@article{AlSa'dehMeinel2012, author = {AlSa'deh, Ahmad and Meinel, Christoph}, title = {Secure neighbor discovery Review, challenges, perspectives, and recommendations}, series = {IEEE security \& privacy : building confidence in a networked world}, volume = {10}, journal = {IEEE security \& privacy : building confidence in a networked world}, number = {4}, publisher = {Inst. of Electr. and Electronics Engineers}, address = {Los Alamitos}, issn = {1540-7993}, pages = {26 -- 34}, year = {2012}, abstract = {Secure Neighbor Discovery is designed as a countermeasure to Neighbor Discovery Protocol threats. The authors discuss Secure Neighbor Discovery implementation and deployment challenges and review proposals to optimize it.}, language = {en} } @article{GerickeGumiennyMeinel2012, author = {Gericke, Lutz and Gumienny, Raja and Meinel, Christoph}, title = {Tele-board : folow the traces of your design process history}, year = {2012}, language = {en} } @article{GumiennyGerickeWenzeletal.2012, author = {Gumienny, Raja and Gericke, Lutz and Wenzel, Matthias and Meinel, Christoph}, title = {Tele-board in use : applying aq digital whiteboard system in different situations and setups}, isbn = {978-3-642-31990-7}, year = {2012}, language = {en} } @article{JobstKoeppenLindbergetal.2012, author = {Jobst, Birgit and K{\"o}ppen, Eva and Lindberg, Tilmann and Moritz, Josephine and Rhinow, Holger and Meinel, Christoph}, title = {The faith-factor in design thinking : creative confidence through education at the design thinking schools Potsdam and Standford?}, isbn = {978-3-642-31990-7}, year = {2012}, language = {en} } @article{LindbergKoeppenRauthetal.2012, author = {Lindberg, Tilmann and K{\"o}ppen, Eva and Rauth, Ingo and Meinel, Christoph}, title = {On the perection, adoption and Implementation of design thinking in the IT industry}, year = {2012}, language = {en} } @article{MeinelLeifer2012, author = {Meinel, Christoph and Leifer, Larry}, title = {Design thinking research}, isbn = {978-3-642-31990-7}, year = {2012}, language = {en} } @article{MeinelLeifer2012, author = {Meinel, Christoph and Leifer, Larry}, title = {Design thinking research}, year = {2012}, language = {en} } @article{NoweskiScheerBuettneretal.2012, author = {Noweski, Christine and Scheer, Andrea and B{\"u}ttner, Nadja and Thienen, Julia von and Erdmann, Johannes and Meinel, Christoph}, title = {Towards a paradigm shift in education practice : developing twenty-first century skills with design thinking}, isbn = {978-3-642-31990-7}, year = {2012}, language = {en} } @article{QuasthoffMeinel2012, author = {Quasthoff, Matthias and Meinel, Christoph}, title = {Supporting object-oriented programming of semantic-web software}, series = {IEEE transactions on systems, man, and cybernetics : Part C, Applications and reviews}, volume = {42}, journal = {IEEE transactions on systems, man, and cybernetics : Part C, Applications and reviews}, number = {1}, publisher = {Inst. of Electr. and Electronics Engineers}, address = {Piscataway}, issn = {1094-6977}, doi = {10.1109/TSMCC.2011.2151282}, pages = {15 -- 24}, year = {2012}, abstract = {This paper presents the state of the art in the development of Semantic-Web-enabled software using object-oriented programming languages. Object triple mapping (OTM) is a frequently used method to simplify the development of such software. A case study that is based on interviews with developers of OTM frameworks is presented at the core of this paper. Following the results of the case study, the formalization of OTM is kept separate from optional but desirable extensions of OTM with regard to metadata, schema matching, and integration into the Semantic-Web infrastructure. The material that is presented is expected to not only explain the development of Semantic-Web software by the usage of OTM, but also explain what properties of Semantic-Web software made developers come up with OTM. Understanding the latter will be essential to get nonexpert software developers to use Semantic-Web technologies in their software.}, language = {en} } @article{RafieevonLoewisMeinel2012, author = {Rafiee, Hosnieh and von Loewis, Martin and Meinel, Christoph}, title = {IPv6 Deployment and Spam Challenges}, series = {IEEE Internet computing}, volume = {16}, journal = {IEEE Internet computing}, number = {6}, publisher = {Inst. of Electr. and Electronics Engineers}, address = {Los Alamitos}, issn = {1089-7801}, pages = {22 -- 29}, year = {2012}, abstract = {Spam has posed a serious problem for users of email since its infancy. Today, automated strategies are required to deal with the massive amount of spam traffic. IPv4 networks offer a variety of solutions to reduce spam, but IPv6 networks' large address space and use of temporary addresses - both of which are particularly vulnerable to spam attacks - makes dealing with spam and the use of automated approaches much more difficult. IPv6 thus poses a unique security issue for ISPs because it's more difficult for them to differentiate between good IP addresses and those that are known to originate spam messages.}, language = {en} }