling MYC-dependent regulation of gene expression and cell metabolism in B-cell lymphomas. PhD, Universität Regensburg.

Vielberth, Manfred , Englbrecht, Ludwig and Pernul, Günther (2021) Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information. Information & Computer Security 29 (2), pp. 332-349. Fulltext not available.

Moßburger, Luis, Riedl, Felix, Lehenmeier, Constantin and Doß, Brigitte (2021) DBIS Data Workshop - Report. In: DBIS Data Workshop, 5th March 2021, University Library of Regensburg (online). (Unpublished)

Moßburger, Luis, Riedl, Felix, Lehenmeier, Constantin and Doß, Brigitte (2021) DBIS Datenworkshop - Bericht. In: DBIS Datenworkshop, 05.03.2021, Universitätsbibliothek Regensburg (virtuell). (Unpublished)

Vielberth, Manfred (2021) Security Information and Event Management (SIEM). In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg, pp. 1-3. ISBN 978-3-642-27739-9. Fulltext not available.

Steinhauser, Stefanie (2021) COVID-19 as a Driver for Digital Transformation in Healthcare. In: Glauner, Patrick and Plugmann, Philipp and Lerzynski, Guido, (eds.) Digitalization in Healthcare: Implementing Innovation and Artificial Intelligence. Future of Business and Finance. Springer International Publishing, Cham, pp. 93-102. ISBN 978-3-030-65895-3 (print). 978-3-030-65896-0 (online). Fulltext not available.

Schlette, Daniel (2021) Cyber Threat Intelligence. In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. ISBN 978-3-642-27739-9.

Schlette, Daniel (2021) Cyber Threat Intelligence Sharing. In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. ISBN 978-3-642-27739-9.

Schüsselbauer, Dennis, Schmid, Andreas and Wimmer, Raphael (2021) Dothraki: Tracking Tangibles Atop Tabletops Through De-Bruijn Tori. In: TEI '21: Fifteenth International Conference on Tangible, Embedded, and Embodied Interaction, February 14-17, 2021, Salzburg.

Götz, Theresa Ida (2021) Estimation of Dose Distribution for Lu-177 Therapies in Nuclear Medicine. PhD, Universität Regensburg.

Englbrecht, Ludwig (2021) IT Forensic Readiness. In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 1-3. ISBN 978-3-642-27739-9. Fulltext not available.

Englbrecht, Ludwig (2021) Security Capability Maturity Model. In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 1-4. ISBN 978-3-642-27739-9. Fulltext not available.

Vielberth, Manfred (2021) Security Operations Center (SOC). In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg, pp. 1-3. ISBN 978-3-642-27739-9. Fulltext not available.

Böhm, Fabian (2021) Visual Security Analytics. In: Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin Heidelberg.

Löwer, Stefanie Verena (2021) Erfolgsfaktoren softwaregestützter Expertenwerkzeuge in komplexen Domänen. PhD, Universität Regensburg.

Käppel, Martin, Ackermann, Lars, Schönig, Stefan and Jablonski, Stefan (2021) Language-independent look-ahead for checking multi-perspective declarative process models. Software and Systems Modeling 20 (5), pp. 1379-1401.

Konadl, Daniel, Wörner, Janik and Leist, Susanne (2021) Identifying Sentiment Influences Provoked by Context Factors – Results from a Data Analytics Procedure Performed on Tweets. In: Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS 2021). University of Hawai'i at Manoa, Honolulu, HI, pp. 2511-2520. ISBN 978-0-9981331-4-0.

Putz, Benedikt , Dietz, Marietheres , Empl, Philip and Pernul, Günther (2021) EtherTwin: Blockchain-based Secure Digital Twin Information Management. Information Processing & Management 58 (1). Fulltext not available.

Böhm, Fabian , Vielberth, Manfred and Pernul, Günther (2021) Bridging Knowledge Gaps in Security Analytics. In: 7th International Conference on Information Systems Security and Privacy, 11.02. - 13.02.2021, Vienna, AT.

Prester, Julian , Wagner, Gerit , Schryen, Guido and Hassan, Nik Rushdi (2021) Classifying the ideational impact of Information Systems review articles: A content-enriched deep learning approach. Decision Support Systems 140, p. 113432. Fulltext not available.

Götz, Theresa I., Lang, Elmar W., Schmidkonz, Christian, Kuwert, Torsten and Ludwig, Bernd (2021) Dose voxel kernel prediction with neural networks for radiation dose estimation. Zeitschrift für Medizinische Physik 31 (1), pp. 23-36. Fulltext not available.

Schmidt, Thomas, Dennerlein, Katrin and Wolff, Christian (2021) Emotion Classification in German Plays with Transformer-based Language Models Pretrained on Historical and Contemporary Language. In: The 5th Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature, November 11, 2021, Punta Cana, Dominican Republic (online).

Schmidt, Thomas and Wolff, Christian (2021) Exploring Multimodal Sentiment Analysis in Plays: A Case Study for a Theater Recording of Emilia Galotti. In: Computational Humanities Research Conference (CHR 2021), November 17–19, 2021, Amsterdam, The Netherlands.

Felgenhauer, Annette, Kaufmann, Katharina, Klier, Julia and Klier, Mathias (2021) In the same boat: social support in online peer groups for career counseling. Electronic Markets 31 (1), pp. 197-213. Fulltext not available.

Halbhuber, David, Henze, Niels and Schwind, Valentin (2021) Increasing Player Performance and Game Experience in High Latency Systems. Proceedings of the ACM on Human-Computer Interaction 5 (CHI PL), pp. 1-20.

Käppel, Martin, Schönig, Stefan and Jablonski, Stefan (2021) Leveraging Small Sample Learning for Business Process Management. Information and Software Technology 132, p. 106472. Fulltext not available.

Sippl, Colin, Burghardt, Manuel and Wolff, Christian (2021) Modelling Cross-Document Interdependencies in Medieval Charters of the St. Katharinenspital in Regensburg. In: Spadini, Elena and Tomasi, Francesca and Vogeler, Georg, (eds.) Graph Data-Models and Semantic Web Technologies in Scholarly Digital Editing. Schriften des Instituts für Dokumentologie und Editorik, 15. BoD - Books on Demand, Norderstedt, pp. 181-206. ISBN 978-3-7543-4369-2; 978-3-7543-5876-4. Fulltext not available.

Korcyl, Piotr (2021) Numerical package for solving the JIMWLK evolution equation in C++. SoftwareX 16, p. 100887. Fulltext not available.

Kocur, Martin , Habler, Florian, Schwind, Valentin, Wozniak, W. Pawel, Wolff, Christian and Henze, Niels (2021) Physiological and Perceptual Responses to Athletic Avatars while Cycling in Virtual Reality. In: CHI Conference on Human Factors in Computing Systems (CHI ’21), May 8-13, 2021, Online Virtual Conference (originally Yokohama, Japan).

Rzayev, Rufat, Ugnivenko, Polina, Graf, Sarah, Schwind, Valentin and Henze, Niels (2021) Reading in VR: The Effect of Text Presentation Type and Location. In: CHI Conference on Human Factors in Computing Systems (CHI ’21), May 8-13, 2021, Online Virtual Conference (originally Yokohama, Japan).

Wechsler, Theresa F., Brockelmann, Martin, Kulik, Konstantin, Kopf, Felicitas M., Kocur, Martin , Lankes, Michael, Mühlberger, Andreas and Wolff, Christian (2021) SpEYEders: Adults’ and children’s affective responses during immersive playful gaze interactions transforming virtual spiders. In: 2021 Annual Symposium on Computer-Human Interaction in Play, October 18–21, 2021, Virtual Event, Austria.

Kocur, Martin , Henze, Niels and Schwind, Valentin (2021) The Extent of the Proteus Effect as a Behavioral Measure for Assessing User Experience in Virtual Reality. In: CHI 2021 - Workshop on Evaluating User Experiences in Mixed Reality. (In Press)

Hornsteiner, Markus, Groll, Sebastian and Puchta, Alexander (2021) Towards a user-centric IAM entitlement shop - Learnings from the e-commerce. In: SIN 2020: 13th International Conference on Security of Information and Networks, November 4 - 7, 2020, Merkez Turkey.

Küfner, Thomas, Schönig, Stefan , Jasinski, Richard and Ermer, Andreas (2021) Vertical data continuity with lean edge analytics for industry 4.0 production. Computers in Industry 125, p. 103389. Fulltext not available.

Belchior, Rafael, Putz, Benedikt , Pernul, Günther, Correia, Miguel, Vasconcelos, André and Guerreiro, Sérgio (2020) SSIBAC: Self-Sovereign Identity Based Access Control. In: The 3rd International Workshop on Blockchain Systems and Applications (BlockchainSys2020), in Conjunction with IEEE TrustCom 2020, December 29, 2020 - January 1, 2021, Guangzhou, China.

Kraus, Matthias, Ludwig, Bernd , Minker, Wolfgang and Wagner, Nicolas (2020) 20. Assistenzsysteme. In: Görz, Günther and Schmid, Ute and Braun, Tanya, (eds.) Handbuch der künstlichen Intelligenz. De Gruyter, Berlin, Boston, pp. 859-906. ISBN 978-3-11-021808-4 (print), 978-3-11-021809-1 (online).

Roth, Christian , Ngoc, Thanh-Dinh and Kesdogan, Dogan (2020) CrowdAbout: Using Vehicles as Sensors to Improve Map Data for ITS. In: International Workshop on Data Science Engineering and its Applications (DSEA). (In Press) Fulltext not available.

Menges, Florian , Putz, Benedikt and Pernul, Günther (2020) DEALER: decentralized incentives for threat intelligence reporting and exchange. International Journal of Information Security 2021 (5), pp. 741-761.

Moßburger, Luis, Wende, Felix, Brinkmann, Kay and Schmidt, Thomas (2020) Exploring Online Depression Forums via Text Mining: A Comparison of Reddit and a Curated Online Forum. Proceedings of the Fifth Social Media Mining for Health Applications Workshop & Shared Task, pp. 70-81.

Kouadio, Marc Yao (2020) Creating an Instrument of Measurement for the Evaluation of the Digital Divide: A Methodological Challenge at a Global Level. PhD, Universität Regensburg.

Putz, Benedikt and Pernul, Günther (2020) Detecting Blockchain Security Threats. In: 2020 IEEE International Conference on Blockchain, November 02-06, 2020, (virtual conference).

Kleindienst, Nina and Schmidt, Thomas (2020) Investigating the Transformation of Original Work by the Online Fan Fiction Community: A Case Study for Supernatural. In: Digital Practices. Reading, Writing and Evaluation on the Web, November 23–25, 2020, Basel, Switzerland.

Kocur, Martin , Schauhuber, Philipp, Schwind, Valentin, Wolff, Christian and Henze, Niels (2020) The Effects of Self- and External Perception of Avatars on Cognitive Task Performance in Virtual Reality. In: VRST '20: 26th ACM Symposium on Virtual Reality Software and Technology, November 1 - 4, 2020, Virtual Event Canada. Fulltext restricted.

Kocur, Martin , Graf, Sarah and Schwind, Valentin (2020) The Impact of Missing Fingers in Virtual Reality. In: VRST '20: 26th ACM Symposium on Virtual Reality Software and Technology, November 1 - 4, 2020, Virtual Event Canada. Fulltext not available.

Heinrich, Bernd , Hopf, Marcus, Lohninger, Daniel, Schiller, Alexander and Szubartowicz, Michael (2020) Something’s Missing? A Procedure for Extending Item Content Data Sets in the Context of Recommender Systems. Information Systems Frontiers (ISF).

Schmidt, Thomas, Mosiienko, Anastasiia, Faber, Raffaela, Herzog, Juliane and Wolff, Christian (2020) Utilizing HTML-analysis and computer vision on a corpus of website screenshots to investigate design developments on the web. Proceedings of the Association for Information Science and Technology 57 (1), e392.

Menges, Florian (2020) Cyber Threat Intelligence Exchange. PhD, Universität Regensburg.

Schmidt, Thomas, Kaindl, Florian and Wolff, Christian (2020) Distant Reading of Religious Online Communities: A Case Study for Three Religious Forums on Reddit. In: Proceedings of the Digital Humanities in the Nordic Countries 5th Conference (DHN 2020), 2020, Riga, Latvia.

Schmidt, Thomas and Halbhuber, David (2020) Live Sentiment Annotation of Movies via Arduino and a Slider. In: Digital Humanities in the Nordic Countries 5th Conference 2020 (DHN 2020), Riga, Latvia.

Schmidt, Thomas, Engl, Isabella, Herzog, Juliane and Judisch, Lisa (2020) Towards an Analysis of Gender in Video Game Culture: Exploring Gender specific Vocabulary in Video Game Magazines. In: Proceedings of the Digital Humanities in the Nordic Countries 5th Conference (DHN 2020), 2020, Riga, Latvia.

Roth, Christian , Saur, Mario and Kesdogan, Dogan (2020) kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive Example. In: Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy (DETIPS 2020), 18. Sep. 2020, Virtual Conference. (In Press) Fulltext not available.

Ludwig, Bernd (2020) Editorial. KI - Künstliche Intelligenz 34, pp. 285-286.

Stadler, Patrick, Schmid, Andreas and Wimmer, Raphael (2020) DispLagBox: Simple and Replicable High-Precision Measurements of Display Latency. In: MuC '20: Proceedings of Mensch und Computer 2020, September 6 - 9, 2020, Magdeburg Germany.

Alhelbawy, Ayman, Lattimer, Mark, Kruschwitz, Udo , Fox, Chris and Poesio, Massimo (2020) An NLP-Powered Human Rights Monitoring Platform. Expert Systems with Applications 153 (113365). Fulltext not available.

Schön, Dominik (2020) Quantitative Approaches to enable the Automated Planning of Adaptive Process Models. PhD, Universität Regensburg.

Roth, Christian , Aringer, Sebastian, Petersen, Johannes and Nitschke, Mirja (2020) Are Sensor Based Business Models a Threat to Privacy? The Case Of Pay-How-You-Drive Insurance Models. In: The 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020, 14.-17. Sep. 2020. Fulltext not available.

Thim-Mabrey, Christiane and Brack, Matthias, eds. (2020) Verschiedene Rationalitäten im Diskurs von Wissenschaft und Gesellschaft? Am Beispiel der Atomenergie-Beschlüsse. V. Regensburger Symposium vom 21. bis 23. März 2012;
Wissen – Nichtwissen – Grenzen des Wissens in den Wissenschaften. VI. Regensburger Symposium vom 20. bis 22. März 2013.
Regensburger Symposium, 5 und 6. Universitätsbibliothek Regensburg, Regensburg.

Dietz, Marietheres , Vielberth, Manfred and Pernul, Günther (2020) Integrating Digital Twin Security Simulations in the Security Operations Center. In: ARES 2020: The 15th International Conference on Availability, Reliability and Security, August 25 - 28, 2020, Virtual Event Ireland. Fulltext not available.

Wagner, Gerit (2020) Explaining and Distinguishing Scientific Impact in Information Systems Research: A Study of Review Articles and Design Science Research. PhD, Universität Regensburg.

Schmidt, Thomas, Hartl, Philip, Ramsauer, Dominik, Fischer, Thomas, Hilzenthaler, Andreas and Wolff, Christian (2020) Acquisition and Analysis of a Meme Corpus to Investigate Web Culture. In: Estill, Laura and Guiliano, Jennifer, (eds.) 15th Annual International Conference of the Alliance of Digital Humanities Organizations (DH 2020), Conference Abstracts. Ottawa, Canada.

Schmidt, Thomas, Kaindl, Florian and Wolff, Christian (2020) Visualizing Collocations in Religious Online Forums. In: 15th Annual International Conference of the Alliance of Digital Humanities Organizations (DH 2020), Conference Abstracts, July 20-25, 2020, Ottawa, Canada.

Roth, Christian , Nitschke, Mirja , Hörmann, Matthias and Kesdogan, Dogan (2020) iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management. Proceedings of the 9th International Conference on Data Science, Technology and Applications (DATA 2020) 1, pp. 252-259. Fulltext not available.

Böhm, Fabian , Englbrecht, Ludwig and Pernul, Günther (2020) 13. Designing a Decision-Support Visualization for Live Digital Forensic Investigations. In: Singhal, Anoop and Vaidya, Jaideep, (eds.) Data and Applications Security and Privacy XXXIV. 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings. Springer International Publishing, Cham, pp. 223-240. ISBN 978-3-030-49669-2. Fulltext not available.

Schlette, Daniel , Menges, Florian , Baumer, Thomas and Pernul, Günther (2020) 4. Security Enumerations for Cyber-Physical Systems. In: Singhal, Anoop and Vaidya, Jaideep, (eds.) Data and Applications Security and Privacy XXXIV. DBSec 2020. Lecture Notes in Computer Science, 12122 (4). Springer International Publishing, Cham, pp. 64-76. ISBN 978-3-030-49668-5 (print)l, 978-3-030-49669-2 (online). Fulltext not available.

Thim-Mabrey, Christiane and Brack, Matthias, eds. (2020) Erfahrung und Gewissheit – Orientierungen in den Wissenschaften und im Alltag. IV. Regensburger Symposium vom 24.-26. März 2011. Regensburger Symposium, 4. Universitätsbibliothek Regensburg, Regensburg.

Mielke, Bettina and Wolff, Christian (2020) Der lange Weg zum Studium der Rechtsinformatik: Wie gestaltet man ein Legal Tech-Curriculum? Jusletter IT. Fulltext not available.

Wagner, Gerit , Empl, Philip and Schryen, Guido (2020) Designing a novel strategy for exploring literature corpora. In: Proceedings of the 28th European Conference on Information Systems (ECIS 2020), 15-17 June 2020, Marrakesch.

Dechant, Martin Johannes, Kocur, Martin , Wolff, Christian and Mandryk, Regan (2020) "Healthy" Deceits with Mixed Reality. In: CHI 2020 - Workshop on Exploring Potentially Abusive Ethical, Social and Political Implications of Mixed Reality Research in HCI, Virtual Event.

Schlette, Daniel , Böhm, Fabian, Caselli, Marco and Pernul, Günther (2020) Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security.

Mielke, Bettina and Wolff, Christian (2020) Datenethik für verantwortungsvolle Digitalisierung: Probleme, Perspektiven, Politik. Jusletter IT. Fulltext not available.

Nitschke, Mirja , Roth, Christian , Hoyer, Christian and Kesdogan, Dogan (2020) Harmonized Group Mix for ITS. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. SciTePress, Valetta, Malta, pp. 152-163. Fulltext not available.

Stämmler, Frank Michael Nikolaus (2020) Standardisation and optimisation techniques in gut microbiome community analysis. PhD, Universität Regensburg.

Schiller, Alexander (2020) Concepts and Methods from Artificial Intelligence in Modern Information Systems – Contributions to Data-driven Decision-making and Business Processes. PhD, Universität Regensburg.

Englbrecht, Ludwig and Pernul, Günther (2020) A privacy-aware digital forensics investigation in enterprises. In: ARES 2020: The 15th International Conference on Availability, Reliability and Security, August 25 - 28, 2020, Virtual Event Ireland. Fulltext not available.

Heinrich, Bernd, Schiller, Alexander, Schön, Dominik and Szubartowicz, Michael (2020) Adapting Process Models via an Automated Planning Approach. Journal of Decision Systems. (In Press)

Ortloff, Anna-Marie, Windl, Maximiliane, Güntner, Lydia Maria and Schmidt, Thomas (2020) BeyondTheNotes: Ein Tool zur quantitativen Analyse in den digitalen Musikwissenschaften. In: Schöch, Christof, (ed.) DHd 2020: Spielräume; Digital Humanities zwischen Modellierung und Interpretation. Konferenzabstracts; Universität Paderborn, 02. bis 06. März 2020. Universität Paderborn, Paderborn, Germany. ISBN 978-3-945437-07-0.

Schmidt, Thomas, Bauer, Marlene, Habler, Florian, Heuberger, Hannes, Pilsl, Florian and Wolff, Christian (2020) Der Einsatz von Distant Reading auf einem Korpus deutschsprachiger Songtexte. In: Schöch, Christof, (ed.) DHd 2020: Spielräume; Digital Humanities zwischen Modellierung und Interpretation. Konferenzabstracts; Universität Paderborn, 02. bis 06. März 2020. Paderborn, Germany, pp. 296-300. ISBN 978-3-945437-07-0.

Rzayev, Rufat, Korbely, Susanne, Maul, Milena, Schark, Alina, Schwind, Valentin and Henze, Niels (2020) Effects of Position and Alignment of Notifications on AR Glasses during Social Interaction. In: NordiCHI '20: Shaping Experiences, Shaping Society, October 25 - 29, 2020, Tallinn Estonia. Fulltext not available.

Rzayev, Rufat, Hartl, Sabrina, Wittmann, Vera, Schwind, Valentin and Henze, Niels (2020) Effects of position of real-time translation on AR glasses. In: MuC '20: Proceedings of Mensch und Computer 2020, September 6 - 9, 2020, Magdeburg Germany. Fulltext not available.

Kocur, Martin , Dechant, Martin Johannes, Lankes, Michael, Wolff, Christian and Mandryk, Regan (2020) 63. Eye Caramba: Gaze-based Assistance for Virtual Reality Aiming and Throwing Tasks in Games. In: Bulling, Andreas and Huckauf, Anke, (eds.) ACM Symposium on Eye Tracking Research and Applications, ETRA '20 Short Papers, June 2–5, 2020, Stuttgart, Germany. Association for Computing Machinery (ACM), New York, NY, United States. ISBN 978-1-4503-7134-6. Fulltext restricted.

Kocur, Martin , Kloss, Melanie, Schwind, Valentin, Wolff, Christian and Henze, Niels (2020) Flexing Muscles in Virtual Reality: Effects of Avatars' Muscular Appearance on Physical Performance. In: CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play, November 2 - 4, 2020, Virtual Event, Canada. Fulltext restricted.

Ortloff, Anna-Marie, Windl, Maximiliane, Schwind, Valentin and Henze, Niels (2020) Implementation and In Situ Assessment of Contextual Privacy Policies. In: DIS '20: Designing Interactive Systems Conference 2020, July 6 - 10, 2020, Eindhoven Netherlands. Fulltext not available.

Reuter, Rebecca, Stark, Theresa, Sedelmaier, Yvonne, Landes, Dieter, Mottok, Jürgen and Wolff, Christian (2020) Insights in Students’ Problems during UML Modeling. In: 2020 IEEE Global Engineering Education Conference (EDUCON), April 27-30, 2020, Porto, Portugal. Fulltext restricted.

Schmidt, Thomas, Schlindwein, Miriam, Lichtner, Katharina and Wolff, Christian (2020) Investigating the Relationship Between Emotion Recognition Software and Usability Metrics. i-com 19 (2), pp. 139-151.

Auch, Maximilian , Weber, Manuel , Mandl, Peter and Wolff, Christian (2020) Similarity-based analyses on software applications: A systematic literature review. Journal of Systems and Software 168, p. 110669. Fulltext not available.

Gruber, Hans , Wolff, Christian , Mottok, Jürgen, Bazo, Alexander, Hauser, Florian and Schreistetter, Stefan (2020) Tutorial on Software Engineering Education in Co-Located Multi-User Eye-Tracking-Environments. In: 2020 IEEE 32nd Conference on Software Engineering Education and Training (CSEE T), 9. November 2020, München (Online). Fulltext not available.

Kellner, Florian and Brabänder, Christian (2020) VBA mit Excel. Gabler Verlag. ISBN 978-3-662-59739-2 (print), 978-3-662-59740-8 (online). Fulltext not available.

Weiderer, Peter (2019) Machine Learning Applications for Thermal Manufacturing Processes. PhD, Universität Regensburg.

Schön, Dominik (2019) The Influence of Automated Planning on the Task Performance of Process Modelers. In: International Conference on Information Systems, ICIS 2019, 16. - 18.12.2019, München.

Lohmüller, Valentin (2019) Second Screen Applications: A Multi-Platform Software Development Kit and Optimization of Human-Computer Interaction in Distributed Systems. PhD, Universität Regensburg.

Schauhuber, Philipp (2019) Effekte der Verkörperung von Avataren auf die kognitive Leistung in kollaborativen virtuellen Umgebungen. Masters, Universität Regensburg.

Roth, Christian , Nitschke, Mirja , Hutzler, Christian, Koller, Maximilian, Küffner, Rolf, Roßberger, Marc and Kesdogan, Dogan (2019) My Smartwatch is Mine - Machine Learning Based Theft Detection of Smartwatches. In: Askarov, Alan and Hansen, René Rydhof and Rafnsson, Willard, (eds.) Secure IT Systems. NordSec 2019. Lecture Notes in Computer Science, 11875. Springer, Cham, pp. 171-187. ISBN 978-3-030-35054-3. Fulltext not available.

Vielberth, Manfred, Menges, Florian and Pernul, Günther (2019) Human-as-a-security-sensor for harvesting threat intelligence. Cybersecurity 2 (23).

Putz, Benedikt and Pernul, Günther (2019) Trust Factors and Insider Threats in Permissioned Distributed Ledgers - An analytical study and evaluation of popular DLT frameworks. In: Hameurlain, A. and Wagner, R., (eds.) Transactions on Large-Scale Data and Knowledge-Centered Systems XLII. Lecture Notes in Computer Science, 11860. Springer, Berlin, pp. 25-50. ISBN 978-3-662-60530-1 (print), 978-3-662-60531-8 (online).

Hahn, Jürgen and Wimmer, Raphael (2019) A Prototypical Photo Sorting Study Design for Comparing Interaction Styles. In: Mensch und Computer 2019, 08-11 Sep 2019, Hamburg. (In Press)

Sageder, Julia, Demleitner, Ariane, Irlbacher, Oliver and Wimmer, Raphael (2019) Applying Voting Methods in User Research. In: Mensch und Computer 2019, 08-11 Sep 2019, Hamburg. (In Press)

Schmid, Andreas and Wimmer, Raphael (2019) Sketching with Hardware: A Course for Teaching Interactive Hardware Prototyping to Computer Science Students. In: Mensch und Computer 2019, 08-11 Sep 2019, Hamburg. (In Press)

Wimmer, Raphael and Echtler, Florian (2019) VIGITIA: Unterstützung von alltäglichen Tätigkeiten an Tischen durch Projected AR. In: Mensch und Computer 2019, 08-11 Sep 2019, Hamburg. (In Press)

Putz, Benedikt , Menges, Florian and Pernul, Günther (2019) A secure and auditable logging infrastructure based on a permissioned blockchain. Computers & Security 87.

Schmidt, Thomas (2019) Distant Reading Sentiments and Emotions in Historic German Plays. In: Abstract Booklet, DH_Budapest_2019. Budapest, Hungary, pp. 57-60.

Schmidt, Thomas, Wittmann, Vera and Wolff, Christian (2019) The Influence of Participants' Personality on Quantitative and Qualitative Metrics in Usability Testing. In: Alt, Florian and Bulling, Andreas and Döring, Tanja, (eds.) MuC'19: Proceedings of Mensch und Computer 2019. Association for Computing Machinery, New York, NY, USA, pp. 115-126. ISBN 9781450371988.

Heinrich, Bernd , Hopf, Marcus, Lohninger, Daniel, Schiller, Alexander and Szubartowicz, Michael (2019) Data Quality in Recommender Systems: The Impact of Completeness of Item Content Data on Prediction Accuracy of Recommender Systems. Electronic Markets (EM). Fulltext not available.

Madge, Chris, Bartle, Richard, Chamberlain, Jon, Kruschwitz, Udo and Poesio, Massimo (2019) Making Text Annotation Fun with a Clicker Game. In: FDG '19: The Fourteenth International Conference on the Foundations of Digital Games, August, 2019, San Luis Obispo, California, USA. Fulltext not available.

Steinhauser, Stefanie (2019) Network-Based Business Models, the Institutional Environment, and the Diffusion of Digital Innovations: Case Studies of Telemedicine Networks in Germany. Schmalenbach Business Review 71(3), pp. 343-383. Fulltext not available.

Schmid, Andreas (2019) Entwicklung und Evaluation einer End-User-Programming-Schnittstelle für Sensornetzwerke im Rahmen des Projekts FUSION. Masters, Universität Regensburg.

Hummer, Matthias (2019) Sustainable Identity and Access Management. PhD, Universität Regensburg.

Dietz, Marietheres , Putz, Benedikt and Pernul, Günther (2019) A Distributed Ledger Approach to Digital Twin Secure Data Sharing. In: Foley, Simon N., (ed.) Data and Applications Security and Privacy XXXIII. DBSec 2019. Lecture Notes in Computer Science, 11559. Springer, Cham (Switzerland), pp. 281-300. ISBN 978-3-030-22478-3 (print), 978-3-030-22479-0 (online).

Steinhauser, Stefanie, Doblinger, Claudia and Hüsig, Stefan (2019) Can Incumbents’ Complementary Assets Outbalance the Impact of the Regulatory Framework of Discontinuous Digital Innovations? An Empirical Analysis of Telemedicine Adoption in European Hospitals. In: Annual Conference of the European Group for Organizational Studies (EGOS), 01-06 July 2019, Edinburgh, UK. Fulltext not available.

Schmidt, Thomas and Wolff, Christian (2019) Die Zukunft der Erinnerung. Kooperationsprojekt von Universität Regensburg und KZ-Gedenkstätte Flossenbürg. TRIOLOG. Wissenschaft - Wirtschaft - Gesellschaft in Ostbayern 1 (1), pp. 24-26. Fulltext not available.

Puchta, Alexander, Böhm, Fabian and Pernul, Günther (2019) Contributing to Current Challenges in Identity and Access Management with Visual Analytics. In: Foley, S., (ed.) Data and Applications Security and Privacy XXXIII. DBSec 2019. Lecture Notes in Computer Science, 11559. Springer, Cham, pp. 221-239. ISBN 978-3-030-22479-0 (online), 978-3-030-22478-3 (print). Fulltext not available.

Binder, Markus, Heinrich, Bernd, Klier, Mathias, Obermeier, Andreas and Schiller, Alexander Paul Rudolf (2019) Explaining the stars: Aspect-based sentiment analysis of online customer reviews. In: ECIS 2019, 8.-14. Jun 2019, Stockholm-Uppsala, Sweden. (Submitted)

Schmidt, Thomas and Wolff, Christian (2019) Wissenstransfer: Digitalisierung. Einzigartiges Kooperationsprojekt zu Datenbeständen über NS-Opfer. Blick in die Wissenschaft 28 (39), pp. 38-40.

Wimmer, Raphael , Schmid, Andreas and Bockes, Florian (2019) On the Latency of USB-Connected Input Devices. In: CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems Paper No. 420. ACM, New York, NY, USA, 420:1-420:12. ISBN 978-1-4503-5970-2.

Schmidt, Thomas, Burghardt, Manuel , Dennerlein, Katrin and Wolff, Christian (2019) Sentiment Annotation for Lessing’s Plays: Towards a Language Resource for Sentiment Analysis on German Literary Texts. In: Declerck, Thierry and McCrae, John P., (eds.) LDK-PS 2019, poster session of the 2nd Conference on Language, Data and Knowledge 2019 : Proc. of the Poster Session of the 2nd Conf. on Language, Data and Knowledge,: Leipzig, Germany, May 21, 2019 (LDK-PS 2019). RWTH Aachen, Aachen, pp. 45-50.

Schmidt, Thomas, Burghardt, Manuel and Wolff, Christian (2019) Toward Multimodal Sentiment Analysis of Historic Plays: A Case Study with Text and Audio for Lessing’s Emilia Galotti. In: Navarretta, Costanza and Agirrezabal, Manex and Maegaard, Bente, (eds.) Proceedings of the Digital Humanities in the Nordic Countries 4th Conference, Copenhagen, Denmark, March 5-8, 2019. CEUR Workshop Proceedings. Copenhagen, Denmark, pp. 405-414.

Kunz, Michael, Puchta, Alexander, Groll, Sebastian, Fuchs, Ludwig and Pernul, Günther (2019) Attribute Quality Management for Dynamic Identity and Access Management. Elsevier Journal of Information Security and Applications 44, pp. 64-79.

Schiller, Alexander (2019) Knowledge Discovery from CVs: A Topic Modeling Procedure. In: Internationale Tagung Wirtschaftsinformatik (WI), 23.02. -27.02.2019, Siegen.

Hammerl, Timo, Schwaiger, Josef Michael and Leist, Susanne (2019) Measuring the Success of Social Media: Matching Identified Success Factors to Social Media KPIs. In: Proceedings of the 52nd Annual Hawaii International Conference on System Sciences : January 8-11, 2019, Maui, Hawaii. ScholarSpace, Honolulu, pp. 2427-2436. ISBN 978-0-9981331-2-6.

Tokola, Teemu J., Schaberreiter, Thomas, Quirchmayr, Gerald, Englbrecht, Ludwig , Pernul, Günther, Katsikas, Sokratis K., Preneel, Bart and Tang, Qiang (2019) 20. A Collaborative Cybersecurity Education Program. In: Cybersecurity Education for Awareness and Compliance. IGI Global, Hershey, USA, pp. 181-200. ISBN 9781522578475, 9781522578482. Fulltext not available.

Englbrecht, Ludwig , Meier, Stefan and Pernul, Günther (2019) Toward a Capability Maturity Model for Digital Forensic Readiness. In: Vasant, P., (ed.) Innovative Computing Trends and Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham, pp. 87-97. ISBN 978-3-030-03898-4. Fulltext not available.

Lohmüller, Valentin, Schmaderer, Daniel and Wolff, Christian (2019) A Heuristic Checklist for Second Screen Applications. i-com : journal of interactive media 18 (1), pp. 55-66.

Schneider, Matthias, Bruder, Anna, Necker, Marc, Schluesener, Tim, Henze, Niels and Wolff, Christian (2019) A field study to collect expert knowledge for the development of AR HUD navigation concepts. In: AutomotiveUI '19: 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, September 21 - 25, 2019, Utrecht, Netherlands.

Schneider, Matthias, Bruder, Anna, Necker, Marc, Schluesener, Tim, Henze, Niels and Wolff, Christian (2019) A real-world driving experiment to collect expert knowledge for the design of AR HUD navigation that covers less. In: Mensch und Computer 2019 Workshop on Automotive HMIs: UI Research in the Age of New Digital Realities, 8. bis 11. September 2019, Hamburg. Fulltext restricted.

Gonçalves, Taisa G., Kolski, Christophe, Oliveira, Káthia M. de, Travassos, Guilherme H. and Strugeon, Emmanuelle Grislin-Le (2019) 5. A systematic literature review on intelligent user interfaces: preliminary results. In: Proceedings of the 31st Conference on l'Interaction Homme-Machine: Adjunct. Association for Computing Machinery (ACM), New York,NY,United States. ISBN 978-1-4503-7027-1. Fulltext not available.

Rauchecker, Gerhard and Schryen, Guido (2019) An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response. European Journal of Operational Research.

Schmidt, Thomas, Jakob, Marco and Wolff, Christian (2019) Annotator-Centered Design: Towards a Tool for Sentiment and Emotion Annotation. In: Draude, Claude and Lange, Martin and Sick, Bernhard, (eds.) Informatik 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge). Gesellschaft für Informatik e.V., Bonn, pp. 77-85. ISBN 978-3-88579-689-3.

Lohmüller, Valentin, Eiermann, Philip, Zeitlhöfler, Peter and Wolff, Christian (2019) Attention Guidance in Second Screen Applications. In: Mensch und Computer 2019, 8. bis 11. September 2019, Hamburg, Germany. Fulltext restricted.

Hartl, Philip, Fischer, Thomas, Hilzenthaler, Andreas, Kocur, Martin and Schmidt, Thomas (2019) AudienceAR - Utilising Augmented Reality and Emotion Tracking to Address Fear of Speech. In: Alt, Florian and Bulling, Andreas and Döring, Tanja, (eds.) MuC'19: Proceedings of Mensch und Computer 2019. Association for Computing Machinery, New York, NY, USA, pp. 913-916. ISBN 9781450371988.

Mielke, Bettina and Wolff, Christian (2019) Ein Jahr Visualisierung in der richterlichen Praxis. Justice - Justiz - Giustizia (3). Fulltext not available.

Mielke, Bettina, Walser Kessel, Caroline and Wolff, Christian (2019) Einsatz von Visualisierungen – juristische Berufe im Vergleich. Justice - Justiz - Giustizia 2019 (3). Fulltext not available.

Lamm, Lukas and Wolff, Christian (2019) Exploratory Analysis of the Research Literature on Evaluation of In-Vehicle Systems. In: AutomotiveUI '19: 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, September 21–25, 2019, Utrecht, Netherlands. Fulltext restricted.

Yasasin, Emrah, Prester, Julian, Wagner, Gerit and Schryen, Guido (2019) Forecasting IT Security Vulnerabilities - An Empirical Analysis. Computers & Security. (In Press)

Böhm, Victoria, Schlögl, Stephan, Volkmann, Torben and Wolff, Christian (2019) Human-Computer Interaction and Aging. In: Wolf, Katrin and Steinicke, Frank and Völkel, Sarah Theres, (eds.) Mensch und Computer 2019 : Neue Digitale Realitäten - Workshopband. Gesellschaft für Informatik, Hamburg, pp. 276-277. Fulltext restricted.

Wolff, Christian (2019) Informations- und Datenkompetenz: Gemeinsamkeiten, Unterschiede, Entwicklungstendenzen. In: Fühles-Ubach, Simone and Georgy, Ursula, (eds.) Bibliotheksentwicklung im Netzwerk von Menschen, Informationstechnologie und Nachhaltigkeit: Festschrift für Achim Oßwald. Bock + Herchen, Bad Honnef, pp. 221-235. ISBN 978-3-88347-311-6.

Schmidt, Thomas, Winterl, Brigitte, Maul, Milena, Schark, Alina, Vlad, Andrea and Wolff, Christian (2019) Inter-Rater Agreement and Usability: A Comparative Evaluation of Annotation Tools for Sentiment Annotation. In: Draude, Claude and Lange, Martin and Sick, Bernhard, (eds.) Informatik 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge). Gesellschaft für Informatik e.V., Bonn, pp. 121-133. ISBN 978-3-88579-689-3.

Schmidt, Thomas, Burghardt, Manuel , Dennerlein, Katrin and Wolff, Christian (2019) Katharsis – A Tool for Computational Drametrics. In: Book of Abstracts, Digital Humanities Conference 2019 (DH 2019). Utrecht, Netherlands.

Schmargendorf, Maike, Schuller, Hans-Martin, Dengler, Daniel, Mielke, Bettina and Wolff, Christian (2019) Legal Tech in der Praxis: Entwicklung eines Vertragsgenerators. In: Schweighofer, Erich and Kummer, Franz and Saarenpää, Ahti, (eds.) Internet of things : Tagungsband des 22. Internationalen Rechtsinformatik Symposions = IRIS 2019 : proceedings of the 22nd International Legal Infomatics Symposium. Edition Weblaw. 2, Colloquium, 26. Editions Weblaw, Bern, pp. 289-298. ISBN 978-3-96443-724-2. Fulltext restricted.

Mielke, Bettina, Walser Kessel, Caroline and Wolff, Christian (2019) Rechtsvisualisierung in der juristischen Arbeitspraxis – eine empirische Studie. In: Schweighofer, Erich and Kummer, Franz and Saarenpää, Ahti, (eds.) Internet of things : Tagungsband des 22. Internationalen Rechtsinformatik Symposions = IRIS 2019 : proceedings of the 22nd International Legal Infomatics Symposium. Edition Weblaw. 2, Colloquium, 26. Editions Weblaw, Bern, pp. 545-552. ISBN 978-3-96443-724-2.

Ortloff, Anna-Marie, Güntner, Lydia, Windl, Maximiliane, Schmidt, Thomas, Kocur, Martin and Wolff, Christian (2019) SentiBooks: Enhancing Audiobooks via Affective Computing and Smart Light Bulbs. In: Alt, Florian and Bulling, Andreas and Döring, Tanja, (eds.) MuC'19: Proceedings of Mensch und Computer 2019. Association for Computing Machinery, New York, NY, USA, pp. 863-866. ISBN 9781450371988.

Mielke, Bettina and Wolff, Christian (2019) Smart Contracts und das Internet of Things. Aktuelle Entwicklungen, rechtliche und technische Perspektiven. In: Schweighofer, Erich and Kummer, Franz and Saarenpää, Ahti, (eds.) Internet of things : Tagungsband des 22. Internationalen Rechtsinformatik Symposions = IRIS 2019 : proceedings of the 22nd International Legal Infomatics Symposium. Edition Weblaw. 2, Colloquium, 26. Editions Weblaw, Bern, pp. 255-264. ISBN 978-3-96443-724-2.

Auer, Anna-Maria, Berteloot, Pascale, Mielke, Bettina, Schikora, Christine, Schmidt, Thomas and Wolff, Christian (2019) Stilometrie in der Rechtslinguistik. Nutzung korpuslinguistischer Verfahren für die Analyse deutschsprachiger Urteile. In: Schweighofer, Erich and Kummer, Franz and Saarenpää, Ahti, (eds.) IRIS 2019 - Proceedings of the 22nd International Legal Informatics Symposium = Internet of things : Tagungsband des 22. Internationalen Rechtsinformatik Symposions. Editions Weblaw, Bern, pp. 375-385. ISBN 978-3-96443-724-2.

Halbhuber, David, Fehle, Jakob, Kalus, Alexander, Seitz, Konstantin, Kocur, Martin, Schmidt, Thomas and Wolff, Christian (2019) The Mood Game - How to use the player’s affective state in a shoot’em up avoiding frustration and boredom. In: Alt, Florian and Bulling, Andreas and Döring, Tanja, (eds.) MuC'19: Proceedings of Mensch und Computer 2019. Association for Computing Machinery, New York, NY, USA, pp. 867-870. ISBN 9781450371988.

Mielke, Bettina, Walser Kessel, Caroline and Wolff, Christian (2019) The Use of Legal Visualization by Legal Professionals. In: XXXVIth International Congress on Law and Mental Health, July 21, 2019 - July 26, 2019, Rom. Fulltext not available.

Lohmüller, Valentin and Wolff, Christian (2019) Towards a Comprehensive Definition of Second Screen. In: Mensch und Computer 2019, 08. -11. Sep 2019, Hamburg. Fulltext restricted.

Ortloff, Anna-Marie, Windl, Maximiliane, Güntner, Lydia and Schmidt, Thomas (2019) Towards a Graphical User Interface for Quantitative Analysis in Digital Musicology. In: Wolf, Katrin and Steinicke, Frank and Völkel, Sarah, (eds.) Mensch und Computer 2019 - Workshopband. Gesellschaft für Informatik e.V., Bonn, pp. 535-538.

Menges, Florian , Sperl, Christine and Pernul, Günther (2019) Unifying Cyber Threat Intelligence. In: Trust, Privacy and Security in Digital Business.

Reuter, Rebecca, Hauser, Florian, Muckelbauer, Daniel, Stark, Theresa, Antoni, Erika, Mottok, Jürgen and Wolff, Christian (2019) Using Augmented Reality in Software Engineering Education? First insights to a Comparative Study of 2D and AR UML Modeling. In: 52nd Hawaii International Conference on System Sciences, HICSS 2019, January 8-11, 2019, Grand Wailea, Maui, Hawaii, USA.

Rauchecker, Gerhard and Schryen, Guido (2019) Using high performance computing for unrelated parallel machine scheduling with sequence-dependent setup times: Development and computational evaluation of a parallel branch-and-price algorithm. Computers & Operations Research 104, pp. 338-357. Fulltext not available.

Bader, Patrick, Voit, Alexandra , Le, Huy Viet, Woźniak, Paweł W. , Henze, Niels and Schmidt, Albrecht (2019) WindowWall. ACM Transactions on Computer-Human Interaction 26 (2), pp. 1-42. Fulltext not available.

Lankes, Michael, Haslinger, Andreas and Wolff, Christian (2019) gEYEded: Subtle and Challenging Gaze-Based Player Guidance in Exploration Games. Multimodal Technologies and Interaction 3, p. 61.

Böhm, Fabian , Menges, Florian and Pernul, Günther (2018) Graph-based visual analytics for cyber threat intelligence. Cybersecurity 1 (1), pp. 1-16.

Bärwald, Andreas (2018) Sichere Werkzeugketten und werkzeugunterstütztes Assessment - Verwendung komplexer Werkzeugketten für die Entwicklung und Bewertung sicherheitsrelevanter Software. PhD, Universität Regensburg.

Yasasin, Emrah (2018) Decision Problems in Information Security: Methodologies and Quantitative Models. PhD, Universität Regensburg.

Bartel, Alexander (2018) Konzeption und Entwicklung eines DSM-basierten Gamification Authoring Systems zur Unterstützung hochschulischer Lehre. PhD, Universität Regensburg.

Vielberth, Manfred and Pernul, Günther (2018) A Security Information and Event Management Pattern. In: 12th Latin American Conference on Pattern Languages of Programs (SLPLoP), 20.-23. Nov. 2018, Valparaiso, Chile.

Roth, Christian and Kesdogan, Dogan (2018) A Privacy Enhanced Crowdsourcing Architecture for Road Information Mining Using Smartphones. IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA), pp. 17-24. Fulltext not available.

Nitschke, Mirja , Holler, Philipp , Hartmann, Lukas and Kesdogan, Dogan (2018) 3. MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix Zones. In: Gruschka, Nils, (ed.) Secure IT Systems. NordSec 2018. Lecture Notes in Computer Science, 11252 (3). Springer, Cham, Cham (Switzerland), pp. 38-53. ISBN 978-3-030-03638-6 (ebook), 978-3-030-03637-9 (print). Fulltext not available.

Richthammer, Christian, Weber, Michael and Pernul, Günther (2018) State of the Art of Reputation-Enhanced Recommender Systems. Web Intelligence 16 (4), pp. 273-286.

Böhm, Fabian, Rakotondravony, Noëlle, Pernul, Günther and Reiser, Hans (2018) Exploring the role of experts' knowledge in visualizations for cyber security. In: IEEE Symposium on Visualization for Cyber Security, 22.10.2018, Berlin.

Schüsselbauer, Dennis, Schmid, Andreas , Wimmer, Raphael and Muth, Laurin (2018) Spatially-Aware Tangibles Using Mouse Sensors. In: Symposium on Spatial User Interaction 2018, October 13-14 2018, Berlin.

Bauer, Christina (2018) Unterstützung der Orientierung im Innenbereich: Analyse landmarkenbasierter Karten-Interfaces anhand des Blickverhaltens der Nutzer. PhD, Universität Regensburg.

Pur, Sabine (2018) Leitfaden „Blockchain in der Praxis – Funktionsweise und Anwendungsfälle“.

Schüsselbauer, Dennis, Schmid, Andreas , Wimmer, Raphael and Muth, Laurin (2018) DotTrack: absolute und relative Ortsbestimmung von Tangibles mittels eines Maussensors. In: Mensch und Computer 2018, 02-05 Sep 2018, Dresden. (Submitted)

Schmidt, Thomas and Burghardt, Manuel (2018) An Evaluation of Lexicon-based Sentiment Analysis Techniques for the Plays of Gotthold Ephraim Lessing. In: Alex, Beatrice, (ed.) Proceedings of the Second Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature, August 25, 2018, Santa Fe, New Mexico, USA. Association for Computational Linguistics, Stroudsburg, PA, pp. 139-149. ISBN 978-1-948087-61-2.

Szubartowicz, Eva (2018) Planning and Evaluation of Information Security Investments. PhD, Universität Regensburg.

Frummet, Alexander (2018) Zur Detektion domänenspezifischer Informationsbedürfnisse im Conversational Search-Diskurs. Masters, Universität Regensburg.

Steinhauser, Stefanie and Dowling, Michael (2018) Antecedents of Incumbents’ Motivation and Ability to Utilize Disruptive Telemedicine Innovations. Academy of Management Proceedings 2018/1, p. 11057. Fulltext not available.

Steinhauser, Stefanie, Doblinger, Claudia, Hüsig, Stefan and Dowling, Michael (2018) Discontinuous Digital Health Innovations: Impact of Complementary Assets and Regulatory Framework. Academy of Management Proceedings 2018/1, p. 11025. Fulltext not available.

Kattenbeck, Markus , Nuhn, Eva and Timpf, Sabine (2018) Is salience robust? A heterogeneity analysis of survey ratings. In: GIScience 2018, 28-31 August, Melbourne, Australien. Fulltext not available.

Schmidt, Thomas, Burghardt, Manuel and Dennerlein, Katrin (2018) Sentiment Annotation of Historic German Plays: An Empirical Study on Annotation Behavior. In: Kübler, Sandra and Zinsmeister, Heike, (eds.) Proceedings of the Workshop on Annotation in Digital Humanities co-located with ESSLLI 2018 (annDH 2018). Sofia, Bulgaria, pp. 47-52.

Kattenbeck, Markus , Jänich, Thomas and Kreuzpointner, Ludwig (2018) 15. Do Spatial Abilities Have an Impact on Route Learning in Hypertexts? In: Creem-Regehr, S. and Schöning, J. and Klippel, A., (eds.) Spatial Cognition XI. Spatial Cognition 2018. Lecture Notes in Computer Science, 11034 (15). Springer, Cham (Switzerland), pp. 211-227. ISBN 978-3-319-96384-6. Fulltext not available.

Johannsen, Florian, Leist, Susanne, Konadl, Daniel and Basche, Michael (2018) Comparison of Commercial Chatbot solutions for Supporting Customer Interaction. In: 26th European Conference on Information Systems (ECIS2018), 23. - 28.06.2018, Portsmouth, United Kingdom. Fulltext restricted.

Schmidt, Thomas and Burghardt, Manuel (2018) Toward a Tool for Sentiment Analysis for German Historic Plays. In: Piotrowski, Michael, (ed.) COMHUM 2018: Book of Abstracts for the Workshop on Computational Methods in the Humanities 2018. Laboratoire laussannois d'informatique et statistique textuelle, Lausanne, Switzerland, pp. 46-48.

Steinhauser, Stefanie (2018) Antecedents of the Utilization of Disruptive Innovations: An Empirical Analysis of Telemedicine Adoption and Usage by European Physicians. In: Annual Conference of the European Health Management Association, 20-22 June 2018, Budapest, Hungary. Fulltext not available.

Suppan, Santiago Reinhard (2018) Data Protection for the Internet of Things. PhD, Universität Regensburg.

Rötting, Mirja (2018) Privatsphäre in 5G-Netzen. In: CAST-Workshop Mobile und Embedded Security, 17.05.2018, Darmstadt, Germany.

Rauchecker, Gerhard and Schryen, Guido (2018) Decision Support for the Optimal Coordination of Spontaneous Volunteers in Disaster Relief. In: 15th International Conference on Information Systems for Crisis Response and Management, 20.-23. Mai 2018, Rochester, NY, USA.

Steinhauser, Stefanie (2018) Disruptive Technologies in Health Care: The Significance of Digital Innovations for POCT. In: Molecular Diagnostics Europe Summit, 22-24 May 2018, Lisbon, Portugal. Fulltext not available.

Menges, Florian, Böhm, Fabian, Vielberth, Manfred, Puchta, Alexander, Taubmann, Benjamin, Rakotondravony, Noëlle and Latzo, Tobias (2018) Introducing DINGfest: An architecture for next generation SIEM systems. In: SICHERHEIT 2018, 25.4.2018-27.4.2018, Konstanz, DE.

Heckner, Markus, Bazo, Alexander, Wolff, Christian and Scherzinger, Stefanie (2018) Karel relearns C. Teaching good software engineering practices in CS1 with Karel the Robot. IEEE Xplore, pp. 1447-1454. Fulltext not available.

Kattenbeck, Markus and Elsweiler, David (2018) Estimating Models Combining Latent and Measured Variables: A Tutorial on Basics, Applications and Current Developments in Structural Equation Models and Their Estimation Using PLS Path Modeling. In: Proceedings of the 2018 Conference on Human Information Interaction & Retrieval, New Brunswick, NJ, USA. Fulltext not available.

Moll, Anton G. (2018) Semi-supervised Classification of Breast Cancer Expression Profiles Using Neural Networks. PhD, Universität Regensburg.

Wimmer, Raphael and Hahn, Jürgen (2018) A Concept for Sketchable Workspaces and Workflows. In: Workshop "Rethinking Interaction" in Conjunction with CHI 2018, 21.4.2018 - 26.4.2018, Montreal, Canada.

Schmidt, Thomas, Burghardt, Manuel and Dennerlein, Katrin (2018) „Kann man denn auch nicht lachend sehr ernsthaft sein?" – Zum Einsatz von Sentiment Analyse-Verfahren für die quantitative Untersuchung von Lessings Dramen. In: Vogeler, Georg, (ed.) Kritik der digitalen Vernunft. Abstracts zur Jahrestagung des Verbandes Digital Humanities im deutschsprachigen Raum, 26.02. - 02.03.2018 an der Universität zu Köln. Universitäts- und Stadtbibliothek Köln, Köln, pp. 244-249. ISBN 978-3-946275-02-2.

Ullmann, Manuel, Bauer, Christina, Jackermeier, Robert and Ludwig, Bernd (2018) Ain’t short sweet, when walking down that street? In: Adjunct Proceedings of the 14th International Conference on Location Based Services, 15-17 January 2018, Zurich, Switzerland. Fulltext not available.

Bockes, Florian, Wimmer, Raphael and Schmid, Andreas (2018) LagBox – Measuring the Latency of USB-Connected Input Devices. In: CHI 2018, 21.4.2018 - 26.4.2018, Montreal, Canada. (Submitted)

Szubartowicz, Eva and Schryen, Guido (2018) Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements. Working Paper. (Submitted)

Hahn, Jürgen, Ludwig, Bernd and Wolff, Christian (2018) Mixed Reality-based Process Control of Automatic Printed Circuit Board Assembly Lines. In: CHI 2018, 21.4.2018 - 26.4.2018, Montreal, Canada.

Johannsen, Florian (2018) Prozessorientiertes Qualitätsmanagement in Zeiten der Digitalisierung: Forschungs-­ und Entwicklungsarbeiten am Lehrstuhl für Business Engineering an der Universität Regensburg. Blick in die Wissenschaft (35/36), pp. 52-57. (In Press) Fulltext not available.

Mielke, Bettina and Wolff, Christian (2018) "Klar ist der Aether und doch von unergründlicher Tiefe" – Smart Contracts als interdisziplinäres Problem. In: Schweighofer, Erich and Kummer, Franz and Saarenpää, Ahti and Schafer, Burghardt, (eds.) Datenschutz/LegalTech: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018 = Data protection/LegalTech. Edition Weblaw : 2, Colloquium, 24. Editions Weblaw, Bern, pp. 139-148. ISBN 978-3-906940-21-2.

Schmargendorf, Maike, Schuller, Hans-Martin, Böhm, Patricia, Isemann, Daniel and Wolff, Christian (2018) Autonomous Driving and the Elderly: Perceived Risks and Benefits. In: Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden.

Dietz, Marietheres and Pernul, Günther (2018) Big Log Data Stream Processing: Adapting an Anomaly Detection Technique. In: Hartmann, S. and Hameurlain, A. and Pernul, Günther and Wagner, R., (eds.) Database and Expert Systems Applications. DEXA 2018. Lecture Notes in Computer Science, 11030. Springer, Cham, 159^166. ISBN 978-3-319-98811-5 (print), 978-3-319-98812-2 (ebook). Fulltext not available.

Hartmann, Lukas (2018) Bounded Privacy: Formalising the Trade-Off Between Privacy and Quality of Service. In: Langweg, Hanno and Meier, Michael and Witt, Bernhard and Reinhardt, Delphine, (eds.) SICHERHEIT 2018. Lecture Notes in Informatics (LNI) - Proceedings, P-281. Gesellschaft für Informatik, Bonn, pp. 267-272. ISBN 978-3-88579-675-6.

Berteloot, Pascale, Mielke, Bettina and Wolff, Christian (2018) Deutsches, österreichisches, europäisches Deutsch? Deutschsprachige Fassungen von Urteilen des europäischen Gerichtshofs im Vergleich. In: Schweighofer, Erich and Kummer, Franz and Saarenpää, Ahti and Schafer, Burghardt, (eds.) Datenschutz/LegalTech: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018 = Data protection/LegalTech. Edition Weblaw : 2, Colloquium, 24. Editions Weblaw, Bern, pp. 319-324. ISBN 978-3-906940-21-2.

Burghardt, Manuel , Isemann, Daniel, Kattenbeck, Markus , Ludwig, Bernd and Wolff, Christian (2018) Digital Humanities an der Universität Regensburg. Geschichte - Projekte - Studiengang. In: Klinke, Harald, (ed.) #DigiCampus. Digitale Forschung und Lehre in den Geisteswissenschaften. open publishing LMU - Universitätsbibliothek der Ludwig-Maximilians-Universität, München, pp. 115-128. ISBN 978-3-95925-056-6, 978-3-95925-055-9.

Schnurr, Daniel, Herrmann, Dominik, Méndez, Daniel, Passoth, Jan-H., Uhl, Matthias and Wimmer, Raphael (2018) Digital Society: Culture and Policies - Positionspapier. ZD.B Jahresbericht, pp. 42-44.

Wimmer, Raphael (2018) Digitales Papier. Blick in die Wissenschaft 38, pp. 22-25.

Bartel, Alexander, Hagel, Georg and Wolff, Christian (2018) Emendo–A Toolchain for Creating Gamified Learning Arrangements for Online Learning Settings. In: 4th International Conference on Higher Education Advances (HEAd' 18), June 20 – 22, 2018, Valencia, Spain. Fulltext not available.

Jackermeier, Robert and Ludwig, Bernd (2018) Exploring the limits of PDR-based indoor localisation systems under realistic conditions. Journal of Location Based Services 12 (3-4), pp. 231-272.

Wimmer, Raphael (2018) Files as Directories: Some Thoughts on Accessing Structured Data within Files. In: Marr, Stefan and Sartor, Jennifer B., (eds.) Conference Companion of the 2nd International Conference on Art, Science, and Engineering of Programming (Programming'18 Companion). ACM-ICPS International Conference Proceeding Series, 2. Association for Computing Machinery (ACM), New York, N.Y., pp. 166-170. ISBN 978-1-4503-5513-1.

Yasasin, Emrah, Prester, Julian, Wagner, Gerit and Schryen, Guido (2018) Forecasting IT Security Vulnerabilities - An Empirical Analysis. Working Paper. (Submitted)

Kautetzky, Maximilian, Schwarz, Tobias and Wolff, Christian (2018) Gestaltung von In-Car Multi-Device Cross-Platform Umgebungen. In: Mensch und Computer 2018 - Tagungsband, 02.–05. September 2018, Dresden.

Schmidt, Thomas, Burghardt, Manuel and Wolff, Christian (2018) Herausforderungen für Sentiment Analysis-Verfahren bei literarischen Texten. In: Burghardt, Manuel and Müller-Birn, Claudia, (eds.) INF-DH-Workshop 2018 – Im Spannungsfeld zwischen Tool-Building und Forschung auf Augenhöhe. Gesellschaft für Informatik e.V., Bonn.

Lohmüller, Valentin, Schmaderer, Daniel and Wolff, Christian (2018) Heuristiken für Second-Screen-Anwendungen. In: Mensch und Computer 2018 - Tagungsband, 02.–05. September 2018, Dresden.

Weishäupl, Eva, Yasasin, Emrah and Schryen, Guido (2018) Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning. Computers & Security. (In Press)

Burghardt, Manuel and Wimmer, Raphael and Wolff, Christian and Womser-Hacker, Christa, eds. (2018) Mensch und Computer 2017 - Tagungsband. Spielend einfach interagieren. Books on Demand, Norderstedt. ISBN 978-3-7460-8233-2. Fulltext not available.

Dowling, Michael and Steinhauser, Stefanie (2018) Opt-in oder Opt-out? Choice Architecture bei der Implementierung der elektronischen Gesundheitskarte. In: Rückert, M. T. L. and Pförringer, D., (eds.) Bei bester Gesundheit? Deutschlands E-Health im Check-up - Zukunftsplattform Bayern: Digitales Gesundheitswesen 2020. Argumente und Materialien zum Zeitgeschehen (AMZ), 109. Hanns-Seidel-Stiftung e.V., München, pp. 77-79. ISBN 978-3-88795-552-6. Fulltext not available.

Böhm, Patricia, Hansbauer, Andrea, Schmidt, Thomas and Wolff, Christian (2018) Subjektive Komplexität und Usability bei Webshops. In: Dachselt, Raimund and Weber, Gerhard, (eds.) Mensch und Computer 2018 - Tagungsband. Gesellschaft für Informatik e.V., Bonn, pp. 267-271.

Mielke, Bettina and Wolff, Christian (2018) Tagebuchstudie zum Einsatz von Visualisierungen in der richterlichen Praxis. In: Schweighofer, Erich and Kummer, Franz and Saarenpää, Ahti and Schafer, Burghard, (eds.) Datenschutz/LegalTech: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018 = Data protection/LegalTech. Edition Weblaw : 2, Colloquium, 24. Editions Weblaw, Bern, pp. 469-476. ISBN 978-3-906940-21-2.

Jackermeier, Robert and Ludwig, Bernd (2018) Task-Oriented Evaluation of Indoor Positioning Systems. In: Kiefer, P. and Huang, H, and Van de Weghe, N. and Raubal, M., (eds.) Progress in Location Based Services 2018. LBS 2018. Lecture Notes in Geoinformation and Cartography. Springer, Cham, pp. 25-47. ISBN 978-3-319-71469-1.

Schmidt, Thomas and Wolff, Christian (2018) The Influence of User Interface Attributes on Aesthetics. i-com 17 (1), pp. 41-55.

Nuss, Martin, Puchta, Alexander and Kunz, Michael (2018) Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises. In: Furnell, S. and Mouratidis, H. and Pernul, Günther, (eds.) Trust, Privacy and Security in Digital Business. TrustBus 2018. Lecture Notes in Computer Science, 11033. Springer, Cham (Switzerland), pp. 167-181.

Böhm, Patricia, Langer, Andrea and Wolff, Christian (2018) Validierung von Web-Usability-Heuristiken für eine ältere Zielgruppe. In: Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden.

Mielke, Bettina, Walser Kessel, Caroline and Wolff, Christian (2018) Visualisierung in der richterlichen Praxis – eine Umfrage bei Schweizer Richterinnen und Richtern. In: Schweighofer, Erich and Kummer, Franz and Saarenpää, Ahti and Schafer, Burghardt, (eds.) Datenschutz/LegalTech: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018 = Data protection/LegalTech. Edition Weblaw : 2, Colloquium, 24. Editions Weblaw, Bern, pp. 461-468. ISBN 978-3-906940-21-2.

Mielke, Bettina, Walser Kessel, Caroline and Wolff, Christian (2018) Visualisierungen und deren Verwendung in der Schweizer Justiz. Justice - Justiz - Giustizia 2018 (2). Fulltext not available.

Hartmann, Lukas, Marx, Matthias and Schedel, Eva (2018) Wie vertrauenswürdig können ISPs sein? In: Roßnagel, Alexander and Friedewald, Michael and Hansen, Marit, (eds.) Die Fortentwicklung des Datenschutzes: Zwischen Systemgestaltung und Selbstregulierung. Springer Fachmedien, Wiesbaden, pp. 225-247. ISBN 978-3-658-23727-1. Fulltext not available.

Pernul, Günther and Schryen, Guido and Schillinger, Rolf, eds. (2017) Security in Highly Connected IT Systems: Results of the Bavarian Research Alliance FORSEC. Universität Regensburg, Regensburg. ISBN 978-3-88246-374-3.

Hartmann, Lukas, Marx, Matthias, Schedel, Eva, Roth, Christian and Kesdogan, Dogan (2017) Can the ISP be trusted? In: Forum Privatheit: Die Fortentwicklung des Datenschutzes, 02.-03. Nov. 2017, Berlin. Fulltext not available.

Schryen, Guido and Hristova, Diana (2017) High-Performance Business Computing – Effizienzsteigerung durch Parallelisierung. Smart Data Radar (Deutsche Bank). (In Press) Fulltext not available.

Roth, Christian, Hartmann, Lukas and Kesdogan, Dogan (2017) PARTS – Privacy-Aware Routing with Transportation Subgraphs. In: Lipmaa, Helger and Mitrokotsa, Aikaterini and Matulevičius, Raimundas, (eds.) Secure IT Systems (NordSec 2017). Lecture Notes in Computer Science, 10674. Springer, Cham (Switzerland), pp. 86-101. ISBN 978-3-319-70290-2 (online), 978-3-319-70289-6 (print).

Wimmer, Raphael (2017) Some Thoughts on Ergonomic, Practical, and Economic Properties of Interactive Tabletops. In: Workshop "The Disappearing Tabletop" at ISS 2017, 17 Oct 2017, Brighton, UK.

Schmidt, Thomas (2017) „Gefühl ist alles; Name ist Schall und Rauch.“ Der Einsatz von Sentiment Analysis in der quantitativen Dramenanalyse. Masters, Universität Regensburg.

Al-Subari, Karema S. A. (2017) A Study of Biomedical Time Series Using Empirical Mode Decomposition : Extracting event-related modes from EEG signals recorded
during visual processing of contour stimuli.
PhD, Universität Regensburg.

Lechler, David and Burghardt, Manuel (2017) User Experience Mining auf Basis von Online-Produktbewertungen. In: Mensch und Computer 2017, Tagungsband. Gesellschaft für Informatik, Regensburg, pp. 49-60.

Schmidt, Thomas and Wolff, Christian (2017) Der Einfluss von User Interface-Attributen auf die Ästhetik. In: Burghardt, Manuel and Wimmer, Raphael and Wolff, Christian and Womser-Hacker, Christa, (eds.) Mensch und Computer 2017 - Tagungsband. Gesellschaft für Informatik e.V., Regensburg, pp. 61-72. ISBN 3746082102, 9783746082103.

Trattner, Christoph , Parra, Denis and Elsweiler, David (2017) Monitoring obesity prevalence in the United States through bookmarking activities in online food portals. PLoS ONE 12 (6), e0179144.

Weishäupl, Eva (2017) Towards a Multi-objective Optimization Model to Support Information Security Investment Decision-making. In: SHCIS’17, June 21-22, 2017, Neuchâtel, Switzerland.

Schwaiger, Josef Michael, Lang, Markus, Johannsen, Florian and Leist, Susanne (2017) "What does the customer want to tell us?" - An automated classification approach for social media posts at SMEs. In: 25th European Conference on Informations Systems (ECIS), June 5-10, 2017, Guimaraes/Portugal.

Mielke, Bettina and Wolff, Christian (2017) E-Justice, Justiz 3.0 und Legal Tech – eine Analyse. Jusletter IT. Fulltext not available.

Grosse-Puppendahl, Tobias, Holz, Christian, Cohn, Gabe A., Wimmer, Raphael , Bechtold, Oskar, Hodges, Steve, Reynolds, Matthew S. and Smith, Joshua R. (2017) Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction. In: CHI'17 : Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems, May 6-11, 2017, Denver, CO, USA. ACM, New York, NY, USA. ISBN 978-1-4503-4655-9.

Huber, Stephan (2017) EXPY: Stata module to calculate the EXPY-index as proposed by Hausmann et al. (2007). [Software] Fulltext not available.

Huber, Stephan (2017) PRODY: Stata module to calculate factor intensity and sophistication indicators. [Software] Fulltext not available.

Aziz, Haris, Rauchecker, Gerhard, Schryen, Guido and Walsh, Toby (2017) Algorithms for Max-Min Share Fair Allocation of Indivisible Chores. In: Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17), 4-9 February 2017, San Francisco.

Richthammer, Christian and Pernul, Günther (2017) Explorative Analysis of Recommendations Through Interactive Visualization. In: Bridge, Derek and Stuckenschmidt, Heiner, (eds.) E-Commerce and Web Technologies, EC-Web 2016, Revised Selected Papers. Lecture Notes in Business Information Processing, 278. Springer, Cham, pp. 46-57.

Goldhacker, Markus (2017) Frequency-resolved dynamic functional connectivity and scale stability of connectivity-states. PhD, Universität Regensburg.

Meier, Stefan (2017) Digitale Forensik in Unternehmen. PhD, Universität Regensburg.

Mielke, Bettina, Walser-Kessel, Caroline and Wolff, Christian (2017) 20 Jahre Rechtsvisualisierung – Bestandsaufnahme und Storytelling. In: Schweighofer, Erich and Kummer, Franz and Hötzendorfer, Walter and Sorge, Christoph, (eds.) Trends und Communities der Rechtsinformatik : trends and communities of legal informatics : Tagungsband des 20. Internationalen Rechtsinformatik Symposions IRIS 2017 : 23. bis 25. Februar 2017, Universität Salzburg. books@ocg.at, 326. Österreichische Computer-Gesellschaft (ÖCG), Wien, pp. 377-386. ISBN 978-3-903035-15-7.

Scholz, Michael, Dorner, Verena, Schryen, Guido and Benlian, Alexander (2017) A configuration-based recommender system for supporting e-commerce decisions. European Journal of Operational Research. (In Press)

Burghardt, Manuel and Spanner, S. (2017) Allegro: User-centered Design of a Tool for the Crowdsourced Transcription of Handwritten Music Scores. In: Proceedings of the DATeCH (Digital Access to Textual Cultural Heritage) conference. ACM. (In Press) Fulltext not available.

Burghardt, Manuel , Hafner, Katharina, Edel, Laura, Kenaan, Sabrin-Leila and Wolff, Christian (2017) An Information System for the Analysis of Color Distributions in MovieBarcodes. In: Gäde, Maria, (ed.) Everything changes, everything stays the same? Understanding information spaces : Proc.15th Int. Symp. of Information Science (ISI 2017), Berlin, Germany, 13th-15th March 2017. Schriften zur Informationswissenschaft, 70. Verlag Werner Hülsbusch, Glückstadt, pp. 356-358. ISBN 978-3-86488-117-6.

Bartmann, Dieter (2017) Biometrisches Onlinebanking und Internet-Payment. In: Niehoff, Wilhelm and Hirschmann, Stefan, (eds.) Aspekte der Digitalisierung in Banken. Bank-Verlag, Köln, pp. 127-136. ISBN 978-3-86556-484-9. Fulltext not available.

Rakotondravony, Noëlle, Taubmann, Benjamin, Mandarawi, Waseem, Weishäupl, Eva, Xu, Peng, Kolosnjaji, Bojan, Protsenko, Mykolai, de Meer, Hermann and Reiser, Hans (2017) Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing 6 (26).

Meier, Eva-Maria, Böhm, Patricia and Wolff, Christian (2017) Comparing Heuristic Walkthrough and User Studies in Evaluating Digital Appliances. In: Gäde, Maria and Trkulja, Violeta and Petras, Vivien, (eds.) Everything Changes, Everything Stays the Same? Understanding Information Spaces. Proceedings of the 15th International Symposium of Information Science (ISI 2017). Schriften zur Informationswissenschaft, 70. Verlag Werner Hülsbusch, Glücksburg, pp. 146-157. ISBN 978-3-86488-117-6. Fulltext restricted.

Burghardt, Manuel, Spanner, Sebastian, Schmidt, Thomas, Fuchs, Florian, Buchhop, Katia, Nickl, Miriam and Wolff, Christian (2017) Digitale Erschließung einer Sammlung von Volksliedern aus dem deutschsprachigen Raum. In: 4. Jahrestagung der DHd 2017, Digitale Nachhaltigkeit, Konferenzabstracts, Univ. Bern 13.-18. Feb. 2017.

Bartel, Alexander, Soska, Alexander, Wolff, Christian , Hagel, Georg and Mottok, Jürgen (2017) Entwicklung eines Manifests für spielifizierte Hochschullehre. In: Mensch und Computer 2017 - Spielend einfach interagieren, 10. bis 13. September 2017, Regensburg, Universität.

Burghardt, Manuel and Lamm, Lukas (2017) Entwicklung eines Music Information Retrieval-Tools zur Melodic Similarity-Analyse deutschsprachiger Volkslieder. Lecture Notes in Informatics (LNI) 2017, pp. 87-99.

Wolff, Christian (2017) Informationskompetenz und Informationsverhalten - zwei Seiten einer Medaille. In: Schüller-Zwierlein, André, (ed.) Informationskompetenz, Informationsverhalten, Informationsverarbeitung. Universitätsbibliothek Regensburg, Regensburg, pp. 11-31. ISBN 978-3-88246-376-7. Fulltext not available.

Richthammer, Christian, Sänger, Johannes and Pernul, Günther (2017) Interactive Visualization of Recommender Systems Data. In: 4th Workshop on Security in Highly Connected IT Systems (SHCIS), Neuchâtel, Switzerland.

Schryen, Guido , Benlian, Alexander , Rowe, Frantz, Shirley, Gregor , Larsen, Kai , Petter, Stacie, Paré, Guy , Wagner, Gerit , Haag, Steffi and Yasasin, Emrah (2017) Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields? Communications of the AIS. (In Press) Fulltext not available.

Aigner, Johannes, Duchardt, Amelie, Kersting, Thiemo, Kattenbeck, Markus and Elsweiler, David (2017) Manipulating the Perception of Credibility in Refugee Related Social Media Posts. In: The ACM SIGIR Conference on Human Information Interaction & Retrieval (CHIIR), March 7-11, Oslo.

Bartel, Alexander, Hagel, Georg and Wolff, Christian (2017) On the Effective Integration of Gamification and Learning Management Systems for Creating Gamified Learning Arrangements - From Theory Into Practice. In: 3rd International Conference on Higher Education Advances (HEAd' 17), June 21 – 23, 2017, Valencia, Spain. Fulltext not available.

Döhling, Lars, Burghardt, Manuel and Wolff, Christian (2017) PaLaFra – Entwicklung einer Annotationsumgebung für ein diachrones Korpus spätlateinischer und altfranzösischer Texte. In: 4. Jahrestagung der DHd 2017, Digitale Nachhaltigkeit, Konferenzabstracts, Univ. Bern 13.-18. Feb. 2017.

Soska, Alexander, Mottok, Jürgen and Wolff, Christian (2017) Pattern oriented card game development: SOFTTY - A card game for academic learning of software testing. In: 2017 IEEE Global Engineering Education Conference (EDUCON), 25. - 28. April 2017, Athens, Greece. Fulltext restricted.

Richthammer, Christian, Weber, Michael and Pernul, Günther (2017) Reputation-Enhanced Recommender Systems (Best Paper Award). In: Steghöfer, Jan-Philipp and Esfandiari, Babak, (eds.) Trust Management XI. IFIPTM 2017. IFIP Advances in Information and Communication Technology, 505. Springer, Cham (Switzerland), pp. 163-179. ISBN 978-3-319-59170-4 (print), 978-3-319-59171-1 (online).

Rauch, Wolf, Kuhlen, Rainer, Stock, Wolfgang G., Wolff, Christian , Womser-Hacker, Christa and Schlögl, Christian (2017) Significance and Relevance of Information Science in German-Language Countries. In: 15th International Symposium of Information Science, ISI 2017, March 13-15, 2017, Berlin, Germany. Fulltext restricted.

Hastreiter, Isabella, Heckner, Markus, Wilhelm, Thomas and Wolff, Christian (2017) Software und Usability Engineering und User Experience in kleinen und mittleren Unternehmen. In: Mensch und Computer 2017 - Spielend einfach interagieren, 10. bis 13. September 2017, Regensburg, Universität.

Wolff, Christian (2017) Tagungsbericht Mensch und Computer 2017, Regensburg. i-com 16 (3), pp. 275-277. Fulltext not available.

Mielke, Bettina and Wolff, Christian (2017) Trend Mining IRIS: 20 Jahre Entwicklung der Rechtsinformatik. In: Schweighofer, Erich and Kummer, Franz and Hötzendorfer, Walter and Sorge, Christoph, (eds.) Trends und Communities der Rechtsinformatik : trends and communities of legal informatics : Tagungsband des 20. Internationalen Rechtsinformatik Symposions IRIS 2017 : 23. bis 25. Februar 2017, Universität Salzburg. books@ocg.at, 326. Österreichische Computer-Gesellschaft (ÖCG), Wien, pp. 199-208. ISBN 978-3-903035-15-7.

Wolff, Christian (2017) Virales Marketing in den sozialen Medien. Videokampagnen mit Bezug zu Ernährung und Nahrungsmitteln als Beispiel. Mitteilungen des RVW 5, pp. 154-163. Fulltext not available.

Bartel, Alexander, Hagel, Georg and Wolff, Christian (2017) Work In Progress: Towards a Generic Platform for Implementing Gamified Learning Arrangements in Engineering Education. In: 2017 IEEE Global Engineering Education Conference (EDUCON 2017), 25. - 28. April 2017, Athen. Fulltext not available.

Burghardt, Manuel and Wimmer, Raphael and Wolff, Christian and Womser-Hacker, Christa, eds. (2017) Workshopband Mensch und Computer 2017 - Spielend einfach interagieren. Gesellschaft für Informatik e. V., Regensburg. Fulltext not available.

Hastreiter, Isabella, Wilhelm, Thomas and Wolff, Christian (2017) Zwischen Aufgabenangemessenheit und Standardisierung: Eine Branchenlösung für Gastspieltheater. In: Mensch und Computer 2017 - Spielend einfach interagieren, 10. bis 13. September 2017, Regensburg, Universität.

Stephan, Veit (2016) Mock-up Entwicklung von Food Environment Maps mit multiparametrischen, relationalen Daten. Project Report. (Unpublished)

Stephan, Veit (2016) Prototypengetriebene Evaluation von Visualisierungsmethoden bei kontexbezogenen Location Based Applications. Project Report. (Unpublished)

Wagner, Gerit , Prester, Julian , Roche, Maria, Benlian, Alexander and Schryen, Guido (2016) Factors Affecting the Scientific Impact of Literature Reviews: A Scientometric Study. In: International Conference on Information Systems, 11.-14. Dez. 2016, Dublin.

Bauer, Andreas (2016) Information filtering in high velocity text streams using limited memory - An event-driven approach to text stream analysis. PhD, Universität Regensburg.

Karataş, Harun Fatih (2016) Interdependent Security and Compliance in Service Selection. PhD, Universität Regensburg.

Masur, Oliver (2016) A fragment-based embedded approach for periodic systems and enhanced weak-pair treatment of molecular LCCSD, both based on direct-local-ring-CCD. PhD, Universität Regensburg.

Rauchecker, Gerhard and Schryen, Guido (2016) Projekt KUBAS: Koordination ungebundener Vor-Ort-Helfer. Im Einsatz 23, pp. 44-46.

Sänger, Johannes and Pernul, Günther (2016) TRIVIA: visualizing reputation profiles to detect malicious sellers in electronic marketplaces. Journal of Trust Management 3 (5).

Roth, Christian, Hartmann, Lukas, Issel, Katharina and Kesdogan, Dogan (2016) Dynamische Teilrouten zur anonymen Navigation.

Bartmann, Dieter (2016) Mehr Sicherheit im Internet durch BioTAN und BioLogin. Die Bank: Zeitschrift für Bankpolitik und Praxis (9), pp. 62-65. Fulltext not available.

Brem, Jonathan and Hahn, Jürgen (2016) SmileAtMe: rating and recommending funny images via smile detection. In: Lukowicz, Paul, (ed.) Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - UbiComp '16. ACM, New York, NY, pp. 21-24. ISBN 978-1-4503-4462-3.

Hummer, Matthias, Kunz, Michael, Netter, Michael, Fuchs, Ludwig and Pernul, Günther (2016) Adaptive identity and access management—contextual data based policies. EURASIP Journal on Information Security 19.

Schmidt, Thomas (2016) Der Einfluss der Persönlichkeit auf das Informationsverhalten: Eine empirische Studie zur Suche im Web. Bachelorarbeit, Universität Regensburg.

Schmidt, Thomas, Hansbauer, Andrea and Schreyer, Anna (2016) Das Zusammenwirken von intuitiver und reflektiver Ästhetik mit ästhetischen Attributen und personenbezogenen Faktoren. Eine empirische Studie zur ästhetischen Präferenz von Webseiten. Other, Universität Regensburg.

Kattenbeck, Markus (2016) Empirically Measuring Salience of Objects for Use in Pedestrian Navigation. PhD, Universität Regensburg.

Pirkl, Martin Franz-Xaver (2016) Indirect inference of synergistic and alternative signalling of intracellular pathways. PhD, Universität Regensburg.

Bartmann, Dieter (2016) Internet-Payment und Online-Banking mit der BioTAN. BIT: Banking and Information Technology 17 (2), pp. 61-72.

Reinfelder, Lena and Weishäupl, Eva (2016) A Literature Review on Smartphone Security in Organizations using a new theoretical Model - The Dynamic Security Success Model. In: PACIS - Pacific Asia Conference on Information Systems, June 27 - July 1, 2016, Chiayi, Taiwan.

Schwaiger, Josef Michael, Lang, Markus, Ritter, Christian and Johannsen, Florian (2016) Assessing the accuracy of sentiment analysis of social media posts at small and medium-sized enterprises in Southern Germany. In: ECIS 2016, 12. - 15.06.2016, Istanbul.

Burghardt, Manuel , Dennerlein, Katrin, Schmidt, Thomas, Mühlenfeld, Johanna and Wolff, Christian (2016) Katharsis – Ein Werkzeug für die quantitative Dramenanalyse. In: Forum CA3, 7.-8. Jun. 2016, Hamburg.

Sänger, Johannes, Hänsch, Norman, Glass, Brian, Benenson, Zinaida, Landwirth, Robert and Sasse, M. Angela (2016) Look Before You Leap: Improving the Users’ Ability to Detect Fraud in Electronic Marketplaces. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, pp. 3870-3882. ISBN 978-1-4503-3362-7.

Hristova, Diana (2016) Quantitative Approaches for Modeling Information Quality in Information Systems. PhD, Universität Regensburg.

Breyer, Johannes, Rothbauer, C., Ludwig, Bernd, Dotzler, Bernhard, Wolff, Christian , Reimann, Sandra, Borgmann, Hendik and Burger, Maximilian (2016) RF keg: Quality of online health information on prostate cancer - adherence to EAU guidelines? European Urology Supplements 15 (3), e359. Fulltext restricted.

Raab, Felix (2016) Source Code Interaction on Touchscreens. PhD, Universität Regensburg.

Braunnagel, Daniel and Leist, Susanne (2016) Applying Evaluations While Building the Artifact - Experiences from the Development of Process Model Complexity Metrics. In: 49th Hawaii International Conference on System Sciences (HICSS), 5. - 8. Jan. 2016, Koloa, HI, USA.

Kunz, Michael, Fuchs, Ludwig, Netter, Michael and Pernul, Günther (2016) How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. Communications in Computer and Information Science 576 (2), pp. 49-67.

Fill, Hans-Georg and Johannsen, Florian (2016) A Knowledge Perspective on Big Data by Joining Enterprise Modeling and Data Analyses. In: Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS), January 2016, Kauai, Hawaii. Fulltext not available.

Soska, Alexander, Mottok, Jürgen and Wolff, Christian (2016) A Study on Cognitive Deficits in Learning to Program. In: 2nd European Conference on Software Engineering Education, ECSEE16, 30 June and 1 July 2016, Seeon, Germany. Fulltext not available.

Soska, Alexander, Mottok, Jürgen and Wolff, Christian (2016) An experimental card game for software testing: Development, design and evaluation of a physical card game to deepen the knowledge of students in academic software testing education. In: 2016 IEEE Global Engineering Education Conference (EDUCON), 10. - 13. April 2016, Abu Dhabi, United Arab Emirates. Fulltext restricted.

Burghardt, Manuel , Kao, Michael and Wolff, Christian (2016) Beyond Shot Lengths – Using Language Data and Color Information as Additional Parameters for Quantitative Movie Analysis. In: Digital Humanities 2016: Conference Abstracts. Jagiellonian University & Pedagogical University, Krakau, pp. 753-755.

Johannsen, Florian and Fill, Hans-Georg (2016) Business Process Improvement Through a Modeling Tool. In: Karagiannis, Dimitris and Mayr, Heinrich C. and Mylopoulos, John, (eds.) Domain-Specific Conceptual Modeling. Springer, Berlin/Heidelberg, pp. 217-237. ISBN 978-3-319-39416-9 (print), 9783319394176 (online). Fulltext not available.

Burghardt, Manuel , Granvogl, Daniel and Wolff, Christian (2016) Creating a Lexicon of Bavarian Dialect by Means of Facebook Language Data and Crowdsourcing. In: LREC 2016, Tenth Int. Conf. on Language Resources and Evaluation : May 23-28, 2016, Portorož, Slovenia; Proc. European Language Resources Association, Paris, pp. 2029-2033. ISBN 978-2-9517408-9-1.

Schryen, Guido , Wagner, Gerit and Schlegel, Alexander (2016) Development of two novel face-recognition CAPTCHAs: a security and usability study. Computers & Security 60 (July), pp. 95-116.

Burghardt, Manuel and Wolff, Christian (2016) Digital Humanities in Bewegung: Ansätze für die computergestützte Filmanalyse. In: Modellierung, Vernetzung, Visualisierung : die Digital Humanities als fächerübergreifendes Forschungsparadigma : DHd 2016 : Konferenzabstracts : Univ. Leipzig, 7.-12. März 2016. nisaba, Duisburg, pp. 108-112. ISBN 978-3-941379-05-3.

Mielke, Bettina and Wolff, Christian (2016) Error in Persona, pVV und c. i. c. in Song und Video: Zur inhaltlichen und formalen Vielfalt juristischer Videos. In: Schweighofer, Erich and Kummer, Franz and Hötzendorfer, Walter and Borges, Georg, (eds.) Netzwerke, Networks : Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 : 25. bis 27. Februar 2016, Universität Salzburg = Networks : Proceedings of the 19th International Legal Informatics Symposium. books@ocg.at, 320. Österreichische Computer-Gesellschaft (ÖCG), Wien, pp. 389-398. ISBN 978-3-903035-09-6.

Gaul, Magnus, Hammwöhner, Rainer and Ströhl, Barbara (2016) Eye movements during sight-reading. In: SWAET 2016 – Scandinavian Workshop on Applied Eye Tracking, June 19-21, 2016, Turku, Finland. Fulltext not available.

Meier, Florian and Elsweiler, David (2016) Going back in Time: An Investigation of Social Media Re-finding. In: SIGIR Conference on Research and Development in Information Retrieval, 17-21 July 2016, Pisa, Italy. Fulltext not available.

Fuchs, Markus and Wolff, Christian (2016) Improving programming education through gameful, formative feedback. In: 2016 IEEE Global Engineering Education Conference (EDUCON), 10. - 13. April 2016, Abu Dhabi, United Arab Emirates. Fulltext restricted.

Bauer, Christina, Müller, Manuel and Ludwig, Bernd (2016) Indoor Pedestrian Navigation Systems: Is More Than One Landmark Needed for Efficient Self-localization? In: MUM '16 Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia. ACM, New York, NY, USA, pp. 75-79. ISBN 978-1-4503-4860-7. Fulltext not available.

Harborth, David, Herrmann, Dominik, Köpsell, Stefan, Pape, Sebastian, Roth, Christian, Federrath, Hannes, Kesdogan, Dogan and Rannenberg, Kai (2016) Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. Project Report.

Sippl, Colin, Burghardt, Manuel , Wolff, Christian and Mielke, Bettina (2016) Korpusbasierte Analyse österreichischer Parlamentsreden. In: Schweighofer, Erich, (ed.) Netzwerke : Tagungsband des 19. Int. Rechtsinformatik Symposions IRIS 2016 : 25.- 7. Feb. 2016, Univ. Salzburg. Books_372ocg.at, 320. , pp. 139-148.

Wimmer, Raphael , Böhm, Victoria, Böhm, Patricia and Wolff, Christian (2016) Mensch-Computer-Interaktion im Studiengang Medieninformatik an der Universität Regensburg. In: Mensch und Computer 2016 - Sozial Digital – Gemeinsam auf neuen Wegen, 04. bis 07. September 2016, Aachen. Fulltext restricted.

Burghardt, Manuel and Reimann, Sandra (2016) Möglichkeiten der elektronischen Aufbereitung und Nutzung eines historisch syntaktischen Verbwörterbuchs des Deutschen. In: Greule, Albrecht and Korhonen, J. S., (eds.) Historisch syntaktisches Verbwörterbuch. Valenz- und konstruktionsgrammatische Beiträge. Finnische Beiträge zur Germanistik, 34. Peter Lang Edition, Frankfurt, pp. 301-322. ISBN 978-3-631-67904-3 (print), 978-3-653-07081-1 (epdf).

Schmidt, Thomas and Wolff, Christian (2016) Personality and Information Behavior in Web Search. In: 79th Annual Meeting of the Association for Information Science & Technology (ASIST 2016), Copenhagen, Denmark.

Trimpl, Sabine, Dechant, Martin, Wolff, Christian , Mühlberger, Andreas and Shiban, Youssef (2016) Potenzial der virtuellen Realität für eine multimodale Diagnostik der sozialen Angststörung: eine Pilotstudie. In: Virtuelle und Erweiterte Realität - 13. Workshop der GI Fachgruppe VR/AR, Bielefeld. Fulltext not available.

Böhm, Patricia, Hansbauer, Andrea and Wolff, Christian (2016) Sind “richtige“ Tasten besser? Vergleich Touch- bzw. Tasten-basierter Texteingabe auf dem Smartphone. In: Mensch und Computer 2016 - Sozial Digital – Gemeinsam auf neuen Wegen, 04. bis 07. September 2016, Aachen. Fulltext restricted.

Burghardt, Manuel , Lamm, Lukas, Lechler, David, Schneider, Matthias and Semmelmann, Tobias (2016) Tool‑based Identification of Melodic Patterns in MusicXML Documents. In: Digital Humanities 2016: Conference Abstracts. Jagiellonian University & Pedagogical University, Krakau, pp. 440-442.

Johannsen, Florian , Schwaiger, Josef Michael, Lang, Markus and Leist, Susanne (2016) UR SMART: Social Media Analysis Research Toolkit. In: International Conference on Information Systems (ICIS 2016), Dublin.

Burghardt, Manuel (2016) Usability Pattern Identification through Heuristic Walkthroughs. In: Marcus, A., (ed.) Design, User Experience, and Usability: Design Thinking and Methods : 5th Int. Conf., DUXU 2016, Held as Part of HCI Int. 2016, Toronto, Canada, July 17–22, 2016, Proc., Pt I. Lecture Notes in Computer Science ((LNCS), 9746. Springer, Cham (Switzerland), pp. 219-230. ISBN 978-3-319-40408-0 (print), 978-3-319-40409-7 (online).

Mielke, Bettina and Wolff, Christian (2016) Österreichische und Deutsche Gerichtsentscheidungen im Sprachvergleich. In: Schweighofer, Erich and Kummer, Franz and Hötzendorfer, Walter and Borges, Georg, (eds.) Netzwerke, Networks : Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 : 25. bis 27. Februar 2016, Universität Salzburg = Networks : Proceedings of the 19th International Legal Informatics Symposium. books@ocg.at, 320. Österreichische Computer-Gesellschaft (ÖCG), Wien, pp. 129-138. ISBN 978-3-903035-09-6.

Kunz, Michael, Fuchs, Ludwig, Hummer, Matthias and Pernul, Günther (2015) Introducing Dynamic Identity and Access Management in Organizations. In: Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings. Lecture Notes in Computer Science, 9478. Springer, pp. 139-158. ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).

Rauchecker, Gerhard and Schryen, Guido (2015) High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First Search Heuristic. In: Australasian Conference on Information Systems, 30 Nov - 04 Dec 2015, Melbourne, Australia. (In Press)

Kattenbeck, Markus (2015) Empirically Measuring Object Saliency for Pedestrian Navigation. In: 23rd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2015), November 3-6 2015, Seattle, WA, USA. Fulltext not available.

Irle, Gabriele and Kattenbeck, Markus (2015) ISI 2015 Conference Review. Information. Wissenschaft & Praxis 66 (5-6), pp. 357-359. Fulltext not available.

Hauptmann, Stefan (2015) Structure and Action in Organisational Social Media Settings: Genre and Speech Act Analysis Combined – Exemplified on a Case of Strategic Action. Die Betriebswirtschaft 75 (6), pp. 431-444.

Fischer, Andreas, Kittel, Thomas, Kolosnjaji, Bojan, Lengyel, Tamas, Mandarawi, Waseem, de Meer, Hermann, Müller, Tilo, Protsenko, Mykola, Reiser, Hans, Taubmann, Benjamin and Weishäupl, Eva (2015) CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. Lecture Notes in Computer Science 9415, pp. 594-611.

Richthammer, Christian, Kunz, Michael, Sänger, Johannes, Hummer, Matthias and Pernul, Günther (2015) Dynamic Trust-based Recertifications in Identity and Access Management. In: 2nd Workshop on Security in Highly Connected IT Systems (SHCIS), Vienna, Austria.

Pernul, Günther, Ryan, Peter Y. A. and Weippl, Edgar (2015) Computer Security - ESORICS 2015. In: Pernul, Günther and Ryan, Peter Y. A. and Weippl, Edgar, (eds.) 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture notes in computer science, 9327. Springer, Heidelberg. ISBN 978-3-319-24176-0, 978-3-319-24177-7. Fulltext not available.

Weishäupl, Eva, Kunz, Michael, Yasasin, Emrah, Wagner, Gerit, Prester, Julian, Schryen, Guido and Pernul, Günther (2015) Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: 2nd International Workshop on Security in highly connected IT Systems (SHCIS’15), 21-25 Sep 2015, Vienna, Austria. (In Press)

Hummer, Matthias, Kunz, Michael, Fuchs, Ludwig, Netter, Michael and Pernul, Günther (2015) Advanced Identity and Access Policy Management using Contextual Data. In: 10th International Conference on Availability, Reliability and Security (ARES '15), August 24th – 28th, 2015, Université Paul Sabatier, Toulouse, France. Fulltext not available.

Mandarawi, Waseem, Fischer, Andreas, de Meer, Hermann and Weishäupl, Eva (2015) QoS-Aware Secure Live Migration of Virtual Machines. In: 2nd International Workshop on Security in highly connected IT Systems (SHCIS’15), 21-25 Sep 2015, Vienna, Austria. (In Press)

Sänger, Johannes, Richthammer, Christian, Kremser, André and Pernul, Günther (2015) Personalized Composition of Trustful Reputation Systems. In: 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, July 13-15, 2015, Fairfax, VA, USA. Fulltext not available.

Braunnagel, Daniel, Johannsen, Florian and Leist, Susanne (2015) Analysing the Contribution of Coupling Metrics for the Development and Management of Process Architectures. In: European Conference on Information Systems (ECIS), May 26-29, 2015, Münster, Germany. Fulltext not available.

Sänger, Johannes, Richthammer, Christian and Pernul, Günther (2015) Reusable Components for Online Reputation Systems. Journal of Trust Management 2 (5), pp. 1-21.

Kattenbeck, Markus (2015) How Do Participants Deal with Questions If Asked to Rate Visual Dimensions of an Object? In: 14th International Symposium of Information Science, 19. - 21. 5. 2015, Zadar, Kroatien.

Johannsen, Florian and Zellner, Gregor (2015) Introducing a professional complaint management: The case of a fleet management company. In: Twenty-Third European Conference on Information Systems (ECIS 2015), 26. bis 29.05.2015, Münster. Fulltext not available.

Heinrich, Bernd and Klier, Mathias (2015) Metric-based Data Quality Assessment - Developing and Evaluating a Probability-based Currency Metric Decision Support Systems. Decision Support Systems (DSS) 72, pp. 82-96.

Braunnagel, Daniel, Johannsen, Florian and Leist, Susanne (2015) Analysing the Contribution of Coupling Metrics for the Development and Management of Process Architectures. In: European Conference on Information Systems (ECIS), May 26-29, 2015, Münster, Germany.

Kunz, Michael, Fuchs, Ludwig, Netter, Michael and Pernul, Günther (2015) Analyzing Quality Criteria in Role-based Identity and Access Management. In: 1st International Conference on Information Systems Security and Privacy, 09.02.1015 - 11.02.2015, Angers, France.

Schmidt, Thomas and Wolff, Christian (2015) Genderspezifische Unterschiede im Informationsverhalten am Beispiel E-Commerce. Information - Wissenschaft & Praxis 66 (1), pp. 65-76.

Kattenbeck, Markus, Müller, Manuel, Ohm, Christina and Ludwig, Bernd (2015) Der Weg ist das Ziel – Fußgängernavigation ist Forschung zu Information Behavior. Information - Wissenschaft & Praxis 66 (1), pp. 45-55. Fulltext not available.

Holler, Philipp, Roth, Christian and Richthammer, Hartmut (2015) Practical attacks on PXE based boot systems. In: Proceedings of the First International Conference on Cyber Security for Sustainable Society. Working Papers of the Sustainable Society Network+, 3. , pp. 36-48. Fulltext not available.

De Luca, Ernesto William, Said, Alan, Crestani, Fabio and Elsweiler, David (2015) 5th Workshop on Context-Awareness in Retrieval and Recommendation. In: Advances in Information Retrieval. 37th Europ. Conf. on IR Research, ECIR 2015, Vienna, Austria, March 29 - April 2, 2015 ; Proc. Lecture notes in computer science, 9022. Springer International Publishing, Cham, pp. 830-833. ISBN 978-331-91635-4-3 (onl.), 978-3-319-16353-6 (print). Fulltext not available.

Al-Baddai, Saad, Al-Subari, Karema, Tomé, A. M., Volberg, Gregor and Lang, Elmar (2015) A Combined EMD-ICA Analysis of Simultaneously Registered EEG-fMRI Data. The Annals of the BMVA (The British Machine Vision Association and Society for Pattern Recognition) 2015 (2), pp. 1-15. Fulltext not available.

Burghardt, Manuel , Hertlein, Franziska, Hinterleitner, Bastian, Lehenmeier, Constantin and Spröd, Thomas (2015) A Crowdsourced Approach for the Documentation and Transcription of Graffiti in Public Restrooms. In: Pehar, F., (ed.) Re:inventing information science in the networked society : proc. of the 14th Int. Symposium on Information Science (ISI 2015), Zadar, Croatia, 19th - 21st May 2015. Schriften zur Informationswissenschaft, 66. Hülsbusch, Glückstadt. ISBN 978-3-86488-081-0.

Meier, Florian, Bazo, Alexander, Burghardt, Manuel and Wolff, Christian (2015) A Crowdsourced Encoding Approach for
Handwritten Sheet Music.
In: Roland, Perry, (ed.) Proceedings of the Music Encoding Conference (MEC) 2013 and 2014. , pp. 127-130.

Ritter, Christian, Schwaiger, Josef Michael and Johannsen, Florian (2015) A Prototype for Supporting Novices in Collaboration Business Process Modeling Using a Tablet Device. In: 10th International Conference on Design Science Research in Information Systems and Technology (DESRIST),, 21.-22.05.2015, Dublin. Fulltext not available.

Lehrstuhl, Informationswissenschaft (2015) Anwenderstudie: Evaluierung Voice Reader. [Experiment] (Unpublished)

Hahn, Jürgen, Ludwig, Bernd and Wolff, Christian (2015) Augmented reality-based training of the PCB assembly process. In: Holzmann, Clemens, (ed.) MUM '15 Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia. ACM, New York, NY, pp. 395-399. ISBN 978-1-4503-3605-5.

Harvey, Morgan and Elsweiler, David (2015) Automated Recommendation of Healthy, Personalised Meal Plans. In: RecSys'15 : 9th ACM Conference on Recommender Systems, September 16-20, 2015, Vienna. Fulltext not available.

Elsweiler, David, Harvey, Morgan, Ludwig, Bernd and Said, Alan (2015) Bringing the "healthy" into Food Recommenders. In: 2nd International Workshop on Decision Making and Recommender Systems, October 22-23, 2015, Bolzano, Italy. Fulltext not available.

Klier, Julia, Klier, Mathias, Rebhan, Volker and Thiel, Lea (2015) Can Social Media Help to Alleviate Skilled Worker Shortage? First Insights from the German Federal Employment Agency. In: 12. Internationale Tagung Wirtschaftsinformatik, Osnabrück. Fulltext not available.

Jackermeier, Robert (2015) Code I’ve Seen: Verhalten von Programmierern beim Wiederfinden von Code-Stellen. Information - Wissenschaft & Praxis 66 (1), pp. 29-36. Fulltext not available.

Bockes, Florian, Edel, Laura, Ferstl, Matthias and Schmid, Andreas (2015) Collaborative Landmark Mining with a Gamification Approach. In: 14th International Conference on Mobile and Ubiquitous Multimedia, November 30 - December 2, 2015, Linz, Austria.

Klier, Julia, Klier, Mathias, Müller, Anna-Luisa and Rauch, Christian (2015) Customers Can Do Better! A Case Study of Self-Service Technologies at the German Federal Employment Agency. In: 12. Internationale Tagung Wirtschaftsinformatik, Osnabrück. Fulltext not available.

Gaag, Philip, Granvogl, Daniel, Jackermeier, Robert, Ludwig, Florian, Rosenlöhner, Johannes and Uitz, Alexander (2015) FROY: exploring sentiment-based movie recommendations. In: MUM '15: Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, November 30 - December 02, 2015, Linz, Austria. ACM, New York, NY, USA, pp. 345-349. ISBN 978-1-4503-3605-5. Fulltext not available.

Gallego Jutglà, Esteve, Al-Baddai, Saad, Al-Subari, Karema, Tomé, A. M., Lang, Elmar and Solé-Casals, Jordi (2015) Face recognition by fast and stable bi-dimensional empirical mode decomposition. In: Loose, Harald, (ed.) BIOSIGNALS 2015 : proceedings of the International Conference on Bio-inspired Systems and Signal Processing ; Lisbon, Portugal, 12 - 15 January 2015. SciTePress: Science and Technology Publications, pp. 385-391. ISBN 978-989-758-069-7. Fulltext not available.

Weishäupl, Eva, Yasasin, Emrah and Schryen, Guido (2015) IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review. In: 23rd European Conference on Information Systems (ECIS 2015), May 26-29, Münster. (In Press)

Burghardt, Manuel , Wolff, Christian and Womser-Hacker, Christa (2015) Informationsinfrastruktur und informationswissenschaftliche Methoden in den digitalen Geisteswissenschaften. Information – Wissenschaft & Praxis 66 (5-6), pp. 285-286.

Meier, Florian (2015) Informationsverhalten in Social Media. Information - Wissenschaft und Praxis : IWP 66 (1), pp. 22-28. Fulltext not available.

Harvey, Morgan, Hauff, Claudia and Elsweiler, David (2015) Learning by Example: Training Users with High-quality Query Suggestions. In: SIGIR '15 Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, New York, NY, USA, pp. 133-142. ISBN 978-1-4503-3621-5. Fulltext not available.

Spreitzenbarth, Michael, Schreck, Thomas, Echtler, Florian , Arp, Daniel and Hoffmann, Johannes (2015) Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques. International Journal of Information Security 14 (2), pp. 141-153. Fulltext not available.

Burghardt, Manuel , Lamm, Lukas, Lechler, David, Schneider, Matthias and Semmelmann, Tobias (2015) MusicXML Analyzer. Ein Analysewerkzeug für die computergestützte Identifikation von Melodie-Patterns. In: Elbeshausen, S., (ed.) HiER 2015. Proceedings des 9. Hildesheimer Evaluierungs- und Retrievalworkshop. Universitätsverl. Hildesheim, Hildesheim, pp. 29-42.

Ohm, Christina, Ludwig, Bernd and Gerstmeier, Saskia (2015) Photographs or Mobile Maps?-Displaying Landmarks in Pedestrian Navigation Systems. In: Pehar, Franjo, (ed.) Re:inventing information science in the networked society : proceedings of the 14th International Symposium on Information Science (ISI 2015), Zadar, Croatia, 19. - 21. May 2015. Schriften zur Informationswissenschaft, 66. Hülsbusch, Glückstadt, pp. 302-312. ISBN 978-3-86488-081-0. Fulltext not available.

Ludwig, Bernd (2015) Planbasierte Mensch-Maschine-Interaktion in multimodalen Assistenzsystemen. Xpert.press, Springer, Berlin. Fulltext not available.

Netter, Michael, Pernul, Günther, Richthammer, Christian and Riesner, Moritz (2015) Privacy in Social Networks: Existing Challenges and Proposals for Solutions. In: First International Conference on Information Systems Security and Privacy (ICISSP), Revised Selected Papers. Communications in Computer and Information Science. Springer International Publishing, pp. 16-27. ISBN 978-3-319-27667-0.

Heinrich, Bernd, Klier, Mathias, Lewerenz, Lars and Zimmermann, Steffen (2015) Quality of Service-aware Service Selection: A Novel Approach Considering Potential Service Failures and Non-Deterministic Service Values. INFORMS Service Science, A Journal of the Institute for Operations Research and the Management Sciences Vol. 7, No, pp. 1-22.

Rösch, Barbara and Hammwöhner, Rainer (2015) Reading Scanpaths. In: Pehar, Franjo, (ed.) Re:inventing information science in the networked society : proceedings of the 14th International Symposium on Information Science (ISI 2015), Zadar, Croatia, 19th - 21st May 2015. Schriften zur Informationswissenschaft, 66. Hülsbusch, Glückstadt, pp. 290-301. ISBN 978-3-86488-081-0. Fulltext not available.

Yasasin, Emrah and Schryen, Guido (2015) Requirements for IT Security Metrics – An Argumentation Theory Based Approach. In: 23rd European Conference on Information Systems (ECIS 2015), May 26-29, Münster. (In Press)

Kautetzky, Maximilian, Haas, Benedikt, Voit, Matthias, Burghardt, Manuel and Wolff, Christian (2015) ResearchSherlock: Toward a seamless integration of printed books into the digital academic workflow. In: Pehar, F., (ed.) Re:inventing information science in the networked society : proc. of the 14th Int. Symposium on Information Science (ISI 2015), Zadar, Croatia, 19th - 21st May 2015. Schriften zur Informationswissenschaft, 66. Hülsbusch, Glückstadt, 581ff. ISBN 978-3-86488-081-0.

Schryen, Guido, Rauchecker, Gerhard and Comes, Martina (2015) Resource Planning in Disaster Response - Decision Support Models and Methodologies. Business & Information Systems Engineering (BISE) 57 (4), pp. 243-259. (In Press)

Sänger, Johannes, Richthammer, Christian, Rösch, Artur and Pernul, Günther (2015) Reusable Defense Components for Online Reputation Systems. In: Trust Management IX. 9th IFIP WG 11.11 Int. Conf., IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proc. IFIP Advances in Information and Communication Technology, 454. Springer, Berlin, pp. 195-202. ISBN 978-3-319-18491-3 (onl.), 978-3-319-18490-6 (print).

Burghardt, Manuel , Schneider, Patrick, Bogatzki, Christopher-Jannis and Wolff, Christian (2015) StreetartFinder – Eine Datenbank zur Dokumentation von Kunst im urbanen Raum. In: DHd2015 : von Daten zu Erkenntnissen; book of abstracts; 23. - 27. Feb. 2015, Graz, Austria.

Johannsen, Florian and Fill, Hans-Georg (2015) Supporting Knowledge Elicitation and Analysis for Business Process Improvement through a Modeling Tool. In: 12. Internationale Tagung "Wirtschaftsinformatik 2015", 04.03.2015 - 06.03.2015, Osnabrück.

Burghardt, Manuel (2015) Tools for the Analysis and Visualization of Twitter Language Data. 10plus1: Living Linguistics (1).

Elsweiler, David and Harvey, Morgan (2015) Towards Automatic Meal Plan Recommendations for Balanced Nutrition. In: RecSys '15 Proceedings of the 9th ACM Conference on Recommender Systems. ACM, New York, NY, USA, pp. 313-316. ISBN 978-1-4503-3692-5. Fulltext not available.

Spanner, Sebastian, Burghardt, Manuel and Wolff, Christian (2015) Twista – An Application for the Analysis and Visualization of Tailored Tweet Collections. In: Pehar, F. and Schlögl, C. and Wolff, C., (eds.) Re:inventing information science in the networked society : proc. of the 14th Int. Symposium on Information Science (ISI 2015), Zadar, Croatia, 19th - 21st May 2015. Schriften zur Informationswissenschaft, 66. Hülsbusch, Glückstadt, pp. 191-202. ISBN 978-3-86488-081-0.

Ritter, Christian, Leist, Susanne and Blasini, Josef (2015) Using Functional Requirements to Evaluate Process
Performance Management Tools.
In: 17th IEEE Conference on Business Informatics, 13.-16.07.2015, Lissabon. Fulltext not available.

Burghardt, Manuel and Dechant, Martin (2015) Virtuelle Rekonstruktion des Regensburger Ballhauses. In: DHd2015 : von Daten zu Erkenntnissen; book of abstracts; 23. - 27. Feb. 2015, Graz, Austria.

Sänger, Johannes, Richthammer, Christian, Kunz, Michael, Meier, Stefan and Pernul, Günther (2015) Visualizing Unfair Ratings in Online Reputation Systems. In: Proc. of the 23rd European Conference on Information Systems (ECIS), Münster, Germany.

Cetto, Alexandra, Klier, Julia and Klier, Mathias (2015) Why should I do it myself`? Hedonic and utilitarian motivations of customers' intention to use self-service technologies. In: 23rd European Conference on Information Systems (ECIS 2015), Münster, Germany.

Rösch, Barbara (2015) Wie interagieren Nutzer mit Text- und Bildinformationen in einem Wikipedia-Artikel? Information - Wissenschaft & Praxis (Inf. Wiss. & Praxis) 66 (1), pp. 17-21.

Schryen, Guido (2015) Writing qualitative IS literature reviews – Guidelines for synthesis, interpretation and guidance of research. Communications of the AIS 37 (Art 12), pp. 286-325.

Burghardt, Manuel and Wolff, Christian (2015) Zentren für Digital Humanities in Deutschland. Information – Wissenschaft & Praxis 66 (5-6), pp. 313-326.

Unland, Rainer and Pernul, Günther (2014) Datenbanken im Einsatz. Analyse, Modellbildung und Umsetzung. De Gruyter Oldenbourg, Berlin; München. ISBN 978-3-486-72141-6 (print), 978-3-11-486-78129-8 (ebook), 978-3-11-486-98970-0 (ePub). Fulltext restricted.

Hassan, Sabri and Pernul, Günther (2014) Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics. In: iiWAS ’14, December 04 - 06 2014, Hanoi, Viet Nam. Fulltext not available.

Schryen, Guido (2014) The Epistemological Impact of Literature Reviews in Information Systems Research. Fulltext not available.

Schryen, Guido (2014) Writing qualitative IS literature reviews – Guidelines for synthesis, interpretation and guidance of research. Fulltext not available.

Grosse-Puppendahl, Tobias, Herber, Sebastian, Wimmer, Raphael, Englert, Frank, Beck, Sebastian, von Wilmsdorff, Julian, Wichert, Reiner and Kuijper, Arjan (2014) Capacitive Near-field Communication for Ubiquitous Interaction and Perception. In: UbiComp'14 : proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing : September 13-17, 2014, Seattle, WA, USA. UbiComp '14 Adjunct. ACM, New York, NY, USA, pp. 231-242.

Sänger, Johannes and Pernul, Günther (2014) Reusability for Trust and Reputation Systems. In: 6th IFIP WG 11.11 International Conference, IFIPTM 2014, July 7-10, 2014, Singapore, Singapore.

Sänger, Johannes, Richthammer, Christian and Hassan, Sabri (2014) Trust and Big Data: A Roadmap for Research. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, Munich.

Kunz, Michael, Hummer, Matthias, Fuchs, Ludwig, Netter, Michael and Pernul, Günther (2014) Analyzing Recent Trends in Enterprise Identity Management. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, München. (In Press)

Roth, Christian and Schillinger, Rolf (2014) Detectability of Deep Packet Inspection in Common Provider/Consumer Relations. In: 25th International Workshop on Database and Expert Systems Applications, München. Fulltext not available.

Eckert, Claudia and Katsikas, Sokratis K. and Pernul, Günther, eds. (2014) Trust, Privacy, and Security in Digital Business: 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science, 8647. Springer, Heidelberg. ISBN 978-3-319-09770-1 (online), 978-3-319-09769-5 (print). Fulltext not available.

Sänger, Johannes and Pernul, Günther (2014) Visualizing Transaction Context in Trust and Reputation Systems. In: ARES 2014, 08.-12.09.2014, Fribourg, Switzerland.

Richthammer, Christian, Netter, Michael, Riesner, Moritz, Sänger, Johannes and Pernul, Günther (2014) Taxonomy of Social Network Data Types. EURASIP Journal on Information Security 2014 (11).

Schorer, Michael (2014) Virtual integration: A game-theoretic approach. PhD, Universität Regensburg.

Atluri, Vijay and Pernul, Günther, eds. (2014) Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture notes in computer science, 8566. Springer, Heidelberg. ISBN 978-3-662-43935-7, 978-366-24393-6-4 (Online). Fulltext not available.

Fuchs, Ludwig, Kunz, Michael and Pernul, Günther (2014) Role Model Optimization For Secure Role-based Identity Management. In: European Conference on Information Systems (ECIS), June 9-11, 2014, Tel Aviv, Israel.

Bazo, Alexander (2014) Direct Manipulation Techniques for Interactive Ceilings. Masters, Universität Regensburg. Fulltext not available.

Meier, Stefan and Pernul, Günther (2014) Einsatz von digitaler Forensik in Unternehmen und Organisationen. In: Sicherheit 2014, 19.-21. März 2014, Wien. Fulltext not available.

Wiedermann, Wolfgang (2014) Patternbasierter Ansatz zur Entwicklung von verteilten Krankenakten - Kernbestandteil einer Pattern-Sprache zur Beschreibung und Entwicklung von Softwaresystemen für verteilte Krankenakten. PhD, Universität Regensburg.

Rauchecker, Gerhard, Yasasin, Emrah and Schryen, Guido (2014) A Decision Support System for IT Security Incident Management. In: 11th International Conference on Trust, Privacy, and Security in Digital Business (TRUSTBUS), 1.-5. Sep. 2014, Munich. (In Press) Fulltext not available.

Baumer, Eric, Ahn, June, Bie, Mei, Bonsignore, Elizabeth, Börütecene, Ahmet, Buruk, Oğuz Turan, Clegg, Tamara, Druin, Alison, Echtler, Florian, Gruen, Daniel and et, al. (2014) CHI 2039: Speculative Research Visions. In: CHI 2014, 26. April - 01. Mai 2014, Toronto, Canada. Fulltext not available.

Al-Baddai, Saad, Al-Subari, Karema, Tome, A. M., Volberg, Gregor and Lang, Elmar W. (2014) Combining EMD with ICA to analyze combined EEG-fMRI data. In: Medical Image Understanding and Analysis 2014. Proc. 18th conf. on Medical Image Understanding and Analysis, 9-11 July 2014, London. City University London, London, UK, pp. 223-228. ISBN 9781901725513. Fulltext not available.

Schaller, Richard, Harvey, Morgan and Elsweiler, David (2014) Detecting Event Visits in Urban Areas via Smartphone GPS Data. In: Advances in Information Retrieval. 6th European Conference on IR Research, ECIR 2014, Amsterdam, The Netherlands, April 13-16, 2014. Proceedings. Lecture Notes in Computer Science, 8416. Springer Internat. Publishing, Cham (Switzerland), pp. 681-686. ISBN 978-3-319-06028-6 (online), 978-3-319-06027-9 (print). Fulltext not available.

Burghardt, Manuel and Wolff, Christian (2014) Digital Humanities: Buzzword oder Strukturwandel in den Geisteswissenschaften? Blick in die Wissenschaft 23 (29/14), pp. 39-46.

Falk, Thomas and Leist, Susanne (2014) Effects of Mobile Solutions for Improving Business Processes. In: European Conference on Information Systems (ECIS) 2014, June 9-11, 2014, Tel Aviv. Fulltext not available.

Wex, Felix, Schryen, Guido, Feuerriegel, Stefan and Neumann, Dirk (2014) Emergency Response in Natural Disaster Management: Allocation and Scheduling of Rescue Units. European Journal of Operational Research. (In Press)

Ludwig, Bernd, Müller, Manuel and Ohm, Christina (2014) Empirical Evidence for Context-aware Interfaces to Pedestrian Navigation Systems. KI - Künstliche Intelligenz 28 (4), pp. 271-281. Fulltext not available.

Burghardt, Manuel , Schubert, Andreas, Traber, Michael and Wolff, Christian (2014) Empirische Untersuchung zu digitalen Arbeitspraktiken in den Geisteswissenschaften an der Universität Regensburg. In: Online-Proceedings der 1. Jahrestagung der “Digital Humanities im deutschsprachigen Raum”.

Cetto, Alexandra, Netter, Michael, Pernul, Günther, Richthammer, Christian, Riesner, Moritz, Roth, Christian and Sänger, Johannes (2014) Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks (Best Paper Award). In: Proc. of the 2nd International Workshop on Intelligent Digital Games for Empowerment and Inclusion (IDGEI). Haifa, Israel.

Burghardt, Manuel and Wolff, Christian (2014) Humanist-Computer Interaction: Herausforderungen für die Digital Humanities aus Perspektive der Medieninformatik. In: DHd Workshop: Informatik und die Digital Humanities. Leipzig.

Rösch, Barbara (2014) Investigation of Information Behavior in Wikipedia Articles. In: IIiX '14 Proceedings of the 5th Information Interaction in Context Symposium. ACM, New York, NY, USA, pp. 351-353. ISBN 978-1-4503-2976-7. Fulltext not available.

Schaller, Richard and Elsweiler, David (2014) Itinerary Recommenders: How Do Users Customize Their Routes and What Can We Learn from Them? In: IIiX '14 Proceedings of the 5th Information Interaction in Context Symposium. ACM, New York, NY, USA, pp. 185-194. ISBN 978-1-4503-2976-7. Fulltext not available.

Schaller, Richard and Elsweiler, David (2014) Itinerary recommenders: how do users customize their routes and what can we learn from them? In: Proceedings of the 5th Information Interaction in Context Symposium. ACM, New York, pp. 185-194. ISBN 978-1-4503-2976-7. Fulltext not available.

Fink, Andreas, Kliewer, Natalia, Mattfeld, Dirk, Mönch, Lars, Rothlauf, Franz , Schryen, Guido , Suhl, Leena and Voß, Stefan (2014) Model-Based Decision Support in Manufacturing and Service Networks. Business & Information Systems Engineering 6 (1), pp. 17-24. Fulltext not available.

Fink, Andreas, Kliewer, Natalia, Mattfeld, Dirk, Mönch, Lars, Rothlauf, Franz, Schryen, Guido, Suhl, Leena and Voß, Stefan (2014) Model-based Decision Support in Manufacturing and Service Networks. Business & Information Systems Engineering (BISE) 6 (1), pp. 17-24. (In Press)

Fink, Andreas, Kliewer, Natalia, Mattfeld, Dirk, Mönch, Lars, Rothlauf, Franz, Schryen, Guido, Suhl, Lena and Voß, Stefan (2014) Modellbasierte Entscheidungsunterstützung in Produktions- und Service-Netzwerken. Wirtschaftsinformatik 56 (1), pp. 21-29. (In Press) Fulltext not available.

Meier, Florian, Elsweiler, David and Wilson, Max L. (2014) More than Liking and Bookmarking? Towards Understanding Twitter Favouriting Behaviour. In: Eighth International Conference on Weblogs and Social Media, ICWSM 2014, June 1-4, 2014, Ann Arbor, Michigan, USA. Fulltext not available.

Müller, Manuel, Ohm, Christina and Ludwig, Bernd (2014) Path Network Modeling of Public Buildings. In: International Workshop on Interfacing Indoor and Outdoor Spaces at GIScience, 2014, Vienna, Austria. Fulltext not available.

Meier, Florian and Elsweiler, David (2014) Personal information management and social networks re-finding on Twitter. In: Fifth Information Interaction in Context Symposium, IIiX '14, August 26-29, 2014, Regensburg, Germany. Fulltext not available.

Bazo, Alexander and Echtler, Florian (2014) Phone Proxies: Effortless Content Sharing Between Smartphones and Interactive Surfaces. In: Proceedings of the 2014 ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS '14). ACM, New York, NY, USA, pp. 229-234. ISBN 978-1-4503-2725-1.

Schaller, Richard, Harvey, Morgan and Elsweiler, David (2014) Relating User Interaction to Experience During Festivals. In: Proceedings of the 5th Information Interaction in Context Symposium. IIiX '14. Regensburg, Germany, 26-30 August 2014. ACM, New York, NY, USA, pp. 38-47. ISBN 978-1-4503-2976-7. Fulltext not available.

Schryen, Guido and Wex, Felix (2014) Risk Reduction in Natural Disaster Management Through Information Systems: A Literature review and an IS design science research agenda. International Journal of Information Systems for Crisis Response and Management (IJISCRAM) 6 (1). (In Press)

Glücker, Hartmut, Burghardt, Manuel and Wolff, Christian (2014) Sentilyzer – A Mashup Application for the Sentiment Analysis of Facebook Pages. In: Workshop proceedings of the 12th edition of the KONVENS conference. Universitätsbibliothek Hildesheim, Hildesheim, pp. 58-61.

Hassan, Sabri, Sänger, Johannes and Pernul, Günther (2014) SoDA: Dynamic Visual Analytics of Big Social Data. In: Proc. of the 1st international Conference on Big Data and Smart Computing. Bangkok, Thailand. Fulltext not available.

Johannsen, Florian, Leist, Susanne and Braunnagel, Daniel (2014) Testing the Impact of Wand and Weber's Decomposition Model on Process Model Understandability. In: 35th International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, Dec 14 - 17, 2014, Auckland. Fulltext not available.

Meier, Florian and Elsweiler, David (2014) Tweets I've seen: analysing factors influencing re-finding frustration on Twitter. In: Proceedings of the 5th Information Interaction in Context Symposium. Fulltext not available.

Lamm, Lukas, Burghardt, Manuel and Wolff, Christian (2014) Vergleichende Evaluation zur Usability mobiler Web-Browser. In: Koch, Michael, (ed.) Mensch und Computer 2014 – Tagungsband 14. Fachübergreifende Konferenz für Interaktive und Kooperative Medien – Interaktiv unterwegs - Freiräume gestalten. de Gruyter Oldenbourg, München, pp. 105-114. ISBN 978-3-11-034415-8, 978-3-110-34448-6 (online).

Netter, Michael, Weber, Michael, Diener, Michael and Pernul, Günther (2014) Visualizing Social Roles - Design and Evaluation of a Bird's-Eye View of Social Network Privacy Settings. In: Proc. of the 22nd European Conference on Information Systems (ECIS). Tel-Aviv, Israel. (In Press)

Burghardt, Manuel , Pörsch, Julian, Tirlea, Bianca and Wolff, Christian (2014) WebNLP: An Integrated Web-Interface for Python NLTK and Voyant. In: Ruppenhofer, Josef and Faaß, Gertrud, (eds.) Proceedings of the 12th edition of the KONVENS conference : Hildesheim, Germany, October 8-10,2014. Universitätsbibliothek Hildesheim, Hildesheim, pp. 235-240. ISBN 978-3-934105-46-1.

Ohm, Christina, Müller, Manuel, Ludwig, Bernd and Bienk, Stefan (2014) Where is the Landmark? Eye Tracking Studies in Large-Scale Indoor Environments. In: 2nd International Workshop on Eye Tracking for Spatial Research co-located with the 8th International Conference on Geographic Information Science (GIScience 2014), September 23, 2014, Vienna, Austria.

Bienk, Stefan, Kattenbeck, Markus, Ludwig, Bernd, Müller, Manuel and Ohm, Christina (2013) "I want to view it my way – Interfaces to mobile maps should adapt to the user's orientation skills". In: "Mobile and Ubiquitous Multimedia 2013 (mum '13), 2.-5. Dezember 2013, Luleå (Schweden). Fulltext not available.

Pham, Dang Vinh (2013) Towards practical and fundamental limits of anonymity protection. PhD, Universität Regensburg.

Schön, Torsten (2013) Physarum Learner: a novel structure learning algorithm for Bayesian Networks inspired by Physarum polycephalum. PhD, Universität Regensburg.

Emmersberger, Christoph and Springer, Florian (2013) Tutorial: Open Source Enterprise Application Integration. In: DEBS '13, Proceedings of the 7th ACM international conference on Distributed event-based systems (Arlington, Texas, USA, June 29–July 3, 2013). ACM Digital Library, New York, pp. 259-268. ISBN 978-1-4503-1758-0.

Falk, Thomas, Griesberger, Philipp, Johannsen, Florian and Leist, Susanne (2013) Patterns for Business Process Improvement: A First Approach. In: 21st European Conference on Information Systems (ECIS), June 5-8, 2013, Utrecht. Fulltext not available.

Netter, Michael (2013) Privacy-preserving Infrastructure for Social Identity Management. PhD, University of Regensburg. Fulltext not available.

Riesner, Moritz, Netter, Michael and Pernul, Günther (2013) Analyzing Settings for Social Identity Management on Social Networking Sites: Classification, Current State, and Proposed Developments. Information Security Technical Report 17 (4), pp. 185-198.

Kattenbeck, Markus, Brockelmann, Martin, Hammwöhner, Rainer, Jackermeier, Robert and Ludwig, Bernd (2013) Vermessungsdaten - OpenStreetMap - In-Situ-Experimente. Die Datengrundlage von URWalking. In: Hobohm, Hans-Christoph, (ed.) Informationswissenschaft zwischen virtueller Infrastruktur und materiellen Lebenswelten. Proceedings des 13. Internationalen Symposiums für Informationswissenschaft (ISI 2013) Potsdam, 19. bis 22. März 2013. Schriften zur Informationswissenschaft, 63. Verlag Werner Hülsbusch, Glückstadt, pp. 372-383. Fulltext not available.

Grosse-Puppendahl, Tobias, Berghöfer, Yannick, Braun, Andreas, Wimmer, Raphael and Kuijper, Arjan (2013) OpenCapSense: A Rapid Prototyping Toolkit for Pervasive Interaction Using Capacitive Sensing. In: IEEE International Conference on Pervasive Computing and Communications (PerCom), 18.-22. Mar. 2013, San Diego.

Knäusl, Hanna and Ludwig, Bernd (2013) What Readers Want to Experience: An Approach to Quantify Conversational Maxims with Preferences for Reading Behaviour. In: 6th International Conference on Agents and Artificial Intelligence, 6.-8. March 2013, Angers, Loire Valley, France.

Johannsen, Florian (2013) A holistic approach for integrating methods in quality management. In: 11. Internationale Tagung Wirtschaftsinformatik, 2013, Leipzig. Fulltext not available.

Braunnagel, Daniel and Johannsen, Florian (2013) Coupling metrics for EPC models. In: 11. Internationale Tagung Wirtschaftsinformatik - Student Track.Vol. 2, Leipzig. Fulltext not available.

Burghardt, Manuel, Reischer, Jürgen and Wolff, Christian (2013) Usability-Probleme bei Desktop-Suchmaschinen. In: Hobohm, Hans-Christoph, (ed.) Informationswissenschaft zwischen virtueller Infrastruktur und materiellen Lebenswelten: Proceedings des 13. Internationalen Symposiums für Informationswissenschaft (ISI 2013). Schriften zur Informationswissenschaft, 63. Hülsbusch, Glückstadt, pp. 298-309. ISBN 978-3-86488-035-3.

Liedel, Manuel (2013) Sichere Mehrparteienberechnungen und datenschutzfreundliche Klassifikation auf Basis horizontal partitionierter Datenbanken. PhD, Universität Regensburg.

Netter, Michael, Riesner, Moritz, Weber, Michael and Pernul, Günther (2013) Privacy Settings in Online Social Networks-Preferences, Perception, and Reality (Best Paper Award Nominee). In: Proc of the 46th Hawaii International Conference on System Science (HICSS). Maui, Hawaii, USA.

Wilhelm, Thomas, Burghardt, Manuel and Wolff, Christian (2013) "To See or Not to See" - An Interactive Tool for the Visualization and Analysis of Shakespeare Plays. In: Franken-Wendelstorf, Regina and Lindinger, Elisabeth and Sieck, Jürgen, (eds.) Kultur und Informatik: Visual Worlds & Interactive Spaces. Verlag Werner Hülsbusch, Glückstadt, pp. 175-185. ISBN 978-3-86488-045-2.

Wex, Felix, Schryen, Guido and Neumann, Dirk (2013) Assignments of Collaborative Rescue Units during Emergency Response. International Journal of Information Systems for Crisis Response and Management 5 (4), pp. 63-80. (In Press)

Obergrusberger, Florian, Baloglu, Baris, Sänger, Johannes and Senk, Christian (2013) Biometric Identity Trust: Toward Secure Biometric Enrollment in Web Environments. In: Yousif, Mazin and Schubert, Lutz, (eds.) Cloud Computing: Third International Conference, CloudComp 2012. Vienna, Austria, September 24-26, 2012, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 112. Springer International Publishing, Cham, pp. 124-133. ISBN 978-3-319-03873-5. Fulltext not available.

Wimmer, Raphael, Bazo, Alexander, Heckner, Markus and Wolff, Christian (2013) Ceiling Interaction: Properties, Usage Scenarios, and a Prototype. In: Workshop on Blended Interaction: Envisioning Future Collaborative Interactive Spaces, ACM CHI 2013, April 27–May 2, 2013, Paris.

Bazo, Alexander, Wimmer, Raphael, Heckner, Markus and Wolff, Christian (2013) Collaboration on Interactive Ceilings. In: Mensch & Computer 2013, 8.-11. September 2013, Bremen.

Ohm, Christina (2013) Conference Report: KI 2013 German Conference on Artificial Intelligence. KI - Künstliche Intelligenz 27 (4), p. 385. Fulltext not available.

Wex, Felix, Schryen, Guido and Neumann, Dirk (2013) Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response. In: Proceedings of the 46th Hawaii International Conference on System Science, 7-10 January 2013, Maui, Hawaii, USA.

Schneidermeier, Tim, Burghardt, Manuel and Wolff, Christian (2013) Design Guidelines for Coffee Vending Machines. In: Marcus, A., (ed.) Design, User Experience, and Usability. Web, Mobile, and Product Design. DUXU 2013. Lecture Notes in Computer Science, 8015. Springer, Berlin, pp. 432-440. ISBN 978-3-642-39253-5 (online), 978-3-642-39252-8 (print).

Ludwig, Bernd, Bienk, Stefan, Kattenbeck, Markus, Müller, Manuel, Ohm, Christina, Einmal, Michael, Glaser, Thomas, Hackl, Markus, Oreskovich, Mark and Schubart, Lea (2013) Do You Recognize that Building's Facade? Künstliche Intelligenz 27 (3), pp. 241-246. Fulltext not available.

Ludwig, Bernd and Ohm, Christina (2013) Estimating The Driver's Workload. Lecture Notes in Computer Science 8077. Fulltext not available.

Meier, Florian, Bazo, Alexander, Burghardt, Manuel and Wolff, Christian (2013) Evaluating a Web-Based Tool for Crowdsourced Navigation Stress Tests. In: Proceedings of the 15th International Conference on Human-Computer Interaction (HCII). , pp. 248-256.

Bourimi, Mohamed and Kesdogan, Dogan (2013) Experiences by using AFFINE for building collaborative applications for online communities. In: Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International). Springer, Berlin. (In Press) Fulltext not available.

Wimmer, Raphael and Echtler, Florian (2013) Exploring the benefits of fingernail displays. In: CHI'13 Extended Abstracts on Human Factors in Computing Systems, April 27 - May 02, 2013, Paris.

Netter, Michael, Herbst, Sebastian and Pernul, Günther (2013) Interdisciplinary Impact Analysis of Privacy in Social Networks. In: Altshuler, Yaniv and Elovici, Yuva and Cremers, Armin B. and Aharony, Nadav and Pentland, Alex, (eds.) Security and Privacy in Social Networks. Springer, pp. 7-26. ISBN 978-1-4614-4138-0.

Meier, Stefan, Fuchs, Ludwig and Pernul, Günther (2013) Managing the Access Grid - A Process View to Minimize Insider Misuse Risks. In: 11th International Conference on Wirtschaftsinformatik (WI2013), 27.2.-1.3.13, Leipzig.

Spreitzenbarth, Michael, Freiling, Felix, Echtler, Florian, Schreck, Thomas and Hoffmann, Johannes (2013) Mobile-Sandbox: having a deeper look into Android applications. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, March 18 - 22, 2013, Coimbra, Portugal. Fulltext not available.

Burghardt, Manuel, Elsweiler, David, Meier, Florian and Wolff, Christian (2013) Modelle des Informationsverhaltens bei der Websuche. In: Lewandowski, Dirk, (ed.) Handbuch Internet-Suchmaschinen 3 – Suchmaschinen zwischen Technik und Gesellschaft. AKA, Akad. Verl.-Ges., Heidelberg, pp. 111-141. ISBN 978-3-89838-680-7. Fulltext not available.

Will, Sarah, Bazo, Alexander, Meier, Florian and Wolff, Christian (2013) Multi/Touch/Device MindMapper: Creativity Processes in Digital Environments. Natural User Interfaces for Collaborative Controlled Multi User Applications. In: 13th International Symposium of Information Science, 19. - 22. März 2013, Potsdam.

Bourimi, Mohamed, Kesdogan, Dogan, Heupel, Marcel, Abou-Tair, Dhiah el Diehn I. and Lambropoulos, Niki (2013) PETs at CSCL Service: Underutilised Potentials for Privacy-Enhancing Distance Education. Journal of Universal Computer Science. (In Press) Fulltext not available.

Falk, Thomas, Griesberger, Philipp and Leist, Susanne (2013) Patterns as an Artefact for Business Process Improvement - Insights from a Case Study. In: Design Science at the Intersection of Physical and Virtual Design : 8th Internat. Conference DESRIST 2013,, June 11-12, 2013, Helsinki, Finland. Fulltext not available.

Lopez, Javier, Nikova, Svetla, Pashalidis, Andreas, Pernul, Günther and Preneel, Bart (2013) Preface. Computers & Mathematics with Applications 65 (5), p. 747. Fulltext not available.

Heupel, Marcel, Bourimi, Mohamed, Scerri, Simon and Kesdogan, Dogan (2013) Privacy-preserving concepts for supporting recommendations in decentralized OSNs. In: MSM '13 Proceedings of the 4th International Workshop on Modeling Social Media. ACM, New York. ISBN 978-1-4503-2007-8. Fulltext not available.

Riesner, Moritz (2013) Provider-Independent Social Identity Management for Personal and Professional Applications. Shaker, Aachen. ISBN 978-3844021554. Fulltext not available.

Fuchs, Ludwig and Pernul, Günther (2013) Qualitätssicherung im Identity- und Access Management. In: Knoll, Matthias, (ed.) IT-Prüfung und IT-Revision. HMD - Praxis der Wirtschaftsinformatik, 289. dpunkt-verlag, Heidelberg. ISBN 978-3-86490-057-0. Fulltext not available.

Schaller, Richard, Harvey, Morgan and Elsweiler, David (2013) RecSys for Distributed Events: Investigating the Influence of Recommendations on Visitor Plans. In: SIGIR '13 The 36th International ACM SIGIR conference on research and development in Information Retrieval, July 28 - August 01, 2013, Dublin, Ireland. Fulltext not available.

Raab, Felix, Wolff, Christian and Echtler, Florian (2013) RefactorPad: editing source code on touchscreens. In: Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems, June 24 - 27, 2013, London, United Kingdom. Fulltext not available.

Schryen, Guido (2013) Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. European Journal of Information Systems (EJIS) 22 (2), pp. 139-169. (Submitted)

de Meer, Hermann, Diener, Michael, Herkenhöner, Ralph, Kucera, Markus, Niedermeier, Michael, Reisser, Andreas, Schryen, Guido, Vetter, Michael, Waas, Thomas and Yasasin, Emrah (2013) Sicherheitsherausforderungen in hochverteilten Systemen. PIK-Praxis der Informationsverarbeitung und Kommunikation 36 (3), pp. 153-159.

de Meer, Hermann, Diener, Michael, Herkenhöner, Ralph, Kucera, Markus, Niedermeier, Michael, Reisser, Andreas, Schryen, Guido, Vetter, Michael, Waas, Thomas and Yasasin, Emrah (2013) Sicherheitsherausforderungen in hochverteilten Systemen. PIK - Praxis der Informationsverarbeitung und Kommunikation 36 (3), pp. 153-159.

Bazo, Alexander, Burghardt, Manuel and Wolff, Christian (2013) TWORPUS - An Easy-to-Use Tool for the Creation of Tailored Twitter Corpora. In: Proceedings of the 25th International Conference of the German Society for Computational Linguistics and Language Technology, GSCL ’13. , pp. 23-34.

Richthammer, Christian, Netter, Michael, Riesner, Moritz and Pernul, Günther (2013) Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. In: 8th International Conference on Availability, Reliability and Security (ARES).

Rösch, Barbara (2013) Text-Bild-Beziehungen in der Online-Enzyklopädie Wikipedia - Die Rolle von Bildern beim Wissenserwerb mit Wikipedia. In: Hobohm, Hans-Christoph, (ed.) Informationswissenschaft zwischen virtueller Infrastruktur und materiellen Lebenswelten : Proc. d. 13. Internat. Symposiums f. Informationswissenschaft (ISI 2013), Potsdam, 19.-22. März 2013. Schriften zur Informationswissenschaft, 63. Hülsbusch, Glückstadt, pp. 436-441. ISBN 978-3-86488-035-3. Fulltext not available.

Karatas, Fatih, Bourimi, Mohamed and Kesdogan, Dogan (2013) Towards Visual Configuration Support For Interdependent Security Goals. In: Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International). Springer, Berlin. (In Press) Fulltext not available.

Heupel, Marcel, Bourimi, Mohamed and Kesdogan, Dogan (2013) Trust and Privacy in The di.me Userware. In: Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International). Springer, Berlin. (In Press) Fulltext not available.

Burghardt, Manuel, Karsten, Heike, Pflamminger, Melanie and Wolff, Christian (2013) Twitter als interaktive Erweiterung des Mediums Fernsehen: Inhaltliche Analyse von Tatort-Tweets. In: Proceedings of the GSCL 2013 Workshop on "Verarbeitung und Annotation von Sprachdaten aus Genres internetbasierter Kommunikation".

Burghardt, Manuel , Schneidermeier, Tim and Wolff, Christian (2013) Usability Guidelines for Desktop Search Engines. In: Kurosu, M., (ed.) Human-Computer Interaction. Human-Centred Design Approaches, Methods, Tools, and Environments. HCI 2013. Lecture Notes in Computer Science, 8004. Springer, Berlin, pp. 176-183. ISBN 978-3-642-39232-0 (online), 978-3-642-39231-3 (print).

Karatas, Fatih, Barth, Thomas, Kesdogan, Dogan, Fardoun, Habib M. and Villanueva, Pedro G. (2013) Uso de interface distribuída para avaliar a tomada de decisão na nuvem. RTI Magzine (Sao Paulo, Brazil) (1/2013), pp. 82-89. Fulltext not available.

Bazo, Alexander, Burghardt, Manuel and Wolff, Christian (2013) Virtual Bookshelf. Ein Natural User Interface zur Organisation und Exploration digitaler Dokumente. In: Hobohm, Hans-Christoph, (ed.) Informationswissenschaft zwischen virtueller Infrastruktur und materiellen Lebenswelten: Proceedings des 13. Internationalen Symposiums für Informationswissenschaft (ISI 2013). Schriften zur Informationswissenschaft, 63. Hülsbusch, Glückstadt, pp. 490-493. ISBN 978-3-86488-035-3.

Harvey, Morgan, Ludwig, Bernd and Elsweiler, David (2013) You Are What You Eat: Learning User Tastes for Rating Prediction. In: Kurland, Oren, (ed.) String Processing and Information Retrieval. 20th International Symposium, SPIRE 2013, Jerusalem, Israel, October 7-9, 2013, Proceedings. Lecture Notes in Computer Science, 8214. Springer Internat. Publishing, Cham (Switzerland), pp. 153-164. ISBN 978-3-319-02432-5 (online), 978-3-319-02431-8 (print). Fulltext not available.

Bauer, Andreas and Wolff, Christian (2012) Using Stream Features for Instant Document Filtering. In: The Twenty-First Text REtrieval Conference (TREC 2012). NIST Special Publication: SP 500-298, 6.-9.11.2012, Gaithersburg, MD.

Gmelch, Oliver and Pernul, Günther (2012) A Generic Architecture for User-Centric Portlet Integration. In: 14th IEEE Intern. Conference on Business Informatics (IEEE CEC 2012), 9.-11.9.2012, Hangzhou, China.

Netter, Michael, Hassan, Sabri and Pernul, Günther (2012) An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control. In: 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012), 4-6 sept. 2012, Vienna, Austria.

Lory, Peter (2012) Enhancing the Efficiency in Privacy Preserving Learning of Decision Trees in Partitioned Databases. In: Domingo-Ferrer, Josep and Tinnirello, Ilenia, (eds.) Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings. Lecture notes in computer science, 7556. Springer, Berlin, pp. 322-335. ISBN 978-3-642-33626-3. Fulltext not available.

Riesner, Moritz and Pernul, Günther (2012) Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective. In: Proc of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, Workshop on Security and Privacy in Social Networks (SPSN at SocialCom). IEEE Computer Society Press, Boston, USA, pp. 860-867. Fulltext not available.

Fritsch, Christoph and Pernul, Günther (2012) User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection. In: IEEE 9th International Conference on e-Business Engineering, September 9-11, 2012, Hangzhou, China.

Knäusl, Hanna, Elsweiler, David and Ludwig, Bernd (2012) Towards Detecting Wikipedia Task Contexts. In: European Workshop on Human-Computer Interaction and Information Retrieval: EuroHCIR 2012, 25.08.2012, Nijmegen.

Köstlbacher, Anton (2012) Eine Informationssystem-Infrastruktur für das Therapeutische Drug-Monitoring. PhD, Universität Regensburg.

Schaller, Richard, Harvey, Morgan and Elsweiler, David (2012) Entertainment on the Go: Finding Things to Do and See while Visiting Distributed Events. In: In Proceedings Fourth Information Interaction in Context Symposium (IIiX 2012), Nijmegen, the Netherlands.

Riesner, Moritz, Netter, Michael and Pernul, Günther (2012) An Analysis of Implemented and Desirable Settings for Identity
Management on Social Networking Sites.
In: 7th International Conference on Availability, Reliability and Security (ARES 2012), August 20th - 24th, 2012, University of Economics, Prague, Czech Republic.

Fuchs, Ludwig and Pernul, Günther (2012) Minimizing insider misuse through secure Identity Management. Security and Communication Networks 5 (8), pp. 847-862.

Lory, Peter and Liedel, Manuel (2012) Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion. In: Susilo, Willy and Mu, Yi and Seberry, Jennifer, (eds.) Information security and privacy ; 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings. Lecture notes in computer science, 7372. Springer, Berlin, pp. 57-70. ISBN 978-3-642-31447-6. Fulltext not available.

Ritter, Christian, Nöhreiter, Bernhard and Leist, Susanne (2012) Evaluation aktueller Softwarelösungen für das Process Performance Management. ibi research an der Universität Regensburg GmbH, Regensburg. ISBN 978-3-940416-49-0. Fulltext not available.

Gmelch, Oliver (2012) User-Centric Application Integration in Enterprise Portal Systems. Electronic Commerce, 42. EUL-Verlag, Lohmar. ISBN 978-3-8441-0175-1. Fulltext not available.

Dietrich, Susanne, Borst, Nadine, Schlee, Sandra, Schneider, Daniel, Janda, Jan-Oliver, Sterner, Reinhard and Merkl, Rainer (2012) Experimental assessment of the importance of amino acid positions identified by an entropy-based correlation analysis of multiple sequence alignments. Biochemistry. Fulltext not available.

Lory, Peter (2012) Mehrparteienberechnungen und Tschebyscheff-Polynome. In: Konferenz "Cloud & Klein" - IT im Spannungsfeld zwischen Servercluster und Sensornetz, 26.04.2012, Wien.

Bauer, Andreas and Wolff, Christian (2012) Event based classification of Web 2.0 text streams. arXiv / ACM Computing Research Repository (CoRR).

Schryen, Guido (2012) Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften – woran hakt es?, in: Die Zeit (12.04.2012).

Baltrunas, Linas, Ludwig, Bernd and Ricci, Francesco (2012) Rushed or Relaxed? - How the Situation on the Road Influences the Driver's Preferences for Music Tracks. In: ECIR2012: Workshop "Searching 4 Fun!", 01.04.2012, Barcelona.

Penninger, Stefan, Meier, Stefan and Federrath, Hannes (2012) Usability von CAPTCHA-Systemen. In: GI Sicherheit 2012, 07.-09.03.2012, Darmstadt.

Johannsen, Florian and Leist, Susanne (2012) Reflecting modeling languages regarding Wand and Weber's Decomposition Model. In: Fachtagung "Modellierung 2012", 2012, Bamberg. Fulltext not available.

Dürbeck, Stefan (2012) Cross-Domain Identity Management : A maturity model for globally interoperable eIDM frameworks in the European Union. Dürbeck Verlag. ISBN 978-3-00-037283-4. Fulltext not available.

Liedel, Manuel (2012) Secure Distributed Computation of the Square Root and Applications. In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), 9.4-12.4.2012, Hangzhou, China. (In Press)

Schryen, Guido and Wex, Felix (2012) IS Design Thinking in Disaster Management Research. In: 45th Hawaii International Conference on System Sciences, 4.-7. Jan. 2012, Maui, Hawaii, USA.

Riesner, Moritz and Pernul, Günther (2012) Provider-Independent Online Social Identity Management -
Enhancing Privacy Consistently Across Multiple Social Networking Sites.
In: Proc of the 45th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, USA, , 4 - 7 January 2012. IEEE, Piscataway, NJ. ISBN 978-0-7695-4525-7. Fulltext not available.

Kelly, Liadh, Kim, Jinyoung and Elsweiler, David (2012) Workshop on Evaluating Personal Search. ACM SIGIR Forum 45 (2), pp. 81-86. Fulltext not available.

Wagner, Christoph , Greenlee, Mark W. , Jehle, Oliver and Wolff, Christian (2012) Sehen und Verstehen. Funktionen, Wahrnehmungsprozesse, Visualisierungsformen. Kulturelle Bild- und Textstrategien. Blick in die Wissenschaft 25 (12), pp. 3-5. Fulltext restricted.

Ludwig, Bernd, Ricci, Francesco and Yumak, Zerrin (2012) 1st workshop on recommendation technologies for lifestyle change 2012. In: RecSys '12; Proceedings of the sixth ACM conference on Recommender systems. ACM, New York, NY, pp. 357-358. ISBN 978-1-4503-1270-7. Fulltext not available.

Wex, Felix, Schryen, Guido and Neumann, Dirk (2012) A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty. International Journal of Information Systems for Crisis Response and Management 4 (3), pp. 23-41. Fulltext restricted.

de la Cruz, E., Lopez, D. M. and Blobel, Bernd (2012) A Reference Architecture for Sharing Documents in Colombia. European Journal for Biomedical Informatics 8 (3), en11-en17. Fulltext not available.

Blobel, Bernd, Brochhausen, M., Gonzalez, C., Lopez, D. M. and Oemig, Frank (2012) A System-Theoretical, Architecture-Based Approach to Ontology Management. In: Mantas, J. and Andersen, S. K. and Mazzoleni, M. C. and Blobel, Bernd and Quaglini, S. and Moen, A., (eds.) Quality of life through quality of information : proceedings of MIE 2012. Studies in health technology and informatics, 180. IOS Press, Amsterdam, pp. 1087-1089. ISBN 978-1-614-99100-7. Fulltext not available.

Gonzalez, C., Blobel, Bernd and Lopez, D. M. (2012) Adaptive Intelligent Systems for pHealth – An Architectural Approach. In: Blobel, Bernd and Pharow, P. and Sousa, F., (eds.) pHealth 2012 ; proceedings of the 9th International Conference on Wearable Micro and Nano Technologies for Personalized Health : June 26 - 28, 2012, Porto, Portugal. Studies in health technology and informatics, 177. IOS Press, Amsterdam, pp. 170-175. ISBN 978-1-614-99068-0. Fulltext not available.

Blobel, Bernd, Pharow, P. and Ruotsalainen, P. (2012) Advanced Security, Privacy and Trust for Personalized Pervasive Health – Requirements, Principles and Available Specifications. In: Mantas, J., (ed.) Quality of life through quality of information. 24th International Conference of the European Federation for Medical Informatics - MIE2012. CD, Tutorials. Fulltext not available.

Oemig, Frank and Blobel, Bernd (2012) An Ontological Approach to Manage and Harmonize Document Types. In: Mantas, J. and Andersen, S. K. and Mazzoleni, M. C. and Blobel, Bernd and Quaglini, S. and Moen, A., (eds.) Quality of life through quality of information : proceedings of MIE 2012. Studies in health technology and informatics, 180. IOS Press, Amsterdam, pp. 184-188. ISBN 978-1-614-99100-7. Fulltext not available.

Burghardt, Manuel (2012) Annotationsergonomie: Design-Empfehlungen für linguistische Annotationswerkzeuge. Information, Wissenschaft & Praxis 63 (5), pp. 300-304.

Uribe, G. A., Lopez, D. M. and Blobel, Bernd (2012) Architectural Analysis of Clinical Ontologies for pHealth Interoperability. In: Blobel, Bernd and Pharow, P. and Sousa, F., (eds.) pHealth 2012 ; proceedings of the 9th International Conference on Wearable Micro and Nano Technologies for Personalized Health : June 26 - 28, 2012, Porto, Portugal. Studies in health technology and informatics, 177. IOS Press, Amsterdam, pp. 176-182. ISBN 978-1-614-99068-0. Fulltext not available.

Lopez, D. M., Blobel, Bernd and Gonzalez, C. (2012) Architectural Approach for Quality and Safety Aware HealthCare Social Networks. In: Mantas, J. and Andersen, S. K. and Mazzoleni, M. C. and Blobel, Bernd and Quaglini, S. and Moen, A., (eds.) Quality of life through quality of information : proceedings of MIE 2012. Studies in health technology and informatics, 180. IOS Press, Amsterdam, pp. 193-197. ISBN 978-1-614-99100-7. Fulltext not available.

Bernal, J. G., Lopez, D. M. and Blobel, Bernd (2012) Architectural Approach for Semantic EHR Systems Development Based on Detailed Clinical Models. In: Blobel, Bernd and Pharow, P. and Sousa, F., (eds.) pHealth 2012 ; proceedings of the 9th International Conference on Wearable Micro and Nano Technologies for Personalized Health : June 26 - 28, 2012, Porto, Portugal. Studies in health technology and informatics, 177. IOS Press, Amsterdam, pp. 164-169. ISBN 978-1-614-99068-0. Fulltext not available.

Knäusl, Hanna and Ludwig, Bernd (2012) Assessing the relationship between context, user preferences, and content in search behaviour. In: Varde, Aparna S. and Suchanek, Fabian M., (eds.) PIKM '12; Proceedings of the 5th Ph.D. workshop on Information and knowledge, Maui, HI, USA, November 2, 2012. ACM, New York, NY, pp. 67-74. ISBN 978-1-4503-1719-1. Fulltext not available.

Ruiz, F., García, F., Calohorra, L., Llorente, C., Gonçalves, L., Daniel, C. and Blobel, Bernd (2012) Business Process Modeling in Healthcare. In: Garcia-Rojo, M. and Blobel, Bernd and Laurinavicius, A., (eds.) Perspectives on Digital Pathology : results of the COST Action IC0604 EURO-TELEPATH. Studies in health technology and informatics, 179. IOS Press, Amsterdam, pp. 75-87. ISBN 978-1-614-99085-7. Fulltext not available.

Hain, Torsten, Ghai, Rohit , Billion, Andre, Kuenne, Carsten Tobias , Steinweg, Christiane, Izar, Benjamin, Mohamed, Walid, Mraheil, Mobarak, Domann, Eugen, Schaffrath, Silke, Kärst, Uwe, Goesmann, Alexander , Oehm, Sebastian, Pühler, Alfred, Merkl, Rainer , Vorwerk, Sonja, Glaser, Philippe, Garrido, Patricia, Rusniok, Christophe, Buchrieser, Carmen , Goebel, Werner and Chakraborty, Trinad (2012) Comparative genomics and transcriptomics of lineages I, II, and III strains of Listeria monocytogenes. BMC genomics 13 (1), p. 144.

Harvey, Morgan, Carman, Mark and Elsweiler, David (2012) Comparing Tweets and Tags for URLs. In: Advances in Information Retrieval. 34th European Conference on IR Research, ECIR 2012, Barcelona, Spain, April 1-5, 2012. Proc. Lecture Notes in Computer Science, 7224. Springer, Berlin, pp. 73-84. ISBN 978-3-642-28996-5 (print), 978-3-642-28997-2 (online).

Netter, Michael (2012) Conceptualizing Transparency on Online Social Networks. Tiny Transactions on Computer Science (TinyToCS) 1.

Baltrunas, Linas, Ludwig, Bernd, Peer, Stefan and Ricci, Francesco (2012) Context relevance assessment and exploitation in mobile recommender systems. Personal and Ubiquitous Computing 16 (5), pp. 507-526. Fulltext not available.

Meier, Florian (2012) Crowdsourcing als Rekrutierungsstrategie im asynchronen Remote-Usability-Test. Information - Wissenschaft und Praxis : IW 63 (5), pp. 308-313. Fulltext not available.

Ludwig, Bernd and Hitzenberger, Ludwig (2012) Did You Say What I Think You Said? - Towards a Language-Based Measurement of a Speech Recognizer's Confidence. In: Sojka,, Petr, (ed.) Text, speech and dialogue; 15th international conference, TSD 2012, Brno, Czech Republic, September 3-7, 2012, Proceedings. Part III. Lecture notes in computer science, 7499. Springer, Berlin, pp. 431-437. ISBN 9783642327896. Fulltext not available.

Peterhoff, David, Zellner, Hermann, Guldan, Harald, Merkl, Rainer , Sterner, Reinhard and Babinger, Patrick (2012) Dimerization determines substrate specificity of a bacterial prenyltransferase. Chembiochem : a European journal of chemical biology 13 (9), pp. 1297-1303. Fulltext not available.

Mihalas, G., Detmer, D., Li, Y. C. J., Haux, R. and Blobel, Bernd (2012) EFMI Initiatives for Inter-Regional Cooperation: The TrEHRT Project. In: Blobel, Bernd and Engelbrecht, R. and Shifrin, M. A., (eds.) Large scale projects in ehealth : partnership in modernization ; proceedings of the EFMI special topic conference, 18 - 20 April 2012, Moscow, Russia. Studies in health technology and informatics, 174. IOS Press, Amsterdam, pp. 3-7. ISBN 978-1-614-99051-2. Fulltext not available.

Oemig, Frank and Blobel, Bernd (2012) Ein Ontologie-basierter Ansatz zur Verwaltung und Harmonisierung von Dokumenttypen. In: Staußberg, J., (ed.) Informatik 2012. Was bewegt uns in der/die Zukunft?; 42. Jahrestagung der Ges. für Med. Informatik, GMDS 2012, Braunschweig, 16.-20.9.2012. Abstractbd. Ges. für Informatik, Bonn, pp. 298-299. Fulltext not available.

Blobel, Bernd, Brochhausen, M., Oemig, Frank, González, C. and Lopez, D. (2012) Ein systemtheoretischer architekturbasierter Ansatz für das Ontologiemanagement. In: Staußberg, J., (ed.) Informatik 2012. Was bewegt uns in der/die Zukunft?; 42. Jahrestagung der Ges. für Med. Informatik, GMDS 2012, Braunschweig, 16.-20.9.2012. Abstractbd. Ges. für Informatik, Bonn, pp. 237-238. Fulltext not available.

Knäusl, Hanna, Rösch, Barbara and Schubart, Lea (2012) Einfluss von Kontextfaktoren auf das Suchverhalten in der Wikipedia. Information - Wissenschaft & Praxis (Inf. Wiss. & Praxis) 63 (5), pp. 319-323.

Lang, Fabian, Schryen, Guido and Fink, Andreas (2012) Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study. In: International Conference on Information Systems, December, 16-19, 2012 (conditionally accepted), Orlando, FL, USA.

Bodenstein, Christian, Schryen, Guido and Neumann, Dirk (2012) Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers. European Journal of Operational Research : EJOR 222 (1), pp. 157-167. Fulltext restricted.

Bodenstein, Christian, Schryen, Guido and Neumann, Dirk (2012) Energy-aware workload management models for operation cost reduction in data centers. European Journal of Operational Research 222 (1), pp. 157-167. Fulltext not available.

Müller, Manuel, Mika, Stefanie, Harvey, Morgan and Elsweiler, David (2012) Estimating nutrition values for internet recipes. In: 6th International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2012 and Workshops, May 21–24, 2012, San Diego, California, United States. Fulltext not available.

Harvey, M. and Elsweiler, David (2012) Exploring Query Patterns in Email Search. In: Proceedings of BCS European Conference on Information Retrieval.

Gonzalez, C., Blobel, Bernd and Lopez, D. M. (2012) Formal Specification of an Ontology-Based Service for EHR Interoperability. In: Mantas, J. and Andersen, S. K. and Mazzoleni, M. C. and Blobel, Bernd and Quaglini, S. and Moen, A., (eds.) Quality of life through quality of information : proceedings of MIE 2012. Studies in health technology and informatics, 180. IOS Press, Amsterdam, pp. 78-82. ISBN 978-1-614-99100-7. Fulltext not available.

Echtler, Florian and Butz, Andreas (2012) GISpL: gestures made easy. In: TEI '12. Proc. of the Sixth Internat. Conf. on Tangible, Embedded and Embodied Interaction. ACM, New York, NY, USA, pp. 233-240. ISBN 978-1-4503-1174-8. Fulltext not available.

Kattenbeck, Markus (2012) Handlungsorientierte Modellierung von Landmarken im Innen- und Außenbereich. Eine informationswissenschaftliche Fragestellung. Information - Wissenschaft & Praxis 63 (5), pp. 338-342. Fulltext not available.

Meier, Florian and Wolff, Christian (2012) IA von Websites: asynchrone Remote-Tests und Laborstudien im Vergleich. In: Mensch & Computer 2012: interaktiv informiert - allgegenwärtig und allumfassend!?, September 9-12, 2012, Konstanz, Germany. Fulltext not available.

Gutch, Harold W., Gruber, Peter, Yeredor, Arie and Theis, Fabian J. (2012) ICA over finite fields—Separability and algorithms. Signal Processing 92 (8), pp. 1796-1808. Fulltext not available.

Schaller, Richard, Harvey, Morgan and Elsweiler, David (2012) Improving Search Experience on Distributed Leisure Events. In: 2nd European Workshop on Human-Computer Interaction and Information Retrieval, August 25, 2012, Nijmegen, The Netherlands. Fulltext not available.

Ludwig, Bernd and Reischer, Jürgen (2012) Informationslinguistik in Regensburg. Information - Wissenschaft und Praxis : IWP 63 (5), pp. 292-296. Fulltext not available.

Müller, Manuel, Harvey, Morgan, Elsweiler, David and Mika, Stefanie (2012) Ingredient Matching to Determine the Nutritional Properties of Internet-Sourced Recipes. In: 6th International Conference on Pervasive Computing Technologies for Healthcare, 21. - 24. Mai 2012, San Diego, California, USA.

Fuchs, Ludwig (2012) Innovatives Identitätsmanagement. In: Studie IT Security. IT Verlag für Informationstechnik GmbH, Deutschland, pp. 220-236. ISBN 3-936052-38-7. Fulltext not available.

Hay, C., Moen, A., Chronaki, C., Blobel, Bernd, Kreysa, U. and Jaffe, C. (2012) Joint workshop HL7-GS1: Information Exchange Standards meet Supply Chain Standard. In: Mantas, J., (ed.) Quality of life through quality of information. 24th International Conference of the European Federation for Medical Informatics - MIE2012. CD, Workshops. Fulltext not available.

Elsweiler, David, Harvey, Morgan and Ludwig, Bernd (2012) Kochen im Kontext - Am Alltag orientierte Empfehlung von Gerichten. Information - Wissenschaft und Praxis (Inf. Wiss. & Praxis) 63 (5), pp. 324-328.

Blobel, Bernd and Engelbrecht, R. and Shifrin, M. A., eds. (2012) Large scale projects in ehealth : partnership in modernization ; proceedings of the EFMI special topic conference, 18 - 20 April 2012, Moscow, Russia. Studies in health technology and informatics, 174. IOS Press, Amsterdam. ISBN 978-1-614-99051-2. Fulltext not available.

Harvey, Morgan, Ludwig, Bernd and Elsweiler, David (2012) Learning user tastes: a first step to generating healthy meal plans. In: First international workshop on recommendation technologies for lifestyle change (lifestyle 2012), September 13, 2012, Dublin, Ireland. Fulltext not available.

Westermann, B. and Kesdogan, Dogan (2012) Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. In: Financial Cryptography and Data Security. 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science, 7035. Springer, Berlin, pp. 62-76. ISBN 978-3-642-27575-3; 978-3-642-27576-0 (online). Fulltext not available.

Fuchs, Ludwig and Pernul, Günther (2012) Minimizing insider misuse through secure Identity Management. Security and Communication Networks 5 (8), pp. 847-862. Fulltext not available.

Blobel, Bernd, Allaert, F., Kalra, D., Pharow, P., Ruotsalainen, P., Sauermann, S. and Yildirim, S. (2012) Mobile Technologies and Policies on the Move to Pervasive Care. In: Mantas, J., (ed.) Quality of life through quality of information. 24th International Conference of the European Federation for Medical Informatics - MIE2012. CD, Workshops. Fulltext not available.

Ludwig, Bernd (2012) Modell und Gegenstand - untrennbar miteinander verbunden. KI 26 (4), pp. 325-327. Fulltext not available.

Wex, Felix, Schryen, Guido and Neumann, Dirk (2012) Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units. In: International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012, 22. - 25. April 2012, Vancouver. (In Press)

Schaller, Richard, Harvey, Morgan and Elsweiler, David (2012) Out and About on Museums Night: Investigating Mobile Search Behaviour for Leisure Events. In: Searching4Fun Workshop, ECIR2012, 1. - 5. April 2012, Barcelona.

Hall, J. A. and Blobel, Bernd (2012) Paradigm Changes in Health Lead to Paradigm Changes in Pathology. In: Garcia-Rojo, M. and Blobel, Bernd and Laurinavicius, A., (eds.) Perspectives on Digital Pathology : results of the COST Action IC0604 EURO-TELEPATH. Studies in health technology and informatics, 179. IOS Press, Amsterdam, pp. 38-50. ISBN 978-1-614-99085-7. Fulltext not available.

Garcia-Rojo, M. and Blobel, Bernd and Laurinavicius, A., eds. (2012) Perspectives on Digital Pathology : results of the COST Action IC0604 EURO-TELEPATH. Studies in health technology and informatics, 179. IOS Press, Amsterdam. ISBN 978-1-614-99085-7. Fulltext not available.

Blobel, Bernd, Engelbrecht, R. and Shifrin, M. A. (2012) Preface. In: Blobel, Bernd and Engelbrecht, R. and Shifrin, M. A., (eds.) Large scale projects in ehealth : partnership in modernization ; proceedings of the EFMI special topic conference, 18 - 20 April 2012, Moscow, Russia. Studies in health technology and informatics, 174. IOS Press, Amsterdam, v-vi. ISBN 978-1-614-99051-2. Fulltext not available.

Blobel, Bernd, Pharow, P. and Sousa, F. (2012) Preface. In: Blobel, Bernd and Pharow, P. and Sousa, F., (eds.) pHealth 2012 ; proceedings of the 9th International Conference on Wearable Micro and Nano Technologies for Personalized Health : June 26 - 28, 2012, Porto, Portugal. Studies in health technology and informatics, 177. IOS Press, Amsterdam, v-vi. ISBN 978-1-614-99068-0. Fulltext not available.

Garcia-Rojo, M., Blobel, Bernd and Laurinavicius, A. (2012) Preface. In: Garcia-Rojo, M. and Blobel, Bernd and Laurinavicius, A., (eds.) Perspectives on Digital Pathology : results of the COST Action IC0604 EURO-TELEPATH. Studies in health technology and informatics, 179. IOS Press, Amsterdam, v-vi. ISBN 978-1-614-99085-7. Fulltext not available.

Mantas, J., Andersen, S. K., Mazzoleni, M. C., Blobel, Bernd, Quaglini, S. and Moen, A. (2012) Preface. In: Mantas, J. and Andersen, S. K. and Mazzoleni, M. C. and Blobel, Bernd and Quaglini, S. and Moen, A., (eds.) Quality of life through quality of information : proceedings of MIE 2012. Studies in health technology and informatics, 180. IOS Press, Amsterdam, v-vi. ISBN 978-1-614-99100-7. Fulltext not available.

Mantas, J. and Andersen, S. K. and Mazzoleni, M. C. and Blobel, Bernd and Quaglini, S. and Moen, A., eds. (2012) Quality of life through quality of information : proceedings of MIE 2012. Studies in health technology and informatics, 180. IOS Press, Amsterdam. ISBN 978-1-614-99100-7. Fulltext not available.

Elsweiler, David, Wilson, M and Harvey, Morgan (2012) Searching4fun. In: ECIR workshop. Fulltext not available.

Blobel, Bernd (2012) Security and Privacy Services in Pathology for Enabling Trustworthy Personal Health. In: Garcia-Rojo, M. and Blobel, Bernd and Laurinavicius, A., (eds.) Perspectives on Digital Pathology : results of the COST Action IC0604 EURO-TELEPATH. Studies in health technology and informatics, 179. IOS Press, Amsterdam, pp. 203-317. ISBN 978-1-614-99085-7. Fulltext not available.

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter and Wenzl, Jürgen (2012) Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography. In: Obaidat, M. S. and Sevillano, J. L. and Filipe, J., (eds.) E-Business and Telecommunications : ICETE 2011 , Seville, Spain, July 18-21. Communications in Computer and Information Science, 314. Springer, Berlin, pp. 74-81. ISBN 978-3-642-35755-8. Fulltext not available.

Cunningham, Padraig and Hurley, Neil J. and Guy, Ido and Anand, Sarabjot Singh, eds. (2012) Sixth ACM Conference on Recommender Systems, RecSys '12, Dublin, Ireland, September 9-13, 2012. ACM, New York, NY. ISBN 978-1-4503-1270-7. Fulltext not available.

Schryen, Guido (2012) Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear. Information Multimedia Communication imc. (In Press)

Bienk, Stefan and Zahneisen, Anton (2012) Spitzencluster Medical Valley: Verbund intelligente Sensorik: Teilprojekt IS09a; Abschlussbericht PULSERA (Förderkennzeichen BMBF 13EX1014K). SOPHIA living network - Bundesministerium für Bildung und Forschung, Bamberg. Fulltext not available.

Blobel, Bernd (2012) Standards and Solutions for Architecture Based, Ontology Driven and Individualized Pervasive Health. In: Blobel, Bernd and Pharow, P. and Sousa, F., (eds.) pHealth 2012 ; proceedings of the 9th International Conference on Wearable Micro and Nano Technologies for Personalized Health : June 26 - 28, 2012, Porto, Portugal. Studies in health technology and informatics, 177. IOS Press, Amsterdam, pp. 147-157. ISBN 978-1-614-99068-0. Fulltext not available.

Blobel, Bernd and Stegwee, R., eds. (2012) Standards and Solutions for eHealth Interoperability. European Journal of Biomedical Informatics vol. 8, issue 3. EuroMISE s.r.o., Prag. Fulltext not available.

Blobel, Bernd and Stegwee, R., eds. (2012) Standards and Solutions for eHealth Interoperability. European Journal of Biomedical Informatics vol. 8, issue 4. EuroMISE s.r.o., Prag. Fulltext not available.

Schrader, T., Blobel, Bernd, Garcia-Rojo, M., Daniel, C. and Slodkowska, J. (2012) State of the Art in Pathology Business Process Analysis, Modeling, Design and Optimization. In: Garcia-Rojo, M. and Blobel, Bernd and Laurinavicius, A., (eds.) Perspectives on Digital Pathology : results of the COST Action IC0604 EURO-TELEPATH. Studies in health technology and informatics, 179. IOS Press, Amsterdam, pp. 88-102. ISBN 978-1-614-99085-7. Fulltext not available.

Blobel, Bernd (2012) Telepathology Interoperability – A System Architectural Approach. In: Garcia-Rojo, M. and Blobel, Bernd and Laurinavicius, A., (eds.) Perspectives on Digital Pathology : results of the COST Action IC0604 EURO-TELEPATH. Studies in health technology and informatics, 179. IOS Press, Amsterdam, pp. 51-61. ISBN 978-1-614-99085-7. Fulltext not available.

Garcia-Rojo, M., Blobel, Bernd and Gonçalves, L. (2012) The COST Action IC0604 “Telepathology Network in Europe” (EURO-TELEPATH). In: Garcia-Rojo, M. and Blobel, Bernd and Laurinavicius, A., (eds.) Perspectives on Digital Pathology : results of the COST Action IC0604 EURO-TELEPATH. Studies in health technology and informatics, 179. IOS Press, Amsterdam, pp. 3-12. ISBN 978-1-614-99085-7. Fulltext not available.

Burghardt, Manuel, Heckner, Markus and Wolff, Christian (2012) The Many Ways of Searching the Web Together : A Comparison of Social Search Engines. In: Lewandowski, Dirk, (ed.) Web Search Engine Research. Library and Information Science, 4. Emerald Group Publishing Limited., Bingley, UK, pp. 1-28. ISBN 978-1-78052-636-2. Fulltext not available.

Knäusl, Hanna, Elsweiler, David and Ludwig, Bernd (2012) Towards Detecting Wikipedia Task Contexts. In: 2nd European Workshop on Human-Computer Interaction and Information Retrieval, August 25, 2012, Nijmegen, The Netherlands. Fulltext not available.

Elsweiler, David (2012) Understanding the Complexities of Email Behaviour. Information - Wissenschaft und Praxis (Inf. Wiss. & Praxis) 63 (5), pp. 314-318.

Burghardt, Manuel (2012) Usability Recommendations for Annotation Tools. In: 6th Linguistic Annotation Workshop - Proceedings of the ACL 2012. Association for Computational Linguistics, Jeju, pp. 104-112.

Thomas, Paul and Elsweiler, David (2012) Using Card Sorts to Understand how Users Think of Personal Information. In: 2nd European Workshop on Human-Computer Interaction and Information Retrieval, August 25, 2012, Nijmegen, The Netherlands. Fulltext not available.

Johannsen, Florian and Leist, Susanne (2012) Wand and Weber’s Decomposition Model in the Context of Business Process Modeling. Business & Information Systems Engineering 4 (5), pp. 271-286. Fulltext not available.

Burghardt, Manuel, Schneidermeier, Tim and Wolff, Christian (2012) Zur Nachhaltigkeit von Gestaltungslösungen: Prototyping und Patterns. In: Reiterer, Harald and Deussen, Oliver, (eds.) Mensch & Computer 2012 – Workshopband: interaktiv informiert – allgegenwärtig und allumfassend!? Oldenbourg, München, pp. 213-223. ISBN 978-3-486-71990-1.

Blobel, Bernd and Pharow, P. and Sousa, F., eds. (2012) pHealth 2012 ; proceedings of the 9th International Conference on Wearable Micro and Nano Technologies for Personalized Health : June 26 - 28, 2012, Porto, Portugal. Studies in health technology and informatics, 177. IOS Press, Amsterdam. ISBN 978-1-614-99068-0. Fulltext not available.

Weippl, Edgar, Tjoa, A. Min and Pernul, Günther (2011) Advances in Applied Security. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependabe Applications Vol. 2 (No. 4).

Wimmer, Raphael and Baudisch, Patrick (2011) Modular and Deformable Touch-Sensitive Surfaces Based on Time Domain Reflectometry. In: 24th annual ACM symposium on User interface software and technology, October 16 - 19, 2011, Santa Barbara, California, USA.

Mandl, Stefan and Ludwig, Bernd and Michahelles, Florian, eds. (2011) Context Aware Intelligent Assistance 2011. Proceedings of the 2nd Workshop on Context Aware Intelligent Assistance (CAIA-2011). CEUR workshop proceedings, 786. RWTH Aachen. Fulltext not available.

Netter, Michael, Herbst, Sebastian and Pernul, Günther (2011) Analyzing Privacy in Social Networks - An Interdisciplinary Approach. In: Proc. of the Third IEEE International Conference on Social Computing Workshop on Security and Privacy in Social Networks (SPSN at SocialCom). IEEE Computer Society Press, Boston, USA.

Maurer, Thilo (2011) The QPACE supercomputer, renormalization of dynamical CI fermions, axial charges of excited nucleons. PhD, Universität Regensburg.

Zellner, H., Staudigel, M., Trenner, T., Bittkowski, M., Wolowski, V., Icking, C. and Merkl, Rainer (2011) Prescont: Predicting protein-protein interfaces utilizing four residue properties. Proteins. Fulltext not available.

Petkova-Nikova, Svetla and Pashalidis, Andreas and Pernul, Günther, eds. (2011) Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011. Lecture Notes in Computer Science, 7163. Springer, Leuven, Belgium. ISBN 978-3-642-29803-5. Fulltext not available.

Furdik, Karol, Bednar, Peter, Lukac, Gabriel and Fritsch, Christoph (2011) Support of Semantic Interoperability in a Service-based Business Collaboration Platform. Scientific International Journal for Parallel and Distributed Computing: Scalable Computing: Practice and Experience 12 (3), pp. 293-305.

Furnell, Steven and Lambrinoudakis, Costas and Pernul, Günther, eds. (2011) Trust, Privacy and Security in Digital Business: 8th International Conference / TrustBus 2011, Toulouse, France. Prodeedings. Lecture Notes in Computer Science, 6863. Springer, Berlin. ISBN 978-3-642-22889-6. Fulltext not available.

Baltrunas, Linas, Kaminskas, Marius, Ludwig, Bernd, Moling, Omar, Ricci, Francesco, Lüke, Karl-Heinz and Schwaiger, Roland (2011) InCarMusic: Context-Aware Music Recommendations in a Car. In: International Conference on Electronic Commerce and Web Technologies - EC-Web 2011, 29.08.2011-02.09.2011, Toulouse (Frankreich). Fulltext not available.

Fuchs, Ludwig, Pernul, Günther and Sandhu, Ravi (2011) Roles In Information Security - A Survey And Classification Of The Research Area. Computers & Security.

Fritsch, Christoph, Bednar, Peter and Pernul, Günther (2011) DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure. In: Huemer, Christian and Setzer, Thomas, (eds.) E-Commerce and Web Technologies. 12th International Conference, EC-Web 2011, Toulouse, France, August 30 - September 1, 2011. Proceedings. Lecture Notes in Business Information Processing, 85, Part 1. Springer, Berlin, pp. 13-24.

Biendl, Michael (2011) Die Vorratsdatenspeicherung in Europa, Deutschland und Bayern - eine vergleichende Betrachtung und Bewertung aus Sicht der IT-Sicherheit. Expertise. (Submitted)

Fuchs, Ludwig and Meier, S. (2011) The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective. In: Tjoa, A. Min, (ed.) Availability, reliability and security for business, enterprise and health information systems : IFIP WG 8.4/8.9 international cross domain conference and workshop ; proceedings / ARES 2011, Vienna, Austria, August 22 - 26, 2011. Lecture notes in computer science, 6908. Springer, Berlin. ISBN 978-3-642-23299-2, 978-3-642-23300-5 (online). Fulltext not available.

Baltrunas, Linas, Ludwig, Bernd, Peer, Stefan and Ricci, Francesco (2011) Context-Aware Places of Interest Recommendations for Mobile Users. In: International Conference on Human-Computer Interaction (HCII 2011), 09.07.2011-14.07.2011, Orlando. Fulltext not available.

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter and Wenzl, Jürgen (2011) Optimizing cryptographic threshold schemes for the use in wireless sensor networks. In: Obaidat, Mohammad S. and Sevillano, Jose Luis and Ortega, Eusebi Calle, (eds.) Proceedings of DCNET 2011 ‑ International Conference on Data Communication Networking, July 2011. SciTePress - Science and Technology Publications, Seville, Spain, pp. 75-78. ISBN 978-989-8425-69-0.

Ohlmann, Andreas , Merkl, Rainer and Tamm, Ernst R. (2011) Focus on Molecules: Norrin. Experimental eye research. Fulltext not available.

Meilinger, Manuel (2011) Metal artifact reduction and image processing of cone-beam computed tomography data for mobile C-arm CT devices. Dissertationsreihe der Fakultät für Physik der Universität Regensburg 20, PhD, Universität Regensburg.

Dürbeck, Stefan, Kolter, Jan, Pernul, Günther and Schillinger, Rolf (2011) Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten. Informatik-Spektrum 34 (3), pp. 265-275.

Fischer, André, Seitz, Tobias, Lochner, Adriane, Sterner, Reinhard, Merkl, Rainer and Bocola, Marco (2011) A Fast and Precise Approach for Computational Saturation Mutagenesis and its Experimental Validation by Using an Artificial (βα)8-Barrel Protein. ChemBioChem. Fulltext not available.

Klarl, Heiko (2011) Zugriffskontrolle in Geschäftsprozessen - Ein modellgetriebener Ansatz. Vieweg+Teubner, Wiesbaden. ISBN 978-3-8348-1465-4. Fulltext not available.

Kern, Walter (2011) eGovWDF:Validation - A new approach to input validation in Web based eGovernment applications. Technical Report.

Lory, Peter and Wenzl, Jürgen (2011) A Note on Secure Multiparty Multiplication. Working Paper, Regensburg.

Pürzer, Andreas, Grassmann, Felix, Birzer, Dietmar and Merkl, Rainer (2011) Key2Ann: a tool to process sequence sets by replacing database identifiers with a human-readable annotation. Journal of integrative bioinformatics 8 (1). Fulltext not available.

Burghardt, Manuel, Schneidermeier, Tim, Heckner, Markus and Wolff, Christian (2011) Social Media-Marketing im Hochschulbereich. In: Griesbaum, Joachim and Mandl, Thomas and Womser-Hacker, Christa, (eds.) Information und Wissen: global, sozial und frei? Proceedings des 12. Internationalen Symposiums für Informationswissenschaft (ISI 2011, Hildesheim, 9. - 11. März 2011). Schriften zur Informationswissenschaft, 58. Hülsbusch, Boizenburg, pp. 478-492. ISBN 978-3-940317-91-9.

Federrath, Hannes (2011) Löschen im Internet. In: 56. Sitzung des Arbeitskreises "Technik" der Datenschutzbeauftragten des Bundes und der Länder, 22. Februar 2011, Saarbrücken. Fulltext not available.

Gmelch, Oliver and Pernul, Günther (2011) A portal-based approach for user-centric legacy application integration in collaborative environments. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011). Schweiz.

Netter, Michael, Riesner, Moritz and Pernul, Günther (2011) Assisted Social Identity Management - Enhancing Privacy in the Social Web. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011), 16.-18.Februar 2011, Zürich. Schweiz.

Baltrunas, Linas, Ludwig, Bernd and Ricci, Francesco (2011) Context Relevance Assessment for Recommender systems. In: International Conference on Intelligence User Interfaces (IUI 2011), 13.02.2011-16.02.2011, Palo Alto.

Wimmer, Raphael (2011) Grasp Sensing for Human-Computer Interaction. In: Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, TEI'11, Funchal, Madeira, Portugal.

Priebe, Torsten, Reisser, Andreas and Hoang, Duong Thi Anh (2011) Reinventing the Wheel?! Why Harmonization and Reuse Fail in Complex Data Warehouse Environments and a Proposed Solution to the Problem. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011). Schweiz.

Reischer, Jürgen (2011) Informationslinguistische Verfahren der Informationsselektion aus Textdokumenten. In: Linguistisches Forum LIFO, 26.1.2011, Regensburg.

Federrath, Hannes (2011) Schutz der Privatsphäre im Internet. In: Vortrag an der Berufsschule B6, 18. Januar 2011, Nürnberg.

Federrath, Hannes (2011) Ermittlungen im Spannungsfeld von Freiheit und Sicherheit. In: Internationales Seminar „Neue Medien und Kriminaltät – Kriminalität im Internet“, 13. Januar 2011, Münster.

Westermann, Benedikt, Fischer, Lars and Vinh Pam, Dang (2011) 50 Bucks Attack on Tor. In: 16th Nordic Conference in Secure IT Systems (NordSec), 26 - 28 Oct. 2011, Tallinn, Estonia. Fulltext not available.

Scheuer, Florian, Fuchs, Karl-Peter and Federrath, Hannes (2011) A Safety-Preserving Mix Zone for VANETs. In: Furnell, Stephen and Lambrinoudakis, Costas and Pernul, Günther, (eds.) Trust, Privacy and Security in Digital Business. 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings. Lecture Notes in Computer Science, 6863. Springer, Berlin, pp. 37-48. Fulltext not available.

Pernul, Günther and Riesner, Moritz (2011) Conceptual Design of Secure Databases. In: van Tilborg, Henk C. A. and Jajodia, Sushil, (eds.) Encyclopedia of Cryptography and Security. 2. Auflage. Springer, New York, pp. 245-248. ISBN 978-1-441-95906-5; 978-1-4419-5905-8 (ISBN der Printausgabe). Fulltext not available.

Baltrunas, Linas, Ludwig, Bernd, Peer, Stefan and Ricci, Francesco (2011) Context Relevance Assessment and Exploitation in Mobile Recommender Systems. Personal and Ubiquitous Computing, pp. 1-20. Fulltext not available.

Böhm, Patricia, Schneidermeier, Tim and Wolff, Christian (2011) Customized Usability Engineering for a Solar Control Unit: Adapting Traditional Methods to Domain and Project Constraints. In: Marcus, Aaron, (ed.) Design, User Experience, and Usability. Theory, Methods, Tools and Practice. First International Conference, DUXU 2011, Held as Part of HCI International 2011, Orlando, FL, USA, July 9-14, 2011, Proceedings, Part II. Lecture Notes in Computer Science, 6770. Springer, Berlin / Heidelberg, pp. 109-117. ISBN 978-3-642-21708-1. Fulltext not available.

Reischer, Jürgen (2011) Das Konzept der Informativität - Eine begriffliche Positionsbestimmung für die Informationswissenschaft. In: Information und Wissen: global, sozial und frei? 12. Internationales Symposium für Informationswissenschaft, ISI 2011, 9.-11. März 2011, Hildesheim, Germany. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (2011) Datensicherheit. In: Schulte, Martin and Schröder, Rainer, (eds.) Handbuch des Technikrechts. 2. Auflage. Springer, Berlin, pp. 857-886. ISBN 978-3-642-11883-8. Fulltext not available.

Burghardt, Manuel, Heckner, Markus, Kattenbeck, Markus, Schneidermeier, Tim and Wolff, Christian (2011) Design Thinking = Human-centered Design? In: Eibl, Maximilian and Ritter, Marc, (eds.) Workshop-Proceedings der Tagung Mensch & Computer 2011. überMEDIEN|ÜBERmorgen. Universitätsverlag Chemnitz, Chemnitz, pp. 363-368.

Islinger, Tobias, Köhler, Thorsten and Ludwig, Bernd (2011) Driver Distraction Analysis based on FFT of steering wheel angle. Adjunct Proceedings of the 3rd International Conference on Automotive User Interfaces and Interactive Vehicular Applications, pp. 21-22. Fulltext not available.

Mühlbauer, Karl and Bartmann, Dieter (2011) 7. Effizienzsteigerung hochflexibler Geschäftsprozesse mittels Simulation. In: Sinz, Elmar J. and Bartmann, Dieter and Bodendorf, Freimut and Ferstl, Otto K., (eds.) Dienstorientierte IT-Systeme für hochflexible Geschäftsprozesse. Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg, 9 (7). University of Bamberg Press, Bamberg, Deutschland, pp. 129-150. ISBN 978-3-86309-009-8.

Heckner, Markus, Schneidermeier, Tim, Bazo, Alexander, Wagner, Thomas, Wilhelm, Thomas and Wolff, Christian (2011) Engineering Mobile User Experience: Think. Design. Fail. Iterate. Publish. In: Eibl, M., (ed.) Mensch & Computer 2011: überMEDIEN|ÜBERmorgen. Oldenbourg, München, pp. 69-78. ISBN 978-3-486-71235-3. Fulltext not available.

Reischer, Jürgen, Lottes, Daniel, Meier, Florian and Stirner, Matthias (2011) Evaluation von Summarizing-Systemen - Kommerzielle und freie Systeme im Vergleich. In: Information und Wissen: global, sozial und frei? 12. Internationales Symposium für Informationswissenschaft, ISI 2011, 9.-11. März 2011, Hildesheim, Germany. Fulltext not available.

Bienk, Stefan (2011) Home Lab-Context-Aware Fall-Risk Assessment at Home. In: Proceedings of the 2nd Workshop on Context Aware Intelligent Assistance, 04. Oktober 2011, Berlin. Fulltext not available.

Burghardt, Manuel, Fuchs, Markus and Wolff, Christian (2011) Improving the Usability of Corpus Markup and Analysis Tools by Studying their Presentation Layer. In: Philology in the Digital Age - Annual TEI Conference, Würzburg.

Dotzler, Bernhard and Kittler, Friedrich, eds. (2011) Intelligence service : Schriften / Alan M. Turing. Brinkmann u. Bose, Berlin. ISBN 3-922660-22-3. Fulltext not available.

Schryen, Guido (2011) Is open source security a myth? Communications of the ACM 54 (5), pp. 130-140. Fulltext not available.

Burghardt, Manuel, Heckner, Markus, Schneidermeier, Tim, Raab, Felix and Wolff, Christian (2011) Konzepte zur „begreifbaren Lehre“ in der Regensburger Medieninformatik. In: Eibl, Maximilian and Ritter, Marc, (eds.) Workshop-Proceedings der Tagung Mensch & Computer 2011. überMEDIEN|ÜBERmorgen. Universitätsverlag Chemnitz, Chemnitz, pp. 171-175. ISBN 978-3941003385.

Lamber, Patrick, Ludwig, Bernd, Ricci, Francesco, Zini, Floriano and Mitterer, Manfred (2011) Message-Based Patient Guidance in Day-Hospital. In: 12th International Conference on Mobile Data Management (MDM 2011), 06.06.2011-09.06.2011, Lulea. (In Press) Fulltext not available.

Lory, Peter (2011) On Petri Net Representations of Cryptographic Workflows in Electronic Government. In: Sprague, Ralph H. Jr., (ed.) Proceedings of the Forty-Fourth Annual Hawaii International Conference on Systems Sciences. IEEE Computer Society Conference Publishing Services, Los Alamitos, CA. ISBN 978-0-7695-4282-9.

Ludwig, Bernd, Elsweiler, David, Mandl, Stefan and Mika, Stefanie (2011) REFRESH: REcommendations and Feedback for Realising and Stabilising Health. In: Pervasive Health, 23.05.2011-26.05.2011, Dublin. (In Press) Fulltext not available.

Leist, Susanne and Rosemann, Michael (2011) Research Process Management. In: Australiasian Conference on Information Systems ACIS 2011 - "Identifying the Information Systems Discipline", 30th November - 2nd December 2011, Sydney. Fulltext not available.

Elsweiler, David, Losada, D. E., Toucedo, J. C. and Fernandez, R. T. (2011) Seeding simulated queries with user-study data for personal search evaluation. In: SIGIR '11; Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval. ACM, New York, NY, USA, pp. 25-34. ISBN 978-1-4503-0757-4.

Böhm, Patricia, Schneidermeier, Tim and Wolff, Christian (2011) Smart Sol – Bringing User Experience to Facility Management: Designing the User Interaction of a Solar Control Unit. In: Kurosu, Masaaki, (ed.) Human Centered Design. Second International Conference, HCD 2011, Held as Part of HCI International 2011, Orlando, FL, USA, July 9-14, 2011. Proceedings. Lecture Notes in Computer Science, 6776. Springer Berlin / Heidelberg, pp. 187-196. ISBN 978-3-642-21752-4. Fulltext not available.

Burghardt, Manuel, Heckner, Markus and Wolff, Christian (2011) Social Search. In: Lewandowski, Dirk, (ed.) Handbuch Internet-Suchmaschinen 2: Neue Entwicklungen in der Web-Suche. Akademische Verlagsgesellschaft AKA, Heidelberg. ISBN 978-3898386517. Fulltext not available.

Weber, Stephan and Bartmann, Dieter (2011) 15. Standards/IT-Frameworks zur Sicherstellung der IT-Compliance Konformität in hochflexiblen Geschäftsprozessen. In: Sinz, Elmar J. and Bartmann, Dieter and Bodendorf, Freimut and Ferstl, Otto K., (eds.) Dienstorientierte IT-Systeme für hochflexible Geschäftsprozesse. Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg, 9 (15). University of Bamberg Press, Bamberg, Deutschland, pp. 313-339. ISBN 978-3-86309-009-8.

Senk, Christian and Bartmann, Dieter (2011) 16. Starke Authentifizierung für den sicheren Zugriff auf IT-Ressourcen in Föderationen. In: Sinz, Elmar J. and Bartmann, Dieter and Bodendorf, Freimut and Ferstl, Otto K., (eds.) Dienstorientierte IT-Systeme für hochflexible Geschäftsprozesse. Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg, 9 (16). University of Bamberg Press, Bamberg, Deutschland, pp. 341-366. ISBN 978-3-86309-009-8.

Ludwig, Bernd, Hacker, Martin, Schaller, Richard, Zenker, Björn, Ivanov, Alexei and Riccardi, Giuseppe (2011) Tell Me Your Needs: Assistance for Public Transport Users. In: ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2011), 13.06.2011-16.06.2011, Pisa.

Elsweiler, David, Wilson, M. L. and Kirkegaard Lunn, B. (2011) Understanding Casual-leisure Information Behaviour. In: Spink, A. and Heinström, J., (eds.) New Directions in Information Behaviour. Emerald Publishing, 211ff. ISBN 978-1-78052-170-1 ; 1-78052-170-7.

Elsweiler, David, Harvey, Morgan and Hacker, Martin (2011) Understanding re-finding behavior in naturalistic email interaction logs. In: SIGIR '11; Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval. ACM, New York, NY, USA, pp. 35-44. ISBN 978-1-4503-0757-4.

Fernandez, Eduardo B., Yoshioka, Nobukazu, Washizaki, Hironori, Jurjens, Jan, VanHilst, Michael and Pernul, Günther (2011) Using security patterns to develop secure systems. In: Mouratidis, Haralambos, (ed.) Software engineering for secure systems: Industrial and Research Perspectives. IGI Global Group, Information Science Reference, New York, pp. 16-31. ISBN 978-1-615-20837-1; 978-1-615-20838-8.

Bazo, Alexander, Böhm, Patricia, Brockelmann, Martin, Burghardt, Manuel, Hastreiter, Isabella, Heckner, Markus, Kattenbeck, Markus, Liebl, Patricia, Schneidermeier, Tim, Wagner, Thomas, Wilhelm, Thomas and Wolff, Christian (2011) Visionen für übermorgen. Design Thinking the Future Lecture. In: Eibl, Maximilian, (ed.) Mensch & Computer 2011: überMEDIEN|ÜBERmorgen. Oldenbourg Verlag, München, pp. 247-260.

Elsweiler, David, Kelly, Liadh and Kim, Jinyoung (2011) WORKSHOP REPORT: ECIR Workshop on Evaluating Personal Search. Held at European Conference for Information Retrieval, 18. April 2011,Dublin. Fulltext restricted.

Elsweiler, David and Losada, D. (2011) Ways we can improve Simulated Personal Search Evaluation. In: ECIR 2011 Workshop on Evaluating Personal Search, April 18, 2011, Dublin, Ireland.

Elsweiler, David, Baillie, Mark and Ruthven, Ian (2011) What Makes Re-finding Information Difficult ? A Study of Email Re-finding. LNCS 6611, pp. 568-579.

Fuchs, Ludwig and Pernul, Günther (2010) Großreinemachen fürs IAM. Die Zeitschrift für Informations-Sicherheit: <kes> (Nr. 6), p. 24. Fulltext not available.

Riesner, Moritz and Pernul, Günther (2010) Supporting Compliance through Enhancing Internal Control Systems by Conceptual Business Process Security Modeling. In: Proceedings of the 21st Australasian Conference on Information Systems (ACIS). AISel, Brisbane, Australia.

Heupel, Marcel (2010) Porting and evaluating the performance of IDEMIX and TOR anonymity on modern smartphones. Portierung und Bewertung der Laufzeit von IDEMIX und TOR-Anonymität auf
modernen Smart-phones.
Diplomarbeit, Univ. Siegen. Fulltext not available.

von Mandach, Conrad and Merkl, Rainer (2010) Genes optimized by evolution for accurate and fast translation encode in Archaea and Bacteria a broad and characteristic spectrum of protein functions. BMC genomics 11 (1), p. 617.

Uerpmann-Wittzack, Robert (2010) Principles of International Internet Law. German Law Journal 11 (11), pp. 1245-1263. Fulltext restricted.

Herrmann, Dominik, Gerber, Christoph, Banse, Christian and Federrath, Hannes (2010) Analyzing Characteristic Host Access Patterns for Re-Identification of Web User Sessions. In: 15th Nordic Conference in Secure IT Systems (Nordsec 2010), 27. -30. Oktober 2010, Aalto University, Espoo, Finland.

Fuchs, Markus (2010) Aufbau eines wissenschaftlichen Textcorpus auf der Basis der Daten der englischsprachigen Wikipedia. Masters, Universität Regensburg.

Kronschnabl, Stefan, Weber, Stephan, Török, Elmar and Münch, Isabell (2010) IT-Sicherheitsstandards und IT-Compliance 2010. IBI Research, Regensburg. ISBN 978-3-940416-27-8.

Scheuer, Florian, Brecht, Matthias and Federrath, Hannes (2010) A privacy-aware location service for VANETs using Chaum's mixes. Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2010). Fulltext not available.

Herrmann, Dominik, Gerber, Christoph, Banse, Christian and Federrath, Hannes (2010) Analyzing Characteristic Host Access Patterns for Re-Identification of Web User Sessions. In: 15th Nordic Conference in Secure IT Systems (Nordsec 2010), 27. -30. Oktober 2010, Aalto University, Espoo, Finland.

Bartmann, Dieter (2010) Organisationsmodell für die Modellierung hochflexibler Geschäftsprozesse. In: forFlex Vollversammlung. Fulltext not available.

Kern, Walter, Silberbauer, Christian and Wolff, Christian (2010) The Dimension Architecture: A New Approach to Resource Access. IEEE Software 27 (5), pp. 74-81.

Fritsch, Christoph, Netter, Michael, Reisser, Andreas and Pernul, Günther (2010) Attacking Image Recognition Captchas - A Naive but Effective Approach. In: Katsikas, Sokratis and Lopez, Javier and Soriano, Miguel, (eds.) Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings. Lecture notes in computer science, 6264. Springer, Berlin, pp. 13-25. ISBN 3-642-15151-5, 978-3-642-15151-4.

Wilson, M. L. and Elsweiler, David (2010) Casual-leisure Searching: the Exploratory Search scenarios that break our current models. In: 4th International Workshop on Human-Computer Interaction and Information Retrieval.

Fritsch, Christoph and Pernul, Günther (2010) Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. In: Katsikas, Sokratis and Lopez, Javier and Soriano, Miguel, (eds.) Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings. Lecture notes in computer science, 6264. Springer, Berlin, pp. 214-226. ISBN 3-642-15151-5, 978-3-642-15151-4.

Kern, Walter (2010) Entwicklungstechnologien - .NET Compact Framework. Other, Universität Regensburg. (Unpublished)

Kern, Walter (2010) Politische Rahmenbedingungen (eInclusion, eGovernment, auf regionaler, nationaler, europäischer Ebene). Study Thesis, Universität Regensburg. (Unpublished)

Federrath, Hannes (2010) Wie lässt sich Vertrauen technisch umsetzen? In: Angst, Kontrolle, Vertrauen, 10. Juli 2010, Akademie für politische Bildung, Tutzing.

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter and Wenzl, Jürgen (2010) Applicability of Multiparty Computation Schemes for Wireless Sensor Networks. In: Sevillano, Luis and Obaidat, Mohammad S. and Nicopolitidis, Petros, (eds.) Proceedings of DCNET 2010 ‑ International Conference on Data Communication Networking, 26‑28 July 2010. SciTePress - Science and Technology Publications, Athens, Greece, pp. 125-128. ISBN 978-989-8425-25-6.

Pernul, Günther, Kolter, Jan and Kernchen, Thomas (2010) Collaborative Privacy Management. Computers & Security 29 (5), pp. 580-591.

Gmelch, Oliver and Pernul, Günther (2010) Preventing malicious Portlets from Communication and Intercepting in Collaboration Portals. In: Proceedings of the International Conference on Security and Cryptography (SECRYPT). (In Press)

Federrath, Hannes, Fuchs, Karl-Peter and Herrmann, Dominik (2010) Über persönliche Anonymität und die Sicherheit von Informationen im Internet. In: Burda, Hubert and Döpfner, Mathias and Hombach, Bodo and Rüttgers, Jürgen, (eds.) 2020 - Gedanken zur Zukunft des Internets. Klartext-Verlag, Essen, pp. 129-134. ISBN 978-3-8375-0376-0. Fulltext not available.

Meier, Florian (2010) Evolution der Typografie im World Wide Web. Eine empirische Studie als Beitrag zur Designgeschichte des WWW. Bachelorarbeit, Universität Regensburg.

Brucker, Achim D., Petritsch, Helmut and Weber, Stefan G. (2010) Attribute-based Encryption with Break-glass. In: Samarati, Pierangela and Tunstall, Michael and Posegga, Joachim and Markantonakis, Konstantinos and Sauveron, Damien, (eds.) Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings. Lecture Notes in Computer Science / Security and Cryptology, 6033. Springer, Berlin, pp. 237-244. ISBN 978-3-642-12367-2. Fulltext not available.

Pernul, Günther and Fuchs, Ludwig (2010) Reducing the Risk of Insider Misuse by Revising Identity Management and UserAccount Data. In: 2nd Int. Workshop on Managing Insider Security Threats, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Morioka, Iwate, Japan.

Bartmann, Dieter (2010) Bankinnovationen und Herausforderungen für IT-Governance und strategisches IT-Management. In: Banken Symposium 2010. Fulltext not available.

Felle, Max, Exler, Josef H., Merkl, Rainer , Dachauer, Karoline, Brehm, Alexander, Grummt, Ingrid and Längst, Gernot (2010) DNA sequence encoded repression of rRNA gene transcription in chromatin. Nucleic acids research 38 (16), pp. 5304-5314. Fulltext not available.

Wolff, Christian (2010) Adwords, Skyscraper und Eselsohren: Erscheinungsformen der Online-Werbung. In: Reimann, Sandra and Sauerland, Martin, (eds.) Wissenschaf(f)t Werbung. Universitätsverlag Regensburg, Regensburg, pp. 198-215. ISBN 978-3-86845-036-1.

Burghardt, Manuel and Wolff, Christian (2010) Informationswissenschaft und Medieninformatik in Regensburg. In: Arbeitstreffen zur Abstimmung von Curricularentwicklungen im Bereich der eHumanities am CCeH, 12. und 13. April 2010, Cologne Centre for eHumanities (CCeH), Universität zu Köln / Universitäts- und Stadtbibliothek Köln.

Wenzl, Jürgen (2010) Laufzeitanalyse dreier Versionen eines Mehrparteien-Multiplikationsprotokolls. Regensburger Diskussionsbeiträge zur Wirtschaftswissenschaft 440, Working Paper, Regensburg.

Richter, Markus, Bosnali, Manal, Carstensen, Linn, Seitz, Tobias, Durchschlag, Helmut, Blanquart, Samuel, Merkl, Rainer and Sterner, Reinhard (2010) Computational and Experimental Evidence for the Evolution of a (betaalpha)(8)-Barrel Protein from an Ancestral Quarter-Barrel Stabilised by Disulfide Bonds. J Mol Biol 398, pp. 763-773. Fulltext not available.

Schöning, J., Hook, J., Bartindale, T., Schmidt, D., Oliver, P., Echtler, Florian, Motamedi, N., Brandl, P. and Zadow, U. (2010) Building Interactive Multi-touch Surfaces. In: Mueller-Tomfelde, Christian, (ed.) Tabletops - Horizontal Interactive Displays. Springer London, London, pp. 27-49. ISBN 978-1-84996-112-7 (print), 978-1-8499-6113-4 (elektronisch). Fulltext not available.

Olden, Matthias (2010) Biometric authentication and authorisation infrastructures. PhD, Universität Regensburg.

Reischer, Jürgen (2010) Wort- und Phrasenblends im Deutschen und Englischen - eine korpusbasierte Studie. In: Linguistisches Forum LIFO, 10.2.2010, Regensburg.

Dürbeck, Stefan, Fritsch, Christoph, Pernul, Günther and Schillinger, Rolf (2010) A Semantic Security Architecture for Web Services - the Access-eGov Solution. In: Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Brucker, Achim D. and Petritsch, Helmut (2010) Idea: Efficient Evaluation of Access Control Constraints. In: Engineering secure software and systems: second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010; proceedings. Lecture Notes in Computer Science, 5965. Springer, Berlin, pp. 157-165. ISBN 978-3-642-11746-6.

Netter, Michael, Pernul, Günther and Fernandez, Eduardo B. (2010) Refining the pattern-based reference model for electronic invoices by incorporating threats. In: Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Kolter, Jan, Netter, Michael and Pernul, Günther (2010) Visualizing Past Personal Data Disclosures. In: Proc. of the Fifth International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Bourimi, Mohamed, Barth, Thomas, Haake, J. M., Ueberschär, Bernd and Kesdogan, Dogan (2010) AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies. In: Human-Centred Software Engineering. Third International Conference, HCSE 2010, Reykjavik, Iceland, October 14-15, 2010. Proceedings. Lecture Notes in Computer Science, 6409. Springer, Berlin, pp. 182-189. ISBN 978-3-642-16487-3; 978-3-642-16488-0 (online). Fulltext not available.

Echtler, Florian, Pototschnig, Thomas and Klinker, Gudrun (2010) An LED-based multitouch sensor for LCD screens. In: Fourth international conference on Tangible, embedded, and embodied interaction, January 25 - 27, 2010, Cambridge, Mass.. Fulltext not available.

Bourimi, Mohamed, Ueberschär, Bernd, Ganglbauer, E., Kesdogan, Dogan, Barth, Thomas, Dax, J. and Heupel, Marcel (2010) Building usable and privacy-preserving mobile collaborative applications for real-life communities: A case study based report. In: International Conference on Information Society (i-Society), London, 28-30 June 2010. IEEE. ISBN 978-1-4577-1823-6 ; 978-0-9564263-3-8 (online). Fulltext not available.

Ludwig, Bernd and Mandl, Stefan (2010) Centering Information Retrieval to the User. Revue des sciences et technologies de l'information. Revue d'Intelligence Artificielle : RSTI-RIA 24 (1), pp. 95-118. Fulltext not available.

Reischer, Jürgen (2010) EXCERPT - Ein integriertes System zum informativen Summarizing und Within-Document-Retrieval. In: Semantic Approaches in Natural Language Processing: 10th Conference on Natural Language Processing, KONVENS 2010, September 6-8, 2010, Saarland University, Saarbrücken, Germany. Fulltext not available.

Dax, J., Heupel, Marcel, Bourimi, Mohamed and Kesdogan, Dogan (2010) Eine datenschutzfreundliche, ortsbezogene Groupware für das iPhone. In: Sichere Mobilität und Dienstnutzung in künftigen Netzen. 4 . Essener Workshop „ Neue Herausforderungen in der Netzsicherheit “, 15. /16. April 2010. Abstracts. Univ. Duisburg-Essen, pp. 22-23. Fulltext not available.

Bourimi, Mohamed, Haake, J. M., Heupel, Marcel, Ueberschär, Bernd, Kesdogan, Dogan and Barth, Thomas (2010) Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture. International Journal for Infonomics 3 (4), pp. 563-572. Fulltext not available.

Bourimi, Mohamed, Kesdogan, Dogan, Barth, Thomas, Höfke, K. and Abou-Tair, Dhiah el Diehn I. (2010) Evaluating potentials of Internet- and Web-based SocialTV in the light of privacy. In: IEEE Second International Conference on Social Computing (SocialCom), Minneapolis, MN, 20-22 Aug. 2010. IEEE. ISBN 978-1-4244-8439-3; 978-0-7695-4211-9 (online). Fulltext not available.

Wiedemann, Sonja M., Mildner, Silke N., Bönisch, Clemens, Israel, Lars, Maiser, Andreas , Matheisl, Sarah, Straub, Tobias , Merkl, Rainer , Leonhardt, Heinrich, Kremmer, Elisabeth, Schermelleh, Lothar and Hake, Sandra B. (2010) Identification and characterization of two novel primate-specific histone H3 variants, H3.X and H3.Y. The Journal of cell biology 190 (5), pp. 777-791. Fulltext not available.

Elsweiler, David and Jones, G. (2010) Improving Organic Recollection with Memory Prosthetics. In: 2nd Internation al Workshop on Personal Knowledge Management.

Hacker, Martin, Elsweiler, David and Ludwig, Bernd (2010) Investigating Human Speech Processing as a Model for Spoken Dialogue Systems: An Experimental Framework. In: Coelho, Helder and Studer, Rudi and Wooldridge, Michael, (eds.) ECAI 2010: 19th European Conference on Artificial Intelligence, 16-20 August 2010, Lisbon, Portugal: including Prestigious Applications of Artificial Intelligence (PAIS-2010): proceedings. IOS Press, Amsterdam, pp. 1137-1138. ISBN 978-1-60750-605-8. Fulltext not available.

Fuchs, Ludwig (2010) Methodology for Hybrid Role Development. Wirtschaftsinformatik, 69. EUL-Verlag, Lohmar. ISBN 978-3-89936-978-6. Fulltext not available.

Mandl, Stefan and Ludwig, Bernd (2010) Multi-Context Systems with Activation Rules. In: Dillmann, Rüdiger and Beyerer, Jürgen and Hanebeck, Uwe D. and Schultz, Tanja, (eds.) KI 2010: Advances in Artificial Intelligence: 33rd Annual German Conference on AI, Karlsruhe, Germany, September 21-24, 2010; proceedings. Lecture Notes in Computer Science, 6359. Springer, Berlin, pp. 135-142. ISBN 3-642-16110-3. Fulltext not available.

Elsweiler, David, Haller, Heiko and Pircher, Richard (2010) PKM2010 - 2nd Workshop on Personal Knowledge Management. Logos, Berlin. Fulltext not available.

Schryen, Guido (2010) Preserving knowledge on IS business value: what literature reviews have done. Business & Information Systems Engineering (BISE) 52 (4), pp. 225-237. Fulltext restricted.

Federrath, Hannes (2010) Privacy through anonymous communications? In: European Conference on Computer Network Defense (EC2ND), 28. Oktober 2010, Berlin. Fulltext not available.

Zenker, Björn and Ludwig, Bernd (2010) ROSE - An Intelligent Mobile Assistant. In: Fred, Ana and Filipe, Joaquim, (eds.) Proceedings of the 2nd International Conference on Agents and Artificial Intelligence. ICAART: Valencia, Spain, January 22 - 24, 2010. vol. 2. INSTICC, Setúbal, Portugal. ISBN 978-989-674022-1. Fulltext not available.

Elsweiler, David, Jones, Gareth J. F., Kelly, Liadh and Teevan, Jaime (2010) SIGIR Workshop on Desktop Search: Understanding, Supporting, and Evaluating Personal Data Search. ACM SIGIR Forum 44 (2), pp. 28-34. Fulltext not available.

Pope, James A. and Bartmann, Dieter (2010) Securing online transactions with biometric methods. International Journal of Electronic Marketing and Retailing 3 (2), pp. 132-144. Fulltext not available.

Bauereiß, Thomas, Mandl, Stefan and Ludwig, Bernd (2010) Static Preference Models for Options with Dynamic Extent. In: Dillmann, Rüdiger and Beyerer, Jürgen and Hanebeck, Uwe D. and Schultz, Tanja, (eds.) KI 2010: Advances in Artificial Intelligence: 33rd Annual German Conference on AI, Karlsruhe, Germany, September 21-24, 2010; proceedings. Lecture Notes in Computer Science, 6359. Springer, Berlin, pp. 99-106. ISBN 3-642-16110-3. Fulltext not available.

Kronschnabl, Stefan (2010) Steuerung und Kontrolle durch integriertes IT-Governance, IT-Risk & IT-Compliance Management. In: ISACA Mitgliederversammlung, März 2010, Frankfurt. Fulltext not available.

Kern, Walter, Silberbauer, Christian and Wolff, Christian (2010) The Dimension Architecture: A New Approach to Resource Access. IEEE Software 27 (5), pp. 74-81. Fulltext not available.

Li, Y., Elsweiler, David and Meng, X. (2010) Towards Task-Organised Desktop Collections. In: ACM SIGIR 2010 Workshop on Desktop Search. Fulltext not available.

Elsweiler, David, Mandl, Stefan and Kirkegaard Lunn, Brian (2010) Understanding casual-leisure information needs: a diary study in the context of television viewing. In: IIiX '10: Proceedings of the third symposium on Information interaction in context. ACM, New York, pp. 25-34. ISBN 978-1-4503-0247-0.

Kolter, Jan (2010) User-Centric Privacy. Electronic Commerce, 41. EUL-Verlag, Lohmar. ISBN 978-3-89936-917-5. Fulltext not available.

Kronschnabl, Stefan (2010) Vorteile für die IT-Revision durch horizontal und vertikal integriertes IT-GRC-Management. In: Arbeitskreis IT-Revision des Deutschen Instituts für Interne Revision e.V. (DIIR), September 2010, Frankfurt. Fulltext not available.

Schryen, Guido (2010) Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). Wirtschaftsinformatik 52 (4), pp. 225-237.

Herrmann, Dominik, Wendolsky, Rolf and Federrath, Hannes (2009) Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier. In: CCSW '09: ACM Workshop on Cloud Computing Security, 13.11.2009, Chicago, Illinois, USA.

Heuser, Carlos Alberto and Pernul, Günther, eds. (2009) Advances in Conceptual Modeling - Challenging Perspectives:
ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009, Proceedings.
Lecture notes in computer science, 5833. Springer. ISBN 978-3-642-04946-0. Fulltext not available.

Merkl, Rainer and Waack, Stephan (2009) Bioinformatik Interaktiv
Algorithmen und Praxis
2. erweiterte und neubearbeitete Auflage.
Wiley-VCH, Weinheim. Fulltext not available.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver and Pernul, Günther (2009) Impact Analysis of Collaborative Platforms - The Case of SPIKE. In: IFAC, Workshop SWIIS (Supplementary Ways for Improving International Stability).

Herrmann, Dominik, Scheuer, Florian, Feustel, Philipp, Nowey, Thomas and Federrath, Hannes (2009) A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking. In: 6th International Conference on Trust, Privacy and Security in Digital Businesses (TrustBus 2009), 3.- 4. September 2009, Linz.

Kronschnabl, Stefan (2009) Effektives und effizientes Management der MaRisk am Beispiel der Anforderungen an die IT. In: Fachtagung Bankkonzepte zur Notfallplanung des Bankenfachverbandes, September 2009, Berlin. Fulltext not available.

Netter, Michael and Pernul, Günther (2009) Integrating security patterns into the electronic invoicing process. In: Tjoa, A. Min and Wagner, Roland, (eds.) Proc. of the 20th International Workshop on Database and Expert Systems Applications (DEXA 2009). IEEE Computer Society Press, Los Alamitos, Calif., pp. 150-154. ISBN 978-0-7695-3763-4.

Bartmann, Dieter (2009) Key Stroke Dynamics as the Basis for Secure Authentication. In: Source Conference, Barcelona. Fulltext not available.

Wiedermann, Wolfgang, Wolff, Christian and Tsakpinis, Athanassios (2009) Service Oriented Approach for Multi Backend Retrieval in Medical Systems. In: Computer-Based Medical Systems, 2009. CBMS 2009. 22nd IEEE International Symposium on. IEEE, pp. 1-4. ISBN 978-1-4244-4879-1. Fulltext restricted.

von Ammon, Rainer, Emmersberger, Christoph, Ertlmaier, Thomas, Etzion, Opher, Paulus, Thomas and Springer, Florian (2009) 24. Existing and Future Standards for Event-Driven Business Process Management. In: DEBS '09, Proceedings of the Third ACM International Conference on Distributed Event-Based Systems (Nashville, TN, USA July 6–9, 2009). ACM Digital Library, New York, pp. 1-5. ISBN 978-1-60558-665-6.

Petritsch, Helmut, Brucker, Achim D. and Schaad, Andreas (2009) Delegation Assistance. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). IEEE. Fulltext not available.

Kern, Walter (2009) Evaluierung bedeutender Webapplikations-Entwicklungsframeworks im Hinblick auf die Unterstützung assistiver Komponenten im Kontext der Anforderungen im Bereich eGovernment. Technical Report.

Kern, Walter (2009) Evaluierung des Webentwicklungsframeworks eGovWDF im Hinblick auf den Aspekt Validierung und die besonderen Anforderungen im Bereich des eGovernment. Technical Report.

Kern, Walter (2009) Evaluierung des Webentwicklungsframeworks eGovWDF im Hinblick auf die Aspekte Rich-Client-Funktionalität und Barrierefreiheit im Kontext der Anforderungen im Bereich eGovernment. Technical Report.

Lory, Peter (2009) Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. In: Falk, Rainer and Goudalo, Wilson and Chen, Eric Y. and Savola, Reijo and Popescu, Manuela, (eds.) The Third International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2009). The Institute of Electrical and Electronics Engineers, Inc., pp. 286-291. ISBN 978-0-7695-3668-2. Fulltext restricted.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver, Pernul, Günther, Schillinger, Rolf and Wiesbeck, Sandra (2009) Analyzing Requirements for Virtual Business Alliances -
the case of SPIKE.
In: Proceedings of the The First International ICST Conference on Digital Business (DigiBiz 2009), London, UK. Springer, Heidelberg. ISBN 978-963-9799-56-1.

Klarl, Heiko, Molitorisz, Korbinian, Emig, Christian, Klinger, Karsten and Abeck, Sebastian (2009) Extending Role-based Access Control for Business Usage. In: Third International Conference on Emerging Security Information, Systems and Technologies, 18-23 June 2009, Athens/Glyfada, Greece.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver, Pernul, Günther and Schillinger, Rolf (2009) SPIKE - A Collaboration Platform for Short-Term Virtual Business Alliances. In: Proceedings of the Workshop on Technological trends in Enterprise Systems for SMEs and large enterprises: Heading towards the Future Internet, London, UK während der DIGIBIZ 2009. Springer, Heidelberg. ISBN 978-963-9799-56-1.

Federrath, Hannes (2009) Synergien im Management von Datenschutz und Datensicherheit – Annäherung der Industriestandards. In: Erfolgsfaktor Datenschutz - Betriebliche Daten und Werte schützen, Deloitte, 5. Mai 2009, München.

Kolter, Jan, Kernchen, Thomas and Pernul, Günther (2009) Collaborative Privacy - A Community-based Privacy Infrastructure. In: Gritzalis, Dimitris and Lopez, Javier, (eds.) Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings. IFIP International Federation for Information Processing, 297. Springer, Berlin. ISBN 978-3-642-01243-3.

Herrmann, Dominik and Wendolsky, Rolf (2009) Effectivity of Various Data Retention Schemes for Single-Hop Proxy Servers. In: Extended Abstracts of the Fourth Privacy Enhancing Technologies Convention (PET-CON 2009.1), Technical Report TUD-FI09-04, Technische Universität Dresden, ISSN 1430-211X.

Herrmann, Dominik and Wendolsky, Rolf (2009) Trace Me If You Can -- Studying the Effectivity of Various Data Retention Schemes for Single-Hop Proxy Servers. In: PET-CON 2009.1, 25.04.2009, Fourth Privacy Enhancing Technologies Convention (PET-CON 2009.1).

Mandl, Christoph, Pfeiffer, Christoph and Wolff, Christian (2009) Partizipative Leitbildentwicklung und Hochschulkommunikation. In: Kuhlen, Rainer, (ed.) Information: Droge, Ware oder Commons? Wertschöpfungs- und Transformationsprozesse auf den Informationsmärkten. Proc. 11. Internationales Symposium für Informationswissenschaft, Konstanz, April 2009. Schriften zur Informationswissenschaft, 50. vwh Verlag Werner Hülsbusch, Boizenburg, pp. 307-319. ISBN 978-3-940317-43-8.

Heckner, Markus and Wolff, Christian (2009) Towards Social Information Seeking and Interaction on the Web. In: Kuhlen, Rainer, (ed.) Information: Droge, Ware oder Commons? Wertschöpfungs- und Transformationsprozesse auf den Informationsmärkten. Proc. 11. Internationales Symposium für Informationswissenschaft, Konstanz, April 2009. Schriften zur Informationswissenschaft, 50. vwh Verlag Werner Hülsbusch, Boizenburg, pp. 235-241. ISBN 978-3-940317-43-8.

Mielke, Bettina and Wolff, Christian (2009) Welche Farbe hat das Recht ? In: Semantisches Web und Soziales Web im Recht: Tagungsband des 12. Internationalen Rechtsinformatik-Symposions IRIS 2009. IRIS, 12. Oesterreichische Computer Gesellschaft, Wien, pp. 301-308. ISBN 978-3-85403-259-5.

Fuchs, Ludwig, Pernul, Günther and Broser, Christian (2009) Different Approaches to in-house Identity Management. In: Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan. ISBN 978-07695-35647.

Kolter, Jan and Pernul, Günther (2009) Generating User-understandable Privacy Preferences. In: Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan. ISBN 978-07695-35647.

Klarl, Heiko, Wolff, Christian and Emig, Christian (2009) Identity Management in Business Process Modelling: A Model-Driven Approach. In: Hansen, Hans Robert and Karagiannis, Dimitris and Fill, Hans-Georg, (eds.) Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik, Wien, 25 -27. Februar 2009. Teil 1. Österreichische Computer Gesellschaft, Wien, pp. 161-170. ISBN 978-3-85403-246-5.

Burghardt, Manuel and Wolff, Christian (2009) Werkzeuge zur Annotation diachroner Korpora. In: Hoeppner, Wolfgang, (ed.) Proc. GSCL-Symposium Sprachtechnologie und eHumanities. Technische Berichte der Abteilung für Informatik und Angewandte Kognitionswissenschaft, 2009-0. Abteilung für Informatik und Angewandte Kognitionswissenschaft, Universität Duisburg-Essen, Duisburg, pp. 21-31.

Schillinger, Rolf, Dürbeck, Stefan and Bednar, Peter (2009) Access-eGov - a real-world Semantic Service-oriented Architecture for e-Government. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Fuchs, Ludwig and Müller, Christian (2009) Automating Periodic Role-Checks: A Tool-based Approach. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Sneed, Harry M. (2009) Wiedergewinnung von Web Services aus vorhandenen Altsystemen. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Herrmann, Dominik, Scheuer, Florian, Feustel, Philipp, Nowey, Thomas and Federrath, Hannes (2009) A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking. In: Fischer-Hübner, Simone and Lambrinoudakis, Costas and Pernul, Günther, (eds.) Trust, privacy and security in digital business: 6th international conference, TrustBus 2009, Linz, Austria, September 3 - 4, 2009; proceedings. Lecture Notes in Computer Science, 5695. Springer, Berlin, Heidelberg, pp. 32-41. ISBN 978-3-642-03747-4; 3-642-03747-X.

Klarl, Heiko, Marmé, Florian, Wolff, Christian, Emig, Christian and Abeck, Sebastian (2009) An MDA-Based Environment for Generating Access Control Policies. In: Fischer-Hübner, Simone and Lambrinoudakis, Costas and Pernul, Günther, (eds.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 5695. Springer, Berlin, pp. 115-126. ISBN 978-3-642-03747-4.

Federrath, Hannes (2009) Anonymisierungsdienste nach der Vorratsdatenspeicherung. In: AK Medien der Datenschutzbeauftragten des Bundes und der Länder, 17. Februar 2009, Potsdam. Fulltext not available.

Wagner, Benno, Mehler, Alexander, Wolff, Christian and Dotzler, Bernhard (2009) Bausteine eines Literary Memory Information System (LiMeS) am Beispiel der Kafka-Forschung. In: GSCL-Symposium Sprachtechnologie und eHumanities, 26.02. - 27.02.2009, Universität Duisburg-Essen.

Elsweiler, David (2009) Book review: Keeping Found Things Found: The Study and Practice of Personal Information Management. By William Jones. Morgan Kaufmann. Journal of the American Society for Information Science and Technology 60 (8), pp. 1725-1727.

Turban, Bernhard, Kucera, Markus, Tsakpinis, Athanassios and Wolff, Christian (2009) 13. Bridging the Requirements to Design Traceability Gap. In: Seepold, Ralf E. D. and Martínez Madrid, Natividad, (eds.) Intelligent Technical Systems. Lecture Notes in Electrical Engineering, 38 (13). Springer, Berlin, pp. 275-288. ISBN 978-1-4020-9822-2.

Breu, Manuel, Gerber, Christoph, Islinger, Tobias and Scheuer, Florian (2009) CHATMIX - Ein Chatsystem mit Fokus auf Senderanonymität. In: Fourth Privacy Enhancing Technologies Convention (PET-CON 2009.1), 24. - 25. März 2009, TU Dresden.

Schworm, S., Heckner, Markus and Wolff, Christian (2009) Combining Design Patterns and Elements of Social Computing for the Design of User Centered Online Help Systems. Journal of Educational Technology Systems 38 (1), pp. 3-20. Fulltext not available.

Hüsig, Stefan and Kohn, Stefan (2009) Computer Aided Innovation – State of the Art from a New Product Development Perspective. Computers in Industry 60 (8), pp. 551-562.

Will, Sarah and Meier, Florian (2009) Designgeschichte der Web-Interfaces - Analyse der Evolution struktureller Aspekte des Webdesign mithilfe des ,,Internet Archive". In: Information: Droge, Ware oder Commons? Wertschöpfungs- und Transformationsprozesse auf den Informationsmärkten. Proceedings des 11. Internationalen Symposiums für Informationswissenschaft, ISI 2009, 1.-3. April 2009, Konstanz, Germany. Fulltext not available.

Pham, Dang Vinh and Wright, Joss (2009) Discussing Anonymity Metrics for Mix Based Anonymity Approaches. In: Camenisch, Jan and Kesdogan, Dogan, (eds.) iNetSec 2009 — Open Research Problems in Network Security. IFIP Advances in Information and Communication Technology, 309. Springer, Berlin, 149 - 168. ISBN 978-3-642-05437-2 (online), 978-3-642-05436-5 (print). Fulltext not available.

Reischer, Jürgen (2009) EXCERPT - a Within-Document Retrieval System Using Summarization Techniques. In: Information: Droge, Ware oder Commons? Wertschöpfungs- und Transformationsprozesse auf den Informationsmärkten. 11. Internationales Symposiums für Informationswissenschaft, ISI 2009, 1.-3. April 2009, Konstanz, Germany. Fulltext not available.

Meier, Florian, Will, Sarah and Wolff, Christian (2009) Empirische Untersuchung der Designgeschichte des WWW. In: Wandke, Hartmut and Kain, Saskia and Struve, D., (eds.) Mensch & Computer 2009: 9. fachübergreifende Konferenz für interaktive und kooperative Medien; grenzenlos frei!? Oldenbourg, München, pp. 43-52. ISBN 978-3-486-59222-1.

Meier, Florian, Will, Sarah and Wolff, Christian (2009) Empirische Untersuchung der Designgeschichte des WWW. In: Mensch & Computer 2009: Grenzenlos frei!?, Interdisziplinäre Fachtagung, September 6-9, 2009, Berlin, Germany. Fulltext not available.

Elsweiler, David, Azzopardi, L. and Mandl, S. (2009) Evaluating Personal Information Management Behaviour using Markov Models. In: Personal Knowledge Management (PKM) Workshop at the 5th Conference on Professional Knowledge Management, Solothurn, Switzerland. Fulltext not available.

Keller, Andreas and Hüsig, Stefan (2009) Ex Ante Identification of Disruptive Innovations in the Software Industry Applied to Web Applications: The Case of Microsoft’s vs. Google’s Office Applications. Technological forecasting & social change 76 (8), pp. 1044-1054. Fulltext not available.

Petritsch, Helmut and Brucker, Achim D. (2009) Extending access control models with break-glass. In: Proceedings of the 14th ACM symposium on Access control models and technologies. ACM, pp. 197-206. ISBN 978-1-60558-537-6.

Harvey, M., Baillie, M., Ruthven, I. and Elsweiler, David (2009) Folksonomic Tag Clouds as an Aid to Content Indexing. In: Workshop on Search in Social Media (SSM 2009) ACM SIGIR 2009 Conference on Information Retrieval.

Hammwöhner, Rainer and Wolff, Christian (2009) Gesellschaftliche und interdisziplinäre Aspekte der Informatik. In: Henninger, Michael and Mandl, Heinz, (eds.) Handbuch Medien- und Bildungsmanagement. Beltz-Pädagogik. Beltz, Weinheim, pp. 272-287. ISBN 978-3-407-83162-0.

Uerpmann-Wittzack, Robert (2009) Internetvölkerrecht. Archiv des Völkerrechts 47 (3), pp. 261-283. Fulltext not available.

Elsweiler, David (2009) Keeping Found Things Found: The Study and Practice of Personal Information Management. JASIST 60 (8), pp. 1725-1727. Fulltext not available.

Emmersberger, Christoph, Springer, Florian and Wolff, Christian (2009) Location Based Logistics Services and Event Driven Business Process Management. In: Tavangarian, Djamshid and Kirste, Thomas, (eds.) Intelligent interactive assistance and mobile multimedia computing: international conference, IMC 2009, Rostock-Warnemünde, Germany, November 9 - 11, 2009; proceedings. Communications in Computer and Information Science, 53. Springer, Berlin, pp. 167-177. ISBN 3-642-10262-X; 978-3-642-10262-2.

Plößl, Klaus (2009) Mehrseitig sichere Ad-hoc-Vernetzung von Fahrzeugen. Gabler Edition Wissenschaft: DuD-Fachbeiträge. Gabler, Wiesbaden. ISBN 978-3-8349-1642-6. Fulltext not available.

Elsweiler, David, Baillie, M. and Ruthven, I. (2009) On Understanding the Relationship Between Recollection and Refinding. Journal of Digital Information (JoDI) 10 (5).

Bartmann, Dieter, Bakdi, Idir and Achatz, Michael (2009) On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. In: Nemati, Hamid R., (ed.) Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues. Information Science Reference, Hershey, PA. ISBN 978-1-60566-211-4. Fulltext not available.

Wolff, Christian (2009) Online-Werbung als digitales Kulturgut: Analyse, Erschließung und Archivierung. In: Eibl, Max and Kürsten, Jens and Ritter, Marc, (eds.) Workshop Audiovisuelle Medien WAM 2009: Archivierung. Chemnitzer Informatik-Berichte, CSR-09. Chemnitz, pp. 21-30. ISBN 9-78300-278587.

Heckner, Markus, Heilemann, Michael and Wolff, Christian (2009) Personal Information Management vs. Resource Sharing: Towards a Model of Information Behaviour in Social Tagging Systems. In: Third International AAAI Conference on Weblogs and Social Media, ICWSM-09, Mai 2009, San Jose/CA.

Sax, Christian, Lawrence, E. and Wolff, Christian (2009) Portable Medical Monitoring: An E-Nursing Interface for Elderly Care Emergencies. In: IADIS International Conference e-Health 2009, 21 - 23 June 2009, Algarve, Portugal. Fulltext not available.

Zenker, Björn and Ludwig, Bernd (2009) ROSE - Assisting Pedestrians to Find Preferred Events and Comfortable Public Transport Connections. In: Proceedings of the 6th International Conference on Mobile Technology, Application & Systems: 2009, Nice, France, September 02 - 04, 2009. ACM Press, New York. ISBN 978-1-60558-536-9. Fulltext not available.

Ludwig, Bernd, Zenker, Björn and Schrader, Jan (2009) Recommendation of Personalized Routes with Public Transport Connections. In: Tavangarian, Djamshid and Kirste, Thomas and Timmermann, Dirk, (eds.) Intelligent Interactive Assistance and Mobile Multimedia Computing 2009. Communications in Computer and Information Science Series, 53. Springer, Berlin, pp. 97-107. ISBN 978-3-642-10262-2 (print); 978-3-642-10263-9, 3-642-10263-8 (e-Book). Fulltext not available.

Lory, Peter (2009) Reducing the Complexity in the Distributed Computation of Private RSA Keys. In: Boyd, Colin and Nieto, Juan Gonzales, (eds.) Information Security and Privacy: Proceedings of the 14th Australasian Conference, ACISP 2009. Lecture Notes in Computer Science, 5594. Springer, Berlin, pp. 250-263. ISBN 3-642-02619-2. Fulltext restricted.

Schryen, Guido and Rich, Eliot (2009) Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics & Security 4 (4 Part), pp. 729-744.

Burghardt, Manuel and Wolff, Christian (2009) Stand off-Annotation für Textdokumente: Vom Konzept zur Implementierung (zur Standardisierung?). In: Chiarcos, Christian and Eckart de Castillo, R. and Stede, M., (eds.) Von der Form zur Bedeutung: Texte automatisch verarbeiten = from form to meaning: processing texts automatically: proceedings of the Biennial GSCL Conference 2009. Narr, Tübingen, pp. 53-59. ISBN 978-3-8233-6511-2.

Federrath, Hannes (2009) Stellungnahme als Sachverständiger zu den rechtlichen und technischen Möglichkeiten und Grenzen von Sperrungsverfügungen kinderpornographischer Inhalte im Internet. In: Anhörung im Unterausschuss Neue Medien des Deutschen Bundestages, 12. Februar 2009, Berlin.

Federrath, Hannes (2009) Stellungnahme als Sachverständiger zu den rechtlichen und technischen Möglichkeiten und Grenzen von Sperrungsverfügungen kinderpornographischer Inhalte im Internet. In: Anhörung im Unterausschuss Neue Medien des Deutschen Bundestages, 12. Februar 2009, Berlin. Fulltext not available.

Federrath, Hannes (2009) Stellungnahme als Sachverständiger zum Thema Kinderpornographie im Internet - entschlossen und wirksam bekämpfen. In: Anhörung im Rechtsausschuss des Landtages Nordrhein-Westfalen, 11. März 2009, Düsseldorf. Fulltext restricted.

Federrath, Hannes (2009) Stellungnahme als Sachverständiger zum Thema Kinderpornographie im Internet - entschlossen und wirksam bekämpfen. In: Anhörung im Rechtsausschuss des Landtages Nordrhein-Westfalen, 11. März 2009, Düsseldorf. Fulltext not available.

Federrath, Hannes (2009) Technische Aspekte des neuen Computergrundrechts. In: Uerpmann-Wittzack, Robert, (ed.) Das neue Computergrundrecht. Recht der Informationsgesellschaft, 15. LIT Verlag, Berlin, pp. 53-60. ISBN 978-3-643-10155-6.

Federrath, Hannes (2009) Technische Realisierung von Datenschutz in Unternehmen. In: Erster Regensburger Datenschutztag, 24. Juni 2009, Regensburg.

Federrath, Hannes (2009) Technische Realisierungen von Sperren im Internet. In: Konferenz "Netzsperren: Access-Provider - die neuen Gatekeeper des Rechts?", 23. April 2009, Köln.

Federrath, Hannes (2009) Technischer Datenschutz in Zeiten von Terrorbekämpfung und Vorratsdatenspeicherung. In: IT-Sicherheit am Donaustrand "Sicherheitstechnische und sicherheitsrechtliche Herausforderung des Web 2.0", 16. Februar 2009, Universität Passau.

Fischer-Hübner, Simone and Lambrinoudakis, Costas and Pernul, Günther, eds. (2009) Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings. Lecture Notes in Computer Science, 5695. Springer, Berlin. ISBN 978-3-642-03747-4. Fulltext not available.

Elsweiler, David, Hacker, M. and Mandl, S. (2009) Visualising PIM Behaviour with Markov Chains. In: Personal Information Management Workshop at Annual Meeting of American Society for Information Science (ASIST 2009).

Heckner, Markus and Wolff, Christian (2009) Wissensmanagement mit Social Software. Editorial des Themenhefts der IWP. Information in Wissenschaft und Praxis 60 (3), pp. 249-253.

Götzfried, Stephanie and Wolff, Christian (2009) “I can“-Design: Methodik für das benutzerzentrierte Design nicht-standardisierter Icons. In: Usability Professionals 2009 - Erleben. Gestalten, 06.09. - 09.09.2009, Humboldt-Universität Berlin. Fulltext not available.

Wolff, Christian (2009) „embedded media computing“ – die Regensburger Ausrichtung der Medieninformatik. In: Workshop Medieninformatik in Forschung, Lehre und Praxis im Rahmen der GI-Fachtagung Mensch und Computer 2009, 06.- 09.9.2009, Berlin.

Kronschnabl, Stefan (2008) IT-Security Governance. Universitätsverlag Regensburg, Regensburg. ISBN 9 783868 450040.

Fuchs, Ludwig and Pernul, Günther (2008) HyDRo - Hybrid Development of Roles. In: Sekar, R. and Pujari, Arun K., (eds.) Information systems security: 4th international conference; proceedings / ICISS 2008, Hyderabad, India, December 16 - 20, 2008. Lecture Notes in Computer Science, 5352. Springer, Berlin, pp. 287-302. ISBN 978-3-540-89861-0.

Emig, Christian, Kreuzer, Sebastian, Abeck, Sebastian, Biermann, Jürgen and Klarl, Heiko (2008) Model-Driven Development of Access Control Policies for Web Services. In: Khoshgoftaar, T., (ed.) Proceedings of the 9th IASTED International Conference Software Engineering and Applications. Orlando, Florida, USA, pp. 165-171. ISBN 978-0-88986-775-8.

von Ammon, Rainer, Emmersberger, Christoph, Springer, Florian and Wolff, Christian (2008) Event-Driven Business Process Management and its Practical Application Taking the Example of DHL. In: 1st International workshop on Complex Event Processing for the Future Internet, 28.09.-30.09.2008, Vienna, Austria.

Kraus, Stefan, Wiedermann, Wolfgang, Tsakpinis, Athanassios and Wolff, Christian (2008) Vereinfachung von DICOM-Querys durch eine domänenspezifische Abfragesprache. In: GMDS 2008, Stuttgart. Fulltext not available.

Fuchs, Ludwig and Preis, Anton (2008) BusiROLE: A Model for Integrating Business Roles into Identity Management. In: Furnell, Steven, (ed.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Lecture Notes in Computer Science, 5185. Springer, Berlin, pp. 128-138. ISBN 978-3-540-85734-1.

Kronschnabl, Stefan (2008) Governance System für die IT-Security. In: Conference on Innovations in the Banking Industry (CIBI), September 2008, München. Fulltext not available.

Fernandez, Eduardo B., Pernul, Günther and Larrando-Petrie, Maria M. (2008) Patterns and Pattern Diagrams for Access Control. In: Furnell, Steven, (ed.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Lecture Notes in Computer Science, 5185. Springer, Berlin, pp. 38-47. ISBN 978-3-540-85734-1.

Bartmann, Dieter (2008) Zahlungsverkehrssystem. Oldenbourg, München. Fulltext not available.

Kern, Walter (2008) Evaluierung bedeutender Webapplikations-Entwicklungsframeworks im Hinblick auf die Aspekte Rich-Client-Funktionalität und Barrierefreiheit im Kontext der Anforderungen im Bereich eGovernment. Project Report.

Wiedermann, Wolfgang, Athanassios, Tsakpinis and Wolff, Christian (2008) Generischer Architekturansatz für Telemedizin Portale und
verteilte Krankenakten.
In: Telemed 2008, 12. bis 14. Juni 2008, Berlin.

Sneed, Harry M. (2008) Static and Dynamic Analysis of an Internet Security System. In: Software & Systems Quality Conferences, 15. - 18. April 2008, Düsseldorf, Germany.

Herrmann, Dominik (2008) Analyse von datenschutzfreundlichen Übertragungstechniken hinsichtlich ihres Schutzes vor Datenverkehrsanalysen im Internet. Diplomarbeit, Universität Regensburg.

Klarl, Heiko, Wolff, Christian and Emig, Christian (2008) Abbildung von Zugriffskontrollaussagen in Geschäftsprozessmodellen. In: Modellierung 2008 - Workshop Verhaltensmodellierung: Best Practices und neue Erkenntnisse, 12. bis 14. März 2008, Berlin.

Schläger, Christian, Fuchs, Ludwig and Pernul, Günther (2008) Intensive Programme on Information and Communication Security. In: Jakoubi, Stefan, (ed.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., pp. 752-757. ISBN 978-0-7695-3102-1.

Schläger, Christian and Pernul, Günther (2008) Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. In: Jakoubi, Stefan, (ed.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., pp. 344-351. ISBN 978-0-7695-3102-1; 0-7695-3102-4.

Emmersberger, Christoph and Springer, Florian (2008) Event Driven Business Process Management taking the Example of Deutsche Post AG - An evaluation of the Approach of Oracle and the SOPERA Open Source SOA Framework. Diplomarbeit, Fachhochschule Regensburg.

Herrmann, Dominik (2008) Website-Fingerprinting mit dem multinomialen Naıve-Bayes-Klassifizierer. In: Second Privacy Enhancing Technologies Convention (PET-CON 2008.1), 11.02.2008, RWTH Aachen.

Herrmann, Dominik (2008) Website-Fingerprinting mit dem multinomialen Naıve-Bayes-Klassifizierer. In: PET-CON 2008.1, 11.02.2008, Second Privacy Enhancing Technologies Convention (PET-CON 2008.1).

Lottaz, Claudio, Kostka, Dennis and Spang, Rainer (2008) 26. Classification of Patients. In: Lengauer, Thomas, (ed.) Bioinformatics-From Genomes to Therapies. Wiley-VCH, Weinheim, pp. 957-991. ISBN 9783527619368 (online). Fulltext not available.

Westermann, Benedikt (2008) Entwicklung und Evaluation eines einfachen und effizienten Anonymisierungsverfahrens basierend auf offenen Standards. Diplomarbeit, RWTH Aachen. Fulltext not available.

Lottaz, Claudio, Kostka, Dennis, Markowetz, Florian and Spang, Rainer (2008) 15. Computational diagnostics with gene expression profiles. In: Bioinformatics. Methods in Molecular Biology, 453 (15). Humana Press, Totowa, NJ, pp. 281-296. ISBN 978-1-60327-428-9. Fulltext not available.

Turban, Bernhard, Kucera, Markus, Tsakpinis, Athanassios and Wolff, Christian (2008) A Decision Model for Managing and Communicating Resource Restrictions in Embedded Systems Design. In: WISES 2008. Sixth IEEE Workshop on Intelligent Solutions in Embedded Systems, 9./10.6.2008, Regensburg.

Plößl, Klaus and Federrath, Hannes (2008) A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. Computer Standards & Interfaces 30 (6), pp. 390-397. Fulltext not available.

Echtler, Florian and Klinker, Gudrun (2008) A multitouch software architecture. In: NordiCHI '08; Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges. ACM, New York, NY, USA, pp. 463-466. ISBN 978-1-59593-704-9. Fulltext not available.

Bienk, Stefan (2008) ASAM ODX: Syntax as Semantics. In: Software Engineering, 2008. ICSE'08. ACM/IEEE 30th International Conference on, 10. -18. Mai 2008, Leipzig. Fulltext not available.

Pham, Dang Vinh, Kesdogan, Dogan and Pimenidis, Lexi (2008) Analyse der Verkettbarkeit in nutzergesteuerten Identititätsmanagementsystemen. In: Alkassar, Ammar, (ed.) Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ; 2. - 4. April 2008 im Saarbrücker Schloss. GI-Edition : Proceedings LNI, 128. Ges. f. Informatik, Bonn, 17 - 30. ISBN 978-3-88579-222-2. Fulltext not available.

Pham, Vinh (2008) Analysis of the Anonymity Set of Chaumian Mixes. In: 13th Nordic Workshop on Secure IT-Systems, 09/10/08 → 10/10/08, Kongens Lyngby, Denmark. Fulltext not available.

Schläger, Christian (2008) Attribute-based Infrastructures for Authentication and Authorisation. Electronic Commerce, 36. EUL-Verlag, Lohmar. ISBN 978-3-89936-670-9. Fulltext not available.

Priebe, Torsten (2008) Authorization and Access Control. In: Furnell, Steven and Katsikas, Sokratis K. and Lopez, Javier and Patel, Ahmed, (eds.) Securing Information and Communication Systems: Principles, Technologies and Applications. Artech House information security and privacy series; Artech House computer security series. Artech House, Boston, pp. 61-86. ISBN 978-1-59693-228-9; 1-59693-228-7. Fulltext not available.

Elsweiler, David (2008) Book review: Personal Information Management, Jones, W., Teevan, J. University of Washington Press, 2007. ISBN: 978-0-295-98737-8. Inf. Process. Manage. 44 (3), pp. 1393-1396. Fulltext not available.

Elsweiler, David (2008) Book review: Personal Information Management. By W. Jones and J. Teevan. University of Washington Press (October 30, 2007). Information Processing and Management 44 (3), 1393- 1396.

Ludwig, Bernd and Mandl, Stefan (2008) Centering Information Retrieval to the User. In: Brezillon, Patrick, (ed.) Proceedings of the Third International Conference on Human Centered Processes, Delft, 08.06.2008. ISTE Publisher, Washington, D.C.. Fulltext not available.

Widder, Alexander, von Ammon, Rainer, Schaeffer, Philippe and Wolff, Christian (2008) Combining Discriminant Analysis and Neural Networks for Fraud Detection on the Base of Complex Event Processing. In: Fast Abstract, Second International Conference on Distributed Event-Based Systems, DEBS 2008, Rom, Juli 2008, Juli 2008, Rom.

Federrath, Hannes (2008) Das neue Computergrundrecht - Techniken, mit denen es verletzt werden kann. In: Symposium Computergrundrecht, 05. Dezember 2008, Universität Regensburg.

Pernul, Günther (2008) Data-Centric Applications. In: Furnell, Steven and Katsikas, Sokratis K. and Lopez, Javier and Patel, Ahmed, (eds.) Securing Information and Communication Systems: Principles, Technologies and Applications. Artech House information security and privacy series; Artech House computer security series. Artech House, Boston, pp. 87-103. ISBN 978-1-59693-228-9; 1-59693-228-7. Fulltext not available.

Ruthven, I., Elsweiler, David and Nicol, E. (2008) Designing for users: an holistic approach to teaching Information Retrieval. In: 2nd International Workshop on Teaching and Learning Information Retrieval.

Federrath, Hannes and Pöppl, Wolfgang (2008) Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner. In: Alkassar, Ammar and Siekmann, Jörg, (eds.) Sicherheit 2008. Beiträge der 4. Jahrestagung des GI-Fachbereichs Sicherheit. Lecture Notes in Informatics (P-128). Köllen-Verlag, Bonn, pp. 59-70. ISBN 978-3-88579-222-2.

Ludwig, Bernd and Hacker, Martin (2008) Diagnosing Wrong Dependencies in Word Confusion Graphs Using a Two-Phase Parser. In: Kübler, Sandra and Piskorski, Jakub, (eds.) Proceedings of the LREC Workshop on Partial Parsing 2008 (Between Chunking and Deep Parsing). Fulltext not available.

Uerpmann-Wittzack, Robert and Jankowska-Gilberg, Magdalena (2008) Die Europäische Menschenrechtskonvention als Ordnungsrahmen für das Internet. Multimedia und Recht 11 (2), pp. 83-89. Fulltext not available.

Wolff, Christian (2008) Die Halbwertszeit der Wissenszwerge. Anmerkungen zu einigen „Mythen“ der Wissensgesellschaft. In: Geisenhanslüke, Achim and Rott, Hans, (eds.) Ignoranz: Nichtwissen, Vergessen und Missverstehen in Prozessen kultureller Transformationen. Literalität und Liminalität, 3. transcript, Bielefeld, pp. 203-228. ISBN 978-3-89942-778-3; 3-89942-778-5.

Reischer, Jürgen (2008) Die Wortkreuzung und verwandte Verfahren der Wortbildung-Eine korpusbasierte Analyse des Phänomens „Blending“ am Beispiel des Deutschen und Englischen. Schriftenreihe Philologia, 113. Kovac, Hamburg. ISBN 978-3-8300-3306-6. Fulltext not available.

Böhme, Rainer and Nowey, Thomas (2008) Economic Security Metrics. In: Eusgeld, Irene and Freiling, Felix and Reussner, Ralf, (eds.) Dependability Metrics. Lecture Notes in Computer Science, 4909. Springer, Berlin, pp. 182-193. ISBN 978-3-540-68946-1. Fulltext not available.

Westermann, Benedikt (2008) Ein einfaches Anonymisierungsverfahren basierend auf offenen Standards. In: Informatiktage 2008 : Fachwissenschaftlicher Informatik-Kongress, 14. und 15. März 2008, B-IT Bonn-Aachen International Center for Information Technology in Bonn. GI-Edition : Seminars, 6. Ges. f. Informatik, Bonn, pp. 231-233. ISBN 978-3-88579-440-0; 3-88579-440-3. Fulltext not available.

Turban, Bernhard, Kucera, Markus, Tsakpinis, Athanassios and Wolff, Christian (2008) Erweiterte Traceability zwischen Anforderungen und Design. In: Embedded Software Engineering Kongress, 8.-10.12.2008, Sindelfingen.

von Ammon, Rainer, Emmersberger, Christoph, Greiner, Torsten, Springer, Florian and Wolff, Christian (2008) Event-Driven Business Process Management. In: Fast Abstract, Second International Conference on Distributed Event-Based Systems, DEBS 2008, Rom, Juli 2008, Juli 2008, Rom.

Elsweiler, David, Baillie, Mark and Ruthven, Ian (2008) Exploring memory in email refinding. ACM Transactions on Information Systems (TOIS) 26 (4), pp. 1-36.

Mink, Martin and Nowey, Thomas (2008) Human Factors. In: Eusgeld, Irene and Freiling, Felix and Reussner, Ralf, (eds.) Dependability Metrics. Lecture Notes in Computer Science, 4909. Springer, Berlin, pp. 194-201. ISBN 978-3-540-68946-1. Fulltext not available.

Federrath, Hannes (2008) IT-Sicherheit und Datenschutzmanagement - Gemeinsamkeiten und Unterschiede. In: ZKI-Frühjahrstagung, AK IT-Sicherheit, 03. März 2008, Universität Regensburg.

Pham, Vinh, Kesdogan, Dogan and Pimenidis, Lexi (2008) Information Disclosure in Identity Management. In: 13th Nordic Conference in Secure IT Systems, 09/10/08 → 10/10/08, Kongens Lyngby, Denmark. Fulltext not available.

Federrath, Hannes (2008) Kosten- und Nutzenbetrachtungen im IT-Sicherheitsmanagement. In: Versicherungsforen Leipzig, Arbeitstreffen der User Group "IT-Infrastruktur und IT-Services in Versicherungsunternehmen", 12. März 2008, Leipzig.

Wolff, Christian (2008) Medienarchiv für wissenschaftlichen Film an der TIB und die Medienlandschaft in Deutschland. Expertise im Auftrag der Technischen Informationsbibliothek Hannover. Expertise, Hannover. Fulltext not available.

Uerpmann-Wittzack, Robert (2008) Multilevel Internet Governance Involving the European Union, Nation States and NGOs. In: Follesdal, Andreas and Wessel, Ramses A. and Wouters, Jan, (eds.) Multilevel Regulation and the EU. Martinus Nijhoff Publishers, Leiden, pp. 145-168. ISBN 978-90-04-16438-3. Fulltext not available.

Kern, Walter (2008) Netz ohne Schranken: Barrierefreie Webseiten mit ASP.NET realisieren. dotnetpro (07), pp. 73-77. Fulltext not available.

Scheuer, Florian, Plößl, Klaus and Federrath, Hannes (2008) Preventing Profile Generation in Vehicular Networks. In: International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob) 2008, 12. - 14. Oktober 2008, Avignon, Frankreich. Fulltext not available.

Scheuer, Florian (2008) Preventing Profile Generation in Vehicular Networks. In: IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob2008), 12. Oktober 2008, Avignon, France. Fulltext not available.

Reiß, Peter, Schiemann, Bernhard, Seutter, Tobias, Görz, Günther and Ludwig, Bernd (2008) Self-describing Agents. In: Bichler, Martin and Hess, Thomas and Krcmar, Helmut and Lechner, Ulrike and Matthes, Florian and Picot, Arnold and Speitkamp, Benjamin and Wolf, Petra, (eds.) Multikonferenz Wirtschaftsinformatik 2008: 26. - 28. Februar 2008, TU München in Garching. Gito-Verlag, Berlin, pp. 313-314. ISBN 3-940019-34-8, 978-3-940019-34-9. Fulltext not available.

Echtler, Florian, Huber, Manuel and Klinker, Gudrun (2008) Shadow tracking on multi-touch tables. In: Working conference on Advanced Visual Interfaces (AVI 2008), May 28 - 30, 2008, Napoli, Italy. Fulltext not available.

Federrath, Hannes (2008) Spurenlos durchs Netz? - Die technischen Grenzen der Unbeobachtbarkeit im Internet. In: Universität Passau, 10. Mai 2008, Passau.

Heckner, Markus, Mühlbacher, Susanne and Wolff, Christian (2008) Tagging Tagging: Analysing user keywords in scientific bibliography management systems. Journal of Digital Information (JoDI) 9 (2).

Heckner, Markus, Neubauer, Tanja and Wolff, Christian (2008) Tree, funny, to_read, google: What are Tags Supposed to Achieve? A Comparative Analysis of User Keywords for Different Digital Resource Types. In: Soboroff, Ian and Agichtein, Eugene and Kumar, Ravi, (eds.) Proceedings of the 2008 ACM Workshop on Search in Social Media, SSM '08, Held in conjunction with ACM 17th Conference on Information and Knowledge Management (CIKM), Napa Valley/CA. ACM, New York, pp. 3-10. ISBN 978-1-60558-258-0.

Wolff, Christian (2008) Veränderte Arbeits- und Publikationsformen in der Wissenschaft und die Rolle der Bibliotheken. In: Hutzler, Evelinde and Schröder, Albert and Schweikl, Gabriele, (eds.) Bibliotheken gestalten Zukunft. Universitätsverlag Göttingen, Göttingen, pp. 157-172. ISBN 978-3-940344-43-4.

Scheuer, Florian (2008) Voice over IP - Sicherheitsaspekte. In: SächsTel - Sächsisches Telekommmunikationszentrum e.V., Jahrestagung "Voice over IP", 30. September 2008, Dresden.

Federrath, Hannes, Mottok, Jürgen, Plößl, Klaus and Völkl, Thomas (2008) Von der Assistenz zum autonomen Fahren. Automobil-Elektronik 3. Fulltext not available.

Kern, Walter (2008) Web 2.0 - End of Accessibility? Analysis of Most Common Problems with Web 2.0 Based Applications Regarding Web Accessibility. International Journal of Public Information Systems 4 (2), pp. 131-154. Fulltext not available.

Ludwig, Bernd and Hacker, Martin (2008) Why is this Wrong? - Diagnosing Erroneous Speech Recognizer Output with a Two Phase Parser. In: Ghallab, Malik, (ed.) ECAI 2008: 18th European Conference on Artificial Intelligence, July 21 - 25, 2008, Patras, Greece ; including: Prestigious Applications of Intelligent Systems (PAIS 2008). Frontiers in artificial intelligence and applications, 178. IOS Press, Amsterdam, pp. 323-327. ISBN 978-1-586-03891-5. Fulltext not available.

Gaude, Michael (2008) Zukünftige Verbreitung der Digitalen Signatur in Geschäftsprozessen - Ergebnisse einer Delphi-Studie. In: Bichler, Martin and Hess, Thomas and Krcmar, Helmut and Lechner, Ulrike and Matthes, Florian and Picot, Arnold and Speitkamp, Benjamin and Wolf, Petra, (eds.) Multikonferenz Wirtschaftsinformatik 2008. GITO-Verlag, Berlin, pp. 1223-1237. ISBN 978-3-940019-34-9; 3-940019-34-8. Fulltext not available.

Fuchs, Ludwig and Pernul, Günther (2008) proROLE: A Process-oriented Lifecycle Model for Role Systems. In: Proceedings of the 16th European Conference on Information Systems (ECIS 2008), Galway, Ireland, June 9-11, 2008. Springer, Berlin, pp. 1322-1333. ISBN 9780955315923.

Wolff, Christian (2007) Medieninformatik. In: Neumann-Holzschuh, Ingrid, (ed.) 40 Jahre Philosophische Fakultät IV - Sprach- und Literaturwissenschaften. Universität Regensburg, Regensburg, pp. 47-49.

Kronschnabl, Stefan (2007) Risk Performance Management des IT-Bereichs. In: Conference on Innovations in the Banking Industry (CIBI), Oktober 2007, München. Fulltext not available.

Hoffmann, Reinhard, Lottaz, Claudio, Kühne, Thomas, Rolink, Antonius and Melchers, Fritz (2007) Neutrality, compensation, and negative selection during evolution of B-cell development transcriptomes. Molecular Biology and Evolution (Mol Biol Evol) 24 (12), pp. 2610-2618. Fulltext not available.

Gaude, Michael (2007) Future Diffusion of PK1-Technology — A German Delphi Study. In: Pohlmann, Norbert and Reimer, Helmut and Schneider, Wolfgang, (eds.) Securing electronic business processes: highlights of the Information Security Solutions Europe/SECURE 2007 Conference / ISSE/SECURE 2007. Vieweg, Wiesbaden, pp. 386-395. ISBN 978-3-8348-0346-7.

Erber, Roland, Schläger, Christian and Pernul, Günther (2007) Patterns for Authentication and Authorisation Infrastructures. In: Tjoa, A. Min, (ed.) Proceedings / 18th International Conference on Database and Expert Systems Applications, DEXA 2007 Regensburg, Germany, 3 - 7 September 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 755-759. ISBN 978-0-7695-2932-5.

Lambrinoudakis, Costas and Pernul, Günther and Tjoa, A. Min, eds. (2007) Trust, privacy and security in digital business: 4th international conference; proceedings / TrustBus 2007, Regensburg, Germany, September 4-6, 2007. Lecture Notes in Computer Science, 4657. Springer, Heidelberg. ISBN 978-3-540-74408-5. Fulltext not available.

Bullinger, Lars, Rücker, Frank G., Kurz, Stephan, Du, Juan, Scholl, Claudia, Sander, Sandrine, Corbacioglu, Andrea, Lottaz, Claudio, Krauter, Jürgen, Fröhling, Stefan, Ganser, Arnold, Schlenk, Richard F., Döhner, Konstanze, Pollack, Jonathan R. and Döhner, Hartmut (2007) Gene-expression profiling identifies distinct subclasses of core binding factor acute myeloid leukemia. Blood 110 (4), pp. 1291-1300. Fulltext not available.

Emig, Christian, Brandt, Frank, Abeck, Sebastian, Biermann, Jürgen and Klarl, Heiko (2007) An Access Control Metamodel for Web Service-Oriented Architecture. In: Proceedings of the International Conference on Software Engineering Advances. Cap Esterel. ISBN 0-7695-2937-2.

Hof, Alexander (2007) Entwicklung eines adaptiven Hilfesystems für multimodale Anzeige-Bedienkonzepte im Fahrzeug. PhD, Universität Regensburg.

Herrmann, Dominik (2007) Performance Comparison of low-latency Anonymisation Services from a User Perspective. In: 7th Workshop on Privacy Enhancing Technologies, 20. - 22. Juni 2007, University of Ottawa, Canada.

Schläger, Christian, Priebe, Torsten, Liewald, Manuel and Pernul, Günther (2007) Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures. In: Markus, M. Lynne and Hampe, J. Felix and Gricar, Joze and Pucihar, Andreja and Lenart, Gregor, (eds.) Proceedings of the 20th Bled eConference "eMergence" (Bled'07), Bled, Slovenia, June 3 - 6 2007. Faculty of Organizational Sciences, Kranj. ISBN 978-961-232-204-5.

Oßwald, Achim and Stempfhuber, Maximilian and Wolff, Christian, eds. (2007) Open Innovation - neue Perspektiven im Kontext von Information und Wissen? Proc. 10. Internationales Symposium für Informationswissenschaft. Schriften zur Informationswissenschaft, 46. UVK, Konstanz. ISBN 978-3-86764-020-6.

Dobmeier, Wolfgang and Pernul, Günther (2007) Towards Privacy-Aware Handling of Authorizations. In: Policy 2007: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks: proceedings: Bologna, Italy, 13-15 June, 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 70-76. ISBN 0-7695-2767-1.

Kolter, Jan, Schillinger, Rolf and Pernul, Günther (2007) Building a Distributed Semantic-aware Security Architecture. In: Venter, Hein and Eloff, Mariki and Labuschagne, Les and Eloff, Jan and von Solms, Rossouw, (eds.) New approaches for security, privacy and trust in complex environments: proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. Springer, New York, pp. 397-408. ISBN 978-0-387-72366-2; 0-387-72366-8.

Klarl, Heiko (2007) Modellgetriebene, mustergestützte Sicherheit in serviceorientierten Architekturen. Informatik-Spektrum 30 (3), pp. 175-177. Fulltext not available.

Priebe, Torsten, Dobmeier, Wolfgang, Schläger, Christian and Kamprath, Nora (2007) Supporting Attribute-based Access Control in Authentication and Authorization Infrastructures with Ontologies. Journal of software: JSW 2 (1), pp. 27-38.

Plößl, Klaus and Federrath, Hannes (2007) A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. In: 5th International Workshop on Security in Information Systems -- WOSIS 2007, June 2007, Funchal, Madeira, Portugal.

Plößl, Klaus (2007) A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. In: WOSIS 2007, 12. Juni 2007, Funchal, Madeira, Portugal.

Schryen, Guido (2007) A Scalable and Flexible Infrastructure Framework For Addressing Spam. In: Satesh, D. and Prabhakar, R., (eds.) UNSPECIFIED ICFAI University Press, Hyderabad, India, pp. 55-64. Fulltext not available.

Mandl, Christoph, Pfeiffer, Christoph and Wolff, Christian (2007) A propos “Leitbild”. Universität Regensburg setzt bei Grundwertediskussion auf E-Participation und Wisdom of the Crowd. U-Mail - Regensburger Universitätszeitung 32 (1), p. 2.

Turban, Bernhard, Kucera, Markus, Tsakpinis, Athanassios and Wolff, Christian (2007) An Integrated Decision Model For Efficient Requirement Traceability In SPICE Compliant Development. In: WISES 2007. Fifth IEEE Workshop on Intelligent Solutions in Embedded Systems, 21./22.Juni 2007, Madrid.

Wendolsky, Rolf and Federrath, Hannes (2007) Anonymität im Internet. In: Handbuch Datenschutzmanagement. 4. Nachlieferung. WRS Verlag, Planegg/ München. Fulltext not available.

Klarl, Heiko (2007) Ausblick auf die modellgetriebene, mustergestützte Sicherheit in serviceorientierten Architekturen. In: Oßwald, Achim and Stempfhuber, Maximilian and Wolff, Christian, (eds.) Open Innovation - neue Perspektiven im Kontext von Information und Wissen? Proc. 10. Internationales Symposium für Informationswissenschaft. Schriften zur Informationswissenschaft, 46. UVK, Konstanz, pp. 381-383. ISBN 978-3-86764-020-6. Fulltext not available.

Nowey, Thomas and Federrath, Hannes (2007) Collection of Quantitative Data on Security Incidents. In: The Second International Conference on Availability, Reliability and Security (ARES 2007), 10. - 13. April 2007, Wien.

Nowey, Thomas (2007) Collection of Quantitative Data on Security Incidents. In: ARES 2007, 11. April 2007, Wien. Fulltext not available.

Mandl, Stefan and Ludwig, Bernd (2007) Coping with Unconsidered Context of Formalized Knowledge. In: Kokinov, B., (ed.) Modeling and using context: 6th International and Interdisciplinary Conference, CONTEXT 2007, Roskilde, Denmark, August 20 - 24, 2007; proceedings. Lecture notes in computer science: Lecture notes in artificial intelligence, 4635. Springer, Berlin, pp. 342-355. ISBN 3-540-74254-9; 978-3-540-74254-8. Fulltext not available.

Wagner, Roland and Revell, Norman and Pernul, Günther, eds. (2007) Database and expert systems applications: 18th international conference; proceedings / DEXA 2007, Regensburg, Germany, September 3-7, 2007. Lecture Notes in Computer Science, 4653. Springer, Berlin. ISBN 978-3-540-74467-2. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (2007) Datenschutz und Datensicherheit. In: Schneider, Uwe and Werner, Dieter, (eds.) Taschenbuch der Informatik. 6. Auflage. Fachbuchverl. Leipzig im Carl-Hanser-Verlag, München, pp. 488-509. ISBN 3-446-40754-5; 978-3-446-40754-1. Fulltext not available.

Federrath, Hannes (2007) Datenschutz und Datensicherheit. In: Köhler, Richard and Küpper, Hans-Ulrich and Pfingsten, Andreas, (eds.) Handwörterbuch der Betriebswirtschaft. 6. Auflage. Enzyklopädie der Betriebswirtschaftslehre, 1. Schäffer-Poeschel, Stuttgart, pp. 264-274. ISBN 3-7910-8051-2; 978-3-7910-8051-2. Fulltext not available.

Federrath, Hannes (2007) Economic Aspects of Information Security. In: Honors Academy 2007, 18. September 2007, University of Regensburg.

Schläger, Christian and Ganslmayer, Monika (2007) Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. In: The Second International Conference on Availability, Reliability and Security: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 230-237. ISBN 0-7695-2775-2.

Reischer, Jürgen (2007) Extracting Informative Content Units in Text Documents - Using Topic Chains for Conceptual Document Representation. In: "Open Innovation" - Neue Perspektiven im Kontext von Information und Wissen: 10. Internationales Symposium für Informationswissenschaft, ISI 2007, 30. Mai - 1. Juni 2007, Köln, Germany. Fulltext not available.

Widder, Alexander, von Ammon, Rainer, Schaeffer, Philippe and Wolff, Christian (2007) Identification of Suspicious, Unknown Event Patterns in an Event Cloud. In: Jacobsen, Hans-Arno and Mühl, Gero and Jaeger, Michael A., (eds.) Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, DEBS 2007, Toronto, Juni 2007. ACM International Conference Proceeding Series, 233. ACM, New York, pp. 164-170. ISBN 978-1-59593-665-3.

Kesdogan, Dogan, Pham, Vinh and Pimenidis, L. (2007) Information Disclosure in Identity Management. In: Proceedings of 12th Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 11-12 October 2007. Fulltext not available.

Wolff, Christian (2007) Informationskompetenz als Studienfach?! Eine curriculare Zusammenarbeit von Universitätsbibliothek und Fachdisziplinen. In: Oßwald, Achim and Stempfhuber, Maximilian and Wolff, Christian, (eds.) Open Innovation - neue Perspektiven im Kontext von Information und Wissen? Proc. 10. Internationales Symposium für Informationswissenschaft. Schriften zur Informationswissenschaft, 46. UVK, Konstanz, pp. 343-349. ISBN 978-3-86764-020-6.

Nowey, Thomas (2007) Kosten-Nutzen-Quantifizierung von Investitionen in IT-Sicherheit. In: Doctoral Consortium, WI 2007, 26. Februar 2007, Karlsruhe. Fulltext not available.

Nowey, Thomas (2007) Kosten-Nutzen-Quantifizierung von Investitionen in IT-Sicherheit als Grundlage eines ökonomisch fundierten Sicherheitsmangements. In: Doctoral Consortium der WI 2007, 26.2. - 27.2.2007, Karlsruhe.

Schläger, Christian and Nowey, Thomas (2007) On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Activities. International journal of computer systems science & engineering 22 (5). Fulltext not available.

Schläger, Christian and Nowey, Thomas (2007) On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments. International Journal of Computer Systems Science and Engineering.

Harriehausen-Mühlbauer, Bettina, Prados, Francisco Rodriguez, Ludwig, Bernd and Ott, Heike (2007) On the way to Yzun -- NLP Supports Playful Language Learning on Mobiles. In: Interactive systems: The problems of human-computer Interaction. Fulltext not available.

Bienk, Stefan and Schmidt, Sebastian (2007) Part-of-Speech-Tagging am Beispiel der deutschen Sprache. KI : Künstliche Intelligenz 21 (4), pp. 45-49. Fulltext not available.

Wendolsky, Rolf, Herrmann, Dominik and Federrath, Hannes (2007) Performance Comparison of low-latency Anonymisation Services from a User Perspective. In: 7th International Symposium on Privacy Enhancing Technologies (PET 2007), 20. - 22. Juni 2007, Ottawa, Kanada.

Schmidt, Sebastian, Mandl, Stefan, Ludwig, Bernd and Stoyan, Herbert (2007) Product-Advisory on the Web: An Information Extraction Approach. In: Devedžic, Vladan, (ed.) Proceedings of AIA 2007. Acta Press, Zürich, pp. 633-636. ISBN 978-0-88986-629-4. Fulltext not available.

Dürbeck, Stefan, Schillinger, Rolf and Kolter, Jan (2007) Security Requirements for a Semantic Service-oriented Architecture. In: The Second International Conference on Availability, Reliability and Security: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 366-373. ISBN 0-7695-2775-2; 978-0-7695-2775-8.

Federrath, Hannes (2007) Stellungnahme als Sachverständiger zum Gesetzentwurf der Bundesregierung eines Gesetzes zur Verbesserung der Durchsetzung von Rechten des geistigen Eigentums. In: Anhörung im Rechtsausschuss des Deutschen Bundestages, 20. Juni 2007, Berlin.

Federrath, Hannes (2007) Stellungnahme als Sachverständiger zum Gesetzentwurf der Bundesregierung eines Gesetzes zur Verbesserung der Durchsetzung von Rechten des geistigen Eigentums. In: Anhörung im Rechtsausschuss des Deutschen Bundestages, 20. Juni 2007.

Fuchs, Ludwig and Pernul, Günther (2007) Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. In: The Second International Conference on Availability, Reliability and Security, 2007: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 374-384. ISBN 0-7695-2775-2; 978-0-7695-2775-8.

Heckner, Markus, Mühlbacher, Susanne and Wolff, Christian (2007) Tagging Tagging. Analysing user keywords in scientific bibliography management systems. In: Networked Knowledge Organization Systems and Services. The 6th European Networked Knowledge Organization Systems (NKOS) Workshop, held at the 11th ECDL Conference, Budapest.

Federrath, Hannes (2007) Technischer Datenschutz und mehrseitige IT-Sicherheit. In: Seminar "Sichere und datenschutzgerechte Technikgestaltung in einer mobilen und vernetzten Welt" der Studienstiftung des deutschen Volkes, 27. August 2007, La Villa, Italien.

Görz, Günther and Ludwig, Bernd (2007) The Practical Use of Valencies in the Erlangen Speech Dialogue System CONALD. In: Herbst, Thomas and Götz-Votteler, Katrin, (eds.) Valency: theoretical, descriptive and cognitive issues. Trends in Linguistics, 187. de Gruyter, Berlin, pp. 353-364. ISBN 978-3-11-019573-6. Fulltext not available.

Ruthven, I., Baillie, M. and Elsweiler, David (2007) The Relative Effects of Knowledge, Interest and Confidence in Assessing Relevance. Journal of Documentation 63 (4), p. 482. Fulltext not available.

Elsweiler, David, Ruthven, I. and Jones, C. (2007) Towards memory supporting personal information management tools. Journal of American Society of Information Science and Technology 58 (7), pp. 924-946.

Elsweiler, David and Ruthven, Ian (2007) Towards task-based personal information management evaluations. In: SIGIR '07: Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval. ACM Press, New York, NY, pp. 23-30. ISBN 978-1-59593-597-7.

Federrath, Hannes and Nowey, Thomas (2007) Wieviel darf IT-Sicherheit kosten? In: Veranstaltung "(IT)-Sicherheit am Strand" der IT Security Cluster Initiative Ostbayern, 12. Juli 2007, Regensburg.

Wolff, Christian (2007) Zeitbezogene Korpusauswertung. Medienanalyse oder Sprachwandelforschung? In: Reimann, Sandra and Kessel, Katja, (eds.) Wissenschaften im Kontakt. Kooperationsfelder der Deutschen Sprachwissenschaft. Narr, Tübingen, pp. 173-187. ISBN 3-8233-6328-X, 978-3-8233-6328-6.

Wolff, Christian (2007) Überlegungen zur Weiterentwicklung von vascoda. Strategiepapier im Auftrag des deutschen Wissenschaftsportals vascoda e.V. Technical Report, Hannover. Fulltext not available.

Federrath, Hannes (2007) Überwachung in einer vernetzten Welt: Das Ende der Privatheit? Blick in die Wissenschaft (19), pp. 18-24.

Plößl, Klaus (2006) Vorschlag für eine Sicherheitsinfrastruktur für Vehicular Ad Hoc Networks. In: Automotive 2006, 12. – 13. Oktober 2006, Stuttgart.

Pernul, Günther and Dobmeier, Wolfgang (2006) Modellierung von Zugriffsrichtlinien für offene Systeme. In: Weske, Mathias and Nüttgens, Markus, (eds.) EMISA 2006: Methoden, Konzepte und Technologie für die Entwicklung von dienstbasierten Informationssystemen. GI-Edition : Proceedings, 95. Ges. für Informatik, Bonn. ISBN 978-3-88579-189-8; 3-88579-189-7.

Fernandez, Eduardo B. and Pernul, Günther (2006) Patterns for session-based access control. In: Proceedings of the 2006 conference on Pattern language. ACM International Conference Proceeding Series. ACM, NewYork. ISBN 978-1-60558-372-3.

Klarl, Heiko and Preitsameter, Markus (2006) Securing Service-Oriented and Event-Driven Architectures - Results of an Evaluation of Enterprise Security Frameworks. In: IEEE Services Computing Workshops (SCW'06), 18. - 22. September 2006, Chicago, Illinois, USA.

Priebe, Torsten, Kolter, Jan, Herrmann, Dominik, Bednar, Peter and Paralic, Jan (2006) Supporting Semantic Annotation of Text Documents with Text Mining Techniques. In: Proceedings of the 7th International Workshop on Data Analysis (WDA 2006), Kosice, Slovakia, 01.-3. Juli 2006. Elfa Academic Press, Kosice, Slovakia. ISBN 80-969224-8-3. Fulltext not available.

Lottaz, Claudio, Yang, Xinan, Scheid, Stefanie and Spang, Rainer (2006) OrderedList - a bioconductor package for detecting similarity in ordered gene lists. Bioinformatics 22 (18), pp. 2315-2316. Fulltext not available.

Plößl, Klaus (2006) Towards a Security Architecture for Vehicular Ad Hoc Networks. In: ARES 2006, 20. - 22. April 2006, Wien.

Rott, Hans (2006) Revision by Comparison as a Unifying Framework: Severe
Withdrawal, Irrevocable Revision and Irrefutable Revision.
Theoretical Computer Science 355 (2), pp. 228-242. Fulltext not available.

Schläger, Christian, Nowey, Thomas and Montenegro, Jose A. (2006) A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c eCommerce. In: Proceedings of The First International Conference on Availability, Reliability and Security (ARES'06). IEEE Computer Society, Los Alamitos, Calif.. ISBN 0-7695-2567-9.

Abou-Tair, Dhiah el Diehn I. (2006) A framework ensuring privacy in a distributed environment. In: PST '06 Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, Markham, Ontario, Canada, Oct 30-Nov 1, 2006. ACM, New York. ISBN 1-59593-604-1 (online). Fulltext not available.

Federrath, Hannes (2006) AN.ON -- Anonymität Online: Ergebnisse und Verwertung. In: Bundesministerium für Wirtschaft und Technologie (BMWi) Berlin/Bonn, 28. April 2006.

Abou-Tair, Dhiah el Diehn I. and Niere, Jörg (2006) An Architecture for Integrating Heterogeneous University Applications that Supports Monitoring. In: Trends in Enterprise Application Architecture. 2nd International Conference, TEAA 2006, Berlin, Germany, Nov 29 - Dec 1, 2006, Revised Selected Papers. Lecture Notes in Computer Science, 4473. Springer, Berlin, pp. 16-24. ISBN 978-3-540-75911-9, 978-3-540-75912-6 (online). Fulltext not available.

Abou-Tair, Dhiah el Diehn I. and Berlik, Stephan (2006) An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems. In: On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE. OTM Confederated Internat. Conf, CoopIS, DOA, GADA, and ODBASE 2006, Montpellier, France, Oct 29 - Nov 3, 2006. Proc., Part I. Lecture Notes in Computer Science, 4275. Springer, Berlin, pp. 983-994. ISBN 978-3-540-48287-1, 978-3-540-48289-5 (online). Fulltext not available.

Federrath, Hannes (2006) Anonymity in the Internet. In: ZISC Information Security Colloquium, 20. Juni 2006, ETH Zürich.

Federrath, Hannes (2006) Anonymität im Internet. In: Security Colloquium TU München, 28. November 2006, München.

Federrath, Hannes (2006) Applications Research on Information and Communication Technologies (ICT) for Trust and Confidence: Potential Future Research Issues. In: EU, Brüssel, 24. Januar 2006, Brüssel.

Bläsi, C. and Wolff, Christian (2006) Auswahl von DRM-Technologien für ein kioskbasiertes System zum Vertrieb digitaler Lehrbücher. Projektbericht eLET im Auftrag der Firma Mega-World Digitale Medien GmbH. Projektbericht, Project Report, Universität Erlangen / Universität Regensburg. Fulltext not available.

Plößl, Klaus (2006) Awareness für IT-Sicherheit und Datenschutz in der Hochschulausbildung: Eine empirische Untersuchung. In: Sicherheit 2006, 20. Februar 2006, Magdeburg.

Federrath, Hannes (2006) Beobachtungsmöglichkeiten im Internet. In: in: Handbuch Datenschutzmanagement. 3. Nachlieferung. WRS Verlag, Planegg/ München. Fulltext not available.

Ludwig, Bernd, Reiß, Peter and Görz, Günther (2006) CONALD: The Configurable Plan-Based Dialogue System. In: Keith, Bernard, (ed.) 2006 IAR Annual Meeting. Deutsch-Französisches Institut für Automation und Robotik, Nancy 16.-17. Nov. 2006. IAR, Nancy, p. 4. Fulltext not available.

Elsweiler, David, Ruthven, I. and Ma, L. (2006) Considering Human Memory in PIM. In: SIGIR 2006 Workshop on Personal Information Management, August 10-11, 2006, Seattle, Washington. Fulltext not available.

Plößl, Klaus (2006) Eine mögliche Sicherheitsinfrastruktur für Vehicular Ad Hoc Networks. In: Forschungskolloquium Wirtschaftsinformatik, 20. November 2006, Regensburg.

Kesdogan, Dogan, Agrawal, Dakshi, Pham, Vinh and Rautenbach, Dieter (2006) Fundamental limits on the anonymity provided by the MIX technique. In: Symposium on Security and Privacy, 21-24 May 2006, Berkeley/Oakland, CA, USA. IEEE, pp. 14-99. ISBN 0-7695-2574-1. Fulltext not available.

Ludwig, Bernd, Mandl, Stefan and Schmidt, Sebastian (2006) How Linguistic Resources May Help to Recommend TV Programmes. In: Oltramari, Alessandro, (ed.) Proceedings of Ontolex 2006 (OntoLex 2006 Genova 27.05.2006). Fulltext not available.

Ludwig, Bernd and Mandl, Stefan (2006) How to Analyze Free Text Descriptions for Recommending TV Programmes? In: Brewka, Gerhard and Coradeschi, Silva and Perini, Anna and Traverso, Paolo, (eds.) ECAI 2006, 17th European Conference on Artificial Intelligence, August 29 - September 1, 2006, Riva del Garda, Italy ; including: Prestigious Applications of Intelligent Systems (PAIS 2006) ; proceedings. Frontiers in Artificial Intelligence and Applications, 141. IOS Press, Amsterdam, pp. 821-822. ISBN 1-58603-642-4. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (2006) IT-Sicherheit. In: Wind, Martin and Kröger, Detlef, (eds.) Handbuch IT in der Verwaltung. Springer, Berlin, pp. 273-292. ISBN 978-3-540-21879-1; 3-540-21879-3. Fulltext not available.

Federrath, Hannes (2006) IT-Sicherheit und Datenschutz im Spannungsfeld von innerer Sicherheit und Bürgerrechten. In: Akademische Feier der Wirtschaftswissenschaftlichen Fakultät der Universität Regensburg, 10. Juni 2006, Regensburg.

Reischer, Jürgen (2006) IVal--An Alternative WordNet Browser for Evaluating Semantic Informativeness of Concepts. In: KONVENS 2006 (Konferenz zur Verarbeitung natürlicher Sprache), 4. -7. Oktober 2006, Konstanz. Fulltext not available.

Clauß, Sebastian, Kesdogan, Dogan, Kölsch, Tobias, Pimenidis, L., Schiffner, Stefan and Steinbrecher, Sandra (2006) Identitätsmanagement und das Risiko der Re-Identifikation. In: Dittmann, Jana, (ed.) Sicherheit 2006 : Otto-von-Guericke-Univ, Magdeburg, 20. - 22. Feb. 2006. GI-Edition : Proceedings, 77. Ges. f. Informatik, Bonn, pp. 188-191. ISBN 3-88579-171-4. Fulltext not available.

Wolff, Christian (2006) Information Retrieval is for Everybody - Beobachtungen und Thesen. In: Schaaf, Martin and Althoff, Klaus-Dieter, (eds.) Lernen, Wissensentdeckung und Adaptivität - LWA / Workshop Information Retrieval der GI - FGIR 2006. Hildesheimer Informatik-Berichte. Universität Hildesheim, Hildesheim, pp. 102-107.

Federrath, Hannes (2006) Informationssicherheit, Datenschutz und Bürgerrechte -- Eine kritische Betrachtung. In: Internationales Begegnungszentrum der Wissenschaft e.V. Berlin, 30. Oktober 2006, Berlin.

Kesdogan, Dogan, Kölsch, Tobias and Pimenidis, Lexi (2006) Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis. In: Quality of Protection. Security Measurements and Metrics. Advances in Information Security, 23. Springer, Berlin, pp. 159-171. ISBN 978-0-387-29016-4, 978-0-387-36584-8 (online). Fulltext not available.

Federrath, Hannes (2006) Kryptographie. In: Handbuch Datenschutzmanagement. 2. Nachlieferung. WRS Verlag, Planegg/ München. Fulltext not available.

Mandl, Christoph, Pfeiffer, Christoph and Wolff, Christian (2006) Leitbildprozess der Universität Regensburg. Dokumentation und quantitative Auswertung des Leitbild-Forums. Technical Report, Universität Regensburg.

Nowey, Thomas (2006) Lernen vom Business Engineering: Ansätze für ein systematisches, modellgestütztes Vorgehensmodell zum Sicherheitsmanagement. In: Multikonferenz Wirtschaftsinformatik 2006, 20. Februar 2006, Passau. Fulltext not available.

Federrath, Hannes (2006) Mehrseitige IT-Sicherheit und technischer Datenschutz. In: 4. Jahreskongress "Datenschutz im Kreditgewerbe", 11. September 2006, Potsdam.

Federrath, Hannes (2006) Mehrseitige Sicherheit. In: SecurIT Gipfel: Wirtschafts- und Technologiegipfel für IT-Sicherheit, 23. Mai 2006, Gästehaus Petersberg, Königswinter.

Ludwig, Bernd, Mandl, Stefan, Reiß, Peter, Görz, Günther and Stoyan, Herbert (2006) Natürlichsprachliche Bedienung technischer Systeme. In: Hochberger, Christian and Liskowsky, Rüdiger, (eds.) Informatik für Menschen: Beiträge der 36. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 2. bis 6. Oktober 2006 in Dresden. Bd. 2. GI-Edition: lecture notes in informatics; Proceedings, 94. Ges. für Informatik, Bonn, pp. 146-153. ISBN 978-3-88579-188-1. Fulltext not available.

Federrath, Hannes (2006) Netzwerksicherheit -- Risiken und Schutzmöglichkeiten. In: Veranstaltung "(IT)-Sicherheit am Strand" der IT Security Cluster Initiative Ostbayern, 13. Juli 2006, Regensburg.

Federrath, Hannes (2006) Neue Kriminalität im Cyberspace -- Angriffe auf die IT-Sicherheit und ihre Abwehr. In: Landgericht Regensburg, 15. November 2006, Regensburg. Fulltext not available.

Ludwig, Bernd (2006) Pragmatics First: Coherence in Dialogue Follows Acting in the Environment. In: Proceedings of the ECAI 2006 Workshop on Language-Enabled Educational Technology and Development and Evaluation of Robust Spoken Dialogue Systems, Riva del Garda. Fulltext not available.

Federrath, Hannes (2006) Projekt "AN.ON - Anonymität.Online" -- Technische Ergebnisse. In: Abschlusskonferenz des BMWi-Projektes AN.ON, Bundesministerium für Wirtschaft und Technologie, 24. November 2006, Berlin. Fulltext not available.

Mandl, Stefan, Ludwig, Bernd, Schmidt, Sebastian and Stoyan, Herbert (2006) Recurring Hidden Contexts in Online Concept Learning. In: Workshop Planning, Learning and Monitoring with Uncertainty in Dynamic Worlds. Fulltext not available.

Benenson, Zinaida, Freiling, Felix C., Holz, Thorsten, Kesdogan, Dogan and Draque Penso, Lucia (2006) Safety, Liveness, and Information Flow: Dependability Revisited. In: ARCS '06, 19th International Conference on Architecture of Computing Systems : March 16, 2006, Frankfurt am Main. Workshop proceedings. GI-Edition : Proceedings, 81. Ges. f. Informatik, Bonn, pp. 56-65. ISBN 3-88579-175-7. Fulltext not available.

Kesdogan, Dogan and Palmer, C. (2006) Technical challenges of network anonymity. Computer Communications 29 (3), pp. 306-324. Fulltext not available.

Federrath, Hannes (2006) Technische Grundlagen von Auskunftsansprüchen. Zeitschrift für Urheber- und Medienrecht: ZUM 50 (6), pp. 434-438. Fulltext not available.

Federrath, Hannes (2006) Technische Grundlagen von Auskunftsansprüchen. In: Arbeitssitzung "Auskunftsanspruch gegen Internetprovider" des Instituts für Urheber- und Medienrecht, 07. April 2006, München.

Federrath, Hannes (2006) Technische, ökonomische und rechtliche Aspekte datenschutzfreundlicher Techniken. In: NRW-Forschungstag "Innovationen zur Anwendung bringen", 25. Oktober 2006, RWTH Aachen.

Kesdogan, Dogan and Pimenidis, Lexi (2006) The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach. In: Quality of Protection. Security Measurements and Metrics. Advances in Information Security, 23. Springer, Berlin, pp. 145-158. ISBN 978-0-387-29016-4, 978-0-387-36584-8 (online). Fulltext not available.

Schläger, Christian and Nowey, Thomas (2006) Towards a Risk Management Perspective on AAIs. In: 3rd International Conference on Trust, Privacy & Security in Digital Business (TrustBus '06), 04. - 08. September 2006, Krakau, Polen. Fulltext not available.

Ludwig, Bernd (2006) Tracing Actions Helps in Understanding Interactions. In: 7th SIGdial Workshop on Discourse and Dialogue. Fulltext not available.

Fort, Milan, Freiling, Felix, Draque Penso, Lucia, Benenson, Zinaida and Kesdogan, Dogan (2006) TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. In: Computer Security – ESORICS 2006. 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings. Lecture Notes in Computer Science, 4189. Springer, Berlin, pp. 34-48. ISBN 978-3-540-44601-9, 978-3-540-44605-7 (online). Fulltext not available.

Hochholzer, Rupert, Iki, Naoka and Wolff, Christian (2006) Von Google bis zur elektronischen Zeitschrift - Orientierung in der Wissensgesellschaft: die neue Studieneinheit „Informationskompetenz“. U-Mail: Regensburger Universitätszeitung 31 (2), p. 11.

Plößl, Klaus and Federrath, Hannes (2006) Vorschlag für eine Sicherheitsinfrastruktur für Vehicular Ad Hoc Networks. In: Automotive - Safety & Security 2006 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik, 12. - 13. Oktober 2006, Universität Stuttgart.

Ludwig, Bernd, Mandl, Stefan and von Mammen, Sebastian (2006) What's on tonight - User-centered and Situation-aware Proposals for TV Programmes. In: Proceedings of IUI 2006, January 29–February 1, 2006, Sydney, Australia. Fulltext not available.

Hammwöhner, Rainer and Wolff, Christian (2006) Wie funktioniert das Internet? In: Fölling-Albers, Maria, (ed.) Universität für Kinder - Regensburg: Sommersemester 2006. Universtiät Regensburg, pp. 41-50. Fulltext not available.

Rengstl, Christian and Wolff, Christian (2005) Dokumentation Fehlerzuordnungsprogramm – Bildgenerator – Dezentraler Kiosk. Arbeitsbericht 5, Technical Report, Universität Regensburg. Fulltext not available.

Lottaz, Claudio and Spang, Rainer (2005) stam – a Bioconductor compliant R package for structured analysis of microarray data. BMC Bioinformatics 6, p. 211.

Federrath, Hannes (2005) Privacy Enhanced Technologies: Methods, Markets, Misuse. In: 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus '05), 22. - 26. August 2005, Copenhagen, Denmark.

Nowey, Thomas (2005) Protection Mechanisms against Phishing Attacks. In: 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus '05), 22. - 26. August 2005, Copenhagen, Denmark. Fulltext not available.

Hitzenberger, Ludwig, Mühlbacher, Susanne and Wolff, Christian (2005) Überlegungen zum Design Zentraler Kioske. Arbeitsbericht 7, Technical Report, Universität Regensburg. Fulltext not available.

Lottaz, Claudio and Spang, Rainer (2005) Molecular decomposition of complex clinical phenotypes using biologically structured analysis of microarray data. Bioinformatics 21 (9), pp. 1971-1978.

Benenson, Zinaida, Gärtner, Felix and Kesdogan, Dogan (2005) An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks. In: Proceeedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN 2005). IEEE, pp. 158-165. ISBN 0-7803-8801-1 (print). Fulltext not available.

Nowey, Thomas (2005) Ansätze zur Evaluierung von Sicherheitsinvestitionen. In: Sicherheit 2005, 07. April 2005, Regensburg. Fulltext not available.

Elsweiler, David, Ruthven, I. and Jones, C. (2005) Dealing with fragmented recollection of context in information management. In: Context-Based Information Retrieval (CIR-05) Workshop in Fifth International and Interdisciplinary Conference on Modeling and Using Context (CONTEXT-05), Paris, France. Fulltext not available.

Eibl, Maximilian and Wolff, Christian and Womser-Hacker, Christa, eds. (2005) Designing Information Systems: Festschrift für Jürgen Krause zum 60. Geburtstag. Schriften zur Informationswissenschaft, 43. UVK Verlagsgesellschaft mbH, Konstanz. ISBN 3-89669-564-9.

Federrath, Hannes and Pfitzmann, Andreas (2005) Einführung in die Grundlagen des elektronischen Geschäftsverkehrs. In: Moritz, Hans-Werner and Betten, Jürgen, (eds.) Rechts-Handbuch zum E-Commerce. 2. Auflage. Schmidt, Köln, pp. 1-17. ISBN 3-504-56086-X.

Mehler, Alexander and Wolff, Christian (2005) Einleitung: Perspektiven und Positionen des Text Mining [Einführung in das Themenheft Text Mining des LDV-Forum]. LDV-Forum 20 (1), pp. 1-18.

Arnold, Claus and Wolff, Christian (2005) Evaluierung von Visualisierungsformaten bei der webbasierten Suche. In: Moes, Roswitha, (ed.) Knowledge eXtended: die Kooperation von Wissenschaftlern, Bibliothekaren und IT-Spezialisten. Schriften des Forschungszentrums Jülich, Reihe Bibliothek, 14. FZ Jülich, Zentralbibliothek, Jülich, pp. 275-286. ISBN 3-89336-409-9.

Wolff, Christian and Arnold, Claus (2005) Evaluierung von Visualisierungsformaten bei der webbasierten Suche. In: Moes, Roswitha, (ed.) Knowledge eXtended: die Kooperation von Wissenschaftlern, Bibliothekaren und IT-Spezialisten; 2. - 4. November 2005 Jülich; Vorträge und Poster. Schriften des Forschungszentrums Jülich / Reihe Bibliothek, 14. Forschungszentrum, Zentralbibliothek, Jülich, pp. 275-286. ISBN 3-89336-409-9. Fulltext not available.

Federrath, Hannes, Nowey, Thomas, Plößl, Klaus and Wendolsky, Rolf (2005) Informationssicherheit in Forschung und universitärer Ausbildung in Regensburg. Schriftenreihe "Informationstechnologie in Bayern" des Bayerischen Wirtschaftsministeriums, pp. 36-38. Fulltext not available.

Bartmann, Dieter (2005) Innovationen im Retail Banking: der Weg zum erfolgreichen Privatkundengeschäft. Wiley-VCH-Verlag, Weinheim. ISBN 3-527-50136-3. Fulltext not available.

Federrath, Hannes (2005) Kurzüberblick über die Grundlagen des Datenschutzes im Internet. In: Rechenzentrum der Universität, 20. April 2005, Regensburg.

Ott, Heike, Prados, Francisco, Ludwig, Bernd and Harriehausen-Mühlbauer, Bettina (2005) Language e-Learning with role-based mobile phone games. In: Jantke, Klaus P., (ed.) Marktplatz Internet: von e-Learning bis e-Payment: 13. Leipziger Informatik-Tage, LIT 2005, 21. - 23. September 2005, Leipzig. GI-Edition: lecture notes in informatics. Proceedings, 72. Ges. für Informatik, Bonn, pp. 12-18. ISBN 3-88579-401-2. Fulltext not available.

Wolff, Christian (2005) Media Design Patterns. In: Eibl, Maximilian and Womser-Hacker, Christa and Wolff, Christian, (eds.) Designing Information Systems: Festschrift für Jürgen Krause. Schriften zur Informationswissenschaft, 43. UVK Verlagsgesellschaft mbH, Konstanz, pp. 209-217. ISBN 3-89669-564-9.

Federrath, Hannes (2005) Mehrseitige Sicherheit im Internet am Beispiel Privacy Enhancing Technologies (PET). In: TU Berlin, 15. November 2005, Berlin.

Fritsch, Lothar, Kölsch, Tobias, Kohlweiss, Markulf and Kesdogan, Dogan (2005) Mit IDM und Mittler zu mehr Privatsphäre in LBS. In: Roth, Jörg, (ed.) Ortsbezogene Anwendungen und Dienste : 2. GI/ITG KuVS Fachgespräch, Stuttgart 2005.06.16-17. Informatik-Berichte, 324. FernUniversität, Fachbereich Informatik, Hagen, pp. 58-62. Fulltext not available.

Harriehausen-Mühlbauer, Bettina, Prados, Francisco, Ludwig, Bernd and Heike, Ott (2005) Mobile Phone Games for Language e-Learning. In: Sosnin, P., (ed.) Interactive systems and technologies: the problems of human-computer interaction: proceedings of the international conference, 26 - 30 September 2005, Ulyanovsk. , pp. 154-158. ISBN 5-89146-677-5. Fulltext not available.

Ludwig, Bernd (2005) Natürlichsprachliche Bedienung technischer Geräte. In: Wagner, Dorothea and Dreier, Thomas and Günther, Oliver and Hölldobler, Steffen and Löhr, Klaus-Peter and Molitor, Paul and Reischuk, Rüdiger and Saupe, Dietmar, (eds.) UNSPECIFIED GI-Edition: Dissertations, 5. Ges. für Informatik, Bonn, pp. 105-114. ISBN 3-88579-409-8. Fulltext not available.

Döring, Sven and Ludwig, Bernd (2005) Personalisierung und Situierung in der Mensch-Maschine-Interaktion. KI - Künstliche Intelligenz (3), pp. 27-35. Fulltext not available.

Clauß, Sebastian, Kesdogan, Dogan, Kölsch, Tobias, Pimenidis, L., Schiffner, Stefan and Steinbrecher, Sandra (2005) Privacy Enhanced Identity Management: Design Considerations and Open Problems. In: DIM '05. Proceedings of the 2005 ACM Workshop on Digital Identity Management, Nov. 11, George Mason University, Fairfax, VA, USA. ACM, New York, pp. 84-93. ISBN 1595932321 (online). Fulltext not available.

Kölsch, Tobias, Fritsch, Lothar, Kohlweiss, Markulf and Kesdogan, Dogan (2005) Privacy for Profitable Location Based Services. In: Security in Pervasive Computing. 2nd Internat. Conf., SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings. Lecture Notes in Computer Science, 3450. Springer, Berlin, pp. 164-178. ISBN 978-3-540-25521-5, 978-3-540-32004-3 (online). Fulltext not available.

Federrath, Hannes (2005) Responsibility of Mix Operators. In: Panel on Responsibility of Mix Operators. Workshop on Privacy Enhancing Technologies (PET 2005), 30. Mai 2005, Dubrovnik (Cavtat), Croatia.

Plößl, Klaus (2005) Schutzmöglichkeiten gegen Phishing. In: Sicherheit 2005, 07. April 2005, Regensburg.

Benenson, Zinaida, Gärtner, Felix and Kesdogan, Dogan (2005) Secure Multi-Party Computation with Security Modules. In: Federrath, Hannes, (ed.) Sicherheit 2005: Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. Lecture Notes in Informatics P, P-62. Köllen, Bonn. ISBN 3-88579-391-1. Fulltext not available.

Nowey, Thomas (2005) Security Metrics - Business Perspective. In: GI-Dagstuhl-Forschungsseminar on Dependability Metrics, 31. Oktober 2005, Dagstuhl. Fulltext not available.

Reiß, Peter, Ludwig, Bernd and Görz, Günther (2005) Selbstreflexion in einem planbasierten Dialogsystem. In: Cremers, Armin B. and Manthey, Rainer and Martini, Peter and Steinhage, Volker, (eds.) Informatik 2005 - Informatik LIVE!; 19. - 22. September 2005 in Bonn. GI-Edition: lecture notes in informatics. Proceedings, P 67. Ges. für Informatik, Bonn, pp. 256-260. ISBN 3-88579-396-2. Fulltext not available.

Plößl, Klaus (2005) Sichere E-Mail-Kommunikation mit S/MIME. In: Dallmeier electronic, 01. Dezember 2005, Regensburg. Fulltext not available.

Federrath, Hannes, ed. (2005) Sicherheit 2005: Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. Lecture Notes in Informatics (P-62), 62. Köllen-Verlag, Bonn. ISBN 3-88579-391-1. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (2005) Sicherheit im Netz -- Datensicherheit. In: Moritz, Hans-Werner and Betten, Jürgen, (eds.) Rechts-Handbuch zum E-Commerce. 2. Auflage. Schmidt, Köln, pp. 855-870. ISBN 3-504-56086-X.

Kesdogan, Dogan and Rattay, O. (2005) Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web (= Security Evaluation of Anonymity Techniques). In: Federrath, Hannes, (ed.) Sicherheit 2005: Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. Lecture Notes in Informatics P, P-62. Köllen, Bonn. ISBN 3-88579-391-1. Fulltext not available.

Görz, Günther and Ludwig, Bernd (2005) Speech Dialogue Systems - A Pragmatics-Guided Approach to Rational Interaction. KI - Künstliche Intelligenz (3), pp. 5-10. Fulltext not available.

Mehler, Alexander and Wolff, Christian, eds. (2005) Text Mining. Themenheft des LDV-Forum. LDV-Forum, 20 Hef. Gesellschaft für Linguistische Datenverarbeitung, Regensburg.

Kesdogan, Dogan and Pimenidis, Lexi (2005) The Hitting Set Attack on Anonymity Protocols. In: Information Hiding. 6th Internat. Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers. Lecture Notes in Computer Science, 3200. Springer, Berlin, pp. 326-339. ISBN 978-3-540-24207-9, 978-3-540-30114-1 (online). Fulltext not available.

Baillie, M., Elsweiler, David, Nicol, E., Ruthven, I., Sweeney, S., Yakici, M., Crestani, F. and Landoni, M. (2005) University of Strathclyde: The i-lab group's first big day out at TREC HARD. In: Proceedings 'TExt Retrieval Conference', Gaithersburg, Md., USA,. Fulltext not available.

Wolff, Christian (2004) Kioskkonzepte: Fachkonzept Anforderungen an die IT. Arbeitsbericht 5, Technical Report, Universität Regensburg. Fulltext not available.

Bekavac, Bernard and Herget, Josef and Rittberger, Marc, eds. (2004) Information zwischen Kultur und Marktwirtschaft: proceedings des 9. Internationalen Symposiums fur Informationswissenschaft, HTW Chur, 6.-8.Oktober2004. Schriften zur Informationwissenschaft, 42. Universtiätsverlag Konstanz, Konstanz. ISBN 3-89669-706-4.

Mohamed, R., Ferguson, J. D., Elsweiler, David, Mac Cormick, A., Wilson, J. and Weir, G. (2004) BulB - Visualising Bulletin Board Activity. In: Proceedings 6th International Conference on Enterprise Information Systems, 2004-03-24 - 2004-03-26, Lisbon, Portugal. Fulltext not available.

Ludwig, Bernd, Klarner, Martin, Reiß, Peter, Görz, Günther and Niemann, Heinrich (2004) A Pragmatics-First Approach to the Analysis and Generation of Discourse Relations. In: Buchberger, Ernst, (ed.) Konvens 2004: Beiträge zur 7. Konferenz zur Verarbeitung Natürlicher Sprache (KONVENS); 14.-17. September 2004, Universität Wien. Schriftenreihe der Österreichischen Gesellschaft für Artificial Intelligence, 5. ÖGAI, Wien, pp. 117-124. ISBN 3-85027-005-X. Fulltext not available.

Elsweiler, David (2004) Academic Information Management. In: Proceedings of the Glasgow- Strathclyde information retrieval workshop. IEEE teachers building, October 2004, Glasgow. Fulltext not available.

Federrath, Hannes (2004) Anonymization for web, fixed line, and mobile applications. In: Workshop Identity & Role Management (IRM), Deutsche Telekom, 28. Oktober 2004, Bonn.

Federrath, Hannes and Grimm, Rüdiger (2004) Arbeitsgespräch zur Begriffsbildung Sicherheit. Informatik-Spektrum 27 (5), pp. 481-482.

Federrath, Hannes and Pfitzmann, Andreas (2004) Datenschutz und Datensicherheit. In: Schneider, Uwe and Werner, Dieter, (eds.) Taschenbuch der Informatik. 5. Auflage. Hanser, München, pp. 467-488. ISBN 3-446-22584-6. Fulltext not available.

Übernickel, Falk (2004) Datenschutzfreundliche Gestaltung von Location Based Services. In: Fachgruppentreffen der GI-Fachgruppen Netzsicherheit und Sicherheit in mobilen Systemen, 06. Mai 2004, Saarbrücken.

Reischer, Jürgen (2004) Der Informationsbegriff der Alltagssprache - ein Wittgensteinsches Familienähnlichkeitskonzept. In: Information zwischen Kultur und Marktwirtschaft, 9. Internationales Symposium für Informationswissenschaft (ISI 2004), 6.-8. Oktober 2004, Chur. Fulltext not available.

Mohamed, R., Ferguson, J. D., Mac Cormick, A. and Elsweiler, David (2004) Developing Bulletin Board Visualisations. In: Proceedings of the IADIS International Conference on Web Based Communities, 2004-03-24 - 2004-03-26, Lisbon, Portugal. Fulltext not available.

Ludwig, Bernd (2004) Ein konfigurierbares Dialogsystem für Mensch-Maschine-Interaktion in gesprochener Sprache. Studien zur Mustererkennung, 12. Logos, Berlin. ISBN 3-8325-0497-4. Fulltext not available.

Klarner, Martin and Ludwig, Bernd (2004) Hybrid Natural Language Generation in a Spoken Language Dialog System. In: Biundo-Stephan, Susanne and Frühwirth, Thom and Palm, Günther, (eds.) KI 2004: Advances in Artificial Intelligence 27th Annual German Conference on AI, KI 2004, Ulm, Germany, September 20-24, 2004. Proceedings. Lecture notes in computer science: Lecture notes in artificial intelligence, 3238. Berlin, pp. 97-112. ISBN 3-540-23166-8. Fulltext not available.

Federrath, Hannes (2004) IT-Sicherheitsmanagement nach ISO 17799 und nach BSI-Grundschutzhandbuch -- Eine vergleichende Betrachtung. In: Erster Regensburger Security-IT-Kongress, 23. Juni 2004, Regensburg.

Reinert, Denise (2004) Leistungsfähigkeit von Lokalisierungsverfahren im WLAN. In: Fachgruppentreffen der GI-Fachgruppen Netzsicherheit und Sicherheit in mobilen Systemen, 06. Mai 2004, Saarbrücken.

Mühlbacher, Susanne and Wolff, Christian (2004) Materialsammlung zur Anforderungsanalyse. Arbeitsbericht 2, Technical Report, Universität Regensburg. Fulltext not available.

Federrath, Hannes (2004) Patentfähigkeit des europäischen Patents EP 1 051 053 B1 von Rohde & Schwarz. Expertise. Fulltext not available.

Plößl, Klaus (2004) Sicherheit in Funknetzen alles nur Scheinsicherheit? In: Erster Regensburger Security-IT-Kongress, 23. Juni 2004, Regensburg.

Federrath, Hannes (2004) Sicherheit von Location Based Services im Überblick. In: Fachgruppentreffen der GI-Fachgruppen Netzsicherheit und Sicherheit in mobilen Systemen, 06. Mai 2004, Saarbrücken.

Federrath, Hannes and Golembiewski, Claudia (2004) Speicherung von Nutzungsdaten durch Anonymisierungsdienste im Internet. Datenschutz und Datensicherheit: DuD 28 (8), pp. 486-490.

Federrath, Hannes (2004) Technische Realisierbarkeit von Unterlassungs- und Auskunftsansprüchen im Internet. In: Sitzung der AG Internet im Bundesministerium der Justiz, 05. Mai 2004, Berlin. Fulltext not available.

Federrath, Hannes (2004) Technische Verfahren zur anonymen Nutzung des Internet und deren Folgen für Strafverfolgung. In: Workshop des ULD Kiel und des Innenministeriums Schleswig-Holstein zu Fragen der Strafverfolgung im Internet, 10. Mai 2004, Kiel. Fulltext not available.

Federrath, Hannes (2004) Technischer Datenschutz im Internet. In: Veranstaltung anläßlich der Gründung des IT Security Cluster Regensburg, Regensburg.

Benenson, Zinaida, Gärtner, Felix and Kesdogan, Dogan (2004) User Authentication in Sensor Networks (extended abstract). In: Daman, Peter, (ed.) Informatik 2004 : Informatik verbindet : Beiträge der 34. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Ulm, 20. - 24. September 2004. GI-Edition: Lecture notes in informatics (LNI). Proceedings, 50-51. Ges. f. Informatik, Bonn. ISBN 3885793792 (2 Bände). Fulltext not available.

Federrath, Hannes (2004) Verfahren des technischen Urheberschutzes. In: Veranstaltung des Berufsverbandes der Datenschutzbeauftragten (BvD) e.V., 26. Januar 2004, Ulm. Fulltext not available.

Biemann, Christian, Bordag, Stefan, Quasthoff, Uwe and Wolff, Christian (2004) Web Services for Language Resources and Language Technology Applications. In: Fourth International Conference on Language Resources and Evaluation [LREC 2004], 24. - 25. Mai 2004, Lissabon.

Lottaz, Claudio, Iseli, Christian, Jongeneel, C. Victor and Bucher, Philipp (2003) Modeling sequencing errors by combining Hidden Markov models. Bioinformatics 19 (Suppl2), ii103-ii112.

Virághalmy, Lea (2003) Egységes magyar nyelvű terminológiai rendszer lehetősége a Magyarországon bevezetett vállalatirányítási információs rendszerekben ( = Die Möglichkeit des einheitlichen ungarnsprachigen Terminologiesystems in den in Ungarn eingeführten ERP-Systemen ). In: Kováts, Gergely, (ed.) Nemzetközi és regionális kihívások (= Internationale und regionale Herausforderungen). Magyarország az Európai Unió küszöbén II. (= Ungarn an der Schwelle der Europäischen Union II.). Budapesti Közgazdaságtudományi Egyetem (Universität für Wirtschaftswissenschaften), Budapest, Ungarn, pp. 429-434. Fulltext not available.

Quasthoff, Uwe and Wolff, Christian (2003) Web Services in Language Technology and Terminology Management. In: de Schryver, Gilles-Maurice, (ed.) Multilingual Knowledge and Technology Transfer. Proceedings Terminology in Advanced Management Applications - 6th International TAMA Conference. TAMA - Terminology in Advanced Management Applications, 6. Pretoria, South Africa, pp. 142-148.

Brüggemann, Holger, Baumer, Sebastian, Fricke, Wolfgang Florian, Wiezer, Arnim, Liesegang, Heiko, Decker, Ivona, Herzberg, Christina, Martinez-Arias, Rosa, Merkl, Rainer, Henne, Anke and Gottschalk, Gerhard (2003) The genome sequence of Clostridium tetani, the causative agent of tetanus disease. Proceedings of the National Academy of Sciences of the United States of America (PNAS) ISSN 1091-6490.

Biemann, Christian, Böhm, Karsten, Quasthoff, Uwe and Wolff, Christian (2003) Automatic Discovery and Aggregation of Compound Names for the Use in Knowledge Representations. J.UCS – Journal of Universal Computer Science 9 (6), pp. 530-541.

Dingeldey, Alexander (2003) Chancen und Risiken von M-Commerce im Rahmen eines Multi-Channel-Vertriebskonzeptes am Beispiel der TUI GROUP. Diplomarbeit, Universität Regensburg. Fulltext not available.

Görz, Günther, Bücher, Kerstin, Ludwig, Bernd, Schweinberger, Frank-Peter and Thabet, Iman (2003) Combining a Lexical Taxonomy with Domain Ontologies in the Erlangen Dialogue System. In: KI - 2003 Workshop 11 - Reference Ontologies vs. Applications Ontologies, Proceedings.. Fulltext not available.

Görz, Günther, Huber, Alexander, Ludwig, Bernd and Reiß, Peter (2003) Combining the Practical Syllogism and Planning in Dialogue. In: DiaBruck Proceedings: 7th Workshop on the Semantics and Pragmatics of Dialogue.. Fulltext not available.

Berthold, Oliver and Federrath, Hannes (2003) CookieCooker -- Cookies tauschen, Profile vermischen. Datenschutz und Datensicherheit: DuD 27 (5), p. 299.

Federrath, Hannes (2003) Das AN.ON-System -- Starke Anonymität und Unbeobachtbarkeit im Internet. In: Bäumler, Helmut and von Mutius, Albert, (eds.) Anonymität im Internet: Grundlagen, Methoden und Tools zur Realisierung eines Grundrechts. Datenschutz und Datensicherheit. Vieweg, Braunschweig, pp. 172-178. ISBN 3-528-05850-1.

Federrath, Hannes and Pfitzmann, Andreas (2003) Datensicherheit. In: Schulte, Martin, (ed.) Handbuch des Technikrechts. 1. Auflage. Springer, Berlin, pp. 599-628. ISBN 3-540-42492-X. Fulltext not available.

Ludwig, Bernd (2003) Dialogue Understanding in Dynamic Domains. In: Kühnlein, Peter and Rieser, Hannes, (eds.) Perspectives on dialogue in the new millennium. Pragmatics & beyond; N.S., 114. Benjamins, Amsterdam, pp. 243-269. ISBN 1-588-11404-X, 90-272-5356-0. Fulltext not available.

Federrath, Hannes (2003) Die Tarnkappe im Internet. In: Antrittsvorlesung im Rahmen des Tages der Wirtschaftsinformatik, Universität Regensburg, 29. Oktober 2003, Regensburg.

Federrath, Hannes (2003) Die Tarnkappe im Internet -- Von der anonymen Benutzung des World Wide Web. In: Ringvorlesung an der Universität Freiburg, 23. Juni 2003, Freiburg. Fulltext not available.

Federrath, Hannes (2003) Die Technik von Zugangskontrolldiensten (Erster Teil: Technische Grundlagen). In: Dressel, Christian Oliver and Scheffler, Hauke, (eds.) Rechtsschutz gegen Dienstepiraterie: das ZKDSG in Recht und Praxis. Beck, München, pp. 1-26. ISBN 3-406-50434-5.

Federrath, Hannes (2003) Digital Rights Management Systeme. In: Sitzung der Arbeitsgruppe Urheberrecht im Bundesministerium der Justiz, 18. November 2003, Berlin.

Köpsell, Stefan, Federrath, Hannes and Hansen, Marit (2003) Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes. Datenschutz und Datensicherheit: DuD 27 (3), pp. 139-142.

Federrath, Hannes (2003) Grenzen des technischen Urheberrechtsschutzes. In: Universität, 09. Dezember 2003, Kiel. Fulltext not available.

Federrath, Hannes (2003) Grenzen des technischen Urheberschutzes. In: Informationsveranstaltung für Mitglieder des Deutschen Bundestages im Bundesministerium der Justiz, 13. Oktober 2003, Berlin.

Federrath, Hannes and Pfitzmann, Andreas (2003) Kapitel "Technische Grundlagen". In: Roßnagel, Alexander and Abel, Ralf Bernd, (eds.) Handbuch Datenschutzrecht: die neuen Grundlagen für Wirtschaft und Verwaltung. Beck, München, pp. 61-84. ISBN 3-406-48441-7.

Kesdogan, Dogan, Agrawal, Dakshi and Penz, Stefan (2003) Limits of Anonymity in Open Environments. In: Information Hiding. 5th Internat. Workshop, IH 2002 Noordwijkerhout, The Netherlands, Oct. 7-9, 2002 Revised Papers. Lecture Notes in Computer Science, 2578. Springer, Berlin, pp. 53-69. ISBN 978-3-540-00421-9, 978-3-540-36415-3 (online). Fulltext not available.

Federrath, Hannes (2003) Management der Informationssicherheit nach ISO 17799. In: 1. Garmischer IT-Security Management-Kolleg, 27. August 2003, Garmisch-Partenkirchen.

Agrawal, Dakshi and Kesdogan, Dogan (2003) Measuring Anonymity: The Disclosure Attack. IEEE security & privacy 1 (6), pp. 27-34. Fulltext not available.

Quasthoff, Uwe, Richter, Matthias and Wolff, Christian (2003) Medienanalyse und Visualisierung: Auswertung von Online-Pressetexten durch Text Mining. LDV-Forum: Zeitschrift für Computerlinguistik und Sprachtechnologie 18 (1,2), pp. 452-459.

Schryen, Guido and Herstell, Jan (2003) Online-Marktforschung – Analyse von Konsumentenverhalten in virtuellen Umgebungen, in: Information Management & Consulting, 18,2. Information Multimedia Communication (IMC).

Agrawal, Dakshi, Kesdogan, Dogan and Penz, Stefan (2003) Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: SP '03 : Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11-14 May 2003, Oakland, CA, USA. IEEE CS Press, Washington, DC, pp. 16-27. ISBN 0-7695-1940-7. Fulltext not available.

Federrath, Hannes and Hansen, Marit (2003) Schwerpunktheft Anonymität. Datenschutz und Datensicherheit: DuD 27 (3). Fulltext not available.

Federrath, Hannes and Hansen, Marit (2003) Schwerpunktheft Anonymität und Pseudonymität in Anwendungen. Datenschutz und Datensicherheit: DuD 27 (5). Fulltext not available.

Federrath, Hannes (2003) Sichere und verlässliche Datenverarbeitung: Gefährdungs- und Bedrohungspotentiale der automatischen Datenverarbeitung. In: IHK Ulm, Haus der Wirtschaft, 22. Oktober 2003, Ulm.

Federrath, Hannes (2003) Sicherheit mobiler Systeme. In: Konferenz Corporate Security Policies, 16. September 2003, Berlin. Fulltext not available.

Federrath, Hannes (2003) Sicherheit mobiler Systeme. In: Informationstag Mobile Comupting. Universität Regensburg, 11. Juli 2003, Regensburg.

Federrath, Hannes (2003) Sicherheitsanforderungen für E-Learning im Netz. In: Universität, 01. Juli 2003, Ilmenau. Fulltext not available.

Federrath, Hannes (2003) Tarnkappen im Internet -- Anonyme Benutzung des World Wide Web. In: Ringvorlesung an der Universität Cottbus, 06. Mai 2003, Cottbus. Fulltext not available.

Federrath, Hannes (2003) Technischer Schutz von Bezahlinhalten. In: Veranstaltung des Deutschen Multimedia Verbandes (DMMV) e.V., 06. November 2003, München.

Kesdogan, Dogan, Borning, Max and Schmeink, Michael (2003) Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach? In: Privacy Enhancing Technologies : 2nd Internat. Worksh., PET 2002, San Francisco, CA, USA, April 14–15, 2002. Revised Papers. Lecture Notes in Computer Science, 2482. Springer, Berlin, pp. 224-238. ISBN 978-3-540-00565-0, 978-3-540-36467-2 (online). Fulltext not available.

Thabet, Iman, Ludwig, Bernd, Schweinberger, Frank-Peter, Bücher, Kerstin and Görz, Günther (2003) Using EuroWordNet within the Speech Operated System EMBASSI. In: Proceedings of the GermaNet Workshop: Anwendungen des deutschen Wortnetzes in Theorie und Praxis. Fulltext not available.

Hammwöhner, Rainer and Wolff, Christian and Womser-Hacker, Christa, eds. (2002) Information und Mobilität: Optimierung und Vermeidung von Mobilität durch Information: proceedings des 8. Internationalen Symposiums für Informationswissenschaft, Universität Regensburg, 8. – 11. Oktober 2002. Schriften zur Informationswissenschaft, 40. Universtiätsverlag Konstanz, Konstanz. ISBN 3-89669-759-5.

Hammwöhner, Rainer and Wolff, Christian and Womser-Hacker, Christa, eds. (2002) Information und Mobilität. Schriften zur Informationswissenschaft, 40. UVK, Konstanz. ISBN 3-89669-759-5. Fulltext not available.

Abou-Tair, Dhiah el Diehn I. (2002) ECS-Conceptualization and Realization of Profile based Cross-Medial Events Calendar System. Diplomarbeit, Univ. Dortmund. Fulltext not available.

Federrath, Hannes (2002) AN.ON -- Privacy Protection on the Internet. ERCIM news (49).

Federrath, Hannes (2002) "Alternative" Methoden zur Erhöhung der Sicherheitstransparenz (im Open-Source-Bereich). In: Seminar "Open-Source und Politik", TU Berlin, 03. Dezember 2002, Berlin.

Huber, Alexander and Ludwig, Bernd (2002) A Natural Language Multi-Agent System for Controlling Model Trains. In: Proceedings of the Conference on AI, Simulation, and Planning in High Autonomy Systems. Fulltext not available.

Pfitzmann, Andreas, Federrath, Hannes and Kuhn, Markus (2002) Anforderungen an die gesetzliche Regulierung zum Schutz digitaler Inhalte unter Berücksichtigung der Effektivität technischer Schutzmechanismen.

Federrath, Hannes, Köpsell, Stefan and Langos, Heinrich (2002) Anonyme und unbeobachtbare Kommunikation im Internet. In: 32. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 30. Sept. - 03. Okt.2002, Dortmund.

Federrath, Hannes (2002) Anonyme und unbeobachtbare Kommunikation im Internet. In: GI-Jahrstagung 2002, Workshop "Der Staat im Cyberspace -- Datenschutz und Informationssicherheit", 02. Oktober 2002, Dortmund.

Federrath, Hannes (2002) Anonymität im Internet -- möglich und zumutbar. In: Vortrag zur Sommerakademie der Datenschutzakademie Schleswig-Holstein, 26. August 2002, Kiel.

Bücher, Kerstin, Knorr, Michael and Ludwig, Bernd (2002) Anything to Clarify? Report your Parsing Ambiguities! In: van Harmelen, Frank, (ed.) Proceedings of the 15th European Conference on Artifical Intelligence, Lyon. IOS Press, Amsterdam, pp. 465-469. ISBN 1-58603-257-7 ; 4-274-90525-X. Fulltext not available.

Faulstich, Lukas C., Quasthoff, Uwe, Schmidt, Fabian and Wolff, Christian (2002) Concept Extractor – Ein flexibler und domänenspezifischer Web Service zur Beschlagwortung von Texten. In: Hammwöhner, Rainer and Wolff, Christian and Womser-Hacker, Christa, (eds.) Information und Mobilität. Proc. 8. Internationales Symposium für Informationswissenschaft. Schriften zur Informationswissenschaft, 40. UVK, Konstanz, pp. 165-180. ISBN 978-3896697592.

Bücher, Kerstin, Görz, Günther and Ludwig, Bernd (2002) Corega Tabs: Incremental Semantic Composition. In: KI-2002 Workshop on Applications of Description Logics, Proceedings. Fulltext not available.

Ludwig, Bernd, Bücher, Kerstin and Görz, Günther (2002) Corega Tabs: Mapping Semantics onto Pragmatics. In: KI-2002 Workshop on Applications of Description Logics, Proceedings. Fulltext not available.

Federrath, Hannes (2002) Die Praxis der IT-Sicherheit: Ziele, Prioritäten, status quo. In: Friedrich-Ebert-Stiftung, Berlin, 05. Dezember 2002, Berlin.

Reischer, Jürgen (2002) Die Sprache: ein Phänomen und seine Erforschung. De-Gruyter-Studienbuch. de Gruyter, Berlin. ISBN 3-11-017349-2. Fulltext not available.

Federrath, Hannes (2002) Die Tarnkappe im Internet -- Von der anonymen Benutzung des World Wide Web. In: FU Berlin, Lange Nacht der Wissenschaften, 15. Juni 2002, Berlin.

Federrath, Hannes (2002) Die bedrohte Sicherheit von Informationsnetzen. In: Aretin, Felicitas von and Wannenmacher, Bernd, (eds.) Weltlage: der 11. September, die Politik und die Kulturen. Leske und Budrich, Opladen, pp. 163-173. ISBN 3-8100-3418-5.

Federrath, Hannes (2002) Digital-Rights-Management-Systeme aus technischer Sicht: Probleme, Lösungen, Forschungsfragen. In: Universität, 25. April 2002, Regensburg. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (2002) Einführung in die Grundlagen des elektronischen Geschäftsverkehrs. In: Moritz, Hans-Werner and Betten, Jürgen, (eds.) Rechts-Handbuch zum E-Commerce. 1. Auflage. Schmidt, Köln, pp. 1-17. ISBN 3-504-56016-9.

Schryen, Guido (2002) Elektronische Zeitung – das Erbe Gutenbergs? Oldenbourg; de Gruyter.

Dotzler, Bernhard, ed. (2002) Futurum exactum : ausgewählte Schriften zur Kybernetik und Kommunikationstheorie / Norbert Wiener. Ästhetik und Naturwissenschaften : Medienkultur. Springer, Wien. ISBN 3-211-83467-2. Fulltext not available.

Federrath, Hannes (2002) Schwachstelle Schnittstelle -- Angriffspunkt für Datenspione. In: Holznagel, Bernd and Nelles, Ursula and Sokol, Bettina, (eds.) Die neue TKÜV (Telekommunikations-Überwachungsverordnung): die Probleme in Recht und Praxis. Schriftenreihe Information und Recht, 27. Beck, München, pp. 115-123. ISBN 3-406-48404-2.

Federrath, Hannes (2002) Scientific Evaluation of DRM Systems. In: Konferenz Digital Rights Management 2002, 29. Januar 2002, Berlin.

Federrath, Hannes and Pfitzmann, Andreas (2002) Sicherheit im Netz -- Datensicherheit. In: Moritz, Hans-Werner and Betten, Jürgen, (eds.) Rechts-Handbuch zum E-Commerce. 1. Auflage. Schmidt, Köln, pp. 805-817. ISBN 3-504-56016-9.

Federrath, Hannes (2002) Sicherheit und Schutz im Internet. In: Universität Halle, 02. Juli 2002, Halle.

Federrath, Hannes (2002) Sicherheitsfunktionen in GSM-Mobilkommunikationsnetzen. In: Veranstaltung des Berufsverbandes der Datenschutzbeauftragten Deutschlands (BvD), ABB Mannheim, 20. Juni 2002, Mannheim.

Görz, Günther, Bücher, Kerstin, Forkl, Yves, Klarner, Martin and Ludwig, Bernd (2002) Speech Dialogue Systems -- A "Pragmatics-First'' Approach to Rational Interaction. In: Menzel, Wolfgang, (ed.) UNSPECIFIED Hamburg. Fulltext not available.

Federrath, Hannes (2002) Starke Anonymität im Internet. In: Gemeinsame Veranstaltung der GI-Regionalgruppe Schwaben und des Berufsverbandes der Datenschutzbeauftragten Deutschlands (BvD), 10. April 2002, Ulm.

Quasthoff, Uwe and Wolff, Christian (2002) The Poisson Collocation Measure and its Applications. In: Second International Workshop on Computational Approaches to Collocations, 22./23. 7. 2002, Wien.

Huber, Alexander and Ludwig, Bernd (2002) Users Talk to their Model Trains: Interaction with a Speech-based Multi-Agent System. In: Castelfranchi, W. L. and Johnson, C., (eds.) Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems bringing people and agents together; July 15-19, 2002, Palazzo de Enzo, Bologna, Italy / AAMAS 2002. ACM, New York, pp. 801-802. ISBN 1-581-13566-1. Fulltext not available.

Federrath, Hannes (2002) Verfahren zur Anonymität und Unbeobachtbarkeit im Internet. In: Technische Universität Dresden, 15. Mai 2002, Dresden.

Heyer, Gerhard and Wolff, Christian (2001) Abschlußbericht INCCA – Professionelle Services in innovativen Call Center-Organisationen, Unterprojekt Automatische Klassifikation von E-Mails in Call Centern. Technical Report, Universität Leizpig. Fulltext not available.

Dotzler, Bernhard (2001) Ein/Aus (Rezension: Claude E. Shannon, EIN/AUS. Ausgewählte Schriften zur Kommunikations- und Nachrichtentheorie, Berlin 2000). Neue Zürcher Zeitung : NZZ. Fulltext not available.

Ludwig, Bernd, Görz, Günther and Niemann, Heinrich (2001) A Computational Approach to the Semantics of Function Words in Dialogue Context. In: Delmonte, Rodolfo, (ed.) UNSPECIFIED Unipress, Padova, pp. 341-349. ISBN 88-8098-112-9. Fulltext not available.

Federrath, Hannes (2001) Anonymes Surfen -- Erfahrungsbericht und künftige Vorhaben. In: DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik", IBM Böblingen, 11. Juli 2001, Böblingen. Fulltext not available.

Borning, Mark, Kesdogan, Dogan and Spaniol, Otto (2001) Anonymität und Unbeobachtbarkeit im Internet (= Anonymity and unobservability in the Internet). Information technology : it 43 (4), pp. 254-263. Fulltext not available.

Federrath, Hannes (2001) Anonymizer: Anonymität und Unbeobachtbarkeit im Internet. In: Konferenz E-Spionage 2001 - Datenschutz und Datensicherheit im Internet, 02. Juli 2001, München. Fulltext not available.

Wolff, Christian (2001) Aspekte des Vergleichs von Fach- und Normcorpora am Beispiel eines Fachcorpus aus der Automobiltechnik. Arbeitsmaterialien, Technical Report, Universität Leizpig, Abteilung für automatische Sprachverarbeitung. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (2001) Datenschutz und Datensicherheit. In: Schneider, Uwe and Werner, Dieter and Ebert, Joachim, (eds.) Taschenbuch der Informatik. 4. Auflage. Fachbuchverl. Leipzig im Carl-Hanser-Verlag, München, pp. 590-608. ISBN 3-446-21753-3. Fulltext not available.

Federrath, Hannes, ed. (2001) Designing Privacy Enhancing Technologies. Lecture notes in computer science, 2009. Springer, Berlin. ISBN 3-540-41724-9. Fulltext not available.

Kesdogan, Dogan, Borning, Mark and Schmeink, Michael (2001) Die Blinded-Read-Methode zum unbeobachtbaren Surfen im WWW (=Anonymous Surfing on the World Wide Web). In: Verlässliche IT-Systeme : Sicherheit in komplexen IT-Infrastrukturen. Vieweg, Wiesbaden, pp. 37-54. ISBN 3-528-05782-3. Fulltext not available.

Bücher, Kerstin, Forkl, Yves, Görz, Günther, Klarner, Martin and Ludwig, Bernd (2001) Discourse and Application Modeling for Dialogue Systems. In: Haarslev, V. and Möller, R. and Lutz, C. and Görz, Günther, (eds.) Proceedings KI-2001 Workshop on Applications of Description Logics, Aachen. CEUR Workshop Proceedings. Karlsruhe, pp. 1-10. Fulltext not available.

Abou-Tair, Dhiah el Diehn I. (2001) Dragon Slayer SWORD - Secure WAN Object Request Distribution (Interner Bericht). Univ., Dortmund. (Unpublished) Fulltext not available.

Kesdogan, Dogan (2001) Evaluation of Anonymity Providing Techniques using Queuning Theory. In: Proceedings / LCN 2001, 26th Annual IEEE Conference on Local Computer Networks : 14 - 16 November 2001, Tampa, Florida. IEEE CS Press, Los Alamitos, Calif.. ISBN 0-7695-1321-2. Fulltext not available.

Bohrer, Kathy, Liu, Xuan, Kesdogan, Dogan, Schonberg, Edith and Singh, Muninder (2001) How to go Shopping on the World Wide Web without having your Privacy Violated. In: 4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001. Southern Methodist Univ., Dallas, TX, USA, pp. 529-240. ISBN 0971625301 (beide Bände). Fulltext not available.

Federrath, Hannes (2001) Informationszugang und technischer Datenschutz. In: Freie Universität Berlin, 11. Oktober 2001, Berlin. Fulltext not available.

Federrath, Hannes (2001) JAP zum Schutz vor Beobachtung durch Outsider und Insider. In: Veranstaltung "Anonymität im Internet: Datenschutz gleich Täterschutz?", Freie Universität Berlin, 13. Juli 2001, Berlin. Fulltext not available.

Schoch, Thomas, Krone, Oliver and Federrath, Hannes (2001) Making Jini Secure. In: 4th International Conference on Electronic Commerce Research, 08. - 11. November 2001, Dallas, Texas, USA.

Federrath, Hannes (2001) Manipulationssicherheit der Abrechnungsfunktionen in GSM-Mobilfunknetzen. Fulltext not available.

Federrath, Hannes (2001) Mehrseitige Sicherheitsfunktionen Telekommunikationsnetzen. In: Hellmund, Susanne, (ed.) Congress-documentation / World Congress Safety of Modern Technical Systems: Saarbruecken 2001. TÜV-Verlag, Köln, pp. 485-489. ISBN 3-8249-0659-7.

Federrath, Hannes (2001) Mehrseitige Sicherheitsfunktionen in Telekommunikationsnetzen. In: Weltkongress "Sicherheit moderner technischer Systeme", 13. September 2001, Saarbrücken.

Federrath, Hannes (2001) Mobile Computing. Erg. Lfg. 4, 2001. In: Bäumler, Helmut and Breinlinger, Astrid and Schrader, Hans-Hermann, (eds.) Datenschutz von A-Z. Loseblatt-Ausgabe. Luchterhand, Neuwied. ISBN 3-472-03332-0.

Maier, Ronald and Hädrich, Thomas (2001) Modell für die Er folgsmessung von Wissensmanagementsystemen. Wirtschaftsinformatik 43 (5), pp. 497-509. Fulltext not available.

Wolff, Christian (2001) Multimedials zu: Physikalisches Praktikum. Teubner, Stuttgart. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (2001) Neues Datenschutzrecht und die Technik. In: Kubicek, Herbert, (ed.) Internet @ Future: Technik, Anwendungen und Dienste der Zukunft. Jahrbuch Telekommunikation und Gesellschaft, 9.2001. Hüthig, Heidelberg, pp. 252-259. ISBN 3-7785-3935-3.

Bohrer, Kathy, Liu, Xuan, Kesdogan, Dogan, Schonberg, Edith, Singh, Moninder and Spraragen, Susan L. (2001) Personal Information Management and Distribution. In: 4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001. Southern Methodist Univ., Dallas, TX, USA. ISBN 0971625301 (beide Bände). Fulltext not available.

Berthold, Oliver, Federrath, Hannes and Köpsell, Stefan (2001) Praktischer Schutz vor Flooding-Angriffen bei Chaumschen Mixen. In: Arbeitskonferenz Kommunikationssicherheit, März, Sankt Leon-Rot.

Federrath, Hannes (2001) Privacy enhancing technologies in the Internet. In: Internationales Begegnungszentrum der Wissenschaft e.V., 06. Juni 2001, Berlin.

Borning, Mark and Kesdogan, Dogan (2001) Privacy in E-Commerce. In: International Conference on Multimedia Internet, Video Technologies (MIV'01),World Scientific and Engineering Society (WSES), September 2-6 2001, Malta. Fulltext not available.

Federrath, Hannes (2001) Schwachstelle Schnittstelle -- Angriffspunkt für Datenspione. In: Symposium zur Telekommunikationsüberwachungsverordnung der Universität Münster, Institut für Informations-, Telekommunikations- und Medienrecht, Institut für Kriminalwissenschaften, 11. Mai 2001, Münster.

Federrath, Hannes (2001) Security functions in mobile communication systems. In: NEC Research Laboratories Heidelberg, 06. November 2001, Heidelberg.

Federrath, Hannes (2001) Sicherheit durch Anonymität. In: Tutorium "Technischer Datenschutz" im Rahmen der Fachkonferenz "Verlässliche IT-Systeme 2001", 11. September 2001, Kiel. Fulltext not available.

Knorr, M., Ludwig, Bernd and Görz, Günther (2001) Some Requirements for Practical Modeling in Dialogue System. In: Haarslev, V. and Möller, R. and Lutz, C. and Görz, Günther, (eds.) ´Proceedings KI-2001 Workshop on Applications of Description Logics, Aachen. CEUR WorkshopProceedings. Karlsruhe, pp. 1-9. Fulltext not available.

Berthold, Oliver, Federrath, Hannes and Köpsell, Stefan (2001) Web MIXes: A system for anonymous and unobservable Internet access. In: International Workshop on Design Issues in Anonymity and Unobservability, 25. - 26. Juli 2000, Berkeley, CA, USA.

Federrath, Hannes (2001) Wie sicher können Public-Key Infrastrukturen sein? In: Europäische Akademie zur Erforschung von Folgen wissenschaftlich-technischer Entwicklungen, 22. November 2001, Bad Neuenahr-Ahrweiler.

Heyer, Gerhard, Läuter, Martin, Quasthoff, Uwe and Wolff, Christian (2001) Wissensextraktion durch linguistisches Postprocessing bei der Corpusanalyse. In: Lobin, Henning, (ed.) Sprach- und Texttechnologie in digitalen Medien. Proc. GLDV-Jahrestagung 2001, Gießen. Book on Demand, Noderstedt, pp. 71-83. ISBN 978-3831121601.

Lottaz, Claudio (2000) Collaborative Design using Solution Spaces. PhD, École Polytechnique Fédérale de Lausanne.

Knorz, Gerhard and Kuhlen, Rainer, eds. (2000) Informationskompetenz – Basiskompetenz in der Informationsgesellschaft: proceedings des 7. Internationalen Symposiums für Informationswissenschaft, Universität Darmstadt, 8. – 10. November 2000. Schriften zur Informationswissenschaft, 38. Universitätsverlag Konstanz, Konstanz. ISBN 3-87940-753-3.

Wolff, Christian (2000) Multimediales Physikalisches Praktikum - Endbericht. Technical Report, Universität Leizpig. Fulltext not available.

Federrath, Hannes (2000) Flaw in anonymity systems found. Working Paper.

Ludwig, Bernd, Görz, Günther and Niemann, Heinrich (2000) An Inference-Based Approach to the Interpretation of Discourse. Journal of Language and Computation 2, pp. 241-258. Fulltext not available.

Ludwig, Bernd, Klarner, Martin and Görz, Günther (2000) Content and Context in Dialogue Systems. In: Proceedings of the 3rd Bellagio Workshop on Human-Computer Conversation. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (2000) Datenschutz und Datensicherheit. In: Schneider, Uwe and Werner, Dieter and Ebert, Joachim, (eds.) Taschenbuch der Informatik. 3. Auflage. Fachbuchverl. Leipzig im Carl-Hanser-Verlag, München, pp. 586-604. ISBN 3-446-21331-7.

Forkl, Yves, Ludwig, Bernd and Bücher, Kerstin (2000) Dialogue Management in the EMBASSI Realm. Using Description Logics to Reason about Ontology Concepts. In: Heuer, Andreas and Kirste, T., (eds.) Intelligent interactive assistance and mobile multimedia computing. Proceedings of IMC2000. Fraunhofer-Inst. for Computer Graphics, Rostock. Fulltext not available.

Wolff, Christian (2000) Dynamische Elektronische Bücher. Untersuchungen zur Modellierung wissenschaftlicher Lehrwerke als elektronische Publikationen am Beispiel eines Lehrbuchs der Experimentalphysik. Habilitation, Universität Leipzig.

Borcea, Katrin, Federrath, Hannes, Neumann, Olaf and Schill, Alexander (2000) Entwicklung und Einsatz multimedialer Werkzeuge für die Internet-unterstützte Lehre. Praxis der Informationsverarbeitung und Kommunikation: PIK 23 (3), pp. 164-168.

Federrath, Hannes and Pfitzmann, Andreas (2000) Gliederung und Systematisierung von Schutzzielen in IT-Systemen. Datenschutz und Datensicherheit: DuD 24 (12), pp. 704-710.

Berthold, Oliver and Federrath, Hannes (2000) Identitätsmanagement. In: Bäumler, Helmut, (ed.) E-Privacy: Datenschutz im Internet. DuD-Fachbeiträge. Vieweg, Braunschweig, pp. 189-204. ISBN 3-528-03921-3.

Reischer, Jürgen (2000) Linguistische und philosophische Aspekte der natürlichen und maschinellen Sprachverarbeitung : über Denken, Sprache, Bedeutung und Handeln bei Mensch und Maschine. Wissenschaftliche Schriften im Schulz-Kirchner Verlag / 3, 108. Schulz-Kirchner, Idstein. ISBN 3-8248-0202-3. Fulltext not available.

Federrath, Hannes (2000) Multimediale Inhalte und technischer Urheberrechtsschutz. In: Symposion "Lizenzrecht und Internet", Institut für Urheber- und Medienrecht, 30. Juni 2000, München.

Federrath, Hannes (2000) Multimediale Inhalte und technischer Urheberrechtsschutz im Internet. Zeitschrift für Urheber- und Medienrecht: ZUM 44 (10), pp. 804-810.

Kesdogan, Dogan (2000) Privacy im Internet : vertrauenswürdige Kommunikation in offenen Umgebungen. Braunschweig, Vieweg. ISBN 3-528-05731-9. Fulltext not available.

Berthold, Oliver, Federrath, Hannes and Köhntopp, Marit (2000) Project "Anonymity and Unobservability in the Internet". In: Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy 2000, 04. - 07. April 2000, Toronto, Kanada.

Federrath, Hannes (2000) Sicherheit beim Mobile Computing. In: Universität Hamburg, Fachbereich Informatik, 02. Dezember 2000, Hamburg. Fulltext not available.

Federrath, Hannes (2000) Sicherheit beim Mobile Computing. In: Freie Universität Berlin, Fachbereich Informatik, 19. Mai 2000, Berlin. Fulltext not available.

Berthold, Oliver, Federrath, Hannes, Köhntopp, Marit and Köpsell, Stefan (2000) Tarnkappen fürs Internet: Verfahren zur anonymen und unbeobachtbaren Kommunikation. C't: Magazin für Computer-Technik (16), pp. 148-155.

Wolff, Christian (2000) Vergleichende Evaluierung von Such- und Metasuchmaschinen im World Wide Web. In: Knorz, Gerhard and Kuhlen, Rainer, (eds.) Informationskompetenz – Basiskompetenz in der Informationsgesellschaft: proceedings des 7. Internationalen Symposiums für Informationswissenschaft, Darmstadt, 8. – 10. November 2000. Schriften zur Informationswissenschaft, 38. UVK, Konstanz, pp. 31-48. ISBN 3-87940-753-3.

Federrath, Hannes (2000) Verläßlichkeit digitaler Signaturen. In: Anhörung Datenschutz, Datensicherheit und Internet im Bayerischen Landtag, 8. Dezember 2000, München.

Federrath, Hannes (2000) Verläßlichkeit digitaler Signaturen. In: Anhörung "Datenschutz, Datensicherheit und Internet" im Bayerischen Landtag, 08. Dezember 2000, München. Fulltext not available.

Kesdogan, Dogan and Schäffter, M. (2000) Übersicht und Bewertung von VPN-Produktlösungen (=Overview and Evaluation of VPN Solutions). In: 7. Workshop Sicherheit in Vernetzten Systemen : 8. und 9. März 2000, Hamburg ( DFN-CERT). DFN-Bericht, 90. Verein zur Förderung eines Deutschen Forschungsnetzes, Berlin. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (1999) Interception of Short Message Service in GSM mobile communication systems (Gutachten im Auftrag der Data-Protect GmbH München). Expertise. Fulltext not available.

Büschkes, Roland, Haustein, Tobias and Kesdogan, Dogan (1999) Active Intrusion Detection - An Approach To Dynamic Risk Management. In: Proceedings of the 4th Nordic Workshop on Secure IT systems (NordSec’99), November 1999, Kista Science Park, Sweden. Fulltext not available.

Danz, Uwe, Federrath, Hannes, Köhntopp, Marit, Kritzenberger, Huberta and Ruhl, Uwe (1999) Anonymer und unbeobachtbarer Webzugriff für die Praxis. In: 6. Deutscher IT-Sicherheitskongress des BSI (Bundesamt für Sicherheit in der Informationstechnik), 17. - 19.05.1999, Bonn.

Federrath, Hannes (1999) Anonymity and Unobservability in the Internet. In: International Computer Science Institute (ICSI), 01. Dezember 1999, Berkeley. Fulltext not available.

Federrath, Hannes (1999) Anonymity and unobservability in communication systems. In: IBM T. J. Watson Research Hawthorne, 15. Februar 1999, New York. Fulltext not available.

Federrath, Hannes (1999) Datenvermeidung / Anonymer Web-Zugriff. In: Fachtagung Verläßliche IT-Systeme VIS´99, 23. September 1999, Essen. Fulltext not available.

Wolff, Christian (1999) Dokumentation des elektronischen Wahlverfahrens zur GLDV-Wahl. Arbeitsbericht, Technical Report, Universität Leizpig. Fulltext not available.

Federrath, Hannes (1999) Effiziente und skalierbare Realisierung von unbeobachtbarer und anonymer Kommunikation im Internet. In: DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik", 06. Dezember 1999, Siemens München. Fulltext not available.

Wolf, Gritta, Federrath, Hannes, Pfitzmann, Andreas and Schill, Alexander (1999) Endbenutzer- und Entwicklerunterstützung bei der Durchsetzung mehrseitiger Sicherheit. In: Workshop Sicherheitsinfrastrukturen, 09. - 10. März 1999, Hamburg.

Federrath, Hannes (1999) Hacker am Werk -- Von öffentlichen Zugänglichkeit privater Internetkommunikation. In: Evangelische Akademie, 7. Juni 1999, Tutzing.

Kesdogan, Dogan and Büschkes, Roland (1999) Klassifizierung von Anonymisierungstechniken (= Classification of Anonymization Techniques). In: Sicherheitsinfrastrukturen : Grundlagen, Realisierungen, rechtliche Aspekte, Anwendungen. Vieweg, Braunschweig, pp. 331-332. ISBN 3-528-05709-2, 978-3-322-89817-3 (online). Fulltext not available.

Quasthoff, Uwe and Wolff, Christian (1999) Korpuslinguistik und große einsprachige Wörterbücher. Linguistik Online 3(2).

Büschkes, Roland and Kesdogan, Dogan (1999) Privacy Enhanced Intrusion Detection. In: Multilateral security in communications : [basis of the International Conference on Multilateral Security in Communications, to be held on the 16th and 17th of July 1999 in Stuttgart]. Vol. 3. Addison-Wesley, München. ISBN 3-8273-1360-0. Fulltext not available.

Federrath, Hannes (1999) Protection in Mobile Communication Systems. In: Conference "Multilateral Security in Communications" Haus der Wirtschaft, 17. Juli 1999, Stuttgart.

Federrath, Hannes (1999) Protection in Mobile Communications. In: Müller, Günter and Rannenberg, Kai, (eds.) Multilateral security in communications. Information security. Addison-Wesley, München, pp. 349-364. ISBN 3-8273-1360-0.

Federrath, Hannes (1999) Sicherheit mobiler Kommunikation: Schutz in GSM-Netzen, Mobilitätsmanagement und mehrseitige Sicherheit. DuD-Fachbeiträge. Vieweg, Braunschweig. ISBN 3-528-05695-9. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (1999) Stand der Sicherheitstechnik. In: Kubicek, Herbert, (ed.) Multimedia @ Verwaltung: Marktnähe und Bürgerorientierung mit elektronischen Dienstleistungen. Jahrbuch Telekommunikation und Gesellschaft, 7. Hüthig, Heidelberg, pp. 124-132. ISBN 3-7785-3918-3.

Federrath, Hannes (1999) Steganographie in Rechnernetzen. In: Tutorium "Sicherheit in Netzen" der 13. DFN-Arbeitstagung über Kommunikationsnetze, 26. - 28. Mai 1999, Düsseldorf.

Federrath, Hannes (1999) Steganographie in Rechnernetzen. In: Tutorium "Sicherheit in Netzen" der 13. DFN-Arbeitstagung über Kommunikationsnetze, 27. Mai 1999, Düsseldorf.

Kesdogan, Dogan, Büschkes, Roland and Spaniol, Otto (1999) Stop-And-Go-MIXes Providing Pro-babilistic Anonymity in an Open System. In: Multilateral security in communications : [basis of the International Conference on Multilateral Security in Communications, to be held on the 16th and 17th of July 1999 in Stuttgart]. Vol. 3. Addison-Wesley, München. ISBN 3-8273-1360-0. Fulltext not available.

Kesdogan, Dogan, Trofimov, A. and Trossen, D. (1999) Strategies for Minimizing the Average Cost of Paging on the Air Interface. In: Kommunikation in Verteilten Systemen (KiVS): 11. ITG/GI-Fachtagung. Darmstadt, 2.-5. März 1999. Springer, Berlin, pp. 488-499. ISBN 978-3-540-65597-8, 978-3-642-60111-8 (online). Fulltext not available.

Sailer, Reiner, Federrath, Hannes and Pfitzmann, Andreas (1999) Strategies for the Placement of Security Functions in Telecommunication Systems. In: Müller, Günter and Rannenberg, Kai, (eds.) Multilateral security in communications. Addison-Wesley, München, pp. 323-348.

Büschkes, Roland, Borning, Mark and Kesdogan, Dogan (1999) Transaction-based Anomaly Detection. In: 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USA. Prodeedings. www.usenix.org, pp. 129-134. Fulltext not available.

Federrath, Hannes (1999) Zur Kontrollierbarkeit des Internet. Zeitschrift für Urheber- und Medienrecht: ZUM 43 (3), pp. 177-180.

Zimmermann, Harald H. and Schramm, Volker, eds. (1998) Knowledge-Management und Kommunikationssysteme: Workflow-Management, Multimedia, Knowledge-Transfer: proceedings des 6. Internationalen Symposiums für Informationswissenschaft (ISI '98), Prag, 3. - 7. November 1998. Schriften zur Informationswissenschaft, 34. Universitätsverlag, Konstanz. ISBN 3-87940-653-7.

Bertold, Oliver and Federrath, Hannes (1998) Definitionen für mehrseitige Sicherheit. Working Paper. Fulltext not available.

Quasthoff, Uwe and Wolff, Christian (1998) Effizientes Dokumentenclustering durch niederfrequente Terme. Datenbank Rundbrief (hier: Proc. GI-Workshop „Softwareagenten, Datenbanken und IR“ (VDI-98) TU Chemnitz.) 21, pp. 74-77.

Hofmann, T., Walther, D. and Wolff, Christian (1998) Textkonvertierung, Formeldarstellung und Graphikaufbereitung. Arbeitsbericht L4, Technical Report, Universität Leizpig. Fulltext not available.

Federrath, Hannes (1998) Vertrauenswürdiges Mobilitätsmanagement in Telekommunikationsnetzen. PhD, Technische Universität Dresden. Fulltext not available.

Federrath, Hannes and Martius, Kai (1998) Anonymität und Authentizität im World Wide Web. In: ITG-Fachtagung Internet - frischer Wind in der Telekommunikation, 21. und 22. Oktober 1998, Stuttgart.

Federrath, Hannes and Pfitzmann, Andreas (1998) Anonymität, Authentizität und Identifizierung im Internet. In: Bartsch, Michael and Lutterbeck, Bernd, (eds.) Neues Recht für neue Medien. Informationstechnik und Recht, 7. O. Schmidt, Köln, pp. 319-328. ISBN 3-504-67006-1. Fulltext not available.

Ludwig, Bernd, Görz, Günther and Niemann, Heinrich (1998) Combining Expression and Content in Domains for Dialog Managers. In: Proceedings of the International Description Logics Workshop DL-98. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (1998) Die Rolle der Datenschutzbeauftragten bei der Aushandlung von mehrseitiger Sicherheit. In: Bäumler, Helmut and Arens, Heinz-Werner, (eds.) "Der neue Datenschutz" - Datenschutz in der Informationsgesellschaft von morgen. Luchterhand, Neuwied, pp. 166-172. ISBN 3-472-03284-7.

Kesdogan, Dogan, Reichl, Peter and Junghärtchen, Klaus (1998) Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks. In: Computer Security — ESORICS 98 : 5th Europ. Symp. on Research in Computer Security, Louvain-la-Neuve, Belgium, Sept. 16–18, 1998. Proceedings. Lecture Notes in Computer Science, 1485. Springer, Berlin, pp. 295-312. ISBN 978-3-540-65004-1, 978-3-540-49784-4 (online). Fulltext not available.

Pingel, U.-T., Schemmert, U. and Wolff, Christian (1998) Entwicklung von Simulationen. Multimediaprojekt Physikalisches Praktikum. Arbeitsbericht L 2, Technical Report, Universität Leizpig. Fulltext not available.

Federrath, Hannes and Pordesch, Ulrich (1998) Experimente zur Verletzlichkeit im Rahmen der Simulationsstudie "Sicherheit in der Kommunikationstechnik". Arbeitspapier Nr. 264 der Projektgruppe verfassungsverträgliche Technikgestaltung (provet), Working Paper. (Unpublished) Fulltext not available.

Büschkes, Roland, Kesdogan, Dogan and Reichl, Peter (1998) How to Increase Security in Mobile Networks by Anomaly Detection. In: 14th Annual Computer Security Applications Conference, Phoenix, AZ, 07-11 Dec 1998; Proceedings. IEEE, pp. 3-12. ISBN 0-8186-8789-4. Fulltext not available.

Büschkes, Roland and Kesdogan, Dogan (1998) Intrusion Detection and User Privacy - A Natural Contradiction? In: International Symposium on Recent Advances in intrusion Detection 1998 (RAID 98), September 1998, Louvain-la-Neuve, Belgium. Fulltext not available.

Federrath, Hannes (1998) Ist das Internet unkontrollierbar? In: Symposion "Verantwortlichkeit im Internet", Institut für Urheber- und Medienrecht, 11. Dezember 1998, München.

Mielke, Bettina and Wolff, Christian (1998) Kryptographiebasierte Kommunikationsformen für Vereine und Verbände. LDV-Forum 15 (1), pp. 29-44.

Heyer, Gerhard and Wolff, Christian, eds. (1998) Linguistik und neue Medien. DUV Informatik. Deutscher Universitätsverlag, Wiesbaden. ISBN 3-8244-2115-1.

Federrath, Hannes and Martius, Kai (1998) Mehrseitig sicherer Web-Zugriff. KES: Zeitschrift für Kommunikations- und EDV-Sicherheit 14 (4), pp. 10-12. Fulltext not available.

Federrath, Hannes (1998) Mobilkommunikation ohne Spuren. Funkschau 71 (12), pp. 60-63.

Zöllner, Jan, Federrath, Hannes, Klimant, Herbert, Piotraschke, Rudi, Pfitzmann, Andreas, Westfeld, Andreas, Wicke, Guntram and Wolf, Gritta (1998) Modeling the Security of Steganographic Systems. In: Information Hiding, Second International Workshop, IH’98, 14. - 17. April 1998, Portland, Oregon, USA.

Ludwig, Bernd, Görz, Günther and Niemann, Heinrich (1998) Modelling Users, Intentions and Structure in Spoken Dialog. In: Proceedings of the Second International Workshop on Human-Computer Conversation. Fulltext not available.

Federrath, Hannes and Pfitzmann, Andreas (1998) Neue Anonymitätstechniken. Datenschutz und Datensicherheit: DuD 22 (11), pp. 628-632.

Federrath, Hannes (1998) Praktischer Nutzen von asymmetrischen Verschlüsselungen auch ohne Einschaltung externer Trust-Center. In: Vortrag zur 5. Sommerakademie der Datenschutzakademie Schleswig-Holstein, 17. August 1998, Kiel. Fulltext not available.

Schneider, K.-P. and Wolff, Christian (1998) Prototypen Viewersoftware auf Browserbasis. Arbeitsbericht L 3, Technical Report, Universität Leizpig. Fulltext not available.

Heyer, Gerhard and Wolff, Christian (1998) Relevanz linguistischer Pragmatik bei der Entwicklung von Multimedia-Anwendungen. In: Heyer, Gerhard and Wolff, Christian, (eds.) Linguistik und neue Medien. Proc. 10. GLDV-Jahrestagung. Proceedings GLDV-Jahrestagung, 10. Deutscher Universitätsverlag, Wiesbaden, pp. 15-22. ISBN 3-8244-2115-1. Fulltext not available.

Federrath, Hannes (1998) Schutz von Verkehrsdaten in Funknetzen. In: Workshop "Datenschutzfreundliche Technologien in der Telekommunikation" des Datenschutzbeauftragten von NRW, 04. Juni 1998, Düsseldorf. Fulltext not available.

Federrath, Hannes (1998) Schutz von Verkehrsdaten in Kommunikationsnetzen. In: Ringvorlesung an der Universität Freiburg, Institut für Informatik und Gesellschaft, 02. Februar 1998, Freiburg. Fulltext not available.

Federrath, Hannes (1998) Selbstschutz im Internet. Datenschutz und Datensicherheit: DuD 22 (10, Bv), pp. 608-609.

Federrath, Hannes (1998) Sicherheit in der Informations- und Kommunikationstechnik -- Konzept eines DFG-Schwerpunktprogramms. In: Workshop "Kryptographie als Forschungsthema", Ruhr-Universität Bochum, 23. April 1998, Bochum.

Reichl, Peter, Kesdogan, Dogan, Junghärtchen, Klaus and Schuba, Marko (1998) Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. In: Computer Performance Evaluation. Modelling Techniques and Tools, 10th International Conference, Tools’98 Palma de Mallorca, Spain, September 14–18, 1998 Proceedings. Lecture Notes in Computer Science, 1469. Springer, Berlin, pp. 105-116. ISBN 978-3-540-64949-6, 978-3-540-68061-1 (online). Fulltext not available.

Federrath, Hannes (1998) Steganographie -- Vertrauliche Kommunikation ohne Kryptographie. In: Hamm, Rainer and Möller, Klaus Peter, (eds.) Datenschutz durch Kryptographie - ein Sicherheitsrisiko? Forum Datenschutz, 6. Nomos, Baden-Baden, pp. 42-51. ISBN 3-7890-5251-5. Fulltext not available.

Federrath, Hannes (1998) Steganographie -- doch ein leistungsfähiges Verschlüsselungsverfahren? In: Jahrestagung des Berufsverbandes der Datenschutzbeauftragten Deutschlands (BvD) e.V., 31. März 1998, Ulm. Fulltext not available.

Kesdogan, Dogan, Egner, Jan and Büschkes, Roland (1998) Stop-And-Go-MIXes Providing Probabilistic Anonymity in an Open System. In: Information Hiding. 2nd Internat.l Workshop, IH’98, Portland, Oregon, USA, April 14–17, 1998. Proceedings. Lecture Notes in Computer Science, 1525. Springer, Berlin, pp. 83-98. ISBN 978-3-540-65386-8, 978-3-540-49380-8 (online). Fulltext not available.

Quasthoff, Uwe and Wolff, Christian (1998) Tradition und Innovation. Informationen und Bilder einer weltoffenen Universität. , Universität Leipzig, Institut für Informatik. Fulltext not available.

Ludwig, Bernd, Görz, Günther and Niemann, Heinrich (1998) User Models, Dialog Structure, and Intentions in Spoken Dialog. In: Hess, Wolfgang and Lenders, Winfried and Schröder, Bernhard and Portele, Thomas, (eds.) computer, Linguistik und Phonetik zwischen Sprache und Sprechen. Proceedings of KONVENS-98. Lang, Frankfurt, pp. 245-260. ISBN 3-631-33844-9. Fulltext not available.

Schneider, K.-P. and Wolff, Christian (1997) Multimediaprojekt Physikalisches Praktikum - Pflichtenheft & Drehbuch. Arbeitsbericht L1, Technical Report, Universität Leizpig. Fulltext not available.

Sailer, Reiner, Federrath, Hannes, Jerichow, Anja, Kesdogan, Dogan and Pfitzmann, Andreas (1997) Allokation von Sicherheitsfunktionen in Telekommunikationsnetzen. In: Müller, Günter and Pfitzmann, Andreas, (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. 2 Bände. Reihe Informationssicherheit. Addison-Wesley-Longman, Bonn, pp. 325-357. ISBN 3-8273-1116-0; 3-8273-1355-4.

Federrath, Hannes and Pfitzmann, Andreas (1997) Bausteine zur Realisierung mehrseitiger Sicherheit. In: Müller, Günter and Pfitzmann, Andreas, (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. 2 Bände. Reihe Informationssicherheit. Addison-Wesley-Longman, Bonn, pp. 83-104. ISBN 3-8273-1116-0; 3-8273-1355-4.

Federrath, Hannes (1997) DuD-Forum: Schlüsselgenerierung: Einseitig sicher ist nicht sicher genug. Datenschutz und Datensicherheit: DuD 21 (2), pp. 98-99.

Federrath, Hannes, Franz, Elke, Jerichow, Anja, Müller, Jan and Pfitzmann, Andreas (1997) Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren -- Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen. In: Kommunikation in Verteilten Systemen (KiVS) 97, 19. - 21. Februar 1997, Braunschweig.

Federrath, Hannes and Müller, Jan (1997) Ende-zu-Ende-Verschlüsselung in GSM-Mobilfunknetzen. Datenschutz und Datensicherheit: DuD 21 (6), pp. 328-333.

Blobel, Bernd and Pharow, P. (1997) Experiences with Health Professional Cards and Trusted Third Party Services Providing Security in Distributed Electronic Records in Oncology. In: Waegemann, Peter, (ed.) Toward an Electronic Health Record Europe '97: Conference on the Creation of a European Electronic Health Record : 19 - 22 October, Cumberland Hotel London ; [conference proceedings]. Medical Records Institute, Newton, Mass., pp. 29-39. ISBN 0-9640667-3-4. Fulltext not available.

Seeger, Martin, Federrath, Hannes and Wolf, Gritta (1997) Firewallsysteme zur Reduzierung von Risiken beim Einsatz der Internet-Technologie: Untersuchung über Risiken und ihre Minimierung bei Verwendung des Internet und der Internet-Technologie in der öffentlichen Verwaltung in Schleswig-Holstein. Fulltext not available.

Federrath, Hannes (1997) Geheimnisschutz durch Steganographie. In: Vortrag beim Landesbeauftragten für den Datenschutz Schleswig-Holstein, 09. April 1997, Kiel. Fulltext not available.

Wolff, Christian and Womser-Hacker, Christa (1997) Graphisches Faktenretrieval mit vager Anfrageinterpretation. In: Fuhr, Norbert and Dittrich, Gisbert and Tochtermann, Klaus, (eds.) Hypertext – Information Retrieval – Multimedia ‘97. Proc. HIM '97. Theorien, Modelle und Implementierungen integrierter elektronischer Informationssysteme, Dortmund. Schriften zur Informationswissenschaft, 30. UVK, Konstanz, pp. 251-263. ISBN 3-87940-605-7.

Reichenbach, Martin, Damker, Herbert, Federrath, Hannes and Rannenberg, Kai (1997) Individual Management of Personal Reachability in Mobile Communication. In: IFIP TC11 13th International Conference on Information Security (SEC '97), 14. - 16. Mai 1997, Kopenhagen, Dänemark.

Quasthoff, Uwe and Wolff, Christian (1997) Informations-CD-ROM 1997/98 des Instituts für Informatik der Universität Leipzig. , Universität Leipzig, Institut für Informatik. Fulltext not available.

Federrath, Hannes, Jerichow, Anja, Kesdogan, Dogan, Pfitzmann, Andreas and Trossen, Dirk (1997) Minimizing the Average Cost of Paging on the Air Interface -- An Approach Considering Privacy. In: IEEE 47th Annual International Vehicular Technology Conference (VTC), 04. - 07. Mai 1997, Phoenix, Arizona.

Federrath, Hannes, Jerichow, Anja, Kesdogan, Dogan, Pfitzmann, Andreas and Spaniol, Otto (1997) Mobilkommunikation ohne Bewegungsprofile. In: Müller, Günter and Pfitzmann, Andreas, (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. 2 Bände. Reihe Informationssicherheit. Addison-Wesley-Longman, Bonn, pp. 169-180. ISBN 3-8273-1116-0; 3-8273-1355-4.

Dotzler, Bernhard (1997) Neue Wege der Rechnertechnologie: 1936. Ein Interview mit Konrad Zuse (1910-1995). Verstärker 2 (2).

Dotzler, Bernhard (1997) Passagen aus einem Philosophenleben / Charles Babbage. Mit einem Vorw. von Bernhard J. Dotzler. Übers. von Holger Sweers. Kulturverl. Kadmos, Berlin. ISBN 3-931659-07-0. Fulltext not available.

Damker, Herbert, Federrath, Hannes, Reichenbach, Martin and Bertsch, Andreas (1997) Persönliches Erreichbarkeitsmanagement. In: Müller, Günter and Pfitzmann, Andreas, (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. 2 Bände. Reihe Informationssicherheit. Addison-Wesley-Longman, Bonn, pp. 207-217. ISBN 3-8273-1116-0; 3-8273-1355-4.

Federrath, Hannes (1997) Sicherheit in der Mobilkommunikation. In: Universität Rostock, Fachbereich Informatik, 05. Juni 1997, Rostock. Fulltext not available.

Federrath, Hannes (1997) Steganographie -- Vertrauliche Kommunikation ohne Kryptographie. In: Forum Datenschutz beim Hessischen Datenschutzbeauftragten im Hessischen Landtag, 19. Juni 1997, Wiesbaden. Fulltext not available.

Federrath, Hannes, Franz, Elke, Westfeld, Andreas and Wicke, Guntram (1997) Steganographie zur vertraulichen Kommunikation. IT-Sicherheit 3 (3), pp. 10-13.

Federrath, Hannes, Jerichow, Anja, Müller, Jan and Pfitzmann, Andreas (1997) Unbeobachtbarkeit in Kommunikationsnetzen. In: GI-Fachtagung VIS'97, 30.9. - 02.10.1997, Freiburg/Breisgau.

Federrath, Hannes (1997) Unbeobachtbarkeit in Kommunikationsnetzen. In: Fachtagung Verläßliche IT-Systeme VIS´97, 01. Oktober 1997, Freiburg.

Federrath, Hannes and Wicke, Guntram (1997) Vertrauliche Kommunikation mit Steganographie. Praxis der Informationsverarbeitung und Kommunikation: PIK 20 (3), pp. 134-137.

Zöllner, Jan, Federrath, Hannes, Pfitzmann, Andreas, Westfeld, Andreas, Wicke, Guntram and Wolf, Gritta (1997) Über die Modellierung steganographischer Systeme. In: GI-Fachtagung VIS'97, 30.9. - 02.10.1997, Freiburg/Breisgau.

Krause, Jürgen and Herfurth, Matthias and Marx, Jutta, eds. (1996) Herausforderungen an die Informationswirtschaft: Informationsverdichtung, Informationsbewertung und Datenvisualisierung: proceedings des 5. Internationalen Symposiums für Informationswissenschaft an der Humboldt-Universität zu Berlin, 17. - 19. Oktober 1996. Schriften zur Informationswissenschaft, 27. Universitätsverlag Konstanz, Konstanz. ISBN 3-87940-586-7.

Federrath, Hannes (1996) MIXes in mobile communication systems: Location management with privacy. In: Workshop on Information Hiding, 30. Mai - 1. Juni 1996, University of Cambridge, Isaac Newton Institute.

Wolff, Christian and Womser-Hacker, Christa (1996) Dynamic Fuzzy Concepts in Graphical Fact Retrieval. Arbeitsbericht 63, Technical Report, Universität Regensburg, Universität Leipzig. Fulltext not available.

Fasbender, Andreas, Kesdogan, Dogan and Kubitz, Olaf (1996) Analysis of Security and Privacy in Mobile-IP. In: Fourth International Conference on Telecommunication Systems 96, Modelling and Analysis, March 1996, Nashville, TN. Fulltext not available.

Dotzler, Bernhard, ed. (1996) Babbage's Rechen-Automate. Ausgewählte Schriften (hrsg. u. übers. von Bernhard Dotzler). Computerkultur, 6. Springer Vienna, Wien. ISBN 3-211-82640-8 (print), 978-3-7091-9388-4 (e-book). Fulltext not available.

Quasthoff, Uwe and Wolff, Christian (1996) Informations-CD-ROM des Instituts für Informatik der Universität Leipzig. , Universität Leipzig, Institut für Informatik. Fulltext not available.

Kesdogan, Dogan, Federrath, Hannes, Jerichow, Anja and Pfitzmann, Andreas (1996) Location management strategies increasing privacy in mobile communication. In: IFIP SEC, International Information Security Conference; 12, 1996, Neon Karlobasion.

Damker, Herbert, Federrath, Hannes and Schneider, Michael J. (1996) Maskerade-Angriffe im Internet. Datenschutz und Datensicherung: DuD 20 (5), pp. 286-294.

Federrath, Hannes, Jerichow, Anja and Pfitzmann, Andreas (1996) Mixes in mobile communication systems: Location management with privacy. In: Information hiding: first international workshop, 30. Mai - 01.Juni 1996, Cambridge, UK.

Kesdogan, Dogan, Zywiecki, Margarethe and Beulen, Klaus (1996) Mobile User Profile Generation - A Challenge between Performance and Security. In: Proc. of the 2nd Workshop on Personal Wireless Communications, Frankfurt a.M., Germany, 1Dec 10-11 1996 (IFIP TC 6). Univ., Frankfurt am Main, pp. 63-74. Fulltext not available.

Federrath, Hannes, Jerichow, Anja, Kesdogan, Dogan, Pfitzmann, Andreas and Spaniol, Otto (1996) Mobilkommunikation ohne Bewegungsprofile. Informationstechnik und technische Informatik: it + ti 38 (4), pp. 24-29.

Bertsch, Andreas, Damker, Herbert and Federrath, Hannes (1996) Persönliches Erreichbarkeitsmanagement. Informationstechnik und technische Informatik: it + ti 38 (4), pp. 20-23.

Federrath, Hannes (1996) Schutz der Vertraulichkeit des Aufenthaltsorts von Mobilfunkteilnehmern. In: Universität Freiburg, Institut für Informatik und Gesellschaft, 02. Februar 1996, Freiburg. Fulltext not available.

Hoff, Simon, Jakobs, Kai and Kesdogan, Dogan (1996) Secure Location Management in UMTS, Communications and Multimedia Security. In: Communications and multimedia security II : Proc. of the IFIP TC6/TC11 Internat. Conf. on Communications and Multimedia Security, Essen, Germany, 23rd-24th Sept. 1996. Chapman &Hall, London. ISBN 0412797801. Fulltext not available.

Fasbender, Andreas, Kesdogan, Dogan and Kubitz, Olaf (1996) Variable and Scaleable Security Protection of Location Information in Mobile-IP. In: Mobile Technology for the Human Race. IEEE 46th Vehicular Technology Conference, Atlanta, GA, USA, 28 Apr 1996-01 May 1996. Vol. 2. IEEE, pp. 963-967. ISBN 0-7803-3157-5. Fulltext not available.

Wolff, Christian (1995) Anwendungsmöglichkeiten und -szenarien für eine graphische Retrievalkomponente im Kontext Sozial- und wirtschaftswissenschaftlicher Datenbestände. Technical Report, Bonn. Fulltext not available.

Federrath, Hannes (1995) Schutz von Verkehrsdaten in Funknetzen. In: Fachtagung Verläßliche IT-Systeme VIS´95, 05 . - 07. April 1995, Rostock.

Kesdogan, Dogan (1995) Architectural Considerations Increasing Privacy in Mobile Communication Systems (short presentation). In: IFIP TC6/TC11 and Austrian Computer Society joint working Conference on Communications and Multimedia Security, Sept. 1995, Graz, Austria. Fulltext not available.

Bertsch, Andreas, Damker, Herbert, Federrath, Hannes, Kesdogan, Dogan and Schneider, Michael (1995) Erreichbarkeitsmanagement. Praxis der Informationsverarbeitung und Kommunikation: PIK 18 (3), pp. 231-234.

Federrath, Hannes (1995) Konzeption und Architektur eines Erreichbarkeitsmanagementsystems. In: Kolleg "Sicherheit in der Kommunikationstechnik" der Gottlieb Daimler - und Karl Benz - Stiftung, Ladenburg, 16. Juni 1995, Ladenburg. Fulltext not available.

Federrath, Hannes, Jerichow, Anja, Pfitzmann, Andreas and Pfitzmann, Birgit (1995) Mehrseitig sichere Schlüsselerzeugung. In: Arbeitskonferenz Trust Center 95, 1995.

Thees, Jürgen and Federrath, Hannes (1995) Methoden zum Schutz von Verkehrsdaten in Funknetzen. In: GI-Fachtagung VIS '95, 1995, Rostock.

Federrath, Hannes and Thees, Jürgen (1995) Schutz der Vertraulichkeit des Aufenthaltsorts von Mobilfunkteilnehmern. Datenschutz und Datensicherheit, Recht und Sicherheit in Informationsverarbeitung und Kommunikation: DuD 19 (6), pp. 338-348.

Kesdogan, Dogan and Fouletier, Xavier (1995) Secure Location Information Management in Cellular Radio Systems. In: IEEE Wireless Communication System Symposium, New York, NY, USA, Nov. 1995. IEEE, pp. 35-40. Fulltext not available.

Federrath, Hannes, Jerichow, Anja, Kesdogan, Dogan and Pfitzmann, Andreas (1995) Security in Public Mobile Communication Networks. In: IFIP TC6 International Workshop on Personal Wireless Communications, 24. - 25. April 1995, Prag.

Federrath, Hannes, Jerichow, Anja, Kesdogan, Dogan and Pfitzmann, Andreas (1995) Technischer Datenschutz in öffentlichen Mobilkommunikationsnetzen. Wissenschaftliche Zeitschrift der TU Dresden 44 (6), pp. 4-9.

Rauch, Wolf and Strohmeier, Franz and Hiller, Harald and Schlögel, Christian, eds. (1994) Mehrwert von Information - Professionalisierung der Informationsarbeit: proceedings des 4. Internationalen Symposiums für Informationswissenschaft an der Universität Graz, 2. - 4. November 1994. Schriften zur Informationswissenschaft, 16. Universitätsverlag Konstanz, Konstanz. ISBN 3-87940-505-0.

Wolff, Christian, Krause, Jürgen and Womser-Hacker, Christa (1994) Multimodality and Vagueness in the Context of a Graphical, Object-Oriented Materials Information System. In: RIAO 1994 - '94. Intelligent Multimedia Information Retrieval Systems and Management, 1994, New York, NY.

Rott, Hans (1994) Coherent Choice and Epistemic Entrenchment (Preliminary Report). Lecture notes in computer science : Lecture notes in artificial intelligence 861, pp. 284-295.

Federrath, Hannes (1994) Funktionen eines Erreichbarkeitsmanagementsystems. In: Kolleg "Sicherheit in der Kommunikationstechnik" der Gottlieb Daimler - und Karl Benz - Stiftung Ladenburg, 07. Oktober 1994, Achern. Fulltext not available.

Wolff, Christian (1994) Graphisches Faktenretrieval mit Liniendiagrammen. Gestaltung und Evaluierung eines experimentellen Rechercheverfahrens auf der Grundlage kognitiver Theorien der Graphenwahrnehmung. PhD, Regensburg, Universität.

Krause, Jürgen, Marx, Jutta, Roppel, Stephan, Schudnagis, Monika, Wolff, Christian and Womser-Hacker, Christa (1994) Multimodality and Object Orientation in an Intelligent Materials Information System: Part 2. Journal of Document and Text Management 2 (1), pp. 48-66. Fulltext not available.

Wolff, Christian (1993) Der Benutzertest zu WING-GRAPH. Arbeitsbericht 44, Technical Report, Universität Regensburg. Fulltext not available.

Wolff, Christian (1993) Graphisches Retrieval in Wing-IIR: Kurzbeschreibung des WING-GRAPH-Systems. Arbeitsbericht 37, Technical Report, Universität Regensburg. Fulltext not available.

Krause, Jürgen, Marx, S., Roppel, Stephan, Schudnagis, Monika, Wolff, Christian and Womser-Hacker, Christa (1993) The Development of WING-M2: A Multimodal Tool Based Materials Information System with Intelligent Components. Arbeitsbericht 36, Technical Report, Universität Regensburg. Fulltext not available.

Roppel, Stephan, Wolff, Christian and Womser-Hacker, Christa (1993) Intelligentes Faktenretrieval am Beispiel der Werkstoffinformation. In: Knorz, Gerhard and Krause, Jürgen and Womser-Hacker, Christa, (eds.) Information retrieval '93 : von der Modellierung zur Anwendung; Proc. 1. GI-Fachtagung Information Retrieval, 13. - 15. Sept. 1993, Univ. Regensburg. Schriften zur Informationswissenschaft, 12. Univ.-Verl. Konstanz, Konstanz, pp. 154-167. ISBN 3-87940-473-9.

Krause, Jürgen, Marx, Jutta, Roppel, Stephan, Schudnagis, Monika, Wolff, Christian and Womser-Hacker, Christa (1993) Multimodality and Object Orientation in an Intelligent Materials Information System: Part 1. Journal of Document and Text Management 1 (3), pp. 256-275. Fulltext not available.

Wolff, Christian (1993) Perspektiven moderner Softwaretechnologie. In: Wolff, Armin, (ed.) Deutsch als Fremdsprache im europäischen Binnenmarkt: Vortr. u. Materialien 18. Jahrestagung DaF 7. - 9. Juni 1990 Univ. Bonn. Materialien Deutsch als Fremdsprache, 33. FaDaF, Regensburg. ISBN 3-87940-473-9.

Zimmermann, Harald H. and Luckhardt, Heinz-Dirk and Schulz, Angelika, eds. (1992) Mensch und Maschine - Informationelle Schnittstellen der Kommunikation: proceedings des 3. Internationalen Symposiums für Informationswissenschaft an der Universität des Saarlands Sarbrücken, 5. - 7. November 1992. Schriften zur Informationswissenschaft, 7. Universitätsverlag Konstanz, Konstanz. ISBN 3-87940-449-6.

Wolff, Christian (1992) Überlegungen zum graphischen Retrieval in Werkstoffdatenbanken. WING-IIR-Arbeitsbericht 31, Technical Report, Univ., Philosophische Fakultät, Sprach- und Literaturwissenschaften, Universität Regensburg. Fulltext not available.

Wolff, Christian (1992) Der erste multimodale Prototyp WING-M1. WING-IIR-Arbeitsbericht 24, Technical Report, Univ., Philosophische Fakultät, Sprach- und Literaturwissenschaften, Regensburg. Fulltext not available.

Wolff, Christian and Womser-Hacker, Christa (1992) Eine multimodale Benutzerschnittstelle für Werkstoffinformation. In: Neubauer, Wolfram and Meier, Karl-Heinz, (eds.) Deutscher Dokumentartag 1991: Information und Dokumentation in den 90er Jahren. Neue Herausforderung, neue Technologien. Deutsche Gesellschaft für Dokumentation, Frankfurt, pp. 521-544. ISBN 3-925474-13-7. Fulltext not available.

Wolff, Christian (1992) Manipulation von Graphen als Retrievalwerkzeug für Faktendaten. In: Zimmermann, Harald H. and Luckhardt, Heinz-Dirk and Schulz, Angelika, (eds.) Mensch und Maschine - Informationelle Schnittstellen der Kommunikation. Proc. 3. Internationales Symposium für Informationswissenschaft, ISI '92. Schriften zur Informationswissenschaft, 7. Universitätsverlag Konstanz, pp. 255-269. ISBN 3-87940-449-6.

Rott, Hans (1992) Modellings for Belief Change: Base Contraction, Multiple Contraction, and Epistemic Entrenchment (Preliminary Report). Lecture notes in computer science : Lecture notes in artificial intelligence 633, pp. 139-153.

Rott, Hans (1992) On the Logic of Theory Change: More Maps Between Different Kinds of Contraction Function. In: Gärdenfors, Peter, (ed.) Belief revision. Cambridge tracts in theoretical computer science, 29. Cambridge University Press, Cambridge, pp. 122-141. ISBN 0-521-41260-9 (print), 978-0-511-52666-4 (e-book).

Roppel, Stephan and Wolff, Christian (1991) Graphische Recherche und intelligente Hilfe als Komponenten eines multimodalen Werkstoffinformationssystems. In: Killenberg, Harald and Kuhlen, Rainer and Manecke, Hans-Jürgen, (eds.) Wissensbasierte Informationssysteme und Informationsmanagement: proceedings des 2. Internationalen Symposiums für Informationswissenschaft, Technische Hochschule Illmenau, 4. - 7. November 1991. Schriften zur Informationswissenschaft, 2. Universitätsverlag Konstanz, Konstanz, pp. 113-124. ISBN 3-87940-412-7.

Killenberg, Harald and Kuhlen, Rainer and Manecke, Hans-Jürgen, eds. (1991) Wissensbasierte Informationssysteme und Informationsmanagement: proceedings des 2. Internationalen Symposiums für Informationswissenschaft, Technische Hochschule Illmenau, 4. - 7. November 1991. Schriften zur Informationswissenschaft, 2. Universitätsverlag Konstanz, Konstanz. ISBN 3-87940-412-7.

Wolff, Christian (1991) Der erste multimodale Systementwurf für den WING-Prototyp. WING-IIR-Arbeitsbericht 21, Technical Report, Univ., Philosophische Fakultät, Sprach- und Literaturwissenschaften, Regensburg. Fulltext not available.

Wolff, Christian (1991) Der Prototyp 2 des kognitiv-graphischen Zugangswegs von Wing-IIR. Beschreibung der Erweiterungen aufgrund empirischer Erkenntnisse aus Benutzertests. WING-IIR-Arbeitsbericht 17, Technical Report, Univ., Philosophische Fakultät, Sprach- und Literaturwissenschaften, Regensburg. Fulltext not available.

Wolff, Christian (1991) Der Prototyp 1b des graphisch-kognitiven Zugangswegs WING-KOGRA. WING-IIR-Arbeitsbericht 12, Technical Report, Univ., Philosophische Fakultät, Sprach- und Literaturwissenschaften, Regensburg. Fulltext not available.

Rott, Hans (1991) A Nonmonotonic Conditional Logic for Belief Revision I. Semantics and Logic of Simple Conditionals. Lecture notes in computer science : Lecture notes in artificial intelligence 465, pp. 135-183.

Morreau, Michael and Rott, Hans (1991) Is it impossible to keep up to date? Lecture notes in computer science : Lecture notes in artificial intelligence 543, pp. 233-343.

Roppel, Stephan and Wolff, Christian (1990) Der Prototyp 1a des kognitiv-graphischen Zugangswegs WING-KOGRA. Arbeitsbericht 8, Technical Report, Universität Regensburg. Fulltext not available.

Herget, Josef and Kuhlen, Rainer, eds. (1990) Pragmatische Aspekte beim Entwurf und Betrieb von Informationssystemen: proceedings des 1. Internationalen Symposiums für Informationswissenschaft, Universität Konstanz, 17. - 19. Oktober 1990. Schriften zur Informationswissenschaft, 1. Universitätsverlag Konstanz, Konstanz. ISBN 3-87940-384-8.

Wolff, Christian (1990) Beschreibung des Anwendungsgebietes Kunststoffdatenbanken im Projekt Wing-IIR. Arbeitsbericht 6, Technical Report, Universität Regensburg. Fulltext not available.

Wolff, Christian (1990) Die graphische Benutzeroberfläche des Forschungsprototypen WING und der kognitiv-graphische Zugangsweg WING-KOGRA. WING-IIR-Arbeitsbericht 5, Technical Report, Univ., Philosophische Fakultät, Sprach- und Literaturwissenschaften, Regensburg. Fulltext not available.

Krause, Jürgen, Bauer, Gabi, Lutz, Jutta, Roppel, Stephan, Wolff, Christian and Womser-Hacker, Christa (1990) WING - The Research Prototype of a Multi-modal Materials Information System Comprising Natural Language, Graphical/Direct Manipulation and Knowledge Based Components. In: Herget, Josef and Kuhlen, Rainer, (eds.) Pragmatische Aspekte beim Entwurf und Betrieb von Informationssystemen: proceedings des 1. Internationalen Symposiums für Informationswissenschaft, Universität Konstanz, 17. - 19. Oktober 1990. Schriften zur Informationswissenschaft, 1. Universitätsverlag Konstanz, Konstanz, pp. 327-336. ISBN 3-87940-384-8.

Dove, Stefan (1989) Beiträge zu quantitativen Struktur-Wirkungs-Beziehungen und zur Entwicklung von Modellen der Ligand-Rezeptor-Wechselwirkung von ß-Agonisten und -Antagonisten. Habilitation, Akademie der Wissenachften der DDR. Fulltext not available.

Hirschman, A., Krause, Jürgen and Wolff, Christian (1989) Softwareergonomische Überlegungen zu ComfoDesk V. 2. Arbeitsbericht CTEX 2-78, Technical Report. Fulltext not available.

Wolff, Christian (1989) Der SINIX-Consultant. Arbeitsbericht CTEX 2-75, Technical Report. Fulltext not available.

Dotzler, Bernhard (1988) Der Bastler (Ein Portrait Konrad Zuses). Badische Zeitung. BZ-Magazin. Fulltext not available.

Dove, Stefan (1978) Zur Anwendung einiger multivariater Verfahren auf spezielle Probleme der quantitativen Struktur-Wirkungs-Analyse. PhD, Martin-Luther-Universität Halle. Fulltext not available.

This list was generated on Sat Mar 22 14:03:58 2025 CET.
  1. Homepage UR

University Library

Publication Server

Contact:

Publishing: oa@ur.de
0941 943 -4239 or -69394

Dissertations: dissertationen@ur.de
0941 943 -3904

Research data: datahub@ur.de
0941 943 -5707

Contact persons