BibTeX records: Xiaotong Cui

download as .bib file

@article{DBLP:journals/entropy/FangZCWD23,
  author       = {Xing Fang and
                  Hongxin Zhang and
                  Xiaotong Cui and
                  Yuanzhen Wang and
                  Linxi Ding},
  title        = {Efficient Attack Scheme against {SKINNY-64} Based on Algebraic Fault
                  Analysis},
  journal      = {Entropy},
  volume       = {25},
  number       = {6},
  pages        = {908},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25060908},
  doi          = {10.3390/E25060908},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/FangZCWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/WangZFCNWFS23,
  author       = {Yuanzhen Wang and
                  Hongxin Zhang and
                  Xing Fang and
                  Xiaotong Cui and
                  Wenxu Ning and
                  Danzhi Wang and
                  Fan Fan and
                  Lei Shu},
  title        = {Hybrid Threshold Denoising Framework Using Singular Value Decomposition
                  for Side-Channel Analysis Preprocessing},
  journal      = {Entropy},
  volume       = {25},
  number       = {8},
  pages        = {1133},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25081133},
  doi          = {10.3390/E25081133},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/WangZFCNWFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaia/LuoWGC23,
  author       = {Changliang Luo and
                  Zhao Wen and
                  Lei Gao and
                  Xiaotong Cui},
  title        = {Side-Channel Attacks Based on Deep Learning},
  booktitle    = {Proceedings of the 2023 International Conference on Advances in Artificial
                  Intelligence and Applications, {AAIA} 2023, Wuhan, China, November
                  18-20, 2023},
  pages        = {33--37},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603273.3630505},
  doi          = {10.1145/3603273.3630505},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aaia/LuoWGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaia/HeZZC23,
  author       = {Peng He and
                  Qin Zhang and
                  Heng Zhang and
                  Xiaotong Cui},
  title        = {Power Analysis Attack Based on Hybrid Denoising},
  booktitle    = {Proceedings of the 2023 International Conference on Advances in Artificial
                  Intelligence and Applications, {AAIA} 2023, Wuhan, China, November
                  18-20, 2023},
  pages        = {349--353},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603273.3630503},
  doi          = {10.1145/3603273.3630503},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aaia/HeZZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhangZCFW22,
  author       = {Qingqing Zhang and
                  Hongxing Zhang and
                  Xiaotong Cui and
                  Xing Fang and
                  Xingyang Wang},
  title        = {Side Channel Analysis of {SPECK} Based on Transfer Learning},
  journal      = {Sensors},
  volume       = {22},
  number       = {13},
  pages        = {4671},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22134671},
  doi          = {10.3390/S22134671},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhangZCFW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/CuiZYZCWW22,
  author       = {Xiaotong Cui and
                  Xing Zhang and
                  Hao Yan and
                  Liang Zhang and
                  Kefei Cheng and
                  Yu Wu and
                  Kaijie Wu},
  title        = {Toward Building and Optimizing Trustworthy Systems Using Untrusted
                  Components: {A} Graph-Theoretic Perspective},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {41},
  number       = {5},
  pages        = {1386--1399},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCAD.2021.3086765},
  doi          = {10.1109/TCAD.2021.3086765},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/CuiZYZCWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/SunZCDF22,
  author       = {Shaofei Sun and
                  Hongxin Zhang and
                  Xiaotong Cui and
                  Liang Dong and
                  Xing Fang},
  title        = {Electromagnetic Side-Channel Hardware Trojan Detection Based on Transfer
                  Learning},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {69},
  number       = {3},
  pages        = {1742--1746},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSII.2021.3110954},
  doi          = {10.1109/TCSII.2021.3110954},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/SunZCDF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/ZouZCWK22,
  author       = {Minhui Zou and
                  Junlong Zhou and
                  Xiaotong Cui and
                  Wei Wang and
                  Shahar Kvatinsky},
  title        = {Enhancing Security of Memristor Computing System Through Secure Weight
                  Mapping},
  booktitle    = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2022, Nicosia,
                  Cyprus, July 4-6, 2022},
  pages        = {182--187},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISVLSI54635.2022.00044},
  doi          = {10.1109/ISVLSI54635.2022.00044},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/ZouZCWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-14498,
  author       = {Minhui Zou and
                  Junlong Zhou and
                  Xiaotong Cui and
                  Wei Wang and
                  Shahar Kvatinsky},
  title        = {Enhancing Security of Memristor Computing System Through Secure Weight
                  Mapping},
  journal      = {CoRR},
  volume       = {abs/2206.14498},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.14498},
  doi          = {10.48550/ARXIV.2206.14498},
  eprinttype    = {arXiv},
  eprint       = {2206.14498},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-14498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/SunZCLDF21,
  author       = {Shaofei Sun and
                  Hongxin Zhang and
                  Xiaotong Cui and
                  Qiang Li and
                  Liang Dong and
                  Xing Fang},
  title        = {Analysis of Electromagnetic Information Leakage Based on Cryptographic
                  Integrated Circuits},
  journal      = {Entropy},
  volume       = {23},
  number       = {11},
  pages        = {1508},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23111508},
  doi          = {10.3390/E23111508},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/SunZCLDF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ZhangLXZCS20,
  author       = {Hongxin Zhang and
                  Jia Liu and
                  Jun Xu and
                  Fan Zhang and
                  Xiaotong Cui and
                  Shaofei Sun},
  title        = {Electromagnetic radiation-based {IC} device identification and verification
                  using deep learning},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2020},
  number       = {1},
  pages        = {206},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13638-020-01808-z},
  doi          = {10.1186/S13638-020-01808-Z},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ZhangLXZCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/DongZSZCG20,
  author       = {Liang Dong and
                  Hongxin Zhang and
                  Shaofei Sun and
                  Lei Zhu and
                  Xiaotong Cui and
                  Bablu K. Ghosh},
  title        = {An Effective Simulation Analysis of Transient Electromagnetic Multiple
                  Faults},
  journal      = {Sensors},
  volume       = {20},
  number       = {7},
  pages        = {1976},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20071976},
  doi          = {10.3390/S20071976},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/DongZSZCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/CuiSZWWDK20,
  author       = {Xiaotong Cui and
                  Samah Mohamed Saeed and
                  Alwin Zulehner and
                  Robert Wille and
                  Kaijie Wu and
                  Rolf Drechsler and
                  Ramesh Karri},
  title        = {On the Difficulty of Inserting Trojans in Reversible Computing Architectures},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {8},
  number       = {4},
  pages        = {960--972},
  year         = {2020},
  url          = {https://doi.org/10.1109/TETC.2018.2823315},
  doi          = {10.1109/TETC.2018.2823315},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/CuiSZWWDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangCCZ20,
  author       = {Xing Zhang and
                  Xiaotong Cui and
                  Kefei Cheng and
                  Liang Zhang},
  title        = {A Convolutional Encoder Network for Intrusion Detection in Controller
                  Area Networks},
  booktitle    = {16th International Conference on Computational Intelligence and Security,
                  {CIS} 2020, Nanning, China, November 27-30, 2020},
  pages        = {366--369},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CIS52066.2020.00084},
  doi          = {10.1109/CIS52066.2020.00084},
  timestamp    = {Wed, 05 May 2021 14:53:25 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangCCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jetc/CuiZWGK19,
  author       = {Xiaotong Cui and
                  Jeff Jun Zhang and
                  Kaijie Wu and
                  Siddharth Garg and
                  Ramesh Karri},
  title        = {Split Manufacturing-Based Register Transfer-Level Obfuscation},
  journal      = {{ACM} J. Emerg. Technol. Comput. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {11:1--11:22},
  year         = {2019},
  url          = {https://doi.org/10.1145/3289156},
  doi          = {10.1145/3289156},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jetc/CuiZWGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SunZDCCK19,
  author       = {Shaofei Sun and
                  Hongxin Zhang and
                  Liang Dong and
                  Xiaotong Cui and
                  Weijun Cheng and
                  Muhammad Saad Khan},
  title        = {A Novel Multi-Objective Electromagnetic Analysis Based on Genetic
                  Algorithm},
  journal      = {Sensors},
  volume       = {19},
  number       = {24},
  pages        = {5542},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19245542},
  doi          = {10.3390/S19245542},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/SunZDCCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LongACL18,
  author       = {Linbo Long and
                  Qing Ai and
                  Xiaotong Cui and
                  Jun Liu},
  title        = {{TTEC:} Data Allocation Optimization for Morphable Scratchpad Memory
                  in Embedded Systems},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {54701--54712},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2872762},
  doi          = {10.1109/ACCESS.2018.2872762},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LongACL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jetc/CuiKWK18,
  author       = {Xiaotong Cui and
                  Elnaz Koopahi and
                  Kaijie Wu and
                  Ramesh Karri},
  title        = {Hardware Trojan Detection Using the Order of Path Delay},
  journal      = {{ACM} J. Emerg. Technol. Comput. Syst.},
  volume       = {14},
  number       = {3},
  pages        = {33:1--33:23},
  year         = {2018},
  url          = {https://doi.org/10.1145/3229050},
  doi          = {10.1145/3229050},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jetc/CuiKWK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/ZouCSW18,
  author       = {Minhui Zou and
                  Xiaotong Cui and
                  Liang Shi and
                  Kaijie Wu},
  title        = {Potential Trigger Detection for Hardware Trojans},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {37},
  number       = {7},
  pages        = {1384--1395},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCAD.2017.2753201},
  doi          = {10.1109/TCAD.2017.2753201},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/ZouCSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/Cui0K18,
  author       = {Xiaotong Cui and
                  Kaijie Wu and
                  Ramesh Karri},
  title        = {Hardware Trojan detection using path delay order encoding with process
                  variation tolerance},
  booktitle    = {23rd {IEEE} European Test Symposium, {ETS} 2018, Bremen, Germany,
                  May 28 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ETS.2018.8400708},
  doi          = {10.1109/ETS.2018.8400708},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/Cui0K18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/SaeedCZWD0K18,
  author       = {Samah Mohamed Saeed and
                  Xiaotong Cui and
                  Alwin Zulehner and
                  Robert Wille and
                  Rolf Drechsler and
                  Kaijie Wu and
                  Ramesh Karri},
  editor       = {Iris Bahar},
  title        = {{IC/IP} piracy assessment of reversible logic},
  booktitle    = {Proceedings of the International Conference on Computer-Aided Design,
                  {ICCAD} 2018, San Diego, CA, USA, November 05-08, 2018},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3240765.3240817},
  doi          = {10.1145/3240765.3240817},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccad/SaeedCZWD0K18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/CuiSW17,
  author       = {Xiaotong Cui and
                  Liang Shi and
                  Kaijie Wu},
  title        = {Towards trustworthy storage using SSDs with proprietary {FTL}},
  journal      = {Microprocess. Microsystems},
  volume       = {55},
  pages        = {82--90},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.micpro.2017.10.003},
  doi          = {10.1016/J.MICPRO.2017.10.003},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/CuiSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SaeedCWZ0DK17,
  author       = {Samah Mohamed Saeed and
                  Xiaotong Cui and
                  Robert Wille and
                  Alwin Zulehner and
                  Kaijie Wu and
                  Rolf Drechsler and
                  Ramesh Karri},
  title        = {Towards Reverse Engineering Reversible Logic},
  journal      = {CoRR},
  volume       = {abs/1704.08397},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.08397},
  eprinttype    = {arXiv},
  eprint       = {1704.08397},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SaeedCWZ0DK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CuiSZWD0K17,
  author       = {Xiaotong Cui and
                  Samah Mohamed Saeed and
                  Alwin Zulehner and
                  Robert Wille and
                  Rolf Drechsler and
                  Kaijie Wu and
                  Ramesh Karri},
  title        = {On the Difficulty of Inserting Trojans in Reversible Computing Architectures},
  journal      = {CoRR},
  volume       = {abs/1705.00767},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.00767},
  eprinttype    = {arXiv},
  eprint       = {1705.00767},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CuiSZWD0K17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/CuiWWS16,
  author       = {Xiaotong Cui and
                  Kaijie Wu and
                  Tongquan Wei and
                  Edwin Hsing{-}Mean Sha},
  title        = {Worst-Case Finish Time Analysis for DAG-Based Applications in the
                  Presence of Transient Faults},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {31},
  number       = {2},
  pages        = {267--283},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11390-016-1626-6},
  doi          = {10.1007/S11390-016-1626-6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/CuiWWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/Cui0GK16,
  author       = {Xiaotong Cui and
                  Kaijie Wu and
                  Siddharth Garg and
                  Ramesh Karri},
  title        = {Can flexible, domain specific programmable logic prevent {IP} theft?},
  booktitle    = {2016 {IEEE} International Symposium on Defect and Fault Tolerance
                  in {VLSI} and Nanotechnology Systems, {DFT} 2016, Storrs, CT, USA,
                  September 19-20, 2016},
  pages        = {153--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DFT.2016.7684088},
  doi          = {10.1109/DFT.2016.7684088},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/Cui0GK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/CuiZSW15,
  author       = {Xiaotong Cui and
                  Minhui Zou and
                  Liang Shi and
                  Kaijie Wu},
  editor       = {Wolfgang Nebel and
                  David Atienza},
  title        = {Towards trustable storage using SSDs with proprietary {FTL}},
  booktitle    = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
                  Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
                  9-13, 2015},
  pages        = {1213--1216},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2757093},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/CuiZSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/CuiZWS14,
  author       = {Xiaotong Cui and
                  Jun Zhang and
                  Kaijie Wu and
                  Edwin Hsing{-}Mean Sha},
  title        = {Efficient feasibility analysis of {DAG} scheduling with real-time
                  constraints in the presence of faults},
  booktitle    = {19th Asia and South Pacific Design Automation Conference, {ASP-DAC}
                  2014, Singapore, January 20-23, 2014},
  pages        = {131--136},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ASPDAC.2014.6742878},
  doi          = {10.1109/ASPDAC.2014.6742878},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/CuiZWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/CuiMSW14,
  author       = {Xiaotong Cui and
                  Kun Ma and
                  Liang Shi and
                  Kaijie Wu},
  title        = {High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery},
  booktitle    = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San
                  Francisco, CA, USA, June 1-5, 2014},
  pages        = {157:1--157:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2593069.2593150},
  doi          = {10.1145/2593069.2593150},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/CuiMSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics